메뉴 건너뛰기




Volumn 25, Issue 1, 2008, Pages 49-78

Stylometric identification in electronic markets: Scalability and robustness

Author keywords

Anti aliasing; Electronic markets; Online trust; Similarity detection; Stylometry

Indexed keywords

ELECTRONIC COMMERCE; EQUIPMENT TESTING; SCALABILITY;

EID: 49049110756     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222250103     Document Type: Article
Times cited : (39)

References (49)
  • 1
    • 27344450109 scopus 로고    scopus 로고
    • Identification and comparison of extremist-group Web forum messages using authorship analysis
    • Abbasi, A., and Chen, H. Identification and comparison of extremist-group Web forum messages using authorship analysis. IEEE Intelligent Systems, 20, 5 (2005), 67-75.
    • (2005) IEEE Intelligent Systems , vol.20 , Issue.5 , pp. 67-75
    • Abbasi, A.1    Chen, H.2
  • 3
    • 18744405825 scopus 로고    scopus 로고
    • Style mining of electronic messages for multiple authorship discrimination: First results
    • L. Getoor, T.E. Senator, P. Domingos, and C. Faloutsos eds, New York: ACM Press
    • Argamon, S.; Saric, M.; and Stein, S. Style mining of electronic messages for multiple authorship discrimination: First results. In L. Getoor, T.E. Senator, P. Domingos, and C. Faloutsos (eds.), Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM Press, 2003, pp. 475-480.
    • (2003) Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 475-480
    • Argamon, S.1    Saric, M.2    Stein, S.3
  • 4
    • 85040385892 scopus 로고    scopus 로고
    • Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution
    • Baayen, R.H.; Halteren, H.V.; and Tweedie, F. J. Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing, 11, 3 (1996),121-132.
    • (1996) Literary and Linguistic Computing , vol.11 , Issue.3 , pp. 121-132
    • Baayen, R.H.1    Halteren, H.V.2    Tweedie, F.J.3
  • 5
    • 9944260468 scopus 로고    scopus 로고
    • How effective are electronic reputation mechanisms? An experimental investigation
    • Bolton, G.E.; Katok, E.; and Ockenfels, A. How effective are electronic reputation mechanisms? An experimental investigation. Management Science, 50, 11 (2004), 1587-1602.
    • (2004) Management Science , vol.50 , Issue.11 , pp. 1587-1602
    • Bolton, G.E.1    Katok, E.2    Ockenfels, A.3
  • 6
    • 0033737577 scopus 로고    scopus 로고
    • Frictionless commerce? A comparison of Internet and conventional retailers
    • Brynjolfsson, E., and Smith, M.D. Frictionless commerce? A comparison of Internet and conventional retailers. Management Science, 46, 4 (2000), 563-585.
    • (2000) Management Science , vol.46 , Issue.4 , pp. 563-585
    • Brynjolfsson, E.1    Smith, M.D.2
  • 7
    • 84960603650 scopus 로고
    • Word patterns and story shapes: The statistical analysis of narrative style
    • Burrows, J.F. Word patterns and story shapes: The statistical analysis of narrative style. Literary and Linguistic Computing, 2, 2 (1987), 61-70.
    • (1987) Literary and Linguistic Computing , vol.2 , Issue.2 , pp. 61-70
    • Burrows, J.F.1
  • 8
    • 56249097939 scopus 로고    scopus 로고
    • Empirical evaluation of language-based author identification techniques
    • Chaski, C.E. Empirical evaluation of language-based author identification techniques. Forensic Linguistics, 8, 1 (2001), 1-65.
    • (2001) Forensic Linguistics , vol.8 , Issue.1 , pp. 1-65
    • Chaski, C.E.1
  • 9
    • 7244245467 scopus 로고    scopus 로고
    • Fighting Internet auction fraud: An assessment and proposal
    • Chua, C.E.H., and Wareham, J. Fighting Internet auction fraud: An assessment and proposal. IEEE Computer 37, 10 (2004), 31-37.
    • (2004) IEEE Computer , vol.37 , Issue.10 , pp. 31-37
    • Chua, C.E.H.1    Wareham, J.2
  • 10
    • 0242641140 scopus 로고    scopus 로고
    • The digitization of word of mouth: Promise and challenges of online feedback mechanisms
    • Dellarocas, C. The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science, 49, 10 (2003), 1407-1424.
    • (2003) Management Science , vol.49 , Issue.10 , pp. 1407-1424
    • Dellarocas, C.1
  • 11
    • 0042367634 scopus 로고    scopus 로고
    • Mining e-mail content for author identification forensics
    • De Vel, O.; Anderson, A.; Corney, M.; and Mohay, G. Mining e-mail content for author identification forensics. ACM SIGMOD Record, 30, 4 (2001), 55-64.
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 55-64
    • De Vel, O.1    Anderson, A.2    Corney, M.3    Mohay, G.4
  • 12
    • 1842583320 scopus 로고    scopus 로고
    • Extraction of Java program fingerprints for software authorship identification
    • Ding, H., and Samadzadeh, H.M. Extraction of Java program fingerprints for software authorship identification. Journal of Systems and Software, 72, 1 (2004), 49-57.
    • (2004) Journal of Systems and Software , vol.72 , Issue.1 , pp. 49-57
    • Ding, H.1    Samadzadeh, H.M.2
  • 13
    • 84991061352 scopus 로고    scopus 로고
    • Social translucence: An approach to designing systems that support social processes
    • Erickson, T., and Kellogg, W.A. Social translucence: An approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction, 7, 1 (2000), 59-83.
    • (2000) ACM Transactions on Computer-Human Interaction , vol.7 , Issue.1 , pp. 59-83
    • Erickson, T.1    Kellogg, W.A.2
  • 17
    • 0001827842 scopus 로고
    • Production of speech: Observations from normal and pathological language use
    • A. Ellis ed, London: Academic Press
    • Garrett, M.F. Production of speech: Observations from normal and pathological language use. In A. Ellis (ed.), Normality and Pathology in Cognitive Functions. London: Academic Press, 1982.
    • (1982) Normality and Pathology in Cognitive Functions
    • Garrett, M.F.1
  • 19
    • 1842493961 scopus 로고    scopus 로고
    • Software forensics: Extending authorship analysis techniques to computer programs
    • Paper presented at the, Duke University, Durham, NC, September 4-7
    • Gray, A.; Sallis, P.; and MacDonell, S. Software forensics: Extending authorship analysis techniques to computer programs. Paper presented at the Third Biannual Conference of the International Association of Forensic Linguists, Duke University, Durham, NC, September 4-7, 1997.
    • (1997) Third Biannual Conference of the International Association of Forensic Linguists
    • Gray, A.1    Sallis, P.2    MacDonell, S.3
  • 21
    • 0031236568 scopus 로고    scopus 로고
    • Attribution accuracy when using anonymity in group support systems
    • Hayne, C.S., and Rice, E.R. Attribution accuracy when using anonymity in group support systems. International Journal of Human-Computer Studies, 47, 3 (1997), 429-452.
    • (1997) International Journal of Human-Computer Studies , vol.47 , Issue.3 , pp. 429-452
    • Hayne, C.S.1    Rice, E.R.2
  • 22
    • 0041928091 scopus 로고    scopus 로고
    • Identification of comment authorship in anonymous group support systems
    • Summer
    • Hayne, C.S.; Pollard, E.C.; and Rice, E.R. Identification of comment authorship in anonymous group support systems. Journal of Management Information Systems, 20, 1 (Summer 2003), 301-329.
    • (2003) Journal of Management Information Systems , vol.20 , Issue.1 , pp. 301-329
    • Hayne, C.S.1    Pollard, E.C.2    Rice, E.R.3
  • 23
    • 84958184841 scopus 로고    scopus 로고
    • Email alias detection using social network analysis
    • J. Adibi, M. Grobelnik, D. Mladenic, and P. Pantel eds, New York: ACM Press
    • Holzer, R.; Malin, B.; and Sweeney, L. Email alias detection using social network analysis. In J. Adibi, M. Grobelnik, D. Mladenic, and P. Pantel (eds.), Proceedings of the Third International Workshop on Link Discovery. New York: ACM Press, 2005, pp. 52-57.
    • (2005) Proceedings of the Third International Workshop on Link Discovery , pp. 52-57
    • Holzer, R.1    Malin, B.2    Sweeney, L.3
  • 24
    • 0027332773 scopus 로고
    • Stopping rules in principal component analysis: A comparison of heuristical and statistical approaches
    • Jackson, D. Stopping rules in principal component analysis: A comparison of heuristical and statistical approaches. Ecology, 74, 8 (1993), 2204-2214.
    • (1993) Ecology , vol.74 , Issue.8 , pp. 2204-2214
    • Jackson, D.1
  • 25
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Josang, A.; Ismail, R.; and Boyd, C. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43, 2 (2007), 618-644.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 26
    • 28344446431 scopus 로고    scopus 로고
    • What can we do with small corpora? Document categorization via cross-entropy
    • E. Cambouropoulos, U. Hahn, H. Pain, and M. Ramscar eds, Edinburgh, UK: Department of Artificial Intelligence, Edinburgh University
    • Juola, P. What can we do with small corpora? Document categorization via cross-entropy. In E. Cambouropoulos, U. Hahn, H. Pain, and M. Ramscar (eds.), Proceedings of the Interdisciplinary Workshop on Similarity and Categorization. Edinburgh, UK: Department of Artificial Intelligence, Edinburgh University, 1997.
    • (1997) Proceedings of the Interdisciplinary Workshop on Similarity and Categorization
    • Juola, P.1
  • 27
    • 31044439470 scopus 로고    scopus 로고
    • The time course of language change
    • Juola, P. The time course of language change. Computers and the Humanities, 37, 1 (2003), 77-96.
    • (2003) Computers and the Humanities , vol.37 , Issue.1 , pp. 77-96
    • Juola, P.1
  • 28
    • 31044454127 scopus 로고    scopus 로고
    • A controlled-corpus experiment in authorship identification by cross-entropy
    • Juola, P., and Baayen, H. A controlled-corpus experiment in authorship identification by cross-entropy. Literary and Linguistic Computing, 20, Supplement 1 (2005), 59-67.
    • (2005) Literary and Linguistic Computing , vol.20 , Issue.SUPPL.EMENT 1 , pp. 59-67
    • Juola, P.1    Baayen, H.2
  • 29
    • 49049084540 scopus 로고    scopus 로고
    • Obfuscating document stylometry to preserve author anonymity
    • N. Calzolari, C. Cardie, and P. Isabelle eds, East Straudsburg, PA: Association for Computational Linguistics
    • Kacmarcik, G., and Gamon, M. Obfuscating document stylometry to preserve author anonymity. In N. Calzolari, C. Cardie, and P. Isabelle (eds.), Proceedings of the Forty-Fourth Annual Meeting of the Association for Computational Linguistics. East Straudsburg, PA: Association for Computational Linguistics, 2006, pp. 444-451.
    • (2006) Proceedings of the Forty-Fourth Annual Meeting of the Association for Computational Linguistics , pp. 444-451
    • Kacmarcik, G.1    Gamon, M.2
  • 31
    • 1542340393 scopus 로고    scopus 로고
    • Disputed authorship resolution using relative entropy for Markov chains of letters in human language texts
    • Khmelev, D.V. Disputed authorship resolution using relative entropy for Markov chains of letters in human language texts. Journal of Quantitative Linguistics, 7, 3 (2000), 115-126.
    • (2000) Journal of Quantitative Linguistics , vol.7 , Issue.3 , pp. 115-126
    • Khmelev, D.V.1
  • 32
    • 33646138699 scopus 로고    scopus 로고
    • Using Markov chains for identification of writers
    • Khmelev, D.V., and Tweedie, F.J. Using Markov chains for identification of writers. Literary and Linguistic Computing, 16, 3 (2001), 299-307.
    • (2001) Literary and Linguistic Computing , vol.16 , Issue.3 , pp. 299-307
    • Khmelev, D.V.1    Tweedie, F.J.2
  • 36
    • 84951713481 scopus 로고    scopus 로고
    • The effect of negative buyer feedback on prices in Internet auction markets
    • S. Ang, H. Krcmar, W.J. Orlikowski, P. Weill, and J.I. DeGross eds, Atlanta, GA: Association for Information Systems
    • Lee, Z.; Im, L.; and Lee, S. J. The effect of negative buyer feedback on prices in Internet auction markets. In S. Ang, H. Krcmar, W.J. Orlikowski, P. Weill, and J.I. DeGross (eds.), Proceedings of the Twenty-First International Conference on Information Systems. Atlanta, GA: Association for Information Systems, 2000, pp. 286-287.
    • (2000) Proceedings of the Twenty-First International Conference on Information Systems , pp. 286-287
    • Lee, Z.1    Im, L.2    Lee, S.J.3
  • 37
    • 33745213523 scopus 로고    scopus 로고
    • From fingerprint to Writeprint
    • Li, J.; Zheng, R.; and Chen, H. From fingerprint to Writeprint. Communications of the ACM, 49, 4 (2006), 76-82.
    • (2006) Communications of the ACM , vol.49 , Issue.4 , pp. 76-82
    • Li, J.1    Zheng, R.2    Chen, H.3
  • 40
    • 2442676514 scopus 로고    scopus 로고
    • Building effective online marketplaces with institution-based trust
    • Pavlou, P.A., and Gefen, D. Building effective online marketplaces with institution-based trust. Information Systems Research, 15, 1 (2004), 37-59.
    • (2004) Information Systems Research , vol.15 , Issue.1 , pp. 37-59
    • Pavlou, P.A.1    Gefen, D.2
  • 42
    • 85084161175 scopus 로고    scopus 로고
    • Can pseudonymity really guarantee privacy?
    • S. Bellovin and G. Rose eds, Berkeley, CA: USENIX Association
    • Rao, J.R., and Rohatgi, P. Can pseudonymity really guarantee privacy? In S. Bellovin and G. Rose (eds.), Proceedings of the Ninth USENIX Security Symposium. Berkeley, CA: USENIX Association, 2000, pp. 85-96.
    • (2000) Proceedings of the Ninth USENIX Security Symposium , pp. 85-96
    • Rao, J.R.1    Rohatgi, P.2
  • 43
    • 85029609685 scopus 로고    scopus 로고
    • Simulated social control for secure Internet commerce
    • H. Hosmer, J. Dobson, C. Meadows, and D. Bailey eds, New York: ACM Press
    • Rasmusson L., and Jansson, S. Simulated social control for secure Internet commerce. In H. Hosmer, J. Dobson, C. Meadows, and D. Bailey (eds.), Proceedings of the ACM SIGSAC Workshop on New Security Paradigm. New York: ACM Press, 1996, pp. 18-25.
    • (1996) Proceedings of the ACM SIGSAC Workshop on New Security Paradigm , pp. 18-25
    • Rasmusson, L.1    Jansson, S.2
  • 46
    • 0001318320 scopus 로고    scopus 로고
    • The state of authorship attribution studies: Some problems and solutions
    • Rudman, J. The state of authorship attribution studies: Some problems and solutions. Computers and the Humanities, 31, 4 (1997), 351-365.
    • (1997) Computers and the Humanities , vol.31 , Issue.4 , pp. 351-365
    • Rudman, J.1
  • 48
    • 0003141935 scopus 로고    scopus 로고
    • A comparative study on feature selection in text categorization
    • D.H. Fisher ed, San Francisco: Morgan Kaufmann
    • Yang, Y., and Pedersen, J. O. A comparative study on feature selection in text categorization. In D.H. Fisher (ed.), Proceedings of the Fourteenth International Conference on Machine Learning. San Francisco: Morgan Kaufmann, 1997, pp. 412-420.
    • (1997) Proceedings of the Fourteenth International Conference on Machine Learning , pp. 412-420
    • Yang, Y.1    Pedersen, J.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.