{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T21:57:17Z","timestamp":1726437437570},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1016\/j.chb.2020.106348","type":"journal-article","created":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T01:57:05Z","timestamp":1584583025000},"page":"106348","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["Spotting faked 5 stars ratings in E-Commerce using mouse dynamics"],"prefix":"10.1016","volume":"109","author":[{"given":"Merylin","family":"Monaro","sequence":"first","affiliation":[]},{"given":"Emanuela","family":"Cannonito","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Gamberini","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Sartori","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2020.106348_bib1","series-title":"The (honest) truth about dishonesty: How we lie to everyone--especially ourselves","author":"Ariely","year":"2012"},{"issue":"1","key":"10.1016\/j.chb.2020.106348_bib2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forest","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine Learning"},{"key":"10.1016\/j.chb.2020.106348_bib3","series-title":"Intelligence and security informatics. ISI 2003. Lecture Notes in computer science","first-page":"91","article-title":"Detecting deception through linguistic analysis","volume":"Vol. 2665","author":"Burgoon","year":"2003"},{"key":"10.1016\/j.chb.2020.106348_bib4","series-title":"Statistical power analysis for the behavioral sciences","author":"Cohen","year":"1988"},{"key":"10.1016\/j.chb.2020.106348_bib5","series-title":"Cognitive dissonance: Fifty years of a classic theory","author":"Cooper","year":"2007"},{"issue":"2","key":"10.1016\/j.chb.2020.106348_bib6","article-title":"Detecting deceptive chat-based communication using typing behavior and message cues","volume":"4","author":"Derrick","year":"2013","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"issue":"4","key":"10.1016\/j.chb.2020.106348_bib7","doi-asserted-by":"crossref","first-page":"486","DOI":"10.3758\/PBR.17.4.486","article-title":"The action dynamics of overcoming the truth","volume":"17","author":"Duran","year":"2010","journal-title":"Psychonomic Bulletin & Review"},{"key":"10.1016\/j.chb.2020.106348_bib8","series-title":"Online consumer reviews. The case of misleading or fake reviews","year":"2015"},{"issue":"1","key":"10.1016\/j.chb.2020.106348_bib9","doi-asserted-by":"crossref","first-page":"226","DOI":"10.3758\/BRM.42.1.226","article-title":"MouseTracker: Software for studying real-time mouse-tracking method","volume":"42","author":"Freeman","year":"2010","journal-title":"Behavior Research Methods"},{"issue":"59","key":"10.1016\/j.chb.2020.106348_bib10","article-title":"Hand in motion reveals mind in motion","volume":"2","author":"Freeman","year":"2011","journal-title":"Frontiers in Psychology"},{"issue":"1","key":"10.1016\/j.chb.2020.106348_bib11","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","article-title":"The WEKA data mining software: An update","volume":"11","author":"Hall","year":"2009","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"10.1016\/j.chb.2020.106348_bib12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00527","article-title":"Sleight of hand: Identifying concealed information by monitoring mouse-cursor movements","volume":"20","author":"Jenkins","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"issue":"9","key":"10.1016\/j.chb.2020.106348_bib13","article-title":"Understading the Yelp filter: An exploratory study","volume":"19","author":"Kamerer","year":"2014","journal-title":"First Monday"},{"issue":"1\u20132","key":"10.1016\/j.chb.2020.106348_bib14","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10994-005-0466-3","article-title":"Logistic model trees","volume":"95","author":"Landwehr","year":"2005","journal-title":"Machine Learning"},{"issue":"12","key":"10.1016\/j.chb.2020.106348_bib15","doi-asserted-by":"crossref","first-page":"3412","DOI":"10.1287\/mnsc.2015.2304","article-title":"Fake it till you make it: Reputation, competition, and Yelp review fraud","volume":"62","author":"Luca","year":"2016","journal-title":"Management Science"},{"key":"10.1016\/j.chb.2020.106348_bib16","author":"Magnusson"},{"issue":"2","key":"10.1016\/j.chb.2020.106348_bib17","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s10603-012-9216-7","article-title":"Taking fake online consumer reviews seriously","volume":"36","author":"Malbon","year":"2013","journal-title":"Journal of Consumer Policy"},{"issue":"1","key":"10.1016\/j.chb.2020.106348_bib18","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1467-9280.2008.02041.x","article-title":"Action dynamics reveal parallel competition in decision making","volume":"19","author":"McKinstry","year":"2008","journal-title":"Psychological Science"},{"issue":"December","key":"10.1016\/j.chb.2020.106348_bib19","doi-asserted-by":"crossref","first-page":"1976","DOI":"10.1038\/s41598-018-20462-6","article-title":"Covert lie detection using keyboard dynamics","volume":"8","author":"Monaro","year":"2018","journal-title":"Scientific Reports"},{"issue":"5","key":"10.1016\/j.chb.2020.106348_bib20","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0177851","article-title":"\u201cThe detection of faked identity using unexpected questions and mouse dynamics.\u201d edited by zhong-ke gao","volume":"12","author":"Monaro","year":"2017","journal-title":"PloS One"},{"key":"10.1016\/j.chb.2020.106348_bib21","article-title":"Type me the truth!: Detecting deceitful users via keystroke dynamics","volume":"Vol. 60","author":"Monaro","year":"2017"},{"issue":"June","key":"10.1016\/j.chb.2020.106348_bib22","article-title":"The detection of malingering: A new tool to identify made-up depression","volume":"9","author":"Monaro","year":"2018","journal-title":"Frontiers in Psychiatry"},{"key":"10.1016\/j.chb.2020.106348_bib23","series-title":"In ICWSM","article-title":"What Yelp fake review filter might Be doing?","author":"Mukherjee","year":"2013"},{"key":"10.1016\/j.chb.2020.106348_bib24","series-title":"Goodbye stars, hello thumbs","author":"Netflix","year":"2017"},{"issue":"5","key":"10.1016\/j.chb.2020.106348_bib25","doi-asserted-by":"crossref","DOI":"10.1177\/0146167203029005010","article-title":"Lying words: Predicting deception from linguistic styles","volume":"29","author":"Newman","year":"2003","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"January","key":"10.1016\/j.chb.2020.106348_bib26","article-title":"Machine learning in psychometrics and psychological research","volume":"10","author":"Orr\u00f9","year":"2020","journal-title":"Frontiers in Psychology"},{"key":"10.1016\/j.chb.2020.106348_bib27","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","volume":"Vol. 1","author":"Ott","year":"2011"},{"key":"10.1016\/j.chb.2020.106348_bib28","series-title":"2018 IEEE games, entertainment, media conference (GEM), 1\u20139. IEEE","article-title":"In-game motion dynamics provide a means of exploring the cognitive dynamics of deception","author":"O'Hora","year":"2018"},{"key":"10.1016\/j.chb.2020.106348_bib29","series-title":"The New York times","article-title":"Give yourself 5 stars? Online, it might cost you","author":"Streitfeld","year":"2013"},{"key":"10.1016\/j.chb.2020.106348_bib30","series-title":"Detecting deception through reaction times. Detecting deception","author":"Verschuere","year":"2015"},{"issue":"4","key":"10.1016\/j.chb.2020.106348_bib31","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1023\/A:1006610329284","article-title":"Detecting deceit via analysis of verbal and nonverbal behavior","volume":"24","author":"Vrij","year":"2000","journal-title":"Journal of Nonverbal Behavior"},{"issue":"March","key":"10.1016\/j.chb.2020.106348_bib32","article-title":"The effects of money on fake rating behavior in E-commerce: Electrophysiological time course evidence from consumers","volume":"12","author":"Wang","year":"2018","journal-title":"Frontiers in Neuroscience"},{"key":"10.1016\/j.chb.2020.106348_bib33","series-title":"\u201cAmazon's fake review problem is now worse than ever, study suggests","author":"Woollacott","year":"2017"},{"issue":"June","key":"10.1016\/j.chb.2020.106348_bib34","article-title":"The detection of malingered amnesia: An approach involving multiple strategies in a mock crime","volume":"10","author":"Zago","year":"2019","journal-title":"Frontiers in Psychiatry"},{"key":"10.1016\/j.chb.2020.106348_bib35","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/TPC.2005.849652","article-title":"An empirical investigation of deception behavior in instant messaging","volume":"48","author":"Zhou","year":"2005","journal-title":"IEEE Transactions on Professional Communications"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563220301011?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563220301011?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T02:58:28Z","timestamp":1588906708000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563220301011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":35,"alternative-id":["S0747563220301011"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2020.106348","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2020,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Spotting faked 5 stars ratings in E-Commerce using mouse dynamics","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2020.106348","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106348"}}