{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:15:13Z","timestamp":1751606113273,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["W911NF-12-1-0043"],"award-info":[{"award-number":["W911NF-12-1-0043"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2740908.2742575","type":"proceedings-article","created":{"date-parts":[[2016,2,6]],"date-time":"2016-02-06T00:01:06Z","timestamp":1454716866000},"page":"947-952","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Discriminative Models for Predicting Deception Strategies"],"prefix":"10.1145","author":[{"given":"Darren Scott","family":"Appling","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Erica J.","family":"Briscoe","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Clayton J.","family":"Hutto","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1023\/A:1021387326192"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1023\/A:1010933404324"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/HICSS.2014.186"},{"volume-title":"Army Research Institute for the Behavioral and Social Sciences","year":"1998","author":"Buller D. B.","key":"e_1_3_2_1_4_1"},{"unstructured":"D. B. Buller J. K. Burgoon J. Daly and J. Wiemann. Deception: Strategic and nonstrategic communication. Strategic interpersonal communication pages 191--223 1994.  D. B. Buller J. K. Burgoon J. Daly and J. Wiemann. Deception: Strategic and nonstrategic communication. Strategic interpersonal communication pages 191--223 1994.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"crossref","unstructured":"D. B. Buller J. K. Burgoon C. H. White and A. S. Ebesu. Interpersonal deception vii behavioral profiles of falsification equivocation and concealment. Journal of language and social psychology 13(4):366--395 1994.  D. B. Buller J. K. Burgoon C. H. White and A. S. Ebesu. Interpersonal deception vii behavioral profiles of falsification equivocation and concealment. Journal of language and social psychology 13(4):366--395 1994.","key":"e_1_3_2_1_6_1","DOI":"10.1177\/0261927X94134002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/3-540-44853-5_7","volume-title":"Intelligence and Security Informatics","author":"Burgoon J. K.","year":"2003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1080\/03637759609376374"},{"volume-title":"In Proc. of SDAIR-94","year":"1994","author":"Cavnar W. B.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1963405.1963509"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1037\/0022-3514.70.5.979"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1037\/0033-2909.129.1.74"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1017\/S0142716410000068"},{"volume-title":"Experimental Learning Methods","year":"1969","author":"Eady P. M.","key":"e_1_3_2_1_14_1"},{"volume-title":"DTIC Document","year":"1969","author":"Ekman P.","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.5555\/1390681.1442794"},{"unstructured":"D. Graff and C. Cieri. English gigaword ldc2003t05. 2003.  D. Graff and C. Cieri. English gigaword ldc2003t05. 2003.","key":"e_1_3_2_1_17_1"},{"volume-title":"Cengage Learning","year":"2013","author":"Heiman G.","key":"e_1_3_2_1_18_1"},{"volume-title":"TN: Naval Air Station","year":"1975","author":"Kincaid J.","key":"e_1_3_2_1_19_1"},{"volume-title":"Pew Internet & American Life Project","year":"2010","author":"Lenhart A.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.3115\/v1\/P14-5010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.3115\/993268.993301"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.5555\/2002472.2002512"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1146\/annurev.psych.54.101601.145041"},{"issue":"6","key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"82","DOI":"10.13092\/lo.56.257","article-title":"The linguistics of social networking: A study of writing conventions on facebook","volume":"56","author":"P\u00e9rez-Sabater C.","year":"2012","journal-title":"Linguistik online"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.5555\/1920331.1920377"},{"doi-asserted-by":"crossref","unstructured":"Y. R. Tausczik and J. W. Pennebaker. The psychological meaning of words: Liwc and computerized text analysis methods. Journal of language and social psychology 29(1):24--54 2010.  Y. R. Tausczik and J. W. Pennebaker. The psychological meaning of words: Liwc and computerized text analysis methods. Journal of language and social psychology 29(1):24--54 2010.","key":"e_1_3_2_1_27_1","DOI":"10.1177\/0261927X09351676"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.17161\/STR.1808.6098"},{"issue":"2","key":"e_1_3_2_1_29_1","first-page":"147","article-title":"An empirical investigation of deception behavior in instant messaging. Professional Communication","volume":"48","author":"Zhou L.","year":"2005","journal-title":"IEEE Transactions on"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/HICSS.2008.109"},{"volume-title":"Quality in Government and Business Symposium","author":"Zhou L.","first-page":"1","key":"e_1_3_2_1_31_1"}],"event":{"sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"WWW '15","name":"WWW '15: 24th International World Wide Web Conference","location":"Florence Italy"},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2740908.2742575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2740908.2742575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:24Z","timestamp":1750227144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2740908.2742575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":31,"alternative-id":["10.1145\/2740908.2742575","10.1145\/2740908"],"URL":"https:\/\/doi.org\/10.1145\/2740908.2742575","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}