References Used. Online Dating: How to Know When Someone is Lying to You

Afroz, S., Brennan, M., & Greenstadt, R. (2012, May). Detecting hoaxes, frauds, and deception in writing style online. In Security and Privacy (SP), 2012 IEEE Symposium (pp. 461-475). IEEE.

Appling, D. S., Briscoe, E. J., & Hutto, C. J. (2015, May). Discriminative Models for Predicting Deception Strategies. In Proceedings of the 24th International Conference on World Wide Web Companion (pp. 947-952). International World Wide Web Conferences Steering Committee.

Baker, A., Porter, S., ten Brinke, L., & Udala, M. (2015). Risky Business: Incorporating Informed Deception Detection Strategies in Violence Risk Assessments. Archives of Forensic Psychology, 1(2), 55-77.

Balaban-Salı, J., & Şimşek, E. (2013). Abnormalities in virtual world. Uluslararası İletişim, Medya, Teknoloji ve Tasarım, Gazi Mağusa, KKTC. Konferansında.

Chisholm, J. F., & Day, S. K. (2013). Current trends in cyberbullying. Journal of Social Distress and the Homeless, 22(1), 35-57.

Derrick, D. C., Meservy, T. O., Jenkins, J. L., Burgoon, J. K., & Nunamaker Jr, J. F. (2013). Detecting deceptive chat-based communication using typing behavior and message cues. ACM Transactions on Management Information Systems (TMIS), 4(2), 9.

Duran, N. D., Dale, R., Kello, C. T., Street, C. N., & Richardson, D. C. (2013). Exploring the movement dynamics of deception. Frontiers in psychology, 4.

Ferreira, A., & Lenzini, G. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. LNCS-Communications in Computer and Information Science.

Fuller, C. M., Biros, D. P., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Expert Systems with Applications, 38(7), 8392-8398.

Greenwald, G. (2014). How covert agents infiltrate the internet to manipulate, deceive, and destroy reputations. The Intercept. Retrieved 1 November 2015 from https://theintercept.com/2014/02/24/jtrig-manipulation/.

Guadagno, R. E., Okdie, B. M., & Kruse, S. A. (2012). Dating deception: Gender, online dating, and exaggerated self-presentation. Computers in Human Behavior, 28(2), 642-647.

Guthrie, J., & Kunkel, A. (2013). Tell me sweet (and not-so-sweet) little lies: Deception in romantic relationships. Communication Studies, 64(2), 141-157.

Hall, J. A., Park, N., Song, H., & Cody, M. J. (2010). Strategic misrepresentation in online dating: The effects of gender, self-monitoring, and personality traits. Journal of Social and Personal Relationships, 27(1), 117-135.

Hancock, J. T., & Toma, C. L. (2009). Putting your best face forward: The accuracy of online dating photographs. Journal of Communication, 59(2), 367-386.

Harrison, R., & Thomas, M. (2009). Identity in online communities: Social networking sites and language learning. International Journal of Emerging Technologies and Society, 7(2), 109-124.

Hauch, V., Masip, J., Blandon-Gitlin, I., & Sporer, S. L. (2012, April). Linguistic cues to deception assessed by computer programs: a meta-analysis. In Proceedings of the workshop on computational approaches to deception detection (pp. 1-4). Association for Computational Linguistics.

Jensen, M. L., Lowry, P. B., & Jenkins, J. L. (2011). Effects of automated and participative decision support in computer-aided credibility assessment. Journal of Management Information Systems, 28(1), 201-234.

Kaskazi, A. (2014). Social Network Identity: Facebook, Twitter and Identity Negotiation Theory. iConference 2014 Proceedings.

Kee, W. A., & Rashad Yazdanifard, A. (2015). The Review of The Ugly Truth and Negative Aspects of Online Dating. Global Journal of Management And Business Research, 15(4).

Keila, P. S., & Skillicorn, D. B. (2005, June). Detecting unusual and deceptive communication in email. In Centers for Advanced Studies Conference (pp. 17-20).

Malesky Jr, L. A. (2007). Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the Internet. Journal of child sexual abuse, 16(2), 23-32. Retrieved 22 October 2015 from The Haworth  Press.

Masden, C., & Edwards, W. K. (2015, April). Understanding the Role of Community in Online Dating. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 535-544). ACM.

Naquin, C. E., Kurtzberg, T. R., & Belkin, L. Y. (2010). The finer points of lying online: e-mail versus pen and paper. The Journal of applied psychology, 95(2), 387.

Ormond, D., & Warkentin, M. (2015). Is this a Joke? the Impact of Message Manipulations on Risk Perceptions. Journal of Computer Information Systems, 55(2).

Ott, M., Choi, Y., Cardie, C., & Hancock, J. T. (2011, June). Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1 (pp. 309-319). Association for Computational Linguistics.

Phillips, E. (2015). Empirical Assessment of Lifestyle-Routine Activity and Social Learning Theory on Cybercrime Offending. (Masters Thesis) Retrieved from BSU Master’s Theses and Projects. (Item 25)

Rowe, N. C. (2005a). Detecting online deception and responding to it. Encyclopedia of Virtual Communities and Technologies, Hershey, PA: Idea Group, 2005.

Saedi, A. (2012). “Catfish” and the Perils of Online Dating. Psychology Today; MillennialMedia; The media saturated generation Y. Retrieved 24 October 2015 from http://www.psychologytoday.com/blog/millennial- media/201212/catfish-and-the-perils-online-dating

Shajji, Q. K. N. (2015). Investigation of the Enhancement of Security in Social Networks by Modifying Privacy Policy among Users (Doctoral dissertation, Texas A&M University-Corpus Christi).

Street, C. N., & Richardson, D. C. (2015). Lies, Damn Lies, and Expectations: How Base Rates Inform Lie–Truth Judgments. Applied Cognitive Psychology, 29(1), 149-155.

Toma, C. L., Hancock, J. T., & Ellison, N. B. (2008). Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles. Personality and Social Psychology Bulletin, 34(8), 1023-1036.

Toma, C. L., & Hancock, J. T. (2010, February). Reading between the lines: linguistic cues to deception in online dating profiles. In Proceedings of the 2010 ACM conference on Computer supported cooperative work (pp. 5-8). ACM.

Tsikerdekis, M., & Zeadally, S. (2014a). Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior. Information Forensics and Security, IEEE Transactions on, 9(8), 1311-1321.

Tsikerdekis, M., & Zeadally, S. (2014b). Online deception in social media. Communications of the ACM, 57(9), 72-80.

Tsikerdekis, M., & Zeadally, S. (May-June 2015) Detection and Prevention of Online Identity Deception in Social Networking Services (SNSs). IEEE Internet Computing, 19 (3), 41-49.

Warkentin, D., Woodworth, M., Hancock, J. T., & Cormier, N. (2010, February). Warrants and deception in computer mediated communication. In Proceedings of the 2010 ACM conference on Computer supported cooperative work (pp. 9-12). ACM.

Whitehead, D. (2015). The Evidence of Things Unseen: Authenticity and Fraud in the Christian Mommy Blogosphere. Journal of the American Academy of Religion, 83(1), 120-150.

Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2008). Online” predators” and their victims: myths, realities, and implications for prevention and treatment. American Psychologist, 63(2), 111.

Zhou, L., Burgoon, J. K., Nunamaker, J. F., & Twitchell, D. (2004). Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group decision and negotiation, 13(1), 81-106.

Zhou, L., & Sung, Y. W. (2010). Discourse cues to online deception. In Quality in Government and Business Symposium (p. 1).

Zhou, L., & Zhang, D. (2004, January). Can online behavior unveil deceivers?-an exploratory investigation of deception in instant messaging. In System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on (pp. 9-pp). IEEE.

Zhou, L., & Zhang, D. (2006). A comparison of deception behavior in dyad and triadic group decision making in synchronous computer-mediated communication. Small Group Research, 37(2), 140-164.

Zhu, F., Carpenter, S., & Kolimi, S. (2015). Mindlessness attacks. Procedia Manufacturing, 3, 1066-1073.

One response

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: