
{"id":81,"date":"2023-09-14T14:00:00","date_gmt":"2023-09-14T18:00:00","guid":{"rendered":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/?page_id=81"},"modified":"2025-07-30T11:53:45","modified_gmt":"2025-07-30T15:53:45","slug":"deception-detection","status":"publish","type":"page","link":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/research\/deception-detection\/","title":{"rendered":"Online Deception and Misinformation"},"content":{"rendered":"\n<p>Online deception and misinformation have been fueled by the deep penetration of the Internet and social media in support of personal and business communications. The identification of indicators and signals of deception or misinformation is instrumental to the detection task. We have investigated multiple dimensions of indicators of online deception, including lexical, structural, and discourse behaviors, in a variety of settings. In addition, we have developed and enhanced a variety of traditional machine learning and deep learning models for automatic deception detection and for augmentation of human detection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" style=\"text-transform:capitalize\">Selected Publications<\/h3>\n\n\n\n<p><a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/10591478251319686\">Zhang, D., G. Shan, M. Lee, L. Zhou, Z. Fu (2025)<\/a>, <a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/10591478251319686\">MT-GPD: A Multimodal Deep Transfer Learning Model Enhanced by Auxiliary Mechanisms for Cross-Domain Online Fake News Detection, <em>Production and Operations Management<\/em><\/a>,<a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/10591478251319686\"> 34(8), 2448-2470.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10329-7\">Zhou, L., J. Tao, D. Zhang (2022). Do Fake News in Different Languages Tell the Same Story? An Analysis of Multi-level Thematic and Emotional Characteristics of News about COVID-19, <em>Information Systems Frontier<\/em>, September, 1-20<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167923621000233\">Shan, G., L. Zhou, and Zhang, D. (2021). From Conflicts and Confusion to Doubts: Examining Review Inconsistency for Fake Review Detection. <em>Decision Support Systems<\/em>. 144, May.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404817300810\">Ahmed F. Aleroud and L. Zhou (2017). Phishing Environments, Techniques, and Countermeasures: A Survey, <em>Computers &amp; Security<\/em>, 68, 160-196.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2016.1205907\">Zhang, D, L. Zhou, Luo, J., and D. Isil (2016). What Online Reviewer Behaviors Really Matter? <em>Journal of Management Information Systems<\/em>, 33(2), 456-481.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/psycnet.apa.org\/doi\/10.1016\/j.im.2014.05.011\">Zhou, L., J. Wu, and D. Zhang (2014). Discourse Feature of Deception Behavior in case of Multiple Receivers.<em> Information &amp; Management,<\/em> 51(6), 726-737.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/doi.org\/10.1016\/j.dss.2013.08.010\">Pak, J. and L. Zhou (2014). Social Structural Behavior of Deception in Computer-Mediated Communication. <em>Decision Support Systems<\/em>. July, 63, 95-103.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/doi.org\/10.1177\/1046496413484178\">Zhou, L., D. Zhang, and Y. Sung (2013). The Effects of Group Factors on Deception Detection Performance. <em>Small Group Research<\/em>, 24(3), 272-297, June.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10726-012-9303-9\">Zhou, L., Y. Sung, and D. Zhang (2013). Deception Performance in Online Group Negotiation and Decision Making: The Effects of Deception Experience and Deception Skill. <em>Group Decision and Negotiation<\/em>. 22(1), January, 153-172.<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/dx.doi.org\/10.1109\/TKDE.2007.190624\">Zhou, L. Y. Shi, and D. Zhang (2008). A Statistical Language Modeling Approach to Online Deception Detection, <em>IEEE Transactions on Knowledge and Data Engineering<\/em>, 20(8), 1077-1081.<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/dx.doi.org\/10.1109\/TFUZZ.2006.889914\">Zhou, L. and A. Zenebe (2008). Representation and Reasoning under Uncertainty in Deception Detection: A Neuro-fuzzy Approach, <em>IEEE Transactions on Fuzzy Systems<\/em>, 16(2), April, 442-454.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4292235\">Zhou, L. and D. Zhang (2007). An Ontology-supported Misinformation Model: Toward a digital misinformation library, <em>IEEE Transactions on Systems, Man, and Cybernetics (Part A).<\/em> 37(5), Sept. 804-813.<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/dx.doi.org\/10.1016\/j.dss.2007.03.012\">Zhou, L. and D. Zhang (2007). Typing or Messaging? Modality Effect on Deception Detection in Computer-mediated Communication, <em>Decision Support Systems<\/em>, 44, 188-201.<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/dx.doi.org\/10.1080\/07421222.2004.11045779\">Zhou, L., J.K. Burgoon, D. Twitchell, T. Qin, and J.F. Nunamaker (2004). A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. <em>Journal of Management Information Systems<\/em>, 20(4), 139-165.<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online deception and misinformation have been fueled by the deep penetration of the Internet and social media in support of personal and business communications. The identification of indicators and signals of deception or misinformation is instrumental to the detection task. We have investigated multiple dimensions of indicators of online deception, including lexical, structural, and discourse [&hellip;]<\/p>\n","protected":false},"author":4338,"featured_media":0,"parent":79,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-81","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/pages\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/users\/4338"}],"replies":[{"embeddable":true,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":15,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/pages\/81\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/pages\/81\/revisions\/257"}],"up":[{"embeddable":true,"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/pages\/79"}],"wp:attachment":[{"href":"https:\/\/belkcollegeofbusiness.charlotte.edu\/lzhou8\/wp-json\/wp\/v2\/media?parent=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}