{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:39:53Z","timestamp":1729640393376,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/eisic.2013.8","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T22:24:02Z","timestamp":1384208642000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["The Effect of Personality Type on Deceptive Communication Style"],"prefix":"10.1109","author":[{"given":"Tommaso","family":"Fornaciari","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Celli","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Poesio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"126","article-title":"Sincere and deceptive statements in italian criminal proceedings","author":"fornaciari","year":"2011","journal-title":"Proc of the International Association of Forensic Linguists Tenth Biennial Conference IAFL2011"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.3115\/1273073.1273154"},{"key":"17","first-page":"1289","article-title":"An extensive empirical study of feature selection metrics for text classification","volume":"3","author":"forman","year":"2003","journal-title":"J Mach Learn Res"},{"journal-title":"Inquiry and Word Count","year":"2001","author":"pennebaker","key":"36"},{"key":"18","first-page":"2","article-title":"Lexical vs surface features in deceptive language analysis","author":"fornaciari","year":"2011","journal-title":"Proc of the ICAIL2011 Workshop Applying Human Language Technology to the Law in Conj to AHLTL2011"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1037\/h0040291"},{"key":"15","first-page":"183","article-title":"Building a forensic corpus to test language-based indicators of deception","volume":"71","author":"fitzpatrick","year":"2009","journal-title":"Comput Lang"},{"key":"34","article-title":"How old do you think i am? A study of language and age in twitter","author":"nguyen","year":"0","journal-title":"Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media 2013"},{"key":"16","first-page":"31","article-title":"Building a data collection for deception research","author":"fitzpatrick","year":"2012","journal-title":"Proc of the EACL Workshop on Computational Approaches to Deception Detection"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1093\/applin\/25.4.448"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1093\/applin\/25.4.431"},{"key":"14","first-page":"813","article-title":"Personality factors in human deception detection: Comparing human to machine performance","author":"enos","year":"2006","journal-title":"Proc of INTERSPEECH-ICSLP"},{"key":"37","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1130.003.0016","article-title":"Machines using sequential minimal optimization","author":"platt","year":"1998","journal-title":"Advances in Kernel Methods Support Vector Learning"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.4.1.5"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"38"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/14640748108400805"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-013-9140-4"},{"key":"20","first-page":"1585","article-title":"DeCour: A corpus of deceptive statements in Italian courts","author":"fornaciari","year":"2012","journal-title":"Proc of LREC12 European Language Resources Association (ELRA)"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8971.11.1.3"},{"key":"42","article-title":"Detecting lies and deceit: Pitfalls and opportunities","author":"vrij","year":"2008","journal-title":"Wiley Series in Psychology of Crime Policing and Law"},{"key":"41","first-page":"1","article-title":"The lie detector: Explorations in the automatic recognition of deceptive language","author":"strapparava","year":"2009","journal-title":"Proc ACLShort09-Proc of the ACL-IJCNLP 2009 Conference"},{"key":"40","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1328964.1328976","article-title":"Plagiarism analysis, authorship identification, and near-duplicate detection pan07","volume":"41","author":"stein","year":"2007","journal-title":"SIGIR Forum"},{"journal-title":"Practical Machine Learning Tools and Techniques With Java Implementations","year":"2005","author":"witten","key":"44"},{"key":"22","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1007\/978-3-642-24571-8_71","article-title":"Large scale personality classification of bloggers","author":"iacobelli","year":"2011","journal-title":"Lecture Notes in Computer Science"},{"key":"23","article-title":"Estimating continuous distributions in bayesian classifiers","author":"john","year":"1995","journal-title":"Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence"},{"key":"24","first-page":"1","article-title":"Effects of age and gender on blogging","author":"koppel","year":"2006","journal-title":"AAAI 2006 Spring Symposium on Computational Approaches to Analysing Weblogs"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1207\/S15327752JPA7502_6"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.3115\/1599081.1599146"},{"key":"28","first-page":"2981","article-title":"Personae: A corpus for author and personality prediction from text","author":"luyckx","year":"2008","journal-title":"Proc of LREC2008 the Sixth International Language Resources and Evaluation Conference"},{"key":"29","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1613\/jair.2349","article-title":"Using linguistic cues for the automatic recognition of personality in conversation and text","volume":"30","author":"mairesse","year":"2007","journal-title":"Journal of Artificial Intelligence Research"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801686"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1162\/coli.07-034-R2"},{"key":"10","article-title":"The NEO personality inventory manual","author":"costa jr","year":"1985","journal-title":"FL Psychological Assessment Resources"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0027633"},{"journal-title":"Introduction to Personality Toward An Integrative Science of the Person","year":"2007","author":"mischel","key":"30"},{"journal-title":"Adaptive Personality Recognition from Text","year":"2013","author":"celli","key":"7"},{"key":"6","first-page":"59","article-title":"Unsupervised personality recognition for social network sites","author":"celli","year":"2012","journal-title":"Proc of ICDS 2012 The Sixth International Conference on Digital Society"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"5","first-page":"249","article-title":"Assessing agreement on classification tasks: The kappa statistic","volume":"22","author":"carletta","year":"1996","journal-title":"Comput Linguist"},{"journal-title":"Inference and Disputed Authorship The Federalist","year":"1964","author":"mosteller","key":"31"},{"journal-title":"Gifts Differing Understanding Personality Type","year":"1980","author":"briggs","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"}],"event":{"name":"2013 European Intelligence and Security Informatics Conference (EISIC)","start":{"date-parts":[[2013,8,12]]},"location":"Uppsala, Sweden","end":{"date-parts":[[2013,8,14]]}},"container-title":["2013 European Intelligence and Security Informatics Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6656130\/6657109\/06657118.pdf?arnumber=6657118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T10:57:57Z","timestamp":1688641077000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6657118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/eisic.2013.8","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}