2005
DOI: 10.1007/11428817_15
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-Based Information Extraction: A Case Study of Recognizing Emails of Nigerian Frauds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…This type of scams has been widely studied by the research community [12,17,18,21,23,25]. Despite the similarities, in this paper we showed that online dating scams are very different from these schemes, because they typically involve a long exchange of messages between the scammer and the victim before the actual scam is performed.…”
Section: Related Workmentioning
confidence: 76%
See 1 more Smart Citation
“…This type of scams has been widely studied by the research community [12,17,18,21,23,25]. Despite the similarities, in this paper we showed that online dating scams are very different from these schemes, because they typically involve a long exchange of messages between the scammer and the victim before the actual scam is performed.…”
Section: Related Workmentioning
confidence: 76%
“…As an example, scammers commonly set up fake accounts on an online dating site, start interacting with a user on the site, and then lure her into sending them money, for example to pay for the flight needed to meet in person [36]. Such scams are similar in spirit to the infamous "419 scams," in which scammers ask their victims to send them a sum of money to establish trust and then promise to transfer a very large sum to them [17,18,23,25]. Online dating scams, however, are more insidious than "419 scams," because they target emotionally vulnerable people looking for love.…”
Section: Introductionmentioning
confidence: 99%
“…This study also argued that scammers' email addresses and phone numbers are crucial factors of the clustering. Goa et al [4] investigates the use of ontology-based knowledge engineering for Nigerian scam email text mining. Unlike previous studies, in our investigation we have focused on 1) understanding in great depth the prevalence and techniques, and 2) identifying the structure of larger scale groups of scammers that are engaged in attempting to defraud people posting goods for sale on Craigslist.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, they often used abusive language to coerce their victims into actually shipping the items. In addition, it would be feasible to exploit common linguistic features of scam email contents [4]. The combination of these patterns and the different reply-to address might be effectively used to improve the filtering of these messages.…”
Section: Locations Of Scammersmentioning
confidence: 99%
“…A simple example for extraction of relevant information using knowledge based approaches can be associated with the knowledge of the structure of documents to, for instance, extract keywords from the titles and abstracts of scientific documents. More complex examples, like (Gao & Zhao, 2005), are able to identify frauds on emails. However, these kinds of approaches are also quite limiting, mainly because the creation of ontologies isn't straightforward, and ontologies are something very specific to a certain subject and can't be easily generalized.…”
Section: Current State-of-the-art Methods For Unigram Extractionmentioning
confidence: 99%