{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:56:13Z","timestamp":1760597773278,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T00:00:00Z","timestamp":1495152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,19]]},"DOI":"10.1145\/3093241.3093280","type":"proceedings-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T18:49:04Z","timestamp":1504291744000},"page":"23-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Hybrid Text-based Deception Models for Native and Non-Native English Cybercriminal Networks"],"prefix":"10.1145","author":[{"given":"Alex V.","family":"Mbaziira","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"James H.","family":"Jones","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/SP.2012.34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2382448.2382450"},{"key":"e_1_3_2_1_3_1","volume-title":"-J","author":"Chang C.","year":"2001","unstructured":"Chang , C. and Lin , C . -J . 2001 . LIBSVM: a Library for Support Vector Machines . Chang, C. and Lin, C.-J. 2001. LIBSVM: a Library for Support Vector Machines."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/978-3-642-45252-9_9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/2347736.2347755"},{"volume-title":"2015","author":"Enron Email Dataset","unstructured":"Enron Email Dataset : 2015 . http:\/\/www.cs.cmu.edu\/~enron\/. Accessed: 2016--03-29. Enron Email Dataset: 2015. http:\/\/www.cs.cmu.edu\/~enron\/. Accessed: 2016--03-29.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"An Investigative Tool for Cross-Cultural Interviewing","author":"Exploiting Verbal Markers","year":"2015","unstructured":"Exploiting Verbal Markers of Deception Across Ethnic Lines : An Investigative Tool for Cross-Cultural Interviewing : 2015 . https:\/\/leb.fbi.gov\/2015\/july\/exploiting-verbal-markers-of-deception-across-ethnic-lines-an-investigative-tool-for-cross-cultural-interviewing. Accessed : 2016--11-27. Exploiting Verbal Markers of Deception Across Ethnic Lines: An Investigative Tool for Cross-Cultural Interviewing: 2015. https:\/\/leb.fbi.gov\/2015\/july\/exploiting-verbal-markers-of-deception-across-ethnic-lines-an-investigative-tool-for-cross-cultural-interviewing. Accessed: 2016--11-27."},{"unstructured":"Exploring Underweb forums: How cybercriminals communicate: http:\/\/www.techrepublic.com\/blog\/it-security\/exploring-underweb-forums-how-cybercriminals-communicate\/. Accessed: 2016--11-27.  Exploring Underweb forums: How cybercriminals communicate: http:\/\/www.techrepublic.com\/blog\/it-security\/exploring-underweb-forums-how-cybercriminals-communicate\/. Accessed: 2016--11-27.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"Detecting Deceptive Opinions with Profile Compatibility. International Joint Conference on Natural Language Processing","author":"Feng V.W.","year":"2013","unstructured":"Feng , V.W. and Hirst , G . 2013 . Detecting Deceptive Opinions with Profile Compatibility. International Joint Conference on Natural Language Processing ( Nagoya, Japan , 2013 ), 338--346. Feng, V.W. and Hirst, G. 2013. Detecting Deceptive Opinions with Profile Compatibility. International Joint Conference on Natural Language Processing (Nagoya, Japan, 2013), 338--346."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/ICCP.2010.5606466"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.2200\/S00656ED1V01Y201507HLT029"},{"unstructured":"Former Enron CEO Jeffrey Skilling Resentenced to 168 Months for Fraud Conspiracy Charges: 2013. https:\/\/www.justice.gov\/opa\/pr\/former-enron-ceo-jeffrey-skilling-resentenced-168-months-fraud-conspiracy-charges. Accessed: 2017--04-02.  Former Enron CEO Jeffrey Skilling Resentenced to 168 Months for Fraud Conspiracy Charges: 2013. https:\/\/www.justice.gov\/opa\/pr\/former-enron-ceo-jeffrey-skilling-resentenced-168-months-fraud-conspiracy-charges. Accessed: 2017--04-02.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1080\/01638530701739181"},{"volume-title":"2015","unstructured":"ISIS has mastered a crucial recruiting tactic no terrorist group has ever conquered : 2015 . http:\/\/www.businessinsider.com\/isis-is-revolutionizing-international-terrorism-2015-5. Accessed: 2016--03-16. ISIS has mastered a crucial recruiting tactic no terrorist group has ever conquered: 2015. http:\/\/www.businessinsider.com\/isis-is-revolutionizing-international-terrorism-2015-5. Accessed: 2016--03-16.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","volume-title":"Detecting Unusual Email Communication. Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research (Toranto","author":"Keila P.S.","year":"2005","unstructured":"Keila , P.S. and Skillicorn , D.B . 2005 . Detecting Unusual Email Communication. Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research (Toranto , Ontario, Canada , 2005 ), 117--125. Keila, P.S. and Skillicorn, D.B. 2005. Detecting Unusual Email Communication. Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research (Toranto, Ontario, Canada, 2005), 117--125."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2012 Workshop on Biomedical Natural Language Processing","author":"Matykiewicz P.","year":"2012","unstructured":"Matykiewicz , P. and Pestian , J . 2012. Effect of Small Sample Size on Text Categorization with Support Vector Machines . Proceedings of the 2012 Workshop on Biomedical Natural Language Processing ( Stroudsburg, PA, USA , 2012 ), 193--201. Matykiewicz, P. and Pestian, J. 2012. Effect of Small Sample Size on Text Categorization with Support Vector Machines. Proceedings of the 2012 Workshop on Biomedical Natural Language Processing (Stroudsburg, PA, USA, 2012), 193--201."},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Technology and Management. (Jul.","author":"Mbaziira A.","year":"2016","unstructured":"Mbaziira , A. and Jones , J . 2016. A Text-based Deception Detection Model for Cybercrime . International Conference on Technology and Management. (Jul. 2016 ). Mbaziira, A. and Jones, J. 2016. A Text-based Deception Detection Model for Cybercrime. International Conference on Technology and Management. (Jul. 2016)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1177\/0146167203029005010"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies -","volume":"1","author":"Ott M.","year":"2011","unstructured":"Ott , M. , Choi , Y. , Cardie , C. and Hancock , J.T . 2011. Finding Deceptive Opinion Spam by Any Stretch of the Imagination . Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1 (Stroudsburg, PA, USA, 2011 ), 309--319. Ott, M., Choi, Y., Cardie, C. and Hancock, J.T. 2011. Finding Deceptive Opinion Spam by Any Stretch of the Imagination. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1 (Stroudsburg, PA, USA, 2011), 309--319."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1093\/llc\/fqs003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_2_1_23_1","volume-title":"Constructing and Analyzing Criminal Networks. IEEE Security and Privacy Workshops.","author":"Sarvari H.","year":"2014","unstructured":"Sarvari , H. , Abozinadah , E. , Mbaziira , A. and McCoy , D. 2014 . Constructing and Analyzing Criminal Networks. IEEE Security and Privacy Workshops. (2014), 8. Sarvari, H., Abozinadah, E., Mbaziira, A. and McCoy, D. 2014. Constructing and Analyzing Criminal Networks. IEEE Security and Privacy Workshops. (2014), 8."},{"key":"e_1_3_2_1_24_1","volume-title":"2013 13th International Conference on Intelligent Systems Design and Applications (ISDA) (Dec.","author":"Shojaee S.","year":"2013","unstructured":"Shojaee , S. , Murad , M.A.A. , Azman , A.B. , Sharef , N.M. and Nadali , S . 2013. Detecting deceptive reviews using lexical and syntactic features . 2013 13th International Conference on Intelligent Systems Design and Applications (ISDA) (Dec. 2013 ), 53--58. Shojaee, S., Murad, M.A.A., Azman, A.B., Sharef, N.M. and Nadali, S. 2013. Detecting deceptive reviews using lexical and syntactic features. 2013 13th International Conference on Intelligent Systems Design and Applications (ISDA) (Dec. 2013), 53--58."},{"unstructured":"Tan P.-N. Steinbach M. and Kumar V. 2014. Introduction to Data Mining. Dorling Kindersley.  Tan P.-N. Steinbach M. and Kumar V. 2014. Introduction to Data Mining. Dorling Kindersley.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1177\/0261927X09351676"},{"volume-title":"2014","author":"The","unstructured":"The digital language divide : 2014 . http:\/\/labs.theguardian.com\/digital-language-divide\/. Accessed: 2016--11-27. The digital language divide: 2014. http:\/\/labs.theguardian.com\/digital-language-divide\/. Accessed: 2016--11-27.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1080\/07421222.2004.11045779"}],"event":{"sponsor":["University of Florida University of Florida"],"acronym":"ICCDA '17","name":"ICCDA '17: 2017 International Conference on Compute and Data Analysis","location":"Lakeland FL USA"},"container-title":["Proceedings of the International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093241.3093280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:39Z","timestamp":1750217439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,19]]},"references-count":28,"alternative-id":["10.1145\/3093241.3093280","10.1145\/3093241"],"URL":"https:\/\/doi.org\/10.1145\/3093241.3093280","relation":{},"subject":[],"published":{"date-parts":[[2017,5,19]]},"assertion":[{"value":"2017-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}