Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng

E-mail can be a fantasy playground for identity experimentations where players take on an imaginary persona and interact with each other in the virtual world. Therefore. gender deception is difficult. risky and it can be abandoned at will. Inference can be made both from writing style and from clues...

Full description

Saved in:
Bibliographic Details
Main Authors: Cheong, Dianne L.M (Author), Sia Abdullah, Nur Atiqah (Author)
Format: Book
Published: Institute of Research, Development and Commercialization (IRDC), 2006.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_12967
042 |a dc 
100 1 0 |a Cheong, Dianne L.M.  |e author 
700 1 0 |a Sia Abdullah, Nur Atiqah  |e author 
245 0 0 |a Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng 
260 |b Institute of Research, Development and Commercialization (IRDC),   |c 2006. 
500 |a https://ir.uitm.edu.my/id/eprint/12967/1/AJ_DIANNE%20L.M.%20CHEONG%20SMRJ%2006%201.pdf 
520 |a E-mail can be a fantasy playground for identity experimentations where players take on an imaginary persona and interact with each other in the virtual world. Therefore. gender deception is difficult. risky and it can be abandoned at will. Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. The tests shown the prototype have 8/.3% of accuracy level. This is consistent with a human reader of the documents. This prototype can be a tool to assist interested parties such as the Criminology and Forensic Department. e-mail users and virtual communities to successfully identify gender deception. 
546 |a en 
690 |a Data mining 
690 |a Electronic mail systems. General works. Text messages (Cell phone systems) 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/12967/ 
787 0 |n https://smrj.uitm.edu.my/ 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/12967/  |z Link Metadata