{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:03:53Z","timestamp":1760061833987,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,9]]},"abstract":"<jats:p>The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage.<\/jats:p>","DOI":"10.1145\/2629612","type":"journal-article","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T19:38:44Z","timestamp":1408736324000},"page":"72-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["Online deception in social media"],"prefix":"10.1145","volume":"57","author":[{"given":"Michail","family":"Tsikerdekis","sequence":"first","affiliation":[{"name":"University of Kentucky, Lexington, KY"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"University of Kentucky, Lexington, KY"}]}],"member":"320","published-online":{"date-parts":[[2014,9]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Washington, D.C.","author":"Brenner J.","year":"2013","unstructured":"Brenner , J. and Smith , A . 72% of Online Adults are Social Networking Site Users. Pew Internet & American Life Project , Washington, D.C. , Aug. 5, 2013 ; http:\/\/pewinternet.org\/Reports\/2013\/social-networking-sites.aspx Brenner, J. and Smith, A. 72% of Online Adults are Social Networking Site Users. Pew Internet & American Life Project, Washington, D.C., Aug. 5, 2013; http:\/\/pewinternet.org\/Reports\/2013\/social-networking-sites.aspx"},{"key":"e_1_2_1_2_1","first-page":"3","article-title":"Interpersonal deception theory","volume":"6","author":"Buller D.B.","year":"1996","unstructured":"Buller , D.B. and Burgoon , J.K . Interpersonal deception theory . Communication Theory 6 , 3 ( Aug. 1996 ), 203--242. Buller, D.B. and Burgoon, J.K. Interpersonal deception theory. Communication Theory 6, 3 (Aug. 1996), 203--242.","journal-title":"Communication Theory"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1109\/HICSS.2005.78"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.5555\/820759.821924"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.4108\/icst.collaboratecom.2012.250417"},{"key":"e_1_2_1_6_1","volume-title":"D.C.","author":"Damphousse K.R.","year":"2007","unstructured":"Damphousse , K.R. , Pointon , L. , Upchurch , D. , and Moore , R.K . Assessing the Validity of Voice Stress Analysis Tools in a Jail Setting: Final Report to the U.S. Department of Justice. Washington , D.C. , 2007 ; http:\/\/www.ncjrs.gov\/pdffiles1\/nij\/grants\/219031.pdf Damphousse, K.R., Pointon, L., Upchurch, D., and Moore, R.K. Assessing the Validity of Voice Stress Analysis Tools in a Jail Setting: Final Report to the U.S. Department of Justice. Washington, D.C., 2007; http:\/\/www.ncjrs.gov\/pdffiles1\/nij\/grants\/219031.pdf"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1002\/jip.145"},{"key":"e_1_2_1_8_1","volume-title":"Communities in Cyberspace","author":"Donath J.S.","year":"1999","unstructured":"Donath , J.S. Identity and deception in the virtual community . In Communities in Cyberspace , M.A. Smith and P. Kollock, Eds. Routledge, New York , 1999 , 29--59. Donath, J.S. Identity and deception in the virtual community. In Communities in Cyberspace, M.A. Smith and P. Kollock, Eds. Routledge, New York, 1999, 29--59."},{"key":"e_1_2_1_9_1","volume-title":"States of Mind: American and Post-Soviet Perspectives on Contemporary Issues in Psychology","author":"Ekman P.","year":"1997","unstructured":"Ekman P. Deception , lying, and demeanor . In States of Mind: American and Post-Soviet Perspectives on Contemporary Issues in Psychology , D.F. Halpern and A.E. Voiskounsky, Eds. Oxford University Press , New York , 1997 , 93--105. Ekman P. Deception, lying, and demeanor. In States of Mind: American and Post-Soviet Perspectives on Contemporary Issues in Psychology, D.F. Halpern and A.E. Voiskounsky, Eds. Oxford University Press, New York, 1997, 93--105."},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1016\/j.ijhcs.2007.04.005"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1109\/3468.852434"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Ninth European Conference on Speech Communication and Technology","author":"Hirschberg J.","year":"2005","unstructured":"Hirschberg , J. , Benus , S. , Brenier , J.M. et al. Distinguishing deceptive from non-deceptive speech . In Proceedings of the Ninth European Conference on Speech Communication and Technology ( Lisbon, Portugal, Sept. 4--8 , 2005 ), 1833--1836. Hirschberg, J., Benus, S., Brenier, J.M. et al. Distinguishing deceptive from non-deceptive speech. In Proceedings of the Ninth European Conference on Speech Communication and Technology (Lisbon, Portugal, Sept. 4--8, 2005), 1833--1836."},{"key":"e_1_2_1_13_1","volume-title":"Exploiting Online Games: Cheating Massively Distributed Systems","author":"Hoglund G.","year":"2007","unstructured":"Hoglund , G. and McGraw , G. Exploiting Online Games: Cheating Massively Distributed Systems . Addison-Wesley Professional , Boston , 2007 . Hoglund, G. and McGraw, G. Exploiting Online Games: Cheating Massively Distributed Systems. Addison-Wesley Professional, Boston, 2007."},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1016\/j.dss.2010.08.009"},{"key":"e_1_2_1_15_1","volume-title":"The early bird catches the news: Nine things you should know about microblogging. Business Horizons 54, 2 (Mar.--Apr","author":"Kaplan A.M.","year":"2011","unstructured":"Kaplan , A.M. and Haenlein , M . The early bird catches the news: Nine things you should know about microblogging. Business Horizons 54, 2 (Mar.--Apr . 2011 ), 105--113. Kaplan, A.M. and Haenlein, M. The early bird catches the news: Nine things you should know about microblogging. Business Horizons 54, 2 (Mar.--Apr. 2011), 105--113."},{"key":"e_1_2_1_16_1","volume-title":"Users of the world, unite! The challenges and opportunities of social media. Business Horizons 53, 1 (Jan.--Feb","author":"Kaplan A.M.","year":"2010","unstructured":"Kaplan , A.M. and Haenlein , M . Users of the world, unite! The challenges and opportunities of social media. Business Horizons 53, 1 (Jan.--Feb . 2010 ), 59--68. Kaplan, A.M. and Haenlein, M. Users of the world, unite! The challenges and opportunities of social media. Business Horizons 53, 1 (Jan.--Feb. 2010), 59--68."},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1023\/A:1022330011811"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1109\/ISI.2008.4565045"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1109\/HICSS.2005.122"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.5555\/820748.821358"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.5555\/962749.962830"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1109\/HICSS.2013.633"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1109\/TSP.2004.839932(410) 53"},{"key":"e_1_2_1_24_1","volume-title":"Security and privacy in mobile social network","author":"Shen X.","year":"2013","unstructured":"Shen , X. Security and privacy in mobile social network . IEEE Network 27, 5 (Sept .-- Oct. 2013 ), 2--3. Shen, X. Security and privacy in mobile social network. IEEE Network 27, 5 (Sept.--Oct. 2013), 2--3."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the Workshop on Language Analysis in Social Media","author":"Solorio T.","year":"2013","unstructured":"Solorio , T. , Hasan , R. , and Mizan , M . A case study of sockpuppet detection in Wikipedia . In Proceedings of the Workshop on Language Analysis in Social Media , A. Farzindar, M. Gamon, M. Nagarajan, D. Inkpen, and C. Danescu-Niculescu-Mizil, Eds. (Atlanta, June 3). Association for Computational Linguistics , Stroudsburg, PA, 2013 , 59--68. Solorio, T., Hasan, R., and Mizan, M. A case study of sockpuppet detection in Wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media, A. Farzindar, M. Gamon, M. Nagarajan, D. Inkpen, and C. Danescu-Niculescu-Mizil, Eds. (Atlanta, June 3). Association for Computational Linguistics, Stroudsburg, PA, 2013, 59--68."},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1109\/SocialCom-PASSAT.2012.137"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1109\/MC.2007.437"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1089\/1094931041291295"},{"key":"e_1_2_1_29_1","volume-title":"The Art of War (translated by Samuel B. Griffith)","author":"Tzu S.","year":"1963","unstructured":"Tzu , S. The Art of War (translated by Samuel B. Griffith) . Oxford University Press , New York , 1963 . Tzu, S. The Art of War (translated by Samuel B. Griffith). Oxford University Press, New York, 1963."},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1109\/TSMCA.2006.871799"},{"key":"e_1_2_1_31_1","first-page":"1292","article-title":"The fallacy of conventional signalling","volume":"340","author":"Zahavi A","year":"1993","unstructured":"Zahavi , A . The fallacy of conventional signalling . Philosophical Transactions of the Royal Society of London 340 , 1292 ( May 1993 ), 227--230. Zahavi, A. The fallacy of conventional signalling. Philosophical Transactions of the Royal Society of London 340, 1292 (May 1993), 227--230.","journal-title":"Philosophical Transactions of the Royal Society of London"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2629612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:29Z","timestamp":1750227209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":31,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["10.1145\/2629612"],"URL":"https:\/\/doi.org\/10.1145\/2629612","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2014,9]]},"assertion":[{"value":"2014-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}