2005 Purtuguese Conference on Artificial Intelligence 2005
DOI: 10.1109/epia.2005.341275
|View full text |Cite
|
Sign up to set email alerts
|

Towards Ontology-based E-mail Fraud Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Several of the stereotypic Nigerian expressions identified in this article constitute the lexical core in the construction of what is called “terminology engineering in e-mail fraud detection” (Kerremans, Tang, Temmerman, & Zhao, 2005, p. 110) to track and trash fraudulent Nigerian e-mail solicitations. That means 419 scam e-mails have caused the linguistic singularities of even honest Nigerians to be pathologized and criminalized, especially because 419 e-mails have done more to popularize Nigerian English to the rest of the English-speaking world than any Nigerian cultural artifact.…”
Section: Discussionmentioning
confidence: 99%
“…Several of the stereotypic Nigerian expressions identified in this article constitute the lexical core in the construction of what is called “terminology engineering in e-mail fraud detection” (Kerremans, Tang, Temmerman, & Zhao, 2005, p. 110) to track and trash fraudulent Nigerian e-mail solicitations. That means 419 scam e-mails have caused the linguistic singularities of even honest Nigerians to be pathologized and criminalized, especially because 419 e-mails have done more to popularize Nigerian English to the rest of the English-speaking world than any Nigerian cultural artifact.…”
Section: Discussionmentioning
confidence: 99%
“…Tang et al [2] propose an ontology to detect e-mail frauds. The ontology aims to tackle financial frauds, using formal ontological repositories as well as multilingual terminological resources.…”
Section: Methodsmentioning
confidence: 99%
“…Rudman () notes that one of the problems associated with authorship analysis is the availability of suitable corpora, and that although the corpora used are often not ideal, they are the only ones available. However, one corpus that has been used in several authorship characterization studies (Argamon et al., ; Kerremans et al., ; Tsur & Rappoport, ; Wong & Dras, ) is the ICLE (Granger, ). The ICLE has been compiled over 10 years of collaboration with several universities.…”
Section: Previous Workmentioning
confidence: 99%
“…There is a potential pool of thousands of authors, and being able to identify the actual author would be next to impossible. Studies (Kerremans, Tang, Temmerman, & Zhao, ; Tsur & Rappoport, ; Wong & Dras, ) have found that an individual's demographics can affect their choice of words in speech and text. Like forensic profiling in the physical arena, authorship characterization attempts to limit the pool of potential authors by identifying demographic characteristics of the author, such as gender, age, and first language.…”
Section: Introductionmentioning
confidence: 99%