{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:41:10Z","timestamp":1765960870080,"version":"3.41.2"},"reference-count":25,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2015,7,13]],"date-time":"2015-07-13T00:00:00Z","timestamp":1436745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7,13]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to investigate the feasibility of identifying the gender of an author by measuring the keystroke duration when typing a message. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Three classifiers were constructed and tested. The authors empirically evaluated the effectiveness of the classifiers by using empirical data. The authors used primary data as well as a publicly available dataset containing keystrokes from a different language to validate the language independence assumption. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The results of this paper indicate that it is possible to identify the gender of an author by analyzing keystroke durations with a probability of success in the region of 70 per cent. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 The proposed approach was validated with a limited number of participants and languages, yet the statistical tests show the significance of the results. However, this approach will be further tested with other languages. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 Having the ability to identify the gender of an author of a certain piece of text has value in digital forensics, as the proposed method will be a source of circumstantial evidence for \u201cputting fingers on keyboard\u201d and for arbitrating cases where the true origin of a message needs to be identified. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Social implications<\/jats:title>\n               <jats:p> \u2013 If the proposed method is included as part of a text-composing system (such as e-mail, and instant messaging applications), it could increase trust toward the applications that use it and may also work as a deterrent for crimes involving forgery. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 The proposed approach combines and adapts techniques from the domains of biometric authentication and data classification.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ics-05-2014-0032","type":"journal-article","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T13:45:13Z","timestamp":1433943913000},"page":"286-301","source":"Crossref","is-referenced-by-count":8,"title":["Language-independent gender identification through keystroke analysis"],"prefix":"10.1108","volume":"23","author":[{"given":"Ioannis","family":"Tsimperidis","sequence":"first","affiliation":[]},{"given":"Vasilios","family":"Katos","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Clarke","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122220092981700_b1","doi-asserted-by":"crossref","unstructured":"Argamon, S.\n               , \n                  Koppel, M.\n               , \n                  Fine, J.\n                and \n                  Shimoni, A.R.\n                (2003), \u201cGender, genre and writing style in formal written texts\u201d, \n                  Text \u2013 Interdisciplinary Journal for the Study of Discourse\n               , Vol. 23 No. 3, pp. 321-346.","DOI":"10.1515\/text.2003.014"},{"key":"key2020122220092981700_b2","doi-asserted-by":"crossref","unstructured":"Argamon, S.\n               , \n                  Koppel, M.\n               , \n                  Pennebaker, J.\n                and \n                  Schler, J.\n                (2009), \u201cAutomatically profiling the author of an anonymous text\u201d, \n                  Communications of the ACM\n               , Vol. 52 No. 2, pp. 119-123.","DOI":"10.1145\/1461928.1461959"},{"key":"key2020122220092981700_b3","unstructured":"Bello, L.\n               , \n                  Bertacchini, M.\n               , \n                  Benitez, C.\n               , \n                  Pizzoni, C.J.\n                and \n                  Cipriano, M.\n                (2010), \u201cCollection and publication of a fixed text keystroke dynamics dataset\u201d, XVI Congreso Argentino de Ciencias de la Computacio, Buenos Aires, pp. 822-831."},{"key":"key2020122220092981700_b4","unstructured":"Bouckaert, R.\n                (2005), \u201cNaive bayes classifiers that perform well with continuous variables\u201d, in \n                  Webb, G.I.\n                and \n                  Yu, X.\n                (Eds), \n                  AI 2004: Advances in Artificial Intelligence \u2013 Lecture Notes in Computer Science, Volume 3339\n               , Springer, Berlin Heidelberg, pp. 1089-1094."},{"key":"key2020122220092981700_b5","doi-asserted-by":"crossref","unstructured":"Cheng, N.\n               , \n                  Chandramouli, R.\n                and \n                  Subbalakshmi, K.P.\n                (2011), \u201cAuthor gender identification from text\u201d, \n                  Digital Investigation\n               , Vol. 8 No. 1, pp. 78-88.","DOI":"10.1016\/j.diin.2011.04.002"},{"key":"key2020122220092981700_b6","doi-asserted-by":"crossref","unstructured":"Clarke, N.\n                and \n                  Furnell, S.\n                (2007), \u201cAuthenticating mobile phone users using keystroke analysis\u201d, \n                  International Journal of Information Security\n               , Vol. 6 No. 1, pp. 1-14.","DOI":"10.1007\/s10207-006-0006-6"},{"key":"key2020122220092981700_b7","doi-asserted-by":"crossref","unstructured":"Clarke, N.\n               , \n                  Furnell, S.\n               , \n                  Lines, B.\n                and \n                  Reynolds, P.\n                (2003), \u201cKeystroke dynamics on a mobile handset: a feasibility study\u201d, \n                  Information Management & Computer Security\n               , Vol. 11 No. 4, pp. 161-166.","DOI":"10.1108\/09685220310489526"},{"key":"key2020122220092981700_b8","unstructured":"Doyle, J.\n                and \n                  Keselj, V.\n                (2005), \u201cAutomatic categorization of author gender via n-gram analysis\u201d, 6th Symposium on Natural Language Processing, Chiang Rai."},{"key":"key2020122220092981700_b9","unstructured":"Gender Genie\n                (2014), available at: www.hackerfactor.com\/GenderGuesser.php (accessed 23 May 2014)."},{"key":"key2020122220092981700_b11","doi-asserted-by":"crossref","unstructured":"Giot, R.\n               , \n                  El-Abed, M.\n                and \n                  Rosenberger, C.\n                (2009), \u201cGREYC keystroke: a benchmark for keystroke dynamics biometrics systems\u201d, 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS \u201909, IEEE, pp. 1-6.","DOI":"10.1109\/BTAS.2009.5339051"},{"key":"key2020122220092981700_b10","doi-asserted-by":"crossref","unstructured":"Giot, R.\n                and \n                  Rosenberger, C.\n                (2012), \u201cA new soft biometric approach for keystroke dynamics based on gender recognition\u201d, \n                  International Journal of Information Technology and Management\n               , Vol. 11 Nos 1\/2, pp. 35-49.","DOI":"10.1504\/IJITM.2012.044062"},{"key":"key2020122220092981700_b12","doi-asserted-by":"crossref","unstructured":"Holmes, J.\n                (1988), \u201cPaying compliments: a sex-preferential positive politeness strategy\u201d, \n                  Journal of Pragmatics\n               , Vol. 12 No. 3, pp. 445-465.","DOI":"10.1016\/0378-2166(88)90005-7"},{"key":"key2020122220092981700_b27","doi-asserted-by":"crossref","unstructured":"Joyce, R.\n                and \n                  Gupta, G.\n                (1990), \u201cIdentity authentication based on keystroke latencies\u201d, \n                  Communications of the ACM\n               , Vol. 33 No. 2, pp. 168-176.","DOI":"10.1145\/75577.75582"},{"key":"key2020122220092981700_b25","unstructured":"Kagstrom, A.\n               , \n                  Karlsson, A.\n                and \n                  Kagstrom, E.\n                (2014), \u201cuClassify \u2013 GenderAnalyzer_v5\u201d, available at: www.uclassify.com\/browse\/uClassify\/GenderAnalyzer_v5 (accessed 20 August 2013)."},{"key":"key2020122220092981700_b14","unstructured":"Khamar, K.\n                (2013), \u201cShort text classification using kNN based on distance function\u201d, \n                  International Journal of Advanced Research in Computer and Communication Engineering\n               , Vol. 2 No. 4, pp. 1916-1919."},{"key":"key2020122220092981700_b15","unstructured":"Kotsiantis, S.\n                (2007), \u201cSupervised machine learning: a review of classification techniques\u201d, \n                  Informatica\n               , Vol. 31 No. 1, pp. 249-268."},{"key":"key2020122220092981700_b26","unstructured":"Krawetz, N.\n                (2002), \u201cHacker factor: gender guesser\u201d, available at: www.hackerfactor.com\/GenderGuesser.php (accessed 18 August 2013)."},{"key":"key2020122220092981700_b17","unstructured":"Lai, C.\n                (2006), \u201cAuthor gender analysis: I256 applied natural language processing\u201d, available at: http:\/\/courses.ischool.berkeley.edu\/i256\/f09\/Final%20Projects%20write-ups\/LaiChaoyue_project_final.pdf"},{"key":"key2020122220092981700_b18","unstructured":"Li, W.\n               , \n                  Wang, K.\n               , \n                  Stolfo, S.\n                and \n                  Herzog, B.\n                (2005), \u201cFileprints: identifying file types by N-gram analysis\u201d, Sixth Annual IEEE SMC, Information Assurance Workshop, IAW \u201805, IEEE, pp. 64-71."},{"key":"key2020122220092981700_b19","unstructured":"Phyu, T.N.\n                (2009), \u201cSurvey of classification techniques in data mining\u201d, International Multi Conference of Engineers and Computer Scientists 2009 Vol. I, IMECS, Hong Kong, pp. 727-731."},{"key":"key2020122220092981700_b20","unstructured":"Rangel, F.\n               , \n                  Rosso, P.\n               , \n                  Koppel, M.\n               , \n                  Stamatatos, E.\n                and \n                  Inches, G.\n                (2013), \u201cOverview of the author profiling task at PAN 2013\u201d, PAN at CLEF 2013, Valencia."},{"key":"key2020122220092981700_b21","unstructured":"Schler, J.\n               , \n                  Koppel, M.\n               , \n                  Argamon, S.\n                and \n                  Pennebaker, J.\n                (2006), \u201cEffects of age and gender on blogging\u201d, \n                  AAAI Spring Symposium on Computational Approaches for Analyzing Weblogs\n               , Stanford, CA, March, pp. 199-205."},{"key":"key2020122220092981700_b22","unstructured":"Shavers, B.\n                (2013), \n                  Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects\n               , Elsevier\/Syngress, Melbourne."},{"key":"key2020122220092981700_b23","doi-asserted-by":"crossref","unstructured":"Trudgill, P.\n                (1972), \u201cSex, covert prestige and linguistic change in the Urban British English of Norwich\u201d, \n                  Language in Society\n               , Vol. 1 No. 2, pp. 179-195.","DOI":"10.1017\/S0047404500000488"},{"key":"key2020122220092981700_b24","unstructured":"Vel, O.D.\n               , \n                  Corney, M.\n               , \n                  Anderson, A.\n                and \n                  Mohay, G.\n                (2002), \u201cLanguage and gender author cohort analysis of e-mail for computer forensics\u201d, in \n                  Second Digital Forensic Research Workshop\n               , Syracuse, New York, NY."}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-05-2014-0032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-05-2014-0032\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-05-2014-0032\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:54Z","timestamp":1753406574000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/23\/3\/286-301\/109596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,13]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,7,13]]}},"alternative-id":["10.1108\/ICS-05-2014-0032"],"URL":"https:\/\/doi.org\/10.1108\/ics-05-2014-0032","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2015,7,13]]}}}