首页> 外文OA文献 >Automated Analysis Techniques for Online Conversations with Application in Deception Detection
【2h】

Automated Analysis Techniques for Online Conversations with Application in Deception Detection

机译:在线对话自动分析技术在欺骗检测中的应用

摘要

Email, chat, instant messaging, blogs, and newsgroups are now common ways for people to interact. Along with these new ways for sending, receiving, and storing messages comes the challenge of organizing, filtering, and understanding them, for which text mining has been shown to be useful. Additionally, it has done so using both content-dependent and content-independent methods.Unfortunately, computer-mediated communication has also provided criminals, terrorists, spies, and other threats to security a means of efficient communication. However, the often textual encoding of these communications may also provide for the possibility of detecting and tracking those who are deceptive. Two methods for organizing, filtering, understanding, and detecting deception in text-based computer-mediated communication are presented.First, message feature mining uses message features or cues in CMC messages combined with machine learning techniques to classify messages according to the sender's intent. The method utilizes common classification methods coupled with linguistic analysis of messages for extraction of a number of content-independent input features. A study using message feature mining to classify deceptive and non-deceptive email messages attained classification accuracy between 60% and 80%.Second, speech act profiling is a method for evaluating and visualizing synchronous CMC by creating profiles of conversations and their participants using speech act theory and probabilistic classification methods. Transcripts from a large corpus of speech act annotated conversations are used to train language models and a modified hidden Markov model (HMM) to obtain probable speech acts for sentences, which are aggregated for each conversation participant creating a set of speech act profiles. Three studies for validating the profiles are detailed as well as two studies showing speech act profiling's ability to uncover uncertainty related to deception.The methods introduced here are two content-independent methods that represent a possible new direction in text analysis. Both have possible applications outside the context of deception. In addition to aiding deception detection, these methods may also be applicable in information retrieval, technical support training, GSS facilitation support, transportation security, and information assurance.
机译:电子邮件,聊天,即时消息,博客和新闻组现在是人们进行交互的常用方式。除了这些用于发送,接收和存储消息的新方法之外,组织,过滤和理解消息也面临着挑战,事实证明,文本挖掘是有用的。此外,它使用依赖于内容和依赖于内容的方法来做到这一点。不幸的是,计算机介导的通信还为罪犯,恐怖分子,间谍和其他威胁安全的人提供了一种有效的通信手段。但是,这些通信的通常文本编码也可能提供检测和跟踪欺骗性对象的可能性。提出了两种在基于文本的计算机介导的通信中组织,过滤,理解和检测欺骗的方法。首先,消息特征挖掘使用CMC消息中的消息特征或线索,结合机器学习技术根据发件人的意图对消息进行分类。该方法利用常见的分类方法,结合消息的语言分析,以提取许多与内容无关的输入特征。一项使用消息特征挖掘对分类准确度在60%至80%之间的欺骗性和非欺骗性电子邮件进行分类的研究。其次,言语行为分析是一种通过创建会话及其参与者的配置文件来评估和可视化同步CMC的方法。言语行为理论和概率分类方法。来自大型语音行为注释会话的成绩单用于训练语言模型和改良的隐马尔可夫模型(HMM),以获得句子的可能语音行为,将其汇总给每个会话参与者,以创建一组语音行为配置文件。详细介绍了三项用于验证配置文件的研究,以及两项研究表明了言语行为分析发现与欺骗有关的不确定性的能力。这里介绍的方法是两种与内容无关的方法,它们代表了文本分析中可能的新方向。两者在欺骗的上下文之外都有可能的应用。除了帮助进行欺骗检测外,这些方法还可以应用于信息检索,技术支持培训,GSS简化支持,运输安全和信息保证。

著录项

  • 作者

    Twitchell Douglas P.;

  • 作者单位
  • 年度 2005
  • 总页数
  • 原文格式 PDF
  • 正文语种 EN
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号