{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:28:33Z","timestamp":1766136513128},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T00:00:00Z","timestamp":1407801600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/s13388-014-0008-2","type":"journal-article","created":{"date-parts":[[2014,8,11]],"date-time":"2014-08-11T20:39:27Z","timestamp":1407789567000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Automated deception detection of 911 call transcripts"],"prefix":"10.1186","volume":"3","author":[{"given":"Mary B","family":"Burns","sequence":"first","affiliation":[]},{"given":"Kevin C","family":"Moffitt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,12]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1207\/s15327957pspr1003_2","volume":"10","author":"CF Bond","year":"2006","unstructured":"Bond CF, DePaulo BM: Accuracy of deception judgments. Personal. Soc. Psychol. Rev. 2006, 10: 214\u2013234. 10.1207\/s15327957pspr1003_2","journal-title":"Personal. Soc. Psychol. Rev"},{"key":"8_CR2","first-page":"6","volume":"15","author":"M Aamodt","year":"2006","unstructured":"Aamodt M, Custer H: Who can best catch a liar? Forensic Examiner 2006, 15: 6\u201311.","journal-title":"Forensic Examiner"},{"key":"8_CR3","first-page":"22","volume":"77","author":"SH Adams","year":"2008","unstructured":"Adams SH, Harpster T: 911 homicide calls and statement analysis. FBI Law Enforce. Bull. 2008, 77: 22\u201331.","journal-title":"FBI Law Enforce. Bull"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1177\/1088767908328073","volume":"13","author":"T Harpster","year":"2009","unstructured":"Harpster T, Adams SH, Jarvis JP: Analyzing 911 homicide calls for indicators of guilt or innocence. Homicide Stud. 2009, 13: 69\u201393. 10.1177\/1088767908328073","journal-title":"Homicide Stud"},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/07421222.2004.11045779","volume":"20","author":"L Zhou","year":"2004","unstructured":"Zhou L, Burgoon JK, Twitchell DP, Qin T, Nunamaker JF Jr: A comparison of classification methods for predicting deception in computer-mediated communication. J. Manag. Inf. Syst. 2004, 20: 139\u2013165.","journal-title":"J. Manag. Inf. Syst"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","volume":"13","author":"L Zhou","year":"2004","unstructured":"Zhou L, Burgoon JK, Nunamaker JF Jr, Twitchell DP: Automating linguistics based cues for detecting deception in text based asynchronous computer mediated communication: an empirical investigation. Group Decis. Negotiation 2004, 13: 81\u2013106. 10.1023\/B:GRUP.0000011944.62889.6f","journal-title":"Group Decis. Negotiation"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1023\/A:1015332606792","volume":"26","author":"S Mann","year":"2002","unstructured":"Mann S, Vrij A, Bull R: Suspects, lies, and videotape: an analysis of authentic high-stake liars. Law Hum. Behav. 2002, 26: 365\u2013376. 10.1023\/A:1015332606792","journal-title":"Law Hum. Behav"},{"key":"8_CR8","first-page":"504","volume-title":"Lecture Notes in Computer Science","author":"CM Fuller","year":"2006","unstructured":"Fuller CM, Biros DP, Adkins M, Burgoon JK, Nunamaker JF Jr, Coulon S: Detecting Deception in Person-Of-Interest Statements. In Lecture Notes in Computer Science. Springer, Berlin\/Heidelberg; 2006:504\u2013509."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"CM Fuller, DP Biros, D Delen, Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection, in Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS) (Waikoloa, Big Island, HI, 2008) CM Fuller, DP Biros, D Delen, Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection, in Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS) (Waikoloa, Big Island, HI, 2008)","DOI":"10.1109\/HICSS.2008.158"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/j.dss.2008.11.001","volume":"46","author":"CM Fuller","year":"2008","unstructured":"Fuller CM, Biros DP, Wilson RL: Decision support for determining veracity via linguistic-based cues. Decis. Support. Syst. 2008, 46: 695\u2013703. 10.1016\/j.dss.2008.11.001","journal-title":"Decis. Support. Syst"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1177\/0261927X11416201","volume":"30","author":"ML Jensen","year":"2011","unstructured":"Jensen ML, Bessarabova E, Adame B, Burgoon JK, Slowik SM: Deceptive language by innocent and guilty criminal suspects: the influence of dominance, question, and guilt on interview responses. J. Lang. Soc. Psychol. 2011, 30: 357\u2013375. 10.1177\/0261927X11416201","journal-title":"J. Lang. Soc. Psychol"},{"key":"8_CR12","first-page":"1","volume":"72","author":"VA Sandoval","year":"2003","unstructured":"Sandoval VA: Strategies to avoid interview contamination. FBI Law Enforce. Bull. 2003, 72: 1\u201312.","journal-title":"FBI Law Enforce. Bull"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MIS.2012.116","volume":"27","author":"A Nijholt","year":"2012","unstructured":"Nijholt A, Arkin RC, Brault S, Kulpa R, Multon F, Bideau B, Traum DR, Hung H, Santos E Jr, Li D, et al.: Trends and controversies. IEEE Intell. Syst. 2012, 27: 60\u201375. 10.1109\/MIS.2012.116","journal-title":"IEEE Intell. Syst"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.dss.2010.08.009","volume":"50","author":"S Humpherys","year":"2011","unstructured":"Humpherys S, Moffitt KC, Burns MB, Burgoon JK, Felix WF: Identification of fraudulent financial statements using linguistic credibility analysis. Decis. Support. Syst. 2011, 50: 585\u2013594. 10.1016\/j.dss.2010.08.009","journal-title":"Decis. Support. Syst"},{"key":"8_CR15","unstructured":"KC Moffitt, MB Burns, What does that mean? Investigating Obfuscation and Readability Cues as Indicators of Deception in Fraudulent Financial Reports, in Fifteenth Americas Conference on Information Systems (San Francisco, CA, 2009), p. 2009 KC Moffitt, MB Burns, What does that mean? Investigating Obfuscation and Readability Cues as Indicators of Deception in Fraudulent Financial Reports, in Fifteenth Americas Conference on Information Systems (San Francisco, CA, 2009), p. 2009"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01638530701739181","volume":"45","author":"JT Hancock","year":"2008","unstructured":"Hancock JT, Curry LE, Goorha S, Woodworth M: On lying and being lied to: a linguistic analysis of deception in computer-mediated communication. Discourse Process. 2008, 45: 1\u201323. 10.1080\/01638530701739181","journal-title":"Discourse Process"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1177\/0146167203029005010","volume":"29","author":"ML Newman","year":"2003","unstructured":"Newman ML, Pennebaker JW, Berry DS, Richards JM: Lying words: predicting deception from linguistic styles. Personal. Soc. Psychol. Bull. 2003, 29: 665\u2013675. 10.1177\/0146167203029005010","journal-title":"Personal. Soc. Psychol. Bull"},{"key":"8_CR18","volume-title":"Linguistic Inquiry and Word Count","author":"JW Pennebaker","year":"2001","unstructured":"Pennebaker JW, Francis ME, Booth RJ: Linguistic Inquiry and Word Count. Erlbaum Publishers, Mahway, NJ; 2001."},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0261927X09351676","volume":"29","author":"YR Tausczik","year":"2010","unstructured":"Tausczik YR, Pennebaker JW: The psychological meaning of words: LIWC and computerized text analysis methods. J. Lang. Soc. Psychol. 2010, 29: 24\u201354. 10.1177\/0261927X09351676","journal-title":"J. Lang. Soc. Psychol"},{"key":"8_CR20","first-page":"60","volume-title":"Advances in Experimental Social Psychology","author":"M Zuckerman","year":"1981","unstructured":"Zuckerman M, DePaulo BM, Rosenthal R: Verbal and Nonverbal Communication of Deception. In Advances in Experimental Social Psychology. Edited by: Berkowitz L. Academic, New York, NY; 1981:60."},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1468-2885.1996.tb00127.x","volume":"6","author":"DB Buller","year":"1996","unstructured":"Buller DB, Burgoon JK: Interpersonal deception theory. Commun. Theory 1996, 6: 203\u2013242. 10.1111\/j.1468-2885.1996.tb00127.x","journal-title":"Commun. Theory"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03637759209376245","volume":"59","author":"SA McCornack","year":"1992","unstructured":"McCornack SA: Information manipulation theory. Commun. Monogr. 1992, 59: 1\u201316. 10.1080\/03637759209376245","journal-title":"Commun. Monogr"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1037\/0033-295X.88.1.67","volume":"88","author":"M Johnson","year":"1981","unstructured":"Johnson M, Raye C: Reality monitoring. Psychol. Rev. 1981, 88: 67\u201385. 10.1037\/0033-295X.88.1.67","journal-title":"Psychol. Rev"},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BF02170076","volume":"18","author":"JK Burgoon","year":"1994","unstructured":"Burgoon JK, Buller DB: Interpersonal deception: III: effects of deceit on perceived communication and nonverbal behavior dynamics. J. Nonverbal Behav. 1994, 18: 155\u2013184. 10.1007\/BF02170076","journal-title":"J. Nonverbal Behav"},{"key":"8_CR25","volume-title":"AMCIS 2006 Proceedings","author":"CM Fuller","year":"2006","unstructured":"Fuller CM, Biros DP, Burgoon JK, Adkins M, Twitchell DP: An analysis of text-based deception detection tools. AMCIS 2006 Proceedings 2006. Paper 418 Paper 418"},{"key":"8_CR26","volume-title":"Proceedings of the 38th Hawaii International Conference on Systems Sciences (HICSS)","author":"T Qin","year":"2005","unstructured":"Qin T, Burgoon JK, Blair JP, Nunamaker JF Jr: Modality Effects in Deception Detection and Applications in Automatic Deception Detection. Proceedings of the 38th Hawaii International Conference on Systems Sciences (HICSS) 2005."},{"key":"8_CR27","volume-title":"Proceedings of the 36th Hawaii International Conference on Systems Sciences (HICSS '03)","author":"L Zhou","year":"2003","unstructured":"Zhou L, Twitchell DP, Qin T, Burgoon JK, Nunamaker JF Jr: An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. Proceedings of the 36th Hawaii International Conference on Systems Sciences (HICSS '03) 2003."},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1037\/0033-2909.129.1.74","volume":"129","author":"BM DePaulo","year":"2003","unstructured":"DePaulo BM, Lindsay JJ, Malone BE, Muhlenbruck L, Charlton K, Cooper H: Cues to deception. Psychol. Bull. 2003, 129: 74\u2013118. 10.1037\/0033-2909.129.1.74","journal-title":"Psychol. Bull"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44853-5_8","volume-title":"Intelligence and Security Informatics: First NSF\/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 Proceedings","author":"L Zhou","year":"2003","unstructured":"Zhou L, Burgoon JK, Twitchell DP: A Longitudinal Analysis of Language Behavior of Deception in E-Mail. In Intelligence and Security Informatics: First NSF\/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2\u20133, 2003 Proceedings. Edited by: Chen H, Moore R, Zeng D, Leavitt J. Springer, Berlin \/Heidelberg; 2003:102\u2013110. Lecture Notes in Computer Science Lecture Notes in Computer Science 10.1007\/3-540-44853-5_8"},{"key":"8_CR30","first-page":"77","volume":"17","author":"LN Driscoll","year":"1994","unstructured":"Driscoll LN: A validity assessment of written statements from suspects in criminal investigations using the scan technique. Police Stud: Int. Rev. Police Dev. 1994, 17: 77\u201378.","journal-title":"Police Stud: Int. Rev. Police Dev"},{"key":"8_CR31","volume-title":"Forensic Linguistics: An Introduction to Language, Crime, and Law","author":"J Olsson","year":"2004","unstructured":"Olsson J: Forensic Linguistics: An Introduction to Language, Crime, and Law. Continuum International Publishing Group, London; 2004."},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/10570310209374730","volume":"66","author":"SJ Tracy","year":"2002","unstructured":"Tracy SJ: When questioning turns to face threat: an interactional sensitivity in 911 call-taking. West. J. Commun. 2002, 66: 129\u2013157. 10.1080\/10570310209374730","journal-title":"West. J. Commun"},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1111\/j.1749-6632.1981.tb34479.x","volume":"364","author":"P Ekman","year":"1980","unstructured":"Ekman P: Mistakes when deceiving. Ann. N. Y. Acad. Sci. 1980, 364: 269\u2013278. 10.1111\/j.1749-6632.1981.tb34479.x","journal-title":"Ann. N. Y. Acad. Sci"},{"key":"8_CR34","volume-title":"Detecting Lies and Deceit: Pitfalls and Opportunities","author":"A Vrij","year":"2008","unstructured":"Vrij A: Detecting Lies and Deceit: Pitfalls and Opportunities. Wiley, Chichester, West Sussex, England; 2008."},{"key":"8_CR35","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1002\/jip.82","volume":"5","author":"A Vrij","year":"2008","unstructured":"Vrij A, Fisher R, Mann S, Leal S: A cognitive load approach to lie detection. J. Investig. Psychol. Offender Profiling 2008, 5: 39\u201343. 10.1002\/jip.82","journal-title":"J. Investig. Psychol. Offender Profiling"},{"key":"8_CR36","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1080\/106831605160512331329952","volume":"11","author":"E Rassin","year":"2005","unstructured":"Rassin E, van der Heijden S: Appearing credible? Swearing helps! Psychol. Crime Law 2005, 11: 177\u2013182. 10.1080\/106831605160512331329952","journal-title":"Psychol. Crime Law"},{"key":"8_CR37","first-page":"675","volume-title":"9th European Conference on Principles and Practice of Knowledge Discovery in Databases","author":"M Sumner","year":"2005","unstructured":"Sumner M, Frank E, Hall M: Speeding up Logistical Model Tree Induction. 9th European Conference on Principles and Practice of Knowledge Discovery in Databases 2005, 675\u2013683."},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1016\/j.paid.2004.09.022","volume":"38","author":"E Rassin","year":"2005","unstructured":"Rassin E, Muris P: Why do women swear? An explanation of reasons for and perceived efficacy of swearing in Dutch female students. Personal. Individ. Differ. 2005, 38: 1669\u20131674. 10.1016\/j.paid.2004.09.022","journal-title":"Personal. Individ. Differ"},{"key":"8_CR39","first-page":"267","volume":"4","author":"T Jay","year":"2008","unstructured":"Jay T, Janschewitz K: The pragmatics of swearing. J. Politeness Res. Lang. Beh. Cult. 2008, 4: 267\u2013288.","journal-title":"J. Politeness Res. Lang. Beh. Cult"},{"key":"8_CR40","doi-asserted-by":"crossref","DOI":"10.21236\/ADA403870","volume-title":"Comparative analysis of polygraph with other screening and diagnostic tools. No. DODPI01-R-0003","author":"PE Crewson","year":"2001","unstructured":"Crewson PE: Comparative analysis of polygraph with other screening and diagnostic tools. No. DODPI01-R-0003. Research Support Service, Ashburn, VA; 2001."},{"key":"8_CR41","first-page":"56","volume":"16","author":"CR Honts","year":"1988","unstructured":"Honts CR, Raskin DC: A field study of the validity of the directed lie control question. J. Police Sci. Adm. 1988, 16: 56\u201361.","journal-title":"J. Police Sci. Adm"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-014-0008-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0008-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0008-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0008-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T20:14:11Z","timestamp":1565727251000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-014-0008-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,12]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["8"],"URL":"https:\/\/doi.org\/10.1186\/s13388-014-0008-2","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,12]]},"assertion":[{"value":"7 July 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"8"}}