
{"id":96,"date":"2023-11-13T14:26:07","date_gmt":"2023-11-13T14:26:07","guid":{"rendered":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/?page_id=96"},"modified":"2023-11-13T14:30:38","modified_gmt":"2023-11-13T14:30:38","slug":"online-deception-detection","status":"publish","type":"page","link":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/currently-funded-projects\/online-deception-detection\/","title":{"rendered":"Online Deception Detection"},"content":{"rendered":"\n<p>Behavioral Control of Deceivers in Online Attacks<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Award details<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><strong>NSF Org<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Award Number<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Award Instrument<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Start Date<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>End Date<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>NSF Program<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>SES Divn Of Social and Economic Sciences<\/p>\n\n\n\n<p>1527684<\/p>\n\n\n\n<p>Standard Grant<\/p>\n\n\n\n<p>September 1, 2015<\/p>\n\n\n\n<p>March 31, 2019 (Estimated)<\/p>\n\n\n\n<p>Secure &amp; Trustworthy Cyberspace<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Abstract<\/h2>\n\n\n\n<p>Online attacks can cause not only temporary asset loss, but long-term psychological or emotional harm to victims as well. The richness and large scale of online communication data open up new opportunities for detecting online attacks. However, attackers are motivated to constantly adapt their behaviors to changes in security operations to evade detection. Deception underlies most attacks in online communication, and people are poor at detecting deception. Against this backdrop, this project aims to improve the resilience of solutions to online attacks and enable predictive methods for their detection. Although a complete set of deception behaviors of online attackers is assumed to be unknown, there is a reason to expect that some behaviors are more difficult for attackers to control than others.<\/p>\n\n\n\n<p>By identifying such behaviors and their relations in online communication, the project lays the groundwork for the development of resilient and predictive approaches to the detection of online attacks, and advances the state of knowledge on online deception behavior and its identification. At the educational front, the project provides new educational material for enriching the curriculum in cyber security and related disciplines. The interdisciplinary nature of this work contributes to graduate student training toward a new generation of scientists who are capable of conducting multi-disciplinary cutting-edge research using a variety of research methods. The PIs actively engage students at both graduate and undergraduate levels in their research activities, particularly making a strong effort to engage women and underrepresented minorities.<\/p>\n\n\n\n<p>Online attackers\u2019 evolving behaviors can make the existing solutions to online attacks become ineffective quickly. This project not only discovers new deception behaviors and their relations from the discourse and structure of online communication, but also determines attackers\u2019 behavioral control during online attacks by comparing different types of online deception behavior. Further, this project develops techniques for automatic extraction of deception behaviors from online communication by building upon natural language processing and network analysis techniques. Some anticipated advances include:<\/p>\n\n\n\n<p>(1) deception theory extension by investigating deception behavior in online attacks via a new lens of behavior control,<\/p>\n\n\n\n<p>(2) guidelines on how to improve the resilience of online attack detection methods by identifying deception behaviors that likely escape the attackers\u2019 control attempt,<\/p>\n\n\n\n<p>(3) a predictive approach to attack detection in online communication by exploring the temporal relationships among deception behaviors, and<\/p>\n\n\n\n<p>(4) techniques for extracting deception behaviors from online discourse and structure. This project can lead to integrative and effective methods for online attack detection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Selected Publications<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>J. Lim, Zhou, L. and D. Zhang (2021),&nbsp;<strong>Verbal Deception Cues Training for the Detection of Phishing Emails<\/strong>, IEEE International Conference on Intelligence and Security Informatics, San Antonio, TX, Nov. 2-3, 2021.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhou, L., J. Tao, E. Lai, and D. Zhang (2021),&nbsp;<strong>Do Fake News between Different Languages Talk Alike? A Case Study of COVID-19 Related Fake News<\/strong>, International Conference on Secure Knowledge Management in the artificial intelligence, San Antonio, TX, USA, Oct. 5-6, 2021.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Shan, G., L. Zhou, and Zhang, D. (2021).&nbsp;<strong>From Conflicts and Confusion to Doubts: Examining Review Inconsistency for Fake Review Detection<\/strong>, Decision Support Systems. 144, May<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Tao, J., X. Fang, and L. Zhou (2021),&nbsp;<strong>Unsupervised Deep Learning for Fake Content Detection in Social Media<\/strong>, Hawaii International Conference on System Sciences (HICSS-54). January 5-8, Kauai, HI, USA.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Tao, J. and L. Zhou (2020),&nbsp;<strong>A Weakly Supervised WordNet-guided Deep Learning Approach to Extracting Aspect Terms from Online Reviews<\/strong>, ACM Transactions on Management Information Systems, 11(3), 1-22.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhihui Liu, Lina Zhou and Dongsong Zhang (2020).&nbsp;<strong>Effects of Demographic Factors on Phishing Victimization in the Workplace<\/strong>, Proceedings of the PACIS, June 20-24.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Shan, J., L. Zhou, and D. Zhang (2020),&nbsp;<strong>What Reveals About Depression Level? The Role of Multimodal Features at the Level of Interview Questions<\/strong>, Information &amp; Management, 57 (7), Nov.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Wang, P., L. Zhou, D. Mu, D. Zhang, and Q. Shao (2020),&nbsp;<strong>What Makes Clinical Documents Helpful and Engaging? An Empirical Investigation of Experience Sharing in an Online Medical Community<\/strong>, International Journal of Medical Informatics, 143, Nov.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Kang, Y. and L. Zhou (2019).&nbsp;<strong>Helpfulness Assessment of Online Reviews: The Role of Semantic Hierarchy of Product Features<\/strong>, ACM Transactions on Management Information Systems, 10(3), 1-18. https:\/\/doi.org\/10.1145\/3365538.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhou, L., J. Lim, H. Alsaleh, J. Wang, and D. Zhang (2019).&nbsp;<strong>Language Alternation in Online Communication with Misinformation.<\/strong>&nbsp;The 18th Pre-ICIS Workshop on e-Business. Munich, Germany. Dec.14, 2019.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Ping Wang, Dongmei Mu, L. Zhou, Dongsong Zhang and Qi Shao (2019).&nbsp;<strong>Analysis of Factors Affecting the Quality of Clinical Document Based on Online Community of Clinical Professionals<\/strong>, ALIRG 2019 (The 11th Asia Library and Information Research Group Workshop), Nov. 28-29, 2019. Beijing, China.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>J. Lim, Z. Liu and L. Zhou (2019)&nbsp;<strong>Detecting of Fraudulent Tweets: An Empirical Investigation Using Network Analysis and Deep Learning Technique<\/strong>. IEEE International Conference on Intelligence and Security Informatics, Shenzhen, China, July 1-3, 2019.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Alsaleh, H., L. Zhou (2018).&nbsp;<strong>A Heuristic Method for Identifying Scam Ads on Craigslist<\/strong>. European Intelligence and Security Informatics Conference (EISIC), Blekinge Institute of Technology, Karlskrona, Sweden, Oct. 24-25.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=8752901\">READ<\/a><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Shan, G., D. Zhang, L. Zhou, L. Suo, and J. Lim (2018).&nbsp;<strong>Inconsistency Investigation between Online Review Content and Rating<\/strong>, Proceedings of the 2018 Americas Conference on Information Systems (AMCIS), Aug. 16-18, New Orleans, LA, USA.<a href=\"https:\/\/aisel.aisnet.org\/amcis2018\/eBusiness\/Presentations\/23\/\">READ<\/a><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Ahmed F. Aleroud and L. Zhou (2017).&nbsp;<strong>Phishing Environments, Techniques, and Countermeasures: A Survey<\/strong>, Computers &amp; Security, 68, 160-196.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Kang, Y. and L. Zhou (2017),&nbsp;<strong>RubE: Rule-based Methods for Extracting Product Features from Online Consumer Reviews<\/strong>, Information &amp; Management, 54(2), March, 166-176.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhang, D., Zhou, L., Kehoe, L. J., and Kilic, I. (2016).&nbsp;<strong>What Online Reviewer Behaviors Really Matter? A Study of Effects of Verbal and Nonverbal Behaviors on Online Fake Review Detection<\/strong>.&nbsp;<em>Journal of Management Information Systems<\/em>. 33(2). p.456-481&nbsp;<a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2016.1205907\">READ<\/a><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Wu, J. and L. Zhou (2015),&nbsp;<strong>DOBNet: Exploring the Discourse of Deception Behavior to Uncover Online Deception Strategies, Behavioral &amp; Information Technology<\/strong>, 34(9), 936-948.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Li, S., L. Zhou, and Y. Li (2015).&nbsp;<strong>Improving Aspect Extraction by Augmenting a Frequency-Based Method with Web-based Similarity Measures<\/strong>. Information Processing and Management.51, 58-67.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhou, L., Wu, J., &amp; Zhang, D. (2014).&nbsp;<strong>Discourse Features of Deception Behavior in the Case of Multiple Receivers<\/strong>.&nbsp;<em>Information &amp; Management<\/em>. 51(6): 726-737&nbsp;<a href=\"https:\/\/dl.acm.org\/citation.cfm?id=2668586\">READ<\/a><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhou, L., Song, Y., and Zhang, D. (2013).&nbsp;<strong>Deception performance in online group negotiation and decision making: the effects of deception experience and deception skill<\/strong>.&nbsp;<em>Group Decision &amp; Negotiation<\/em>. 22(1), p.153-172&nbsp;<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10726-012-9303-9\">READ<\/a><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhou, L. and Zhang, D. (2012).&nbsp;<strong>Automatic Deception Detection in Computer-Mediated Communication<\/strong>.&nbsp;<em>IEEE Intelligent Systems<\/em>. Nov.\/Dec., p. 73-75.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Zhou, L., Shi, Y, and Zhang, D. (2008).&nbsp;<strong>A Statistical Language Modeling Approach to Online Deception Detection<\/strong>.&nbsp;<em>IEEE Transactions on Knowledge and Data Engineering (TKDE)<\/em>. 20(8): pp.1077-1081.&nbsp;<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=4358936\">READ<\/a><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Behavioral Control of Deceivers in Online Attacks Award details NSF Org Award Number Award Instrument Start Date End Date NSF Program SES Divn Of Social and Economic Sciences 1527684 Standard Grant September 1, 2015 March 31, 2019 (Estimated) Secure &amp; Trustworthy Cyberspace Abstract Online attacks can cause not only temporary asset loss, but long-term psychological [&hellip;]<\/p>\n","protected":false},"author":824,"featured_media":0,"parent":50,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"coauthors":[5],"class_list":["post-96","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/pages\/96","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/users\/824"}],"replies":[{"embeddable":true,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/comments?post=96"}],"version-history":[{"count":3,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/pages\/96\/revisions"}],"predecessor-version":[{"id":101,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/pages\/96\/revisions\/101"}],"up":[{"embeddable":true,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/pages\/50"}],"wp:attachment":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/kaim\/wp-json\/wp\/v2\/coauthors?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}