SEARCH

SEARCH BY CITATION

REFERENCES

  • Bostwick, A. E. (1908). The librarian as a censor. Bulletin of the American Library Association Retrieved June 10, 2012, from http://archive.org/details/alabulletin02ameruoft
  • Buller, D. B., & Burgoon, J. K. (1996). Interpersonal Deception Theory. Communication Theory, 6(3), 203242.
  • Burgoon, J. K., & Buller, D. B. (1994). Interpersonal Deception: V. Accuracy in Deception Detection. Communication Monographs, 61(4), 303.
  • Chisholm, R. M., & Feehan, T. D. (1977). The intent to deceive. Journal of Philosophy, 74(3), 143159. The CRAP Test.
  • LOEX Wiki (Library Orientation Exchange) (2008). Retrieved June 10, 2012, from http://loex2008collaborate.pbworks.com/w/page/18686701/The%20CRAP%20Test
  • Fox, C. J. (1983). Information and misinformation: An investigation of the notions of information, misinformation, informing, and misinforming. Westport, CT: Greenwood.
  • Grice, H. P. (1975). Logic and conversation. In P. Cole & J. Morgan (Eds.), Syntax and semantics 3: Speech acts (pp. 4158). New York: Academic Press.
  • Hopper, R., & Bell, R. A. (1984). Broadening the Deception Construct. Quarterly Journal of Speech, 70(3), 288302.
  • McCornack, S. A. (1992). Information manipulation theory. Communication Monographs, 59, 116.
  • McManus, J. H. (2009). Detecting Bull: How to Identify Bias and Junk Journalism in Print, Broadcast and on the Wild Web. Sunnyvale, CA: Unvarnished Press.
  • Metts, S. (1989). An exploratory investigation of deception in close relationships. Journal of Social and Personal Relationships, 6159–180.
  • O'Hair, H. D., & Cody, M. J. (1994). Deception. In W. R. Cupach & B. H. Spitzberg (Eds.), The Dark Side of Interpersonal Communication (pp. 181213). Hillsdale, N.J.: Erlbaum.
  • Payne, H. J. (208). Targets, strategies, and topics of deception among part-time workers. Employee Relations, 30(3), 251263.
  • Rheingold, H. (2009). Crap detection 101. City Brights. Retrieved June 10, 2012, from http://blog.sfgate.com/rheingold/2009/06/30/crap-detection-101
  • Rieh, S. Y. (2010). Credibility and Cognitive Authority of Information. In B. M. Maack & M. N. Maack (Eds.), Encyclopedia of Library and Information Sciences, Third Edition (pp. 13371344). New York: Taylor and Francis Group.
  • Rubin, V. L. (2010). On Deception and Deception Detection: Content Analysis of Computer-Mediated Stated Beliefs The Proceedings of the American Society for Information Science and Technology Annual Meeting, October 22–27
  • Rubin, V. L., & Conroy, N. (2011). Challenges in Automated Deception Detection in Computer-Mediated Communication. The Proceedings of the American Society for Information Science and Technology Annual Meeting, October 9–12
  • Rubin, V. L., & Conroy, N. (2012). Discerning truth from deception: Human judgments and automation efforts. First Monday, 17(3). Retrieved from http://firstmonday.org
  • Rubin, V. L., & Vashchilko, T. (2012). Identification of Truth and Deception in Text: Application of Vector Space Model to Rhetorical Structure Theory. The Proceedings of the 13th Conference of the European Chapter for the Association for Computational Linguistics: Computational Approached to Deception Detection Workshop (EACL 2012), Avignon, France, April 23, 2012, http://eacl2012.org/home/index.html
  • Rubin, V. L., & Vashchilko, T. (Forthcoming). Extending Information Quality Assessment Methodology: A New Veracity/Deception Dimension and Its Measures.
  • Sagan, C. (1996). The demon-haunted world: Science as a candle in the dark. New York: Random House.
  • Zhou, L., Burgoon, J. K., Nunamaker, J. F., & Twitchell, D. (2004). Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications. Group Decision and Negotiation, 13(1), 81106.