OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Interpersonal Deception Theory
David B. Buller, Judee K. Burgoon
Communication Theory (1996) Vol. 6, Iss. 3, pp. 203-242
Closed Access | Times Cited: 1162

Showing 1-25 of 1162 citing articles:

Cues to deception.
Bella M. DePaulo, James J. Lindsay, Brian E. Malone, et al.
Psychological Bulletin (2003) Vol. 129, Iss. 1, pp. 74-118
Closed Access | Times Cited: 2301

Accuracy of Deception Judgments
Charles F. Bond, Bella M. DePaulo
Personality and Social Psychology Review (2006) Vol. 10, Iss. 3, pp. 214-234
Closed Access | Times Cited: 1844

Communication Theory as a Field
Robert T. Craig
Communication Theory (1999) Vol. 9, Iss. 2, pp. 119-161
Closed Access | Times Cited: 1359


Dandan Li, C.P. Kwong, Dik Lun Lee
Journal of the American Society for Information Science and Technology (2010) Vol. 61, Iss. 1
Closed Access | Times Cited: 1310

Knowledge hiding in organizations
Catherine E. Connelly, David Zweig, Jane Webster, et al.
Journal of Organizational Behavior (2011) Vol. 33, Iss. 1, pp. 64-88
Closed Access | Times Cited: 1124

Truth of Varying Shades: Analyzing Language in Fake News and Political Fact-Checking
Hannah Rashkin, Eunsol Choi, Jin Yea Jang, et al.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (2017)
Open Access | Times Cited: 800

The elements of computer credibility
B. J. Fogg, Hsiang Li Tseng
(1999), pp. 80-87
Closed Access | Times Cited: 771

What makes Web sites credible?
B. J. Fogg, Jonathan Marshall, Othman Laraki, et al.
(2001)
Closed Access | Times Cited: 691

Fake News or Truth? Using Satirical Cues to Detect Potentially Misleading News
Victoria L. Rubin, Niall Conroy, Yimin Chen, et al.
(2016)
Open Access | Times Cited: 532

On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication
Jeffrey T. Hancock, Lauren E. Curry, Saurabh Goorha, et al.
Discourse Processes (2007) Vol. 45, Iss. 1, pp. 1-23
Closed Access | Times Cited: 510

Pitfalls and Opportunities in Nonverbal and Verbal Lie Detection
Aldert Vrij, Pär Anders Granhag, Stephen Porter
Psychological Science in the Public Interest (2010) Vol. 11, Iss. 3, pp. 89-121
Open Access | Times Cited: 493

Increasing cognitive load to facilitate lie detection: The benefit of recalling an event in reverse order.
Aldert Vrij, Samantha Mann, Ronald P. Fisher, et al.
Law and Human Behavior (2007) Vol. 32, Iss. 3, pp. 253-265
Closed Access | Times Cited: 478

Individual differences in judging deception: Accuracy and bias.
Charles F. Bond, Bella M. DePaulo
Psychological Bulletin (2008) Vol. 134, Iss. 4, pp. 477-492
Closed Access | Times Cited: 459

Finding Deceptive Opinion Spam by Any Stretch of the Imagination
Myle Ott, Yejin Choi, Claire Cardie, et al.
Meeting of the Association for Computational Linguistics (2011), pp. 309-319
Closed Access | Times Cited: 447

Truth-Default Theory (TDT)
Timothy R. Levine
Journal of Language and Social Psychology (2014) Vol. 33, Iss. 4, pp. 378-392
Closed Access | Times Cited: 446

How perpetrators and targets construe knowledge hiding in organizations
Catherine E. Connelly, David Zweig
European Journal of Work and Organizational Psychology (2014) Vol. 24, Iss. 3, pp. 479-489
Closed Access | Times Cited: 427

Combating Fake News
Karishma Sharma, Feng Qian, He Jiang, et al.
ACM Transactions on Intelligent Systems and Technology (2019) Vol. 10, Iss. 3, pp. 1-42
Closed Access | Times Cited: 417

Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications
Lina Zhou, Judee K. Burgoon, Jay F. Nunamaker, et al.
Group Decision and Negotiation (2004) Vol. 13, Iss. 1, pp. 81-106
Closed Access | Times Cited: 416

Finding Deceptive Opinion Spam by Any Stretch of the Imagination
Myle Ott, Yejin Choi, Claire Cardie, et al.
arXiv (Cornell University) (2011)
Closed Access | Times Cited: 407

Moderators of nonverbal indicators of deception: A meta-analytic synthesis.
Siegfried L. Sporer, Barbara Schwandt
Psychology Public Policy and Law (2007) Vol. 13, Iss. 1, pp. 1-34
Closed Access | Times Cited: 403

Accuracy in detecting truths and lies: Documenting the “veracity effect”
Timothy R. Levine, Hee Sun Park, Steven A. McCornack
Communication Monographs (1999) Vol. 66, Iss. 2, pp. 125-144
Closed Access | Times Cited: 402

Paraverbal indicators of deception: a meta‐analytic synthesis
Siegfried L. Sporer, Barbara Schwandt
Applied Cognitive Psychology (2006) Vol. 20, Iss. 4, pp. 421-446
Closed Access | Times Cited: 348

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
Arun Vishwanath, Tejaswini Herath, Rui Chen, et al.
Decision Support Systems (2011) Vol. 51, Iss. 3, pp. 576-586
Closed Access | Times Cited: 337

Towards a General Rule for Identifying Deceptive Opinion Spam
Jiwei Li, Myle Ott, Claire Cardie, et al.
(2014)
Open Access | Times Cited: 330

Identification of fraudulent financial statements using linguistic credibility analysis
Sean L. Humpherys, Kevin Moffitt, Mary B. Burns, et al.
Decision Support Systems (2010) Vol. 50, Iss. 3, pp. 585-594
Closed Access | Times Cited: 309

Page 1 - Next Page

Scroll to top