scholarly journals Gender-preferential text mining of e-mail discourse

Author(s):  
M. Corney ◽  
O. de Vel ◽  
A. Anderson ◽  
G. Mohay
Keyword(s):  
1970 ◽  
Vol 3 (1) ◽  
pp. 11
Author(s):  
Dianne Mei Cheong Lee ◽  
Nur Atiqah Sia Abdullah

E-mail can be a fantasy playground for identity experimentations where players take on an imaginary persona and interact with each other in the virtual world. Therefore, gender deception is difficult, risky and it can be abandoned at will. Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. Based on this algorithm, a prototype in Visual Basic is developed. It was tested with 16 documents; each consists of five e-mails exchanges of respective individuals. The tests shown the prototype have 81.3% of accuracy level. This prototype can be a tool to assist interested parties such as the Criminology and Forensic Department, e-mail users interested parties such as the Criminology and Forensic Department, e-mail users and virtual communities to successfully identify gender deception.


2011 ◽  
Vol 22 (4) ◽  
pp. 15-22
Author(s):  
James A. Tackett
Keyword(s):  

2005 ◽  
Vol 6 (1) ◽  
pp. 62-71 ◽  
Author(s):  
S. Sakurai ◽  
A. Suyama
Keyword(s):  

Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2005 ◽  
Vol 36 (1) ◽  
pp. 34
Author(s):  
SHARON WORCESTER
Keyword(s):  

2006 ◽  
Vol 37 (8) ◽  
pp. 56-57
Author(s):  
JOSEPH S. EASTERN
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document