Abstract
The digital information era has allowed increasing online deception opportunities. In addition, the performance of detecting deception has been no better than chance in face-to-face communication, and is reported to be even worse in computer-mediated communication (CMC). Thus, there is a great need to uncover effective cues to deception in CMC. Online interaction weaves an implicit social network. However, Deception in CMC has not been examined from the social network perspective. To fill this gap, this research explores interaction patterns of deceivers in online chat. Based on an analysis of social networks created from online chat messages, this study provides preliminary evidence for the efficacy of social network based metrics in discriminating deceivers from truth-tellers. The findings of this study have significant implications for deception research in social media.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zejda, D.: From Subjective Trust to Objective Trustworthiness in On-line Social Networks: Overview and Challenges. Journal of Systems Integration, 16–22 (2010)
Burgoon, J.K., Blair, J.P., Qin, T., Nunamaker Jr., J.F.: Detecting Deception through Linguistic Analysis. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 91–101. Springer, Heidelberg (2003)
Hancock, J.T., Curry, L., Goorha, S., Woodworth, M.: Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 00(Cmc), 22c–22c. IEEE (2005)
Zhou, L.: An Empirical Investigation of Deception Behavior in Instant Messaging. IEEE Transactions on Professional Communication 48(2), 147–160 (2005)
Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: a general framework and some examples. Computer 37(4), 50–56 (2004)
Xu, J., Chen, H.: Criminal Network Analysis and Visualization. Communications of the ACM 48(6) (2005)
Yang, C.C., Ng, T.D.: Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. In: 2007 IEEE Intelligence and Security Informatics, pp. 55–58. IEEE (2007)
Burgoon, J.K., Chen, F., Twitchell, D.P.: Deception and its Detection Under Synchronous and Asynchronous Computer-Mediated Communication. Group Decision and Negotiation 19(4), 345–366 (2009)
Bengel, J., Gauch, S., Mittur, E., Vijayaraghavan, R.: ChatTrack: Chat Room Topic Detection Using Classification. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 266–277. Springer, Heidelberg (2004)
Carlson, J.R., George, J.F.: Media Appropriateness in the Conduct and Discovery of Deceptive Communication: The Relative Influence of Richness and Synchronicity. Group Decision and Negotiation 13(2), 191–210 (2004)
Herring, S.C.: Interactional coherence in CMC. In: Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, HICSS-32. Abstracts and CD-ROM of Full Papers, 00(c), p. 13. IEEE Comput. Soc. (1999)
Scott, J.: Social Network Analysis. Sage Publications, London (2000)
Mutton, P.: Inferring and visualizing social networks on internet relay chat. In: Proceedings of Eighth International Conference on Information Visualisation, IV 2004, pp. 35–43. IEEE (2004)
Tuulos, V.H., Tirri, H.: Combining Topic Models and Social Networks for Chat Data Mining. In: IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), pp. 206–213 (2004)
Stolcke, A., Ries, K., Coccaro, N., Shriberg, E., Bates, R., Jurafsky, D., Taylor, P., et al.: Dialogue Act Modeling for Automatic Tagging and Recognition of Conversational Speech. Computational Linguistics 26(3), 339–373 (2000)
Berglund, T.Ö.: Disrupted Turn Adjacency and Coherence Maintenance in Instant Messaging Conversations. Language@Internet 6, article 2 (2009)
Erickson, T., Herring, S., Sack, W.: Discourses Architectures: Designing and Visualizing Computer Mediated Conversation. In: Proceedings of ACM CHI, Minneapolis, MN, April 22 (2002)
Halliday, M., Hasan, R.: Cohesion in English. Longman English Languages Series, vol. 9. Longman, London (1976)
Buller, D.B., Burgoon, J.K.: Interpersonal Deception Theory. Communication Theory 6(3), 203–242 (1996)
Zhou, L., Sung, Y.: Discourse Cues to Online Deception. In: Proceedings of the Credibility Assessment and Information Quality in Government and Business Symposium (2010)
Zhou, L., Zhang, D.: A Comparison of Deception Behavior in Dyadic and Triadic Group Decision Making in Synchronous Computer-Mediated Communication. Small Group Research 37(2), 140–164 (2006)
Hanneman, R.A., Riddle, M.: Introduction to social network methods. University of California, Riverside (2005), published in digital form http://faculty.ucr.edu/~hanneman
Hafner-Burton, E.M., Montgomery, A.H.: Centrality in Politics: How Networks Confer Influence. Human Rights, 1–21 (2010)
EpicMafia, http://www.epicmafia.com
Bonsignore, E.M., Dunne, C., Rotman, D., Smith, M., Capone, T., Hansen, D.L., Shneiderman, B.: First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. In: International Conference on Computational Science and Engineering, pp. 332–339. IEEE (2009)
Smith, M.A., Shneiderman, B., Milic-Frayling, N., Rodrigues, E.M., Barash, V., Dunne, C., Capone, T., et al.: Analyzing (social media) networks with NodeXL. In: Proceedings of the Fourth International Conference on Communities and Technologies CT 2009 (Figure 1), p. 255 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pak, J., Zhou, L. (2012). A Social Network Based Analysis of Deceptive Communication in Online Chat. In: Shaw, M.J., Zhang, D., Yue, W.T. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2011. Lecture Notes in Business Information Processing, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29873-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-29873-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29872-1
Online ISBN: 978-3-642-29873-8
eBook Packages: Computer ScienceComputer Science (R0)