Detecting Unusual and Deceptive Communication in Email

نویسنده

  • D. B. Skillicorn
چکیده

Deception theory suggests that deceptive writing is characterized by reduced frequency of first-person pronouns and exclusive words, and elevated frequency of negative emotion words and action verbs. We apply this model of deception to the Enron email dataset, and then apply singular value decomposition to elicit the correlation structure between emails. This allows us to rank emails by how well they fit the profile of detection. Those emails that are highly ranked using this approach include deceptive emails; other emails that are ranked highly using these frequency counts also indicate organizational dysfunctions such as improper communication of information. Hence this approach can be used as a tool for both external investigation of an organization, and internal management and regulatory compliance. Detecting Unusual and Deceptive Communication in Email P.S. Keila and D.B. Skillicorn Abstract: Deception theory suggests that deceptive writing is characterized by reduced frequency of first-person pronouns and exclusive words, and elevated frequency of negative emotion words and action verbs. We apply this model of deception to the Enron email dataset, and then apply singular value decomposition to elicit the correlation structure between emails. This allows us to rank emails by Deception theory suggests that deceptive writing is characterized by reduced frequency of first-person pronouns and exclusive words, and elevated frequency of negative emotion words and action verbs. We apply this model of deception to the Enron email dataset, and then apply singular value decomposition to elicit the correlation structure between emails. This allows us to rank emails by how well they fit the profile of detection. Those emails that are highly ranked using this approach include deceptive emails; other emails that are ranked highly using these frequency counts also indicate organizational dysfunctions such as improper communication of information. Hence this approach can be used as a tool for both external investigation of an organization, and internal management and regulatory compliance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting unusual email communication

Deception theory suggests that deceptive writing is characterized by reduced frequency of firstperson pronouns and exclusive words, and elevated frequency of negative emotion words and action verbs. We apply this model of deception to the Enron email dataset, and then apply singular value decomposition to elicit the correlation structure between emails. Those emails that have high scores using ...

متن کامل

Group Support Systems and Deceptive Communication

Electronic communication is becoming more pervasive worldwide with the spread of the Internet, especially through the World Wide Web and electronic mail. Yet, as with all human communication, electronic communication is vulnerable to deceit on the part of senders, and to the less than stellar performance of most people at detecting deceit aimed at them. Despite considerable research over the ye...

متن کامل

An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication

Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textual information transmitted through Computer-mediated Communication, CMC, people remain largely unsuccessful and inefficient in detecting those...

متن کامل

Detecting Deception in Computer-Mediated Interviewing

Deception in résumés and job applications is common, and being able to detect deceptive information early is worthwhile for many recruiters. Yet recent studies have revealed that people are not very good at detecting deception successfully, particularly when they are communicating using computerbased communication, with which more and more interviews are being conducted. However, in many comput...

متن کامل

0 - 7695 An Exploratory Study into Deception Detection in Text - based Computer - Mediated

Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textual information transmitted through Computer-mediated Communication, CMC, people remain largely unsuccessful and inefficient in detecting those...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005