L., Charlton, K. & Cooper, H. 2003. Cues to deception.
Psychological bulletin, 129, 74.
Drasch, B., Huber, J., Panz, S. & Probst, F. 2015. Detecting
Online Firestorms in Social Media.
Duranti, L. & Rogers, C. 2016. Trust in Records and Data
Online. Integrity in Government through Records
Management. Essays in Honour of Anne Thurston, 203-
214.
Ghiassi, M., Skinner, J. & Zimbra, D. 2013. Twitter brand
sentiment analysis: A hybrid system using n-gram
analysis and dynamic artificial neural network. Expert
Systems with Applications, 40, 6266-6282.
Guillory, J. & Hancock, J. T. 2012. The effect of Linkedin
on deception in resumes. Cyberpsychology, Behavior,
and Social Networking, 15, 135-140.
Haque, M. A. & Rahman, T. 2014. Sentiment analysis by
using fuzzy logic.
Kashy, D. A. & Depaulo, B. M. 1996. Who lies? Journal of
Personality and Social Psychology, 70, 1037.
Levine, T. R., Ali, M. V., Dean, M., Abdulla, R. A. &
Garcia-Ruano, K. 2016. Toward a Pan-cultural
Typology of Deception Motives. Journal of
Intercultural Communication Research, 45, 1-12.
Li, J. & Wang, A. G. 2015. A framework of identity
resolution: evaluating identity attributes and matching
algorithms. Security Informatics, 4, 1.
Liu, H., Han, J. & Motoda, H. 2014. Uncovering deception
in social media. Social Network Analysis and Mining,
4, 1-2.
Mohammad, S. 2016. NRC Emotion Lexicon.
Navidi, W. C. 2006. Statistics for engineers and scientists,
McGraw-Hill New York.
Oxford 2012. The English Oxford Dictionary. Third
Edition, March 2012 ed.: Oxford University Press.
Peterson, T. 2016. Rapist who used social media to lure
child victims sentenced to 20 years. News24, 15 Jun
2016.
Quercia, D., Kosinski, M., Stillwell, D. & Crowcroft, J. Our
Twitter profiles, our selves: Predicting personality with
Twitter. Privacy, Security, Risk and Trust (PASSAT)
and 2011 IEEE Third Inernational Conference on
Social Computing (SocialCom), 2011 IEEE Third
International Conference on, 2011. IEEE, 180-185.
Radziwill, N. M. & Benton, M. C. 2016. Bot or Not?
Deciphering Time Maps for Tweet Interarrivals. arXiv
preprint arXiv:1605.06555.
Robinson, D. 2016. Two people write Trump’s tweets. He
writes the angrier ones. Washington Post
, 12 Aug 2016.
Schulz, A., Bergen, E., Schuhmann, P., Hoyer, J. &
Santtila, P. 2015. Online Sexual Solicitation of Minors
How Often and between Whom Does It Occur? Journal
of Research in Crime and Delinquency,
0022427815599426.
Schwartz, H. A., Eichstaedt, J. C., Kern, M. L.,
Dziurzynski, L., Ramones, S. M., Agrawal, M., Shah,
A., Kosinski, M., Stillwell, D. & Seligman, M. E. 2013.
Personality, gender, and age in the language of social
media: The open-vocabulary approach. PloS one, 8,
e73791.
Sharma, S. 2013. Black Twitter? Racial hashtags, networks
and contagion. New Formations, 78, 46-64.
Sloan, L., Morgan, J., Burnap, P. & Williams, M. 2015.
Who tweets? Deriving the demographic characteristics
of age, occupation and social class from Twitter user
meta-data. PloS one, 10, e0115545.
Squicciarini, A. & Griffin, C. 2014. Why and how to
deceive: game results with sociological evidence.
Social Network Analysis and Mining, 4, 1-13.
Van Der Walt, E. & Eloff, J. H. P. 2015. Protecting minors
on social media platforms - A Big Data Science
experiment HPI Cloud Symposium "Operating the
Cloud". Potsdam, Germany: Hasso Plattner Institut.
Van Liere, D. How far does a tweet travel?: Information
brokers in the twitterverse. Proceedings of the
International Workshop on Modeling Social Media,
2010. ACM, 6.
Von Solms, R. & Van Niekerk, J. 2013. From information
security to cyber security. Computers & Security, 38,
97-102.
Wang, G. A., Chen, H., Xu, J. J. & Atabakhsh, H. 2006.
Automatically detecting criminal identity deception: an
adaptive detection algorithm. Systems, Man and
Cybernetics, Part A: Systems and Humans, IEEE
Transactions on, 36, 988-999.
Wick, M. 2016. Geonames.