{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:00:22Z","timestamp":1760061622111,"version":"3.30.1"},"reference-count":16,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1016\/s0020-0255(99)00109-7","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:32:24Z","timestamp":1049736744000},"page":"43-53","source":"Crossref","is-referenced-by-count":11,"title":["Computer-mediated communication: experiments with e-mail readability"],"prefix":"10.1016","volume":"123","author":[{"given":"Philip","family":"Sallis","sequence":"first","affiliation":[]},{"given":"Diana","family":"Kassabova","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"unstructured":"M.R. Berthold, F. Sudweeks, S. Newton, R. Coyne, It makes sense: using an autoassociative neural network to explore typicality in computer mediated discussions, in: F. Sudweeks et al. (Eds.), Network and Netplay: Virtual Groups on the Internet, AAAI\/MIT Press, Menlo Park, CA, 1997","key":"10.1016\/S0020-0255(99)00109-7_BIB1"},{"unstructured":"S.P. Ferris, What is CMC? an overview of scholarly definitions, in: Computer-Mediated Communication Magazine, ISSN 1076-027X, vol. 4, No. 1, 1 January 1997. http:\/\/www.december.com\/cmc\/mag\/1997\/jan\/","key":"10.1016\/S0020-0255(99)00109-7_BIB2"},{"unstructured":"A.R. Gray, P.J. Sallis, S.G. MacDonell, Software forensics: extending authorship analysis to computer programs, in: Proceedings of the Third Biannual Conference of the International Association of Forensic Linguists, Durham, NC, 1997","key":"10.1016\/S0020-0255(99)00109-7_BIB3"},{"doi-asserted-by":"crossref","unstructured":"A.R. Gray, P.J. Sallis, S.G. MacDonell, IDENTIFIED (Integrated Dictionary-based Extraction of Non-language-dependent Token Information for Forensic Identification, Examination, and Discrimination): a dictionary-based system for extracting source code metrics for software forensics, in: Proceedings of SE:E&P \u201998 (Software Education Conference), Dunedin, New Zealand, 1998","key":"10.1016\/S0020-0255(99)00109-7_BIB4","DOI":"10.1109\/SEEP.1998.707658"},{"doi-asserted-by":"crossref","unstructured":"D. Harman, Overview of the Third Text REtrieval Conference (TREC-3), in: D.K. Harman (Ed.), The Third Text REtrieval Conference, April 1995, NIST, Gaithersburg, MD, 1995","key":"10.1016\/S0020-0255(99)00109-7_BIB5","DOI":"10.6028\/NIST.SP.500-225"},{"year":"1980","author":"Harrison","series-title":"Readability in the Class Room","key":"10.1016\/S0020-0255(99)00109-7_BIB6"},{"key":"10.1016\/S0020-0255(99)00109-7_BIB7","series-title":"Neuro-Fuzzy Techniques for Intelligent Information Systems","first-page":"265","article-title":"Connectionist methods for stylometric analysis: a hybrid approach","author":"Kassabova","year":"1998"},{"unstructured":"R.I. Kilgour, A.R Gray, P.J. Sallis, S.G. MacDonell, A fuzzy logic approach to computer software source code authorship analysis, in: Proceedings of ICONIP\/ANZIIS\/ANNES\u201997 Conference, Dunedin, New Zealand, 1997","key":"10.1016\/S0020-0255(99)00109-7_BIB8"},{"doi-asserted-by":"crossref","unstructured":"T. Kohonen, Exploration of very large databases by self organising maps, in: Proceedings of the 1997 International Conference on Neural Networks (ICNN\u201997), Houston, June 1997, vol.1, IEEE","key":"10.1016\/S0020-0255(99)00109-7_BIB9","DOI":"10.1109\/ICNN.1997.611622"},{"unstructured":"S. Rafaeli, F. Sudweeks, Interactivity on the nets, in: Sudweeks et al. (Eds.), NetWork and NetPlay: Virtual Groups on the Internet, AAAI\/MIT Press, Menlo Park, CA, 1997","key":"10.1016\/S0020-0255(99)00109-7_BIB10"},{"unstructured":"S.E. Robertson et al., OKAPI at TREC-3, in: D.K. Harman (Ed.), The Third Text REtrieval Conference, April 1995, NIST, Gaithersburg MD, USA","key":"10.1016\/S0020-0255(99)00109-7_BIB11"},{"doi-asserted-by":"crossref","unstructured":"I.A. Rudy, A critical review of research on electronic mail, in: European Journal of Information Systems 4 (1996) 198\u2013213","key":"10.1016\/S0020-0255(99)00109-7_BIB12","DOI":"10.1057\/ejis.1996.2"},{"doi-asserted-by":"crossref","unstructured":"P.J. Sallis, S.G. MacDonell, A. Aakjaer, Software Forensics: old methods for a new science, in: Proceedings, Software Education Conference (SE:E&P '96), Dunedin, New Zealand, January 1996","key":"10.1016\/S0020-0255(99)00109-7_BIB13","DOI":"10.1109\/SEEP.1996.534037"},{"unstructured":"The Comprehensive Internet Reference to Discussion Lists, Newsgroups, FTP Sites, Computer Products Vendors and Internet Service & Web Design Companies at http:\/\/tile.net\/","key":"10.1016\/S0020-0255(99)00109-7_BIB14"},{"doi-asserted-by":"crossref","unstructured":"H. Wilkins, Computer talk: long-distance conversations by computer, Written Communication 8(1) (1991) 56\u201378","key":"10.1016\/S0020-0255(99)00109-7_BIB15","DOI":"10.1177\/0741088391008001004"},{"unstructured":"T. Wright, Privacy protection principles for electronic mail systems, Report of the Information and Privacy Commissioner for Ontario, Canada, The Computer Law and Security Report, March\u2013April, 1995","key":"10.1016\/S0020-0255(99)00109-7_BIB16"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025599001097?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025599001097?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T22:12:33Z","timestamp":1733350353000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025599001097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":16,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["S0020025599001097"],"URL":"https:\/\/doi.org\/10.1016\/s0020-0255(99)00109-7","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}