{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:55Z","timestamp":1750221355772,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":31,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Science Foundation Ireland","award":["12\/RC\/2289"],"award-info":[{"award-number":["12\/RC\/2289"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3184558.3186567","type":"proceedings-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T18:04:25Z","timestamp":1524074665000},"page":"807-811","source":"Crossref","is-referenced-by-count":0,"title":["Truth or Lie"],"prefix":"10.1145","author":[{"given":"Lucas","family":"Azevedo","sequence":"first","affiliation":[{"name":"Insight Centre for Data Analytics, Galway, Ireland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","reference":[{"key":"key-10.1145\/3184558.3186567-1","unstructured":"John Arbuthnot and Jonathan Swift. 1874. The Art of Political Lying. K. Tompkins."},{"key":"key-10.1145\/3184558.3186567-2","unstructured":"Mevan Babakar and Will Moy. 2016. The State of Automated Factchecking. Full Fact (2016)."},{"key":"key-10.1145\/3184558.3186567-3","unstructured":"Charles F Bond Jr and Bella M DePaulo. 2006. Accuracy of deception judgments. Personality and social psychology Review 10, 3 (2006), 214--234."},{"key":"key-10.1145\/3184558.3186567-4","doi-asserted-by":"crossref","unstructured":"Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2011. Information credibility on twitter. In Proceedings of the 20th international conference on World wide web. ACM, 675--684.","DOI":"10.1145\/1963405.1963500"},{"key":"key-10.1145\/3184558.3186567-5","unstructured":"Giovanni Luca Ciampaglia, Prashant Shiralkar, Luis M Rocha, Johan Bollen, Filippo Menczer, and Alessandro Flammini. 2015. Computational fact checking from knowledge networks. PloS one 10, 6 (2015), e0128193."},{"key":"key-10.1145\/3184558.3186567-6","unstructured":"Niall J Conroy, Victoria L Rubin, and Yimin Chen. 2015. Automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology 52, 1 (2015), 1--4."},{"key":"key-10.1145\/3184558.3186567-7","doi-asserted-by":"crossref","unstructured":"Aron Culotta and Jeffrey Sorensen. 2004. Dependency tree kernels for relation extraction. In Proceedings of the 42nd annual meeting on association for computational linguistics. Association for Computational Linguistics, 423.","DOI":"10.3115\/1218955.1219009"},{"key":"key-10.1145\/3184558.3186567-8","unstructured":"Bella M DePaulo, James J Lindsay, Brian E Malone, Laura Muhlenbruck, Kelly Charlton, and Harris Cooper. 2003. Cues to deception. Psychological bulletin 129, 1 (2003), 74."},{"key":"key-10.1145\/3184558.3186567-9","doi-asserted-by":"crossref","unstructured":"Xin Luna Dong, Laure Berti-Equille, and Divesh Srivastava. 2009. Integrating conflicting data: the role of source dependence. Proceedings of the VLDB Endowment 2, 1 (2009), 550--561.","DOI":"10.14778\/1687627.1687690"},{"key":"key-10.1145\/3184558.3186567-10","unstructured":"Christie M Fuller, David P Biros, and Rick L Wilson. 2009. Decision support for determining veracity via linguistic-based cues. Decision Support Systems 46, 3 (2009), 695--703."},{"key":"key-10.1145\/3184558.3186567-11","unstructured":"JF George and BT Keane. 2006. Deception detection by third party observers. In deception detection symposium, 39th annual Hawaii international conference on system sciences."},{"key":"key-10.1145\/3184558.3186567-12","unstructured":"Cale Guthrie Weissman. 2015. \"Computers can now tell the difference between real breaking news and internet trolls trying to dupe us\". https:\/\/goo.gl\/x2D2Zi. (2015)."},{"key":"key-10.1145\/3184558.3186567-13","unstructured":"Jeffrey T Hancock, Jennifer Thom-Santelli, and Thompson Ritchie. 2004. Deception and design: The impact of communication technology on lying behavior. In Proceedings of the SIGCHI. ACM, 129--134."},{"key":"key-10.1145\/3184558.3186567-14","unstructured":"Naeemul Hassan, Bill Adair, James T Hamilton, Chengkai Li, Mark Tremayne, Jun Yang, and Cong Yu. 2015. The quest to automate fact-checking. world (2015)."},{"key":"key-10.1145\/3184558.3186567-15","doi-asserted-by":"crossref","unstructured":"Julia Hirschberg, Stefan Benus, Jason M Brenier, Frank Enos, Sarah Friedman, Sarah Gilman, Cynthia Girand, Martin Graciarena, Andreas Kathol, Laura Michaelis, et al. 2005. Distinguishing deceptive from non-deceptive speech. In Ninth European Conference on Speech Communication and Technology.","DOI":"10.21437\/Interspeech.2005-580"},{"key":"key-10.1145\/3184558.3186567-16","doi-asserted-by":"crossref","unstructured":"Sejeong Kwon, Meeyoung Cha, Kyomin Jung, Wei Chen, and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In Data Mining (ICDM), 2013 IEEE 13th International Conference on. IEEE, 1103--1108.","DOI":"10.1109\/ICDM.2013.61"},{"key":"key-10.1145\/3184558.3186567-17","doi-asserted-by":"crossref","unstructured":"David F Larcker and Anastasia A Zakolyukina. 2012. Detecting deceptive discussions in conference calls. Journal of Accounting Research 50, 2 (2012), 495--540.","DOI":"10.1111\/j.1475-679X.2012.00450.x"},{"key":"key-10.1145\/3184558.3186567-18","doi-asserted-by":"crossref","unstructured":"Bing Liu, Minqing Hu, and Junsheng Cheng. 2005. Opinion observer: analyzing and comparing opinions on the web. In Proceedings of the 14th international conference on World Wide Web. ACM, 342--351.","DOI":"10.1145\/1060745.1060797"},{"key":"key-10.1145\/3184558.3186567-19","doi-asserted-by":"crossref","unstructured":"Jing Ma, Wei Gao, and Kam-Fai Wong. 2017. Detect Rumors in Microblog Posts Using Propagation Structure via Kernel Learning. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vol. 1. 708--717.","DOI":"10.18653\/v1\/P17-1066"},{"key":"key-10.1145\/3184558.3186567-20","doi-asserted-by":"crossref","unstructured":"Rada Mihalcea and Carlo Strapparava. 2009. The lie detector: Explorations in the automatic recognition of deceptive language. In Proceedings of the ACLIJCNLP 2009 Conference Short Papers. Association for Computational Linguistics, 309--312.","DOI":"10.3115\/1667583.1667679"},{"key":"key-10.1145\/3184558.3186567-21","doi-asserted-by":"crossref","unstructured":"Ndapandula Nakashole and Tom M Mitchell. 2014. Language-Aware Truth Assessment of Fact Candidates. In ACL (1). 1009--1019.","DOI":"10.3115\/v1\/P14-1095"},{"key":"key-10.1145\/3184558.3186567-22","doi-asserted-by":"crossref","unstructured":"Kashyap Popat, Subhabrata Mukherjee, Jannik Str&#246;tgen, and Gerhard Weikum. 2017. Where the Truth Lies: Explaining the Credibility of Emerging Claims on the Web and Social Media. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 1003--1012.","DOI":"10.1145\/3041021.3055133"},{"key":"key-10.1145\/3184558.3186567-23","unstructured":"Victoria L Rubin, Yimin Chen, and Niall J Conroy. 2015. Deception detection for news: three types of fakes. Proceedings of the Association for Information Science and Technology 52, 1 (2015), 1--4."},{"key":"key-10.1145\/3184558.3186567-24","doi-asserted-by":"crossref","unstructured":"Victoria L Rubin and Niall Conroy. 2012. Discerning truth from deception: Human judgments and automation efforts. First Monday 17, 3 (2012).","DOI":"10.5210\/fm.v17i3.3933"},{"key":"key-10.1145\/3184558.3186567-25","doi-asserted-by":"crossref","unstructured":"Andreas Vlachos and Sebastian Riedel. 2014. Fact Checking: Task definition and dataset construction. In Proceedings of the ACL 2014. 18--22.","DOI":"10.3115\/v1\/W14-2508"},{"key":"key-10.1145\/3184558.3186567-26","unstructured":"Aldert Vrij. 2000. Detecting lies and deceit: The psychology of lying and implications for professional practice. Wiley."},{"key":"key-10.1145\/3184558.3186567-27","doi-asserted-by":"crossref","unstructured":"Janyce Wiebe, Theresa Wilson, Rebecca Bruce, Matthew Bell, and Melanie Martin. 2006. Learning subjective language. Learning 30, 3 (2006).","DOI":"10.1162\/0891201041850885"},{"key":"key-10.1145\/3184558.3186567-28","unstructured":"Jim Wright. 2017. \"Fake News, Facts, and Alternative Facts\" [How News Has Changed]. https:\/\/www.coursera.org\/learn\/ fake-news-facts-alternative-facts-michiganx-teachout-2x\/lecture\/sxW8D\/ veteran-journalist-on-how-news-has-changed. (2017). Accessed 10\/04\/17."},{"key":"key-10.1145\/3184558.3186567-29","doi-asserted-by":"crossref","unstructured":"You Wu, Pankaj K Agarwal, Chengkai Li, Jun Yang, and Cong Yu. 2014. Toward computational fact-checking. Proceedings of the VLDB Endowment 7, 7 (2014), 589--600.","DOI":"10.14778\/2732286.2732295"},{"key":"key-10.1145\/3184558.3186567-30","doi-asserted-by":"crossref","unstructured":"Lina Zhou, Judee K Burgoon, Jay F Nunamaker, and Doug Twitchell. 2004. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group decision and negotiation 13, 1 (2004), 81--106.","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"key-10.1145\/3184558.3186567-31","unstructured":"Arkaitz Zubiaga, Maria Liakata, Rob Procter, Geraldine Wong Sak Hoi, and Peter Tolmie. 2016. Analysing how people orient to and spread rumours in social media by looking at conversational threads. PloS one 11, 3 (2016), e0150989."}],"event":{"number":"2018","sponsor":["IW3C2, International World Wide Web Conference Committee","SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"WWW '18","name":"Companion of the The Web Conference 2018","start":{"date-parts":[[2018,4,23]]},"location":"Lyon, France","end":{"date-parts":[[2018,4,27]]}},"container-title":["Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3184558.3186567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3186567&ftid=1958266&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:07Z","timestamp":1750213567000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3184558.3186567"}},"subtitle":["Automatically Fact Checking News"],"proceedings-subject":"The Web Conference 2018","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1145\/3184558.3186567","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}