A Social Network Based Analysis of Deceptive Communication in Online Chat

被引:0
作者
Pak, Jinie [1 ]
Zhou, Lina [1 ]
机构
[1] UMBC, Dept Informat Syst, Baltimore, MD 21250 USA
来源
E-LIFE: WEB-ENABLED CONVERGENCE OF COMMERCE, WORK, AND SOCIAL LIFE | 2012年 / 108卷
关键词
Deception Detection; Online Deception; Cues to Deception; Social Network Analysis; Online Chat; BEHAVIOR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The digital information era has allowed increasing online deception opportunities. In addition, the performance of detecting deception has been no better than chance in face-to-face communication, and is reported to be even worse in computer-mediated communication (CMC). Thus, there is a great need to uncover effective cues to deception in CMC. Online interaction weaves an implicit social network. However, Deception in CMC has not been examined from the social network perspective. To fill this gap, this research explores interaction patterns of deceivers in online chat. Based on an analysis of social networks created from online chat messages, this study provides preliminary evidence for the efficacy of social network based metrics in discriminating deceivers from truth-tellers. The findings of this study have significant implications for deception research in social media.
引用
收藏
页码:55 / 65
页数:11
相关论文
共 25 条
[1]  
[Anonymous], 2009, P 4 INT C COMMUNITIE, DOI DOI 10.1145/1556460.1556497
[2]  
Bengel J, 2004, LECT NOTES COMPUT SC, V3073, P266
[3]  
Berglund T. O, 2009, LANGUAGE INTERNET, V6
[4]  
Bonsignore Elizabeth M., 2009, 2009 International Conference on Computational Science and Engineering (CSE), P332, DOI 10.1109/CSE.2009.120
[5]  
Buller DB, 1996, COMMUN THEOR, V6, P203, DOI 10.1111/j.1468-2885.1996.tb00127.x
[6]  
Burgoon JK, 2003, LECT NOTES COMPUT SC, V2665, P91
[7]   Deception and its Detection Under Synchronous and Asynchronous Computer-Mediated Communication [J].
Burgoon, Judee K. ;
Chen, Fang ;
Twitchell, Douglas P. .
GROUP DECISION AND NEGOTIATION, 2010, 19 (04) :345-366
[8]   Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity [J].
Carlson, JR ;
George, JF .
GROUP DECISION AND NEGOTIATION, 2004, 13 (02) :191-210
[9]   Crime data mining: A general framework and some examples [J].
Chen, HC ;
Chung, WY ;
Xu, JJ ;
Wang, G ;
Qin, Y ;
Chau, M .
COMPUTER, 2004, 37 (04) :50-+
[10]  
Erickson T., 2002, P ACM CHI MINN MN AP