Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines

  • Shuyuan Mary HoEmail author
  • Xiuwen Liu
  • Cheryl Booth
  • Aravind Hariharan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9708)


In text-based online communication, the clues available to the communicator for ascertaining the underlying intent of a message sender and discerning whether a message is deceptive are often limited to the text. Nonetheless, research has shown that it is possible to detect deception with reasonable accuracy by applying certain classification methodologies to certain observable language-action cues. This paper explores the viability of adopting support vector machines (SVMs) to develop an automated process for deception detection in computer-mediated communications (CMC). In particular, it examines the prediction accuracy of SVM models with different kernel functions on data collected from a controlled online interactive game set up on a Google + Hangout platform. The results indicate that SVM models using the radial basis function (RBF) kernel can classify the complex relationships with high accuracy between language-action cues and deception.



The authors wish to thank the National Science Foundation EAGER grants #1347113, 09/01/13—08/31/15, the Florida Center for Cybersecurity Collaborative Seed Grant 03/01/15—02/28/16, and the Florida State University Council for Research and Creativity Planning Grant #034138, 12/01/13—12/12/14.


  1. 1.
    Ekman, P., O’Sullivan, M.: Who can catch a liar? Am. Phychologist 46(9), 913–920 (1991)CrossRefGoogle Scholar
  2. 2.
    Buller, D.B., Burgoon, J.K.: Interpersonal deception theory. Commun. Theory 6(3), 203–242 (1996)CrossRefGoogle Scholar
  3. 3.
    Buller, D.B., Burgoon, J.K., Buslig, A., Roiger, J.: Testing interpersonal deception theory: The language of interpersonal deception. Commun. Theory 6(3), 268–289 (1996)CrossRefGoogle Scholar
  4. 4.
    Miller, G.R., Deturck, M.A., Kalbfleisch, P.J.: Self-monitoring, rehearsal, and deceptive communication. Hum. Commun. Res. 10(1), 97–117 (1983)CrossRefGoogle Scholar
  5. 5.
    Vrij, A.: Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice. John Wiley & Sons Ltd., West Susses (2000). ISBN 0-471-85316-XGoogle Scholar
  6. 6.
    Whitty, M.T., Buchanan, T., Joinson, A.N., Meredith, A.: Not all lies are spontaneous: An examination of deception across different modes of communication. J. Am. Soc. Inf. Sci. Technol. 63(1), 208–216 (2012)CrossRefGoogle Scholar
  7. 7.
    Hancock, J.T., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J., Amos, B.: Butler lies: Awareness, deception and design. In: CHI 2009, pp. 517–526. ACM, Boston (2009)Google Scholar
  8. 8.
    Ho, S.M., Hancock, J.T., Booth, C., Liu, X., Liu, M., Timmarajus, S.S., Burmester, M.: Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues. In: Hawaii International Conference on System Sciences (HICSS 1949), pp. 3706–3715. IEEE, Kauai, Hawaii (2016)Google Scholar
  9. 9.
    Ho, S.M., Hancock, J.T., Booth, C., Liu, X., Timmarajus, S.S., Burmester, M.: Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. In: IEEE International Conference on Intelligence and Security Informatics, pp. 157–159. IEEE, Baltimore (2015)Google Scholar
  10. 10.
    Ho, S.M., Fu, H., Timmarajus, S.S., Booth, C., Baeg, J.H., Liu, M.: Insider threat: Language-action cues in group dynamics. In: SIGMIS-CPR 2015, pp. 101–104. ACM, Newport Beach (2015)Google Scholar
  11. 11.
    Ho, S.M., J.T. Hancock, C. Booth, M. Burmester, X. Liu, Timmarajus, S.S.: Demystifying insider threat: Language-action cues in group dynamics. in Hawaii International Conference on System Sciences (HICSS 1949), pp. 2729–2738. IEEE, Kauai, Hawaii (2016)Google Scholar
  12. 12.
    Pennebaker, J.W., King, L.A.: Linguistic styles: Language use as an individual difference. J. Pers. Soc. Pyschology 77(6), 1296–1312 (1999)CrossRefGoogle Scholar
  13. 13.
    Newman, M.L., Pennebaker, J.W., Berry, D.S., Richard, J.M.: Lying words: Predicting deception from linguistic styles. Pers. Soc. Psychology Bull. 29(5), 665–675 (2003)CrossRefGoogle Scholar
  14. 14.
    Zhou, L., Zhang, D.: Can online behavior unveil a deceiver? In: HICSS. Hilton Waikoloa Village Big Island. IEEE Press, Hawaii (2004)Google Scholar
  15. 15.
    Zhou, L., Zhang, D.: Following linguistic footprints: Automatic deception detection in online communication. Commun. ACM 51(9), 119–122 (2008)CrossRefGoogle Scholar
  16. 16.
    Zhou, L., Burgoon, J.K., Twitchell, D.P., Qin, T., Nunamaker Jr., J.F.: A comparison of classification methods for predicting deception in computer-mediated communication. J. Manage. Inf. Sys. 20(4), 139–166 (2004)Google Scholar
  17. 17.
    Vapnik, V.N.: The Nature of Statistical Learning Theory, p. 314. Springer-Verlag, New York (2000). ISBN 978-0-387-98780-4CrossRefzbMATHGoogle Scholar
  18. 18.
    Toma, C.L., Hancock, J.T.: What lies beneath: The linguistic traces of deception in online dating profiles. J. Commun. 62(1), 78–97 (2012)CrossRefGoogle Scholar
  19. 19.
    Buller, D.B., Burgoon, J.K.: Deception: Strategic and nonstrategic communication. In: Daly, J.A., Wiemann, J.M. (eds.) Strategic interpersonal communication, pp. 191–223. Lawrence Erlbaum Assoicates, Inc., Hillsdale, New Jersey (1994)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Shuyuan Mary Ho
    • 1
    Email author
  • Xiuwen Liu
    • 1
  • Cheryl Booth
    • 1
  • Aravind Hariharan
    • 1
  1. 1.Florida State UniversityTallahasseeUSA

Personalised recommendations