Automated analysis techniques for online conversations with application in deception detection

作者: Douglas Paul Twitchell , Jay F. Nunamaker

DOI:

关键词:

摘要: Email, chat, instant messaging, blogs, and newsgroups are now common ways for people to interact. Along with these new sending, receiving, storing messages comes the challenge of organizing, filtering, understanding them, which text mining has been shown be useful. Additionally, it done so using both content-dependent content-independent methods. Unfortunately, computer-mediated communication also provided criminals, terrorists, spies, other threats security a means efficient communication. However, often textual encoding communications may provide possibility detecting tracking those who deceptive. Two methods understanding, deception in text-based presented. First, message feature uses features or cues CMC combined machine learning techniques classify according sender's intent. The method utilizes classification coupled linguistic analysis extraction number input features. A study deceptive non-deceptive email attained accuracy between 60% 80%. Second, speech act profiling is evaluating visualizing synchronous by creating profiles conversations their participants theory probabilistic Transcripts from large corpus annotated used train language models modified hidden Markov model (HMM) obtain probable acts sentences, aggregated each conversation participant set profiles. Three studies validating detailed as well two showing profiling's ability uncover uncertainty related deception. The introduced here that represent possible direction analysis. Both have applications outside context In addition aiding detection, applicable information retrieval, technical support training, GSS facilitation support, transportation security, assurance.

参考文章(135)
John R Searle, A taxonomy of illocutionary acts University of Minnesota Press, Minneapolis. pp. 1- 29 ,(1979) , 10.1017/CBO9780511609213.003
Douglas P. Twitchell, Jay F. Nunamaker, Judee K. Burgoon, Using Speech Act Profiling for Deception Detection intelligence and security informatics. pp. 403- 410 ,(2004) , 10.1007/978-3-540-25952-7_30
Hamish Cunningham, GATE, a General Architecture for Text Engineering Computers and The Humanities. ,vol. 36, pp. 223- 254 ,(2002) , 10.1023/A:1014348124664
Aldert Vrij, Katherine Edward, Kim P. Roberts, Ray Bull, Detecting Deceit via Analysis of Verbal and Nonverbal Behavior Journal of Nonverbal Behavior. ,vol. 24, pp. 239- 263 ,(2000) , 10.1023/A:1006610329284
Lesa A. Stern, Judee K. Burgoon, Leesa Dillman, Interpersonal Adaptation: Dyadic Interaction Patterns ,(1995)
Alessandra Agostini, Giorgio De Michelis, Maria Antonietta Grasso, Rethinking CSCW systems: the architecture of MILANO european conference on computer supported cooperative work. pp. 33- 48 ,(1997) , 10.1007/978-94-015-7372-6_3
Marti A. Hearst, TextTiling: segmenting text into multi-paragraph subtopic passages Computational Linguistics. ,vol. 23, pp. 33- 64 ,(1997)
Terry Winograd, Fernando Flores, None, Understanding Computers and Cognition: A New Foundation for Design Alex Publishing Corporation. ,(1987)