Australia and the question of Internet Control

AUTHOR
Matthew J. Warren and Shona Leitch

ABSTRACT

Introduction

Australia as a part of the Global Information Society will have to deal with a number of ethical issues in relation to the Internet; particularly, the distribution of illegal material and the impact of Web 2.0 on Australian society. In the Oceania region of the world there are 20.8 million Internet users, which represents 60% of the regions population (InternetWorld, 2009), this identifies the strong impact of the Internet in Australia.

Historically the initial focus of the Internet was the distribution of information in a static manner, but over time and through the development of technology the Internet has now developed into Web 2.0. The Web is no longer a collection of static pages of HTML that describe something in the world; increasingly, the Web is the world. Everything and everyone in the world casts an “information shadow,” an aura of data which, when captured and processed intelligently, offers extraordinary opportunity and mindbending implications (O’Reiley and Battelle, 2009).

In recent years the emergence of Web 2.0 and related internet sites such as Facebook have had a major impact upon the Internet in recent years. One of the interesting aspects of Facebook is the use of third party applications and the interactions that this allows. This means that individual Facebook pages now act as a web page, blog, instant messenger, email system and the use of third party applications allows for real time functionality (DiMicco and Millen, 2007; Shuen, 2008).

Australia Government Strategies

One of the proposals put forward by the Australian Federal Government to deal with the concerns of the Internet is the introduction of mandatory Internet filtering. The aim is that Internet service providers will run the mandatory Internet filtering system on behalf of the Federal Government. The overall aim being to remove access to Australians to information that is considered illegal in an Australian content.

As part of the process, in 2010 the Australian Federal Government via the Department of Broadband, Communications and the Digital Economy sought public views regarding dealing with illegal content via the Internet. This paper will analyse the public feedback that was obtained and determine current trends that exist within that data.

Structure of the paper

The structure of the paper will be:

1) A discussion of how Australia is dealing with the issues posed by the Internet and the associated new technologies;

2) The paper will discuss the strategies developed by the Australian Federal Government and in particular discuss the proposed mandatory Internet filtering;

3) An analysis of the public findings submitted to the Department of Broadband, Communications and the Digital Economy will be presented. The submission will be analysed and data trends will be discussed within the paper in particular the issues raised (for and against) in regards to mandatory Internet filtering.

4) An assessment of the next stage of the Federal Government proposals and the impact that it could have on Australia.

5) The paper will conclude by comparing Australian Government initiatives with initiatives from other countries around the world.

REFERENCES

DiMicco, J. M. and Millen, D. R. (2007) Identity management: Multiple presentations of self in Facebook. Proceedings of the 2007 International ACM conference on Supporting group work, Florida, USA.

InternetWorld (2009) Global Internet Statistics, URL: http://www.internetworldstats.com/stats.htm, Accessed 25th September, 2009.

Shuen, A. (2008) Web 2.0: a strategy guide. O’Reilly Media, Inc.

O’Reiley and Battelle (2009) Web Squared: Web 2.0 Five Years On, Proceedings of Web 2.0 Summit, San Francisco, USA.

Political blogging in Northern Ireland: A post-conflict society in the virtual world

AUTHOR
Ciaran Ward

ABSTRACT

The socio-political landscape of Northern Ireland has changed radically and rapidly over the course of the last 15-20 years. This period has seen the emergence and rapid growth of the online social media phenomenon, which has exercised a considerable influence over the politics and wider society of the region.

In 1998 devolved government returned to Northern Ireland in the form of a legislative assembly for the first time in 26 years following a prolonged period of civil unrest during which time direct rule was administered from London.

After an uncertain beginning including two periods of suspension and temporary return to direct rule the assembly was reconvened in 2007, since which time it has functioned continuously with a two-party coalition. The assembly’s existence has coincided roughly with the advent and development of blogging or citizen journalism. Since the birth of the first weblog dedicated specifically to Northern Irish politics “Slugger O’Toole” in 2002 dozens of blogs encompassing a vast spectrum of political views and party affiliations reflecting both the left/right and the unionist/nationalist divide have sprung up. These blogs are written by a wide range of actors including politicians, academics and journalists as well as private individuals and have become a significant addition to the input of the mainstream media. The ownership status of these blogs also varies considerably in that some are fully or partially independent of external influence, while others are linked to broadcasting organisations, newspapers, political parties, lobby groups and think tanks throughout the UK as well as in the Republic of Ireland. The tone of such blogs also varies from serious analysis to whimsical satire. It is also significant to note that not all actors within the Northern Irish blogosphere are physically based within the region. Participants, including authors, commenters and readers form a large online community whose members are based all over the world.

Since the end of the civil conflict of 1969-94 and the gradual normalisation of political life international news coverage of the region has markedly declined. This gap has been filled in part by the advent of the blog and related online media in that bloggers now chart news events on a daily basis, giving rise to extensive debate and commentary.

Although the practice of blogging is often panned by critics as little more than vanity publishing, its influence in forming political thought and provoking debate should not be underestimated. Unlike mainstream media sources blogs are not restricted by editorial control or neutrality policies and can therefore accommodate a vast range of views ranging from the moderate to the extremist ends of the spectrum. Other restrictive factors within conventional journalism such as time, space and money are largely irrelevant within the blogosphere. Similarly, blogs lack the hierarchical and often dictatorial culture often present in the more traditional media. Blogs alongside Freedom of Information legislation can contribute to government transparency and accountability. However one major flaw is the lack of veracity or authority in reporting purported facts, which as well as being ethically questionable can lead to the possibility of legal action. Furthermore the lack of regulation and the free-for-all nature of the medium means that quality can vary immensely. Comment threads can often alternate between mature political debate and abusive exchanges like a virtual wild west or school playground, in which the infamous “Godwin’s Law” is often invoked.

In more recent years the blog has been supplemented by other interactive social media phenomena such as Twitter, Facebook and YouTube, all of which feature prominently in the socio-political developments within the region and further afield.

The regional Assembly has had to face many challenges during its relatively short existence, such as the impact of the Freedom of Information Act and the financial crisis, the ongoing threat from dissident terrorism, devolution of policing and justice and financial misconduct by members, all of which have been covered extensively within the local blogosphere.

Important events such as elections, budgets, incidents of civil unrest and ministerial resignations can be discussed and debated on an instantaneous basis within these online communities. The blogosphere thus permits interaction on an unprecedented scale which would have been impossible in the pre-internet era.

Although blogging in Northern Ireland, a relatively liberal democratic society does not have the same radical impact as it would in countries with restrictions on democracy or freedom of speech it nevertheless plays a crucial role in the flow of information, the formation of opinions and the empowerment and organisation of political activists. This is aided in part by the small size of the region and its close-knit political community.

This paper examines and sets out to quantify the impact of the blog and related social networks within Northern Ireland’s socio-political landscape through empirical research comparative cases, source material and anecdotal evidence, charting both the negative and positive effects as well as the unintended consequences of the phenomenon.

Brain-Computer Interfaces: a technical approach to supporting privacy

AUTHOR
Kirsten Wahlstrom, Ben Fairweather and Helen Ashman

ABSTRACT

Introduction

Brain-Computer Interfaces (BCIs) facilitate communication between a brain and a computer and can be categorised according to function: interpretation of neural activity, stimulation of neural activity, and interpretation-stimulation. Warwick’s self-experiments with implants in the interpretation-stimulation category (Warwick and Gasson, 2004) demonstrate the technical feasibility of extending the human nervous system beyond its biological limits to other systems, and to other people, via the internet. Furthermore, there have been recent advances in interpreting passive neural activity (Coffey et al., 2010) and also in concurrent interpretation of visual and motor intentional neural activity (Allison et al., 2010). A future BCI (fBCI) integrating these technical features would concurrently interpret both intentional and passive neural activity in order to communicate information to systems and other people via the Internet.

In addition to these research advances, BCIs interpreting intentional neural activity via electroencephalography (EEG) are available to consumers (Emotiv Systems, Intendix). Should fBCI be commercially viable, an ethical and legal obligation to support privacy will exist.

Privacy emerges from a society’s communication practices (Westin, 2003). Although acculturation plays a role in shaping privacy expectations, the extent to which one person requires privacy may differ to that required by another (Gavison, 1980). In addition, a person’s perception of privacy is dependent on context (Solove, 2006). For example, I am likely to openly disclose details related to my health to my father, judiciously disclose these details to my friends, and withhold them completely from strangers. Thus, privacy requirements are diverse and susceptible to change.

Privacy is a component of freedom, autonomy and identity. When using technologies, people assert independence and autonomy by declining to participate, or by using anonymity or misinformation to create and maintain privacy (Lenhart and Madden, 2007, Fuster, 2009). When people opt out, adopt anonymity or engage in misinformation, the effectiveness of any technology reliant upon accurate and representative data is compromised.

The conceptualisation of privacy as culturally shaped and unique for each person and their immediate context is well understood, long-standing, and widely applied by law- and policy-makers. It forms the basis for legislative and other regulatory approaches such as the Australian Privacy Act, the EU’s Privacy Directives and the OECD’s Guidelines. These legal obligations, and further ethical obligations (Burkert, 1997), mandate support for privacy with respect to technologies. In addition, if technologies support privacy, people are more likely to provide accurate information, adding value to the technology itself. However, to the authors’ knowledge, there have been no investigations of technical approaches to supporting privacy in BCIs. This paper presents a conceptual model for consideration and critique.

BCI technology

BCIs identify and measure the electrical activity associated with activating specific neural pathways (Berger et al., 2007). These measurements are then applied to the control of external systems (Hochberg et al., 2006). With respect to BCI technologies, the identification and measurement of neural activity has been achieved with surgically invasive and non-invasive approaches. While surgical BCIs identify and measure neural activity with a higher level of accuracy, non-surgical approaches carry fewer health risks. Thus, there has been interest in improving the accuracy of non-surgical BCIs (Allison et al., 2010).

BCIs have neural networks which must be trained to identify a person’s neural activities and then to map specific neural activities to specific intentions. For example, consider a scenario in which Ann has purchased a new BCI to use with her mobile phone. She must spend time training the BCI to recognise the unique pattern of neural activity that matches with imagining each person in her mobile phone’s address book and to recognise neural activity corresponding to the ‘call’ and ‘hang up’ commands.

Conceptual model

If BCIs can identify and measure neural activity, then they can also identify and measure a person’s privacy perception and requirement. The person’s privacy requirement can then be applied to any information they may be sharing. For example, consider a scenario in which Bob is using a BCI to interact with his mobile phone. He is calling Charlie but does not want the call logged in the mobile phone’s memory. First, he thinks of Charlie and the mobile phone retrieves Charlie’s number. Then Bob thinks of not logging the call and the mobile phone saves this privacy requirement in its working memory. Finally, Bob thinks ‘call’ and the mobile phone places the call without logging it.

This scenario is a binary situation: log the call or don’t log the call. However, privacy requirements are much more diverse than this. If this conceptual model can be refined to support a diversity of privacy requirements, a technical prototype will be designed, implemented and tested.

The full paper will further conceptualise privacy with a view to informing a future prototype. Then the paper will describe the technologies underlying BCIs. These conceptual and technical descriptions will enable the proposition of technical conceptual model for the prototype which offers flexibility with respect to privacy and interoperability with respect to existing BCIs. Conclusions will stimulate consideration, discussion and critique.

REFERENCES

ALLISON, B. Z., BRUNNER, C., KAISER, V., MULLER-PUTZ, G. R., NEUPER, C. & PFURTSCHELLER, G. 2010. Toward a hybrid brain-computer interface based on imagined movement and visual attention. Journal of Neural Engineering, 7, 026007.

BERGER, T., CHAPIN, J., GERHARDT, G., MCFARLAND, D., PRINCIPE, J., SOUSSOU, W., TAYLOR, D. & TRESCO, P. 2007. International Assessment of Research and Development in Brain-Computer Interfaces.

BURKERT, H. 1997. Privacy-Enhancing Technologies: typology, critique, vision. Technology and privacy: the new landscape.

CAMPBELL, A., CHOUDHURY, T., HU, S., LU, H., MUKERJEE, M., RABBI, M. & RAIZADA, R. NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset. MobiHeld 2010, 2010. ACM.

COFFEY, E., BROUWER, A.-M., WILSCHUT, E. & VAN ERP, J. 2010. Brain-machine interfaces in space: Using spontaneous rather than intentionally generated brain signals. Acta Astronautica, 67, 1-11.

DRUMMOND, K. 2009. Pentagon Preps Soldier Telepathy Push. Wired.

EMOTIV SYSTEMS. Emotiv – Brain Computer Interface Technology [Online]. Available: http://emotiv.com.

FUSTER, G. 2009. Inaccuracy as a privacy-enhancing tool. Ethics and Information Technology.

GAVISON, R. 1980. Privacy and the Limits of Law. The Yale Law Journal, 89, 421-471.

HOCHBERG, L., SERRUYA, M., FRIEHS, G., MUKAND, J., SALEH, M., CAPLAN, A., BRANNER, A., CHEN, D., PENN, R. & DONOGHUE, J. 2006. Neuronal ensemble control of prosthetic devices by a human with tetraplegia. Nature, 442, 164-171.

INTENDIX Personal EEG-based Spelling System.

LENHART, A. & MADDEN, M. 2007. Teens, Privacy and Online Social Networks: How teens manage their online identities and personal information in the age of MySpace.

SHACHTMAN, N. 2008. Army Funds ‘Synthetic Telepathy’ Research. Wired.

SOLOVE, D. 2006. A Taxonomy of Privacy. University of Pennsylvania Law Review, 154, 477-560.

WARWICK, K. & GASSON, M. Extending the human nervous system through internet implants – experimentation and impact. IEEE International Conference on Systems, Man and Cybernetics, 2004 The Hague, Netherlands. 2046-2052.

WESTIN, A. 2003. Social and Political Dimensions of Privacy. Journal of Social Issues, 59, 431-453.

Lurking: finding one’s self while remaining hidden

AUTHOR
Richard Volkman

ABSTRACT

“Lurking” refers to the online behavior of gathering information from interactive resources like forums and social networking sites without participating in the interactivity that generates the online content and without disclosing one’s self as a consumer of that content. I propose to explore the ethical significance of lurking as it specifically relates to social networking sites like Facebook. This focus will reveal the deep relativity of the ethics of lurking to its particular context and motivations. In the context of social networking sites like Facebook, lurking and its compliment in the public disclosure of personal information are expressions of the particular characters of particular social animals situated in a particular social circumstance. Phenomena like lurking indicate the ethical significance of deliberations that cannot be readily undertaken in the language of impersonalist ethics, since lurking takes place at the vague and overlapping boundaries of self and other, friend and stranger, this community and that community. To deliberate effectively about such matters we do better to operate in the personalist language of character, self-discovery, and self-realization than the impersonalist discourse of overall consequences, moral rules, and political rights that characterizes so much of academic philosophy in ethics.

By “personalist” discourse, I mean ethical discourse that admits the relevance of particular persons and circumstances in properly judging what there is most reason to do or want or be. Aristotle’s virtue ethics or the heroic individualism of Emerson and Nietzsche are personalist in this sense. “Impersonalist” accounts of ethics strive for a level of impartiality and universality, whether in the form of some agent-neutral specification of the “overall good” in consequentialism, or in the specification of universal rules to govern conduct for “persons as such” in the deontology of Kant’s moral theory or Locke’s account of natural rights. The point of the essay is not to establish the absolute superiority of one or the other of these modes of discourse but to indicate the extent to which one’s account of the ethical universe will be impoverished if one altogether eschews personalist ethical discourse on the grounds that it is insufficiently impartial or universal in its application.

While there is a considerable literature on the ethics and motivations of lurking, there is relatively little investigation of it in the context of social networking and even less that reflects on the ultimate particularity of good judgement in that domain. There are many articles on the ethics of lurking in the context of formal research such as ethnography, and there are several articles examining the values of lurking versus more active participation in online learning communities. These are appropriate issues for academics to study, since they directly touch the pedagogical and policy concerns that shape our vocation, but we generally do not evaluate our everyday conduct in the terms of policy or professionalism. Meanwhile, treatments of lurking that focus on the free riding it may entail are appropriate to the investigation of the flourishing and success of online collaborative projects like Wikipedia or Slashdot or Reddit, but they do not seem particularly relevant to the motives or the consequences of lurking on social networking sites. In fact, one of the purposes that people bring to such sites is to disclose information about themselves, and this purpose would often be frustrated or at least undermined if there were no lurkers. This indicates a complimentary relation between “lurkers” and “disclosers” that may be present in other venues but which I will argue is an essential feature of social networking. Finally, analysis that focuses on hacking, violating terms of service, or other straightforward breeches of contract or policy is not directly relevant, since these issues are adequately addressed in impersonalist modes of discourse. It will be shown that lurking on social networking sites has obvious and profound privacy implications, but they are not the sort that can be neatly captured by an impersonalist discussion of privacy or the policies and social norms that attend it.

To orient the discussion, it is helpful to describe concrete cases in which lurking on a social networking site has plain ethical significance that cannot be easily captured without explicit reference to the particular person embedded in her particular circumstance and relations. This is a daunting task that cannot be neatly summed in an abstract, since it cannot proceed in the usual manner of “situated action ethics,” such that the story pumps an obvious intuition that is leveraged as evidence for or against some account of the rules or policies appropriate to the case. The point is that the particular facts matter, and this cannot be illustrated by leaving out the particular facts; nor is it possible to tell a story short of a novel that would include all those relevant facts. Instead, the cases will illustrate how many salient details are invariably left out of any such description, while also showing the case is an instance of real ethical significance and not a matter of mere taste or whim. The paper will proceed from a detailed investigation of such particular cases to illustrate that ethics is not simply a matter of evaluating actions or rules. One’s situated character matters.

In the end, it will be revealed that lurking on social networking sites cannot be categorically judged to be good or bad and that crude political tools for balancing privacy and the flow of information shed little light on the phenomena. To engage these matters, we need to engage the concrete realities of our particular lives in their full particularity. Ultimately, if we are to navigate the ethics of real life in the information age, we shall each need to engage our selves.

The Global Communication skill among educated youth of the Tharu tribe: A study in special reference to uses of internet-facilities

AUTHOR
Subhash Chandra Verma

ABSTRACT

The Tharu community is famous tribe of India and Nepal. The Tharus are indigenous people of the Himalayan Tarai area. Maximum population of this community lives on both sides of Indo-Nepal border. Tharu were already living in the Terai before Indo-Europeans arrived. Due to friendly relations between India and Nepal, the Indo-Nepal border is open for people of both countries; so Indian and Nepali Tharus are active in their socio-cultural relationship. This paper is based on primary & secondary data and it describes status of global communication & connectivity among educated youth of the Tharu tribe. There were 32 male and 18 female students in the selected samples. All these Tharu students belong to various villages. A self developed questionnaire has been used in interviewing all selected Tharu students for collection of information about awareness of global communication. Facts about use of internet, Social Networking, Chatting tools, developing of online communities have been collected from the internet. Facebook, Orkut, Yahoo Messenger, MSN Messenger, Skype, Google search have been used for searching those Tharus who are connected and active globally through the use of internet. Some information has been searched from the internet about the Nepali and Indian Tharus. Facts about use of internet, Social Networking, Chatting tools, developing of online communities have been collected from the internet. Facebook, Orkut, Yahoo Messenger, MSN Messenger, Skype, Google search have been used for searching those Tharus who are connected and active globally through the use of internet. It is a normal perception about the Tharus that they have very reserved and shy nature so they are backward. It has also been found in this study that they are really very poor in global connectivity due to their traditional habits. This situation is only in Indian Tharus because Nepali Tharus are more aware than Indian Tharus in use of internet and direct links to other people. This is why they are working at global level but Indian Tharus are still struggling for their basic needs in this era of globalization. Educated Indian Tharus are also backward and poor in use of global communication facilities like internet. Maximum (approx 75%) Indian Tharu students are not able to use computer and internet till now, though they know very well that use of modern technologies of communication is very helpful in development of any society. Hence they are always away from these facilities which are available in the college and market at very low price. There is need for more awareness about global communication and connectivity among Indian Tharus for their development. The Indian Tharu youth, who have access to higher education, are not so aware about globalization and global communication. Although they are aware of the significance of global communication in the development of any community in this era, but even then they are not active in global communication. There is no dearth of facilities which are available free of cost (at college) or at very low price in the market for global communication but Indian educated Tharu youths seem to have little interest in it. Nepali Tharu youths are more active than Indian Tharu youths in global communication by internet and direct contacts with people of other countries. There are many Nepali Tharu students studying in top grade Indian Institutes. But Indian Tharu youths have little awareness about studying in these institutes, though they have special facility of reservation for admission in these types of institutions. What is the real status of the global communication and what are the main problems of Indian Tharu youth about this matter? Why they are not interested in global communication? These are some main and big questions at present. On the basis of this analysis, of collected data from the Indian Tharu students and other available information by related literature & internet search, it should be said that Indian Tharu community is still poor and deprived in matter of global communication in this era of globalization. Lack of awareness about development and globalization is the reason of their backwardness in global communication. Due to poor English some Indian Tharus feel shyness and hesitation to keep global contacts by internet or directly. Educated Indian Tharus are also poor and slow in global communication due to their tipical traditional habits of hesitation and shyness. That is why the Indian Tharus have only one online community named as Rana Tharu Parishad but Nepali Tharus have lot of online communities for social networking (name of these online communities have also described above). Maximum educated Indian Tharus (3/4) are not able to use computer and internet till now. This is the era of globalization so the global communication is must for development of every community. That’s why the Indian Tharus need to be connected with global communication stream. Tharu youth are very important wing of their community. They are playing very creative role in their community. But they are not connected with mainstream of development. Some youths are trying to get higher education and advanced technology but they are very few. They are neither advanced nor are intricately linked with their traditional culture. They should have access to modern education, communication, technology and new life style but the care of traditional culture is necessary to keep their own identity.

Web Deception Detanglement

AUTHOR
Anna Vartapetiance and Lee Gillam

ABSTRACT

Suppose we wished to create an intelligent machine, and the web was the choice of information. More specifically, suppose we relied on Wikipedia as a resource from which this intelligent machine would derive its knowledge base. Any acts of Wikipedia vandalism would then impact upon the knowledge base of this intelligent system, and the system might develop confidence in entirely incorrect information. Ethically, should we develop a machine which can craft its own knowledge base without reference to the veracity of the material it considers? If we did, what kinds of “beliefs” might such a machine start to encompass? How do we address the veracity of such materials so that such a learning machine might distinguish between truth and lie, and what kinds of conclusions might be derived about our world as a consequence? If trying to construct an ethical machine, how appropriate can ethical outcomes be considered in the presence of deceptive data? And, finally, how much of the Web is deceptive?

In this paper, we will investigate the nature and, importantly the detectability, of deception at large, and in relation to the web. Deception appears to be increasingly prevalent in society, whether deliberate, accidental, or simply ill-informed. Examples of deception are readily available, from individuals deceiving potential partners on dating websites, to surveys which make headlines about “Coffee causing Hallucinations” with no medical evidence and very little scientific rigour , . to companies which collapsed due to deceptive financial practices (e.g. Enron, WorldCom), and segments of the financial industry allegedly misrepresenting risk in order to derive substantial profits . We envisage a Web Filter which could be used equally well as an assistive service for human readers, and as a mechanism within a system that learns from the web.

So-called Deception Theory, and the possibility to model human deception processes, is interesting to experts in different subject fields for differing reasons and with different foci. Most research has been directed towards human physical reactions in relation to co-located (face-to-face, synchronous) deception, largely considering non-verbal cues involving body language, eye movements, vocal pitch and so on, and how to detect deceptions on the basis of such cues. Such research is interesting for sociologists in terms of how deception is created, criminologists in trying to differentiate the deceptive from the truthful, and computer vision researchers in relating identifying such cues automatically across participants within captured video. Alternative communication mediums, in which participants are distributed, communications asynchronous, and cues can only be captured from the artefact of the communication, the verbal, requires entirely different lines of expertise and investigation.

To try to recognize deception in verbal communication, lexical and grammatical analysis is typical. Such approaches may be suitable for identifying deception on the web. It is assumed that deception leads to identifiable, yet unconscious, lexical selection and the forming of certain grammatical structures (Toma and Hancock, 2010), and these may act as generally useful cues for deceptive writing. From numerous researchers (Burgoon et al 2003, Pennebaker et al 2003, Newman et al 2003, Zhou et al 2003), we find that the presence of such cues can be divided into four principal groups:

1. Use of more negative emotion words

2. Use distancing strategies – fewer self references

3. Use of larger proportions of rare and/or long words

4. Use of more emotion words

To demonstrate that deception detection might be possible, Pennebaker and colleagues developed a text analysis program called Linguistic Inquiry and Word Count (LIWC) which analyzes texts against an internal dictionary (Pennebaker, Francis, & Booth, 2001, Pennebaker, Booth, & Francis, 2007). Each word in the text can belong to one or more of LIWC’s 70 dimensions, which include general text measures (e.g. word count); psychological indicators (e.g. emotions), and semantically-related words (e.g. temporally and spatially related words). We submitted the BBC’s “’Visions link’ to coffee intake” article, alluded to earlier, to the free online version of LIWC. Results, included below, show an absence of self-references, few positive emotions, and a large proportion of “big words”. Of course, such an analysis is inconclusive as such features may also be true of scientific articles, or textbooks, and LIWC leaves the interpretation up to us.
web_deception_fig1
Our aim is to create a system that can identify deceptive texts, but also explains which are the most deceptive sentences. Such a system could act as an effective Web Filter for both human and machine use. We assume that such a system should be geared towards the peaks of deception which may occur in texts which are otherwise not deceptive, so such deceptions may be lost in the aggregate. We must also account for systematic variations as exist in different text genres in order to control for them, and to ascertain the threshold values for the various factors which give us appropriate confidence in our identification.

The full paper will initially review the literature relating to deception in general, and distinguish between deceptions and lies. In the process, we will offer up some interesting – and occasionally amusing – examples of deception. We will then focus towards text-based deception, and we will include discuss initial experiments geared towards the development of the system mentioned above. One of these experiments may even demonstrate how a paper supposedly geared towards deception detection, whose conclusions fail to fit the aim, was never likely to achieve its aim, and make mention of one or two other interesting examples of academic deception and/or lies.

REFERENCES

Toma, C.L. and Hancock, J.T. (2010). Reading between the Lines: Linguistic Cues to Deception in Online Dating Profiles. Proceedings of the ACM conference on Computer-Supported Cooperative Work (CSCW 2009)

Burgoon, J.K., Blair, J.P., Qin, T., and Nunamaker, J.F. (2003). Detecting deception through linguistic analysis. Intelligence and Security Informatics, 2665.

Pennebaker, J.W., Booth, R.J., & Francis, M.E. (2007). “Linguistic Inquiry and Word Count: LIWC 2007”. Austin, TX: LIWC (www.liwc.net).

Pennebaker, J.W., Francis, M.E., and Booth, R.J. (2001). “Linguistic Inquiry and Word Count: LIWC 2001”. Mahwah, NJ: Erlbaum Publishers.