A Social Network Based Analysis of Deceptive Communication in Online Chat | SpringerLink
Skip to main content

A Social Network Based Analysis of Deceptive Communication in Online Chat

  • Conference paper
E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life (WEB 2011)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 108))

Included in the following conference series:

Abstract

The digital information era has allowed increasing online deception opportunities. In addition, the performance of detecting deception has been no better than chance in face-to-face communication, and is reported to be even worse in computer-mediated communication (CMC). Thus, there is a great need to uncover effective cues to deception in CMC. Online interaction weaves an implicit social network. However, Deception in CMC has not been examined from the social network perspective. To fill this gap, this research explores interaction patterns of deceivers in online chat. Based on an analysis of social networks created from online chat messages, this study provides preliminary evidence for the efficacy of social network based metrics in discriminating deceivers from truth-tellers. The findings of this study have significant implications for deception research in social media.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Zejda, D.: From Subjective Trust to Objective Trustworthiness in On-line Social Networks: Overview and Challenges. Journal of Systems Integration, 16–22 (2010)

    Google Scholar 

  2. Burgoon, J.K., Blair, J.P., Qin, T., Nunamaker Jr., J.F.: Detecting Deception through Linguistic Analysis. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 91–101. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Hancock, J.T., Curry, L., Goorha, S., Woodworth, M.: Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 00(Cmc), 22c–22c. IEEE (2005)

    Google Scholar 

  4. Zhou, L.: An Empirical Investigation of Deception Behavior in Instant Messaging. IEEE Transactions on Professional Communication 48(2), 147–160 (2005)

    Article  Google Scholar 

  5. Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: a general framework and some examples. Computer 37(4), 50–56 (2004)

    Article  Google Scholar 

  6. Xu, J., Chen, H.: Criminal Network Analysis and Visualization. Communications of the ACM 48(6) (2005)

    Google Scholar 

  7. Yang, C.C., Ng, T.D.: Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. In: 2007 IEEE Intelligence and Security Informatics, pp. 55–58. IEEE (2007)

    Google Scholar 

  8. Burgoon, J.K., Chen, F., Twitchell, D.P.: Deception and its Detection Under Synchronous and Asynchronous Computer-Mediated Communication. Group Decision and Negotiation 19(4), 345–366 (2009)

    Article  Google Scholar 

  9. Bengel, J., Gauch, S., Mittur, E., Vijayaraghavan, R.: ChatTrack: Chat Room Topic Detection Using Classification. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 266–277. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Carlson, J.R., George, J.F.: Media Appropriateness in the Conduct and Discovery of Deceptive Communication: The Relative Influence of Richness and Synchronicity. Group Decision and Negotiation 13(2), 191–210 (2004)

    Article  Google Scholar 

  11. Herring, S.C.: Interactional coherence in CMC. In: Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, HICSS-32. Abstracts and CD-ROM of Full Papers, 00(c), p. 13. IEEE Comput. Soc. (1999)

    Google Scholar 

  12. Scott, J.: Social Network Analysis. Sage Publications, London (2000)

    Google Scholar 

  13. Mutton, P.: Inferring and visualizing social networks on internet relay chat. In: Proceedings of Eighth International Conference on Information Visualisation, IV 2004, pp. 35–43. IEEE (2004)

    Google Scholar 

  14. Tuulos, V.H., Tirri, H.: Combining Topic Models and Social Networks for Chat Data Mining. In: IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), pp. 206–213 (2004)

    Google Scholar 

  15. Stolcke, A., Ries, K., Coccaro, N., Shriberg, E., Bates, R., Jurafsky, D., Taylor, P., et al.: Dialogue Act Modeling for Automatic Tagging and Recognition of Conversational Speech. Computational Linguistics 26(3), 339–373 (2000)

    Article  Google Scholar 

  16. Berglund, T.Ö.: Disrupted Turn Adjacency and Coherence Maintenance in Instant Messaging Conversations. Language@Internet 6, article 2 (2009)

    Google Scholar 

  17. Erickson, T., Herring, S., Sack, W.: Discourses Architectures: Designing and Visualizing Computer Mediated Conversation. In: Proceedings of ACM CHI, Minneapolis, MN, April 22 (2002)

    Google Scholar 

  18. Halliday, M., Hasan, R.: Cohesion in English. Longman English Languages Series, vol. 9. Longman, London (1976)

    Google Scholar 

  19. Buller, D.B., Burgoon, J.K.: Interpersonal Deception Theory. Communication Theory 6(3), 203–242 (1996)

    Article  Google Scholar 

  20. Zhou, L., Sung, Y.: Discourse Cues to Online Deception. In: Proceedings of the Credibility Assessment and Information Quality in Government and Business Symposium (2010)

    Google Scholar 

  21. Zhou, L., Zhang, D.: A Comparison of Deception Behavior in Dyadic and Triadic Group Decision Making in Synchronous Computer-Mediated Communication. Small Group Research 37(2), 140–164 (2006)

    Article  Google Scholar 

  22. Hanneman, R.A., Riddle, M.: Introduction to social network methods. University of California, Riverside (2005), published in digital form http://faculty.ucr.edu/~hanneman

  23. Hafner-Burton, E.M., Montgomery, A.H.: Centrality in Politics: How Networks Confer Influence. Human Rights, 1–21 (2010)

    Google Scholar 

  24. EpicMafia, http://www.epicmafia.com

  25. Bonsignore, E.M., Dunne, C., Rotman, D., Smith, M., Capone, T., Hansen, D.L., Shneiderman, B.: First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. In: International Conference on Computational Science and Engineering, pp. 332–339. IEEE (2009)

    Google Scholar 

  26. Smith, M.A., Shneiderman, B., Milic-Frayling, N., Rodrigues, E.M., Barash, V., Dunne, C., Capone, T., et al.: Analyzing (social media) networks with NodeXL. In: Proceedings of the Fourth International Conference on Communities and Technologies CT 2009 (Figure 1), p. 255 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pak, J., Zhou, L. (2012). A Social Network Based Analysis of Deceptive Communication in Online Chat. In: Shaw, M.J., Zhang, D., Yue, W.T. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2011. Lecture Notes in Business Information Processing, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29873-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29873-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29872-1

  • Online ISBN: 978-3-642-29873-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics