{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:21:26Z","timestamp":1774797686207,"version":"3.50.1"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1068026"],"award-info":[{"award-number":["1068026"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["2008-ST-061-BS0002"],"award-info":[{"award-number":["2008-ST-061-BS0002"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2013,8]]},"abstract":"<jats:p>Computer-mediated deception is prevalent and may have serious consequences for individuals, organizations, and society. This article investigates several metrics as predictors of deception in synchronous chat-based environments, where participants must often spontaneously formulate deceptive responses. Based on cognitive load theory, we hypothesize that deception influences response time, word count, lexical diversity, and the number of times a chat message is edited. Using a custom chatbot to conduct interviews in an experiment, we collected 1,572 deceitful and 1,590 truthful chat-based responses. The results of the experiment confirm that deception is positively correlated with response time and the number of edits and negatively correlated to word count. Contrary to our prediction, we found that deception is not significantly correlated with lexical diversity. Furthermore, the age of the participant moderates the influence of deception on response time. Our results have implications for understanding deceit in chat-based communication and building deception-detection decision aids in chat-based systems.<\/jats:p>","DOI":"10.1145\/2499962.2499967","type":"journal-article","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T13:52:04Z","timestamp":1398261124000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues"],"prefix":"10.1145","volume":"4","author":[{"given":"Douglas C.","family":"Derrick","sequence":"first","affiliation":[{"name":"University of Nebraska at Omaha"}]},{"given":"Thomas O.","family":"Meservy","sequence":"additional","affiliation":[{"name":"Brigham Young University"}]},{"given":"Jeffrey L.","family":"Jenkins","sequence":"additional","affiliation":[{"name":"Brigham Young University"}]},{"given":"Judee K.","family":"Burgoon","sequence":"additional","affiliation":[{"name":"University of Arizona"}]},{"suffix":"Jr.","given":"Jay F.","family":"Nunamaker","sequence":"additional","affiliation":[{"name":"University of Arizona"}]}],"member":"320","published-online":{"date-parts":[[2013,8]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"6","article-title":"Who can best catch a liar? A meta-analysis of individual differences in detecting deception","volume":"15","author":"Aamodt M. G.","year":"2006","unstructured":"Aamodt , M. G. and Custer , H. 2006 . Who can best catch a liar? A meta-analysis of individual differences in detecting deception . Foren. Exam. 15 , 1, 6 -- 11 . Aamodt, M. G. and Custer, H. 2006. Who can best catch a liar? A meta-analysis of individual differences in detecting deception. Foren. Exam. 15, 1, 6--11.","journal-title":"Foren. Exam."},{"key":"e_1_2_1_2_1","unstructured":"ABC NEWS. 2007. Cyber bullying leads to teen\u2019s suicide.  ABC NEWS. 2007. Cyber bullying leads to teen\u2019s suicide."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/02699050701769819"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.55.4.362"},{"key":"e_1_2_1_5_1","unstructured":"Atkin D. Jeffres L. Neuendorf K. Lange R. and Skalski P. 2005. Why they chat: Predicting adoption and use of chat rooms. In Online News and the Public Michael B. Salwen Bruce Garrison and Paul D. Driscoll Eds. Lawrence Erlbaum Associates Inc. Mahwah NJ 303--320.  Atkin D. Jeffres L. Neuendorf K. Lange R. and Skalski P. 2005. Why they chat: Predicting adoption and use of chat rooms. In Online News and the Public Michael B. Salwen Bruce Garrison and Paul D. Driscoll Eds. Lawrence Erlbaum Associates Inc. Mahwah NJ 303--320."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2174\/187152706778559309"},{"key":"e_1_2_1_9_1","volume-title":"The Central Nervous System: Structure and Function","author":"Brodal P.","unstructured":"Brodal , P. 2004. The Central Nervous System: Structure and Function 3 rd Ed. Oxford University Press , Oxford, UK . Brodal, P. 2004. The Central Nervous System: Structure and Function 3rd Ed. Oxford University Press, Oxford, UK.","edition":"3"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X94134003"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the National Communication Convention.","author":"Burgoon J. K.","unstructured":"Burgoon , J. K. , Burgoon , M. , Broneck , K. , Alvaro , E. , and Nunmaker , J. F . 2002. Effects of synchronicity and proximity on group communication . In Proceedings of the National Communication Convention. Burgoon, J. K., Burgoon, M., Broneck, K., Alvaro, E., and Nunmaker, J. F. 2002. Effects of synchronicity and proximity on group communication. In Proceedings of the National Communication Convention."},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Cerf V. G. 1973. RFC 439: PARRY encounters the DOCTOR.   Cerf V. G. 1973. RFC 439: PARRY encounters the DOCTOR.","DOI":"10.17487\/rfc0439"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.88"},{"key":"e_1_2_1_15_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","unstructured":"Cohen , J. 1988. Statistical Power Analysis for the Behavioral Sciences 2 nd Ed. Lawrence Erlbaum Associates, Inc. Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences 2nd Ed. Lawrence Erlbaum Associates, Inc.","edition":"2"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/00332747.1969.11023575"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Elkins A. C. and Derrick D. C. 2013. The sound of trust: Voice as a measurement of trust during interactions with embodied conversational agents. Group Dec. Negot. 1--17.  Elkins A. C. and Derrick D. C. 2013. The sound of trust: Voice as a measurement of trust during interactions with embodied conversational agents. Group Dec. Negot. 1--17.","DOI":"10.1007\/s10726-012-9339-x"},{"key":"e_1_2_1_19_1","unstructured":"Epstein R. 2007. The truth about online dating. Scientific Amer. 26--34.  Epstein R. 2007. The truth about online dating. Scientific Amer. 26--34."},{"key":"e_1_2_1_20_1","unstructured":"Fitzpatrick M. 2006. Deleting online predators Act (H.R. 5319).  Fitzpatrick M. 2006. Deleting online predators Act (H.R. 5319)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1101\/lm.921708"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/2678130"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.05.003"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Hauser M. D. Chomsky N. and Fitch W. T. 2002. The faculty of language: What is it who has it and how did it evolve? Science 298 5598 1569--1579.  Hauser M. D. Chomsky N. and Fitch W. T. 2002. The faculty of language: What is it who has it and how did it evolve? Science 298 5598 1569--1579.","DOI":"10.1126\/science.298.5598.1569"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872097778940597"},{"key":"e_1_2_1_27_1","first-page":"69","article-title":"Biological basis of the stress response. News Physi","volume":"8","author":"Henry J. P.","year":"1993","unstructured":"Henry , J. P. 1993 . Biological basis of the stress response. News Physi . Sci. 8 , 69 -- 73 . Henry, J. P. 1993. Biological basis of the stress response. News Physi. Sci. 8, 69--73.","journal-title":"Sci."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/00335638409383698"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280107"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.88.1.67"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1929916.1929919"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(97)00012-5"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070710.2070716"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1002\/hbm.10020"},{"key":"e_1_2_1_35_1","unstructured":"National Institutes of Health. 2011. National Library of Medicine - Medical Subject Headings. http:\/\/www.nlm.nih.gov\/cgi\/mesh\/2010\/MBcgi?mode=&term=Psychophysiology.  National Institutes of Health. 2011. National Library of Medicine - Medical Subject Headings. http:\/\/www.nlm.nih.gov\/cgi\/mesh\/2010\/MBcgi?mode=&term=Psychophysiology."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/0022-4537.00153"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191703"},{"key":"e_1_2_1_38_1","unstructured":"Nass C. Moon Y. Morkes J. Kim E.-Y. and Fogg B. J. 1997. Computers are social actors: A review of current research. In Human Values and the Design of Computer Technology Cambridge University Press Cambridge UK 137--161.   Nass C. Moon Y. Morkes J. Kim E.-Y. and Fogg B. J. 1997. Computers are social actors: A review of current research. In Human Values and the Design of Computer Technology Cambridge University Press Cambridge UK 137--161."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.3732-07.2008"},{"key":"e_1_2_1_41_1","unstructured":"Reed K. Doty D. H. and May D. R. 2005. The impact of aging on self-efficacy and computer skill acquisition. J. Manager.-Issues. Summer.  Reed K. Doty D. H. and May D. R. 2005. The impact of aging on self-efficacy and computer skill acquisition. J. Manager.-Issues. Summer."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cub.2007.03.044"},{"key":"e_1_2_1_43_1","volume-title":"Reading between the lines: An evaluation of the scientific content analysis technique (SCAN). Police research series paper 135","author":"Smith N.","unstructured":"Smith , N. 2001. Reading between the lines: An evaluation of the scientific content analysis technique (SCAN). Police research series paper 135 . London : UK Home Office, Research, Development and Statistics Directorate . Smith, N. 2001. Reading between the lines: An evaluation of the scientific content analysis technique (SCAN). Police research series paper 135. London: UK Home Office, Research, Development and Statistics Directorate."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1190"},{"key":"e_1_2_1_45_1","first-page":"257","article-title":"Cognitive load during problem-solving - Effects on learning. Cogniti","volume":"12","author":"Sweller J.","year":"1988","unstructured":"Sweller , J. 1988 . Cognitive load during problem-solving - Effects on learning. Cogniti . Sci. 12 , 2, 257 -- 285 . Sweller, J. 1988. Cognitive load during problem-solving - Effects on learning. Cogniti. Sci. 12, 2, 257--285.","journal-title":"Sci."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_45"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.95.21.12695"},{"key":"e_1_2_1_48_1","volume-title":"Detecting Lies and Deceit: the Psychology of Lying and the Implications for Professional Practice","author":"Vrij A.","unstructured":"Vrij , A. 2000. Detecting Lies and Deceit: the Psychology of Lying and the Implications for Professional Practice . Wiley , New York . Vrij, A. 2000. Detecting Lies and Deceit: the Psychology of Lying and the Implications for Professional Practice. Wiley, New York."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8971.11.1.3"},{"key":"e_1_2_1_50_1","volume-title":"Detecting Lies and Deceit: Pitfalls and Opportunities","author":"Vrij A.","unstructured":"Vrij , A. 2008. Detecting Lies and Deceit: Pitfalls and Opportunities 2 nd Ed. Wiley , Hoboken, NJ . Vrij, A. 2008. Detecting Lies and Deceit: Pitfalls and Opportunities 2nd Ed. Wiley, Hoboken, NJ.","edition":"2"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-006-9066-4"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21648"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2005.849652"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.109"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.889914"},{"key":"e_1_2_1_56_1","volume-title":"Proceeding of the 37th Hawaii International Conference on System Sciences. Hawaii.","author":"Zhou L.","unstructured":"Zhou , L. and Zhang , D . 2004. Can online behavior unveil deceivers? An exploratory investigation of deception in instant messaging . In Proceeding of the 37th Hawaii International Conference on System Sciences. Hawaii. Zhou, L. and Zhang, D. 2004. Can online behavior unveil deceivers? An exploratory investigation of deception in instant messaging. In Proceeding of the 37th Hawaii International Conference on System Sciences. Hawaii."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.03.012"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"e_1_2_1_59_1","first-page":"1","article-title":"Verbal and nonverbal communication of deception. In Advances Experimental Social Pyschology, L. Berkowitz Ed., Academic Press","volume":"14","author":"Zuckerman M.","year":"1981","unstructured":"Zuckerman , M. , DeP\u00e1ulo , B. M. , and Rosenthal , R. 1981 . Verbal and nonverbal communication of deception. In Advances Experimental Social Pyschology, L. Berkowitz Ed., Academic Press , Inc. , vol. 14 , 1 -- 60 . Zuckerman, M., DeP\u00e1ulo, B. M., and Rosenthal, R. 1981. Verbal and nonverbal communication of deception. In Advances Experimental Social Pyschology, L. Berkowitz Ed., Academic Press, Inc., vol. 14, 1--60.","journal-title":"Inc."}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499962.2499967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2499962.2499967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:00Z","timestamp":1750232040000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499962.2499967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":59,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["10.1145\/2499962.2499967"],"URL":"https:\/\/doi.org\/10.1145\/2499962.2499967","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8]]},"assertion":[{"value":"2012-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}