{"id":"https://openalex.org/W2012047333","doi":"https://doi.org/10.1109/isi.2012.6282258","title":"A game theory approach to deception strategy in computer mediated communication","display_name":"A game theory approach to deception strategy in computer mediated communication","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2012047333","doi":"https://doi.org/10.1109/isi.2012.6282258","mag":"2012047333"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2012.6282258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6282258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069743917","display_name":"Hsien-Ming Chou","orcid":"https://orcid.org/0000-0002-4622-5032"},"institutions":[{"id":"https://openalex.org/I126744593","display_name":"University of Maryland, Baltimore","ror":"https://ror.org/04rq5mt64","country_code":"US","type":"education","lineage":["https://openalex.org/I126744593"]},{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hsien-Ming Chou","raw_affiliation_strings":["Information Systems, University of Maryland, Baltimore, USA","Information Systems, University of Maryland, Baltimore County, USA"],"affiliations":[{"raw_affiliation_string":"Information Systems, University of Maryland, Baltimore, USA","institution_ids":["https://openalex.org/I126744593"]},{"raw_affiliation_string":"Information Systems, University of Maryland, Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010146682","display_name":"Lina Zhou","orcid":"https://orcid.org/0000-0003-1864-0527"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]},{"id":"https://openalex.org/I126744593","display_name":"University of Maryland, Baltimore","ror":"https://ror.org/04rq5mt64","country_code":"US","type":"education","lineage":["https://openalex.org/I126744593"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lina Zhou","raw_affiliation_strings":["Information Systems, University of Maryland, Baltimore, USA","Information Systems, University of Maryland, Baltimore County, USA"],"affiliations":[{"raw_affiliation_string":"Information Systems, University of Maryland, Baltimore, USA","institution_ids":["https://openalex.org/I126744593"]},{"raw_affiliation_string":"Information Systems, University of Maryland, Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069743917"],"corresponding_institution_ids":["https://openalex.org/I126744593","https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.14433707,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"7","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.8952580094337463},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6770889759063721},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5253360271453857},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5025358200073242},{"id":"https://openalex.org/keywords/rationality","display_name":"Rationality","score":0.491894006729126},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4590986371040344},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3302956819534302},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.292270302772522},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.24085953831672668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19577673077583313},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.15091198682785034},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.11630499362945557},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08319494128227234}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.8952580094337463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6770889759063721},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5253360271453857},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5025358200073242},{"id":"https://openalex.org/C201717286","wikidata":"https://www.wikidata.org/wiki/Q938185","display_name":"Rationality","level":2,"score":0.491894006729126},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4590986371040344},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3302956819534302},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.292270302772522},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.24085953831672668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19577673077583313},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.15091198682785034},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.11630499362945557},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08319494128227234},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2012.6282258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6282258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320329795","display_name":"Southwestern University of Finance and Economics","ror":"https://ror.org/04ewct822"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1514681859","https://openalex.org/W1588566738","https://openalex.org/W1601917599","https://openalex.org/W1968018613","https://openalex.org/W1985483052","https://openalex.org/W2012910199","https://openalex.org/W2035896792","https://openalex.org/W2074432676","https://openalex.org/W2081505745","https://openalex.org/W2106815140","https://openalex.org/W2110092041","https://openalex.org/W2113335527","https://openalex.org/W2116625462","https://openalex.org/W2126879264","https://openalex.org/W2144260101","https://openalex.org/W2148055514","https://openalex.org/W2151021713","https://openalex.org/W2159158762","https://openalex.org/W3022590799","https://openalex.org/W3102219781"],"related_works":["https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W4388260134","https://openalex.org/W2351341309","https://openalex.org/W2359095791","https://openalex.org/W2364973163","https://openalex.org/W2370332065","https://openalex.org/W2963993697"],"abstract_inverted_index":{"Many":[0],"computer-based":[1],"communication":[2],"media":[3],"offer":[4],"visual":[5],"anonymity.":[6],"As":[7],"a":[8,86,97],"result,":[9],"detecting":[10],"online":[11,30,126],"deception":[12,31,48,83,127],"tends":[13],"to":[14,19,39,63,70,81,104,116],"be":[15],"more":[16],"difficult":[17],"relative":[18],"traditional":[20],"non-mediated":[21],"communication.":[22],"The":[23,90],"state":[24],"of":[25,92],"the":[26,129],"art":[27],"research":[28,78],"on":[29,34],"has":[32],"focused":[33],"using":[35],"linear":[36,52],"statistical":[37],"approaches":[38],"identifying":[40],"behavioral":[41],"differences":[42],"between":[43],"deceivers":[44,54,66,102,111],"and":[45,65,110],"truth-tellers.":[46],"However,":[47],"behaviors":[49],"are":[50,61],"not":[51],"because":[53],"may":[55,112],"adopt":[56],"dynamic":[57],"strategies":[58,84,107,115],"when":[59],"they":[60],"motivated":[62],"succeed,":[64],"could":[67],"disguise":[68],"themselves":[69],"maximize":[71],"their":[72,114],"payoffs.":[73],"Given":[74],"such":[75],"backdrop,":[76],"this":[77],"is":[79],"aimed":[80],"address":[82],"with":[85,96],"game":[87,99],"theory":[88],"approach.":[89],"results":[91],"an":[93],"empirical":[94],"study":[95],"multi-stage":[98],"show":[100],"that":[101],"tend":[103],"select":[105],"different":[106],"from":[108],"truth-tellers":[109],"adjust":[113],"avoid":[117],"detection.":[118],"These":[119],"findings":[120],"provide":[121],"significant":[122],"implications":[123],"for":[124],"explaining":[125],"in":[128],"full":[130],"rationality":[131],"paradigm.":[132]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
