{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:18:48Z","timestamp":1771633128718,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Transactions on Asian Language Information Processing"],"published-print":{"date-parts":[[2014,6]]},"abstract":"<jats:p>In hopes of sparking a discussion, I argue for much needed research on automated deception detection in Asian languages. The task of discerning truthful texts from deceptive ones is challenging, but a logical sequel to opinion mining. I suggest that applied computational linguists pursue broader interdisciplinary research on cultural differences and pragmatic use of language in Asian cultures, before turning to detection methods based on a primarily Western (English-centric) worldview. Deception is fundamentally human, but how do various cultures interpret and judge deceptive behavior?<\/jats:p>","DOI":"10.1145\/2605292","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:16:16Z","timestamp":1403612176000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["TALIP Perspectives, Guest Editorial Commentary"],"prefix":"10.1145","volume":"13","author":[{"given":"Victoria L.","family":"Rubin","sequence":"first","affiliation":[{"name":"University of Western Ontario"}]}],"member":"320","published-online":{"date-parts":[[2014,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/08934210802381862"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 22nd International Conference on Computational Linguistics.","author":"Bachenko J."},{"key":"e_1_2_1_3_1","volume-title":"Attributions. In Proceedings of the AAAI Spring Symposium: Exploring Attitude and Affect in Text: Theories and Applications.","author":"Bergler S."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167200265010"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the EACL Workshop on Computational Approaches to Deception Detection. http:\/\/www.chss.montclair.edu\/linguistics\/DeceptionDetection.html.","author":"EACL.","year":"2012"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0104_5"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0363-8111(94)90039-6"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022022101032006005"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.001"},{"key":"e_1_2_1_11_1","volume-title":"Deception Detection and Credibility Assessment Symposium, M. Jensen, T. Meservy, J. Burgoon, and J. Nunamaker, Eds.","author":"George J. F."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 26th Annual Conference of the Cognitive Science Society.","author":"Hancock J. T."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.66"},{"key":"e_1_2_1_15_1","volume-title":"Rapid Screening Technologies. Deception Detection and Credibility Assessment Symposium.","author":"Jensen M."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli.2010.36.2.36201"},{"key":"e_1_2_1_17_1","first-page":"924","article-title":"Chinese and Canadian children\u2019s evaluations of lying and truth telling: Similarities and differences in the context of pro-and antisocial behaviors","volume":"68","author":"Lee K.","year":"1997","journal-title":"Child Devel."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.05.002"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Liu B. 2012. Sentiment Analysis and Opinion Mining. Morgan and Claypool.  Liu B. 2012. Sentiment Analysis and Opinion Mining . Morgan and Claypool.","DOI":"10.1007\/978-3-031-02145-9"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 47th Annual Meeting of the Association for Computational Linguistics.","author":"Mihalcea R."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_a_00095"},{"key":"e_1_2_1_22_1","unstructured":"Pennebaker J. and Francis M. 1999. Linguistic Inquiry and Word Count: LIWC. Erlbaum Publishers.  Pennebaker J. and Francis M. 1999. Linguistic Inquiry and Word Count: LIWC . Erlbaum Publishers."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01498980"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1614108.1614144"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1920331.1920377"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the American Society for Information Science and Technology Annual Meeting.","volume":"49","author":"Rubin V. L."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the American Society for Information Science and Technology Annual Meeting.","volume":"48","author":"Rubin V. L."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v17i3.3933"},{"key":"e_1_2_1_29_1","article-title":"Truth and deception at the rhetorical structure level","author":"Rubin V. L.","year":"2014","journal-title":"J. Amer. Soc. Inf. Sci. Technol. To appear."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the Workshop on Computational Approaches to Deception Detection Annual Meeting.","author":"Rubin V. L."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_a_00096"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/jip.121"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11671299_52"},{"key":"e_1_2_1_34_1","first-page":"33","article-title":"Confucianism as cultural constraint: A comparison of Confucian values of Japanese and Korean university students","volume":"3","author":"Tamai K.","year":"2002","journal-title":"Int. Educ. J."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/10400410802355152"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.2013.41.2.335"},{"key":"e_1_2_1_37_1","first-page":"11","article-title":"An improving deception detection method in computer-mediated communication J","volume":"7","author":"Zhang H.","year":"2012","journal-title":"Netw."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.109"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0065-2601(08)60369-X","article-title":"Verbal and nonverbal communication of deception","volume":"14","author":"Zuckerman M.","year":"1981","journal-title":"Adv. Exper. Social Psychol."}],"container-title":["ACM Transactions on Asian Language Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2605292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2605292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:42Z","timestamp":1750230102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2605292"}},"subtitle":["Pragmatic and Cultural Considerations for Deception Detection in Asian Languages"],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["10.1145\/2605292"],"URL":"https:\/\/doi.org\/10.1145\/2605292","relation":{},"ISSN":["1530-0226","1558-3430"],"issn-type":[{"value":"1530-0226","type":"print"},{"value":"1558-3430","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6]]},"assertion":[{"value":"2014-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}