{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:08Z","timestamp":1755838688977,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,21]],"date-time":"2018-04-21T00:00:00Z","timestamp":1524268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Research Council","award":["648785"],"award-info":[{"award-number":["648785"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,21]]},"DOI":"10.1145\/3173574.3174135","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T15:38:35Z","timestamp":1524238715000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Veritaps"],"prefix":"10.1145","author":[{"given":"Aske","family":"Mottelson","sequence":"first","affiliation":[{"name":"University of Copenhagen, Copenhagen, Danmark, Denmark"}]},{"given":"Jarrod","family":"Knibbe","sequence":"additional","affiliation":[{"name":"University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Kasper","family":"Hornb\u00e6k","sequence":"additional","affiliation":[{"name":"University of Copenhagen, Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2018,4,21]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024916214403"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2013.03.029"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"volume-title":"The Polygraph and Lie Detection","author":"National Research Council. 2003.","key":"e_1_3_2_2_4_1","unstructured":"National Research Council. 2003. The Polygraph and Lie Detection. The National Academies Press."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979046"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2395131.2395138"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797614520714"},{"key":"e_1_3_2_2_8_1","series-title":"Syntax and Semantics","volume-title":"Speech Acts","author":"Grice H. P.","unstructured":"H. P. Grice. 1975. Logic and Conversation. In Syntax and Semantics: Vol. 3: Speech Acts, P. Cole and J. L. Morgan (Eds.). Academic Press, San Diego, CA, 41--58."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807551"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518782"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2012.11.010"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/08824096.2010.496334"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370270"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1667583.1667679"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971654"},{"key":"e_1_3_2_2_17_1","volume-title":"Cultural Differences in Ultimatum Game Experiments: Evidence from a Meta-Analysis. Experimental Economics 7, 2 (01","author":"Oosterbeek Hessel","year":"2004","unstructured":"Hessel Oosterbeek, Randolph Sloof, and Gijs van de Kuilen. 2004. Cultural Differences in Ultimatum Game Experiments: Evidence from a Meta-Analysis. Experimental Economics 7, 2 (01 Jun 2004), 171--188."},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies -","volume":"1","author":"Ott Myle","year":"2002","unstructured":"Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T. Hancock. 2011. Finding Deceptive Opinion Spam by Any Stretch of the Imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1 (HLT '11). Association for Computational Linguistics, Stroudsburg, PA, USA, 309--319. http:\/\/dl.acm.org\/citation.cfm?id=2002472.2002512"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804252"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.40.3.355"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1097\/00001756-200109170-00019"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:SORE.0000027411.35832.53"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650210396868"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1155\/2005\/804026"},{"volume-title":"Detecting Lies and Deceit: Pitfalls and Opportunities","author":"Vrij Aldert","key":"e_1_3_2_2_25_1","unstructured":"Aldert Vrij. 2011. Detecting Lies and Deceit: Pitfalls and Opportunities. Wiley."},{"key":"e_1_3_2_2_26_1","volume-title":"Lewis","author":"Williams Emma J.","year":"2013","unstructured":"Emma J. Williams, Lewis A. Bott, John Patrick, and Michael B. Lewis. 2013. Telling Lies: The Irrepressible Truth? PLOS ONE 8, 4 (04 2013), 1--14."},{"key":"e_1_3_2_2_27_1","volume-title":"Verbal and Nonverbal Communication of Deception. Advances in Experimental Social Psychology 14 (Jan","author":"Zuckerman Miron","year":"1981","unstructured":"Miron Zuckerman, Bella M. DePaulo, and Robert Rosenthal. 1981. Verbal and Nonverbal Communication of Deception. Advances in Experimental Social Psychology 14 (Jan. 1981), 1--59."}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Montreal QC Canada","acronym":"CHI '18"},"container-title":["Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3174135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3174135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:11Z","timestamp":1750210751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3174135"}},"subtitle":["Truth Estimation from Mobile Interaction"],"short-title":[],"issued":{"date-parts":[[2018,4,21]]},"references-count":27,"alternative-id":["10.1145\/3173574.3174135","10.1145\/3173574"],"URL":"https:\/\/doi.org\/10.1145\/3173574.3174135","relation":{},"subject":[],"published":{"date-parts":[[2018,4,21]]},"assertion":[{"value":"2018-04-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}