Detecting unusual email communication

نویسندگان

  • P. S. Keila
  • David B. Skillicorn
چکیده

Deception theory suggests that deceptive writing is characterized by reduced frequency of firstperson pronouns and exclusive words, and elevated frequency of negative emotion words and action verbs. We apply this model of deception to the Enron email dataset, and then apply singular value decomposition to elicit the correlation structure between emails. Those emails that have high scores using this approach include deceptive emails; other emails that score highly using these frequency counts also indicate organizational dysfunctions such as improper communication of information. Hence this approach can be used as a tool for both external investigation of an organization, and internal management and regulatory

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Unusual and Deceptive Communication in Email

Deception theory suggests that deceptive writing is characterized by reduced frequency of first-person pronouns and exclusive words, and elevated frequency of negative emotion words and action verbs. We apply this model of deception to the Enron email dataset, and then apply singular value decomposition to elicit the correlation structure between emails. This allows us to rank emails by how wel...

متن کامل

The Comparison efficiency of Pivotal Response treatment (PRT) and Sensory Integration (SI) to reduce unusual quality of social interactions, unusual quality of communication and self-stimulatory behaviors in Autistic children

Background: This study was conducted to compare the effect of Pivotal Response treatment and sensory integration treatment in reducing the symptoms of male autistic children, including abnormal quality of social interactions, abnormal quality of communication and self-stimulatory behaviors. Methods: The clinical trial study was done on 36 boys with autism between 8-12 years’ old in pediatric re...

متن کامل

"C u @ d Uni": Analysis of academic emails written by native and non-native English speakers

The present study examined email communication practices of two groups of students in Iran and the United States to uncover the probable differences between Iranian and American email communication norms. The study also aimed at investigating how power distance in academic centers influences students’ choices of communication strategies in email writing. The use of two politeness strategies nam...

متن کامل

A Design Tool for Autonomous Group Agents

Autonomous group agents coordinate cooperative activities in spatially distributed groups of people who communicate via electronic mail. The highly asynchronous nature of remote communication poses a problem for the design of such programmed agents. This paper describes a tool supporting the consistent design of the communication behaviour of autonomous group agents. The tool will support the d...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005