Advances in automated deception detection in text-based computer-mediated communication

Mark Adkins, Douglas P. Twitchell, Judee K. Burgoon, Jay F. Nunamaker

Research output: Contribution to journalConference articlepeer-review

10 Scopus citations


The Internet has provided criminals, terrorists, spies, and other threats to national security a means of communication. At the same time it also provides for the possibility of detecting and tracking their deceptive communication. Recent advances in natural language processing, machine learning and deception research have created an environment where automated and semi-automated deception detection of text-based computer-mediated communication (CMC, e.g. email, chat, instant messaging) is a reachable goal. This paper reviews two methods for discriminating between deceptive and non-deceptive messages in CMC. First, Document Feature Mining uses document features or cues in CMC messages combined with machine learning techniques to classify messages according to their deceptive potential. The method, which is most useful in asynchronous applications, also allows for the visualization of potential deception cues in CMC messages. Second, Speech Act Profiling, a method for quantifying and visualizing synchronous CMC, has shown promise in aiding deception detection. The methods may be combined and are intended to be a part of a suite of tools for automating deception detection.

Original languageEnglish (US)
Pages (from-to)122-129
Number of pages8
JournalProceedings of SPIE - The International Society for Optical Engineering
StatePublished - 2004
EventEnabling Technologies for Simulation Science VIII - Orlando, FL, United States
Duration: Apr 13 2004Apr 15 2004

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering


Dive into the research topics of 'Advances in automated deception detection in text-based computer-mediated communication'. Together they form a unique fingerprint.

Cite this