Detecting Hoaxes, Frauds, and Deception in Writing Style Online

作者: Sadia Afroz , Michael Brennan , Rachel Greenstadt

DOI: 10.1109/SP.2012.34

关键词: PragmaticsWriting styleInformation privacyContext (language use)DeceptionIdentity (object-oriented programming)Artificial intelligenceNatural language processingComputer scienceStylometryDigital forensics

摘要: … method for detecting stylistic deception in written documents. … distinguish regular documents from deceptive documents with … While Tom’s posts as Amina were not found to be deceptive …

参考文章(29)
Max Steller, Recent developments in statement analysis. Springer, Dordrecht. pp. 135- 154 ,(1989) , 10.1007/978-94-015-7856-1_8
William Aiello, Andrew Warfield, Mihir Nanavati, Nathan Taylor, Herbert west: deanonymizer usenix conference on hot topics in security. pp. 6- 6 ,(2011)
Josyula R. Rao, Pankaj Rohatgi, Can pseudonymity really guarantee privacy usenix security symposium. pp. 7- 7 ,(2000)
Mark G. Frank, Melissa A. Menasco, Maureen O'Sullivan, Human Behavior and Deception Detection Wiley Handbook of Science and Technology for Homeland Security. pp. 1- 1 ,(2008) , 10.1002/9780470087923.HHS299
Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker, Detecting deception through linguistic analysis intelligence and security informatics. pp. 91- 101 ,(2003) , 10.1007/3-540-44853-5_7
Harold Somers, Fiona Tweedie, Authorship Attribution and Pastiche Computers and The Humanities. ,vol. 37, pp. 407- 429 ,(2003) , 10.1023/A:1025786724466
F. J. Tweedie, S. Singh, D. I. Holmes, Neural network applications in stylometry: The Federalist Papers Computers and the Humanities. ,vol. 30, pp. 1- 10 ,(1996) , 10.1007/BF00054024
Jeffrey T. Hancock, Lauren E. Curry, Saurabh Goorha, Michael Woodworth, On Lying and Being Lied to: A Linguistic Analysis of Deception in Computer-Mediated Communication. Discourse Processes. ,vol. 45, pp. 1- 23 ,(2007) , 10.1080/01638530701739181
D. I. HOLMES, The Federalist Revisited: New Directions in Authorship Attribution Literary and Linguistic Computing. ,vol. 10, pp. 111- 127 ,(1995) , 10.1093/LLC/10.2.111