首页> 外文学位 >Automated analysis techniques for online conversations with application in deception detection.
【24h】

Automated analysis techniques for online conversations with application in deception detection.

机译:自动化在线对话分析技术,可应用于欺骗检测。

获取原文
获取原文并翻译 | 示例

摘要

Email, chat, instant messaging, blogs, and newsgroups are now common ways for people to interact. Along with these new ways for sending, receiving, and storing messages comes the challenge of organizing, filtering, and understanding them, for which text mining has been shown to be useful. Additionally, it has done so using both content-dependent and content-independent methods.; Unfortunately, computer-mediated communication has also provided criminals, terrorists, spies, and other threats to security a means of efficient communication. However, the often textual encoding of these communications may also provide for the possibility of detecting and tracking those who are deceptive. Two methods for organizing, filtering, understanding, and detecting deception in text-based computer-mediated communication are presented.; First, message feature mining uses message features or cues in CMC messages combined with machine learning techniques to classify messages according to the sender's intent. The method utilizes common classification methods coupled with linguistic analysis of messages for extraction of a number of content-independent input features. A study using message feature mining to classify deceptive and non-deceptive email messages attained classification accuracy between 60% and 80%.; Second, speech act profiling is a method for evaluating and visualizing synchronous CMC by creating profiles of conversations and their participants using speech act theory and probabilistic classification methods. Transcripts from a large corpus of speech act annotated conversations are used to train language models and a modified hidden Markov model (HMM) to obtain probable speech acts for sentences, which are aggregated for each conversation participant creating a set of speech act profiles. Three studies for validating the profiles are detailed as well as two studies showing speech act profiling's ability to uncover uncertainty related to deception.; The methods introduced here are two content-independent methods that represent a possible new direction in text analysis. Both have possible applications outside the context of deception. In addition to aiding deception detection, these methods may also be applicable in information retrieval, technical support training, GSS facilitation support, transportation security, and information assurance.
机译:电子邮件,聊天,即时消息,博客和新闻组现在是人们进行交互的常用方式。除了这些用于发送,接收和存储消息的新方法之外,组织,过滤和理解消息也面临着挑战,事实证明,文本挖掘是有用的。另外,它使用依赖于内容和依赖于内容的方法来做到这一点。不幸的是,计算机介导的通信还为犯罪分子,恐怖分子,间谍和其他对安全的威胁提供了一种有效的通信手段。但是,这些通信的通常文本编码也可能提供检测和跟踪欺骗性对象的可能性。提出了两种在基于文本的计算机介导的通信中组织,过滤,理解和检测欺骗的方法。首先,消息特征挖掘将CMC消息中的消息特征或线索与机器学习技术结合使用,根据发件人的意图对消息进行分类。该方法利用常见的分类方法,结合消息的语言分析,以提取许多与内容无关的输入特征。一项使用消息特征挖掘对欺骗性和非欺骗性电子邮件进行分类的研究获得了60%至80%的分类精度。其次,言语行为分析是一种通过使用言语行为理论和概率分类方法创建对话及其参与者的配置文件来评估和可视化同步CMC的方法。来自大型语音行为注释会话的成绩单用于训练语言模型和修改的隐马尔可夫模型(HMM),以获得句子的可能语音行为,将其汇总给每个会话参与者,以创建一组语音行为配置文件。详细的三项研究验证了配置文件,还有两项研究显示了言语行为分析发现与欺骗有关的不确定性的能力。这里介绍的方法是两种与内容无关的方法,它们代表了文本分析中可能的新方向。两者在欺骗的上下文之外都有可能的应用。除了帮助进行欺骗检测外,这些方法还可以应用于信息检索,技术支持培训,GSS简化支持,运输安全和信息保证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号