{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:56Z","timestamp":1750221356722,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,23]],"date-time":"2018-03-23T00:00:00Z","timestamp":1521763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,23]]},"DOI":"10.1145\/3193077.3193080","type":"proceedings-article","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T12:24:55Z","timestamp":1527596695000},"page":"42-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Empirical Study on Detecting Deception and Cybercrime Using Artificial Neural Networks"],"prefix":"10.1145","author":[{"given":"Alex V.","family":"Mbaziira","sequence":"first","affiliation":[{"name":"Marymount University, Arlington, VA"}]},{"given":"Diane R.","family":"Murphy","sequence":"additional","affiliation":[{"name":"Marymount University, Arlington, VA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"P. Engel \"ISIS has mastered a crucial recruiting tactic no terrorist group has ever conquered \" Business Insider 09-May-2015. {Online}. Available http:\/\/www.businessinsider.com\/isis-is-revolutionizing-international-terrorism-2015-5. {Accessed: 16-Mar-2016}.  P. Engel \"ISIS has mastered a crucial recruiting tactic no terrorist group has ever conquered \" Business Insider 09-May-2015. {Online}. Available http:\/\/www.businessinsider.com\/isis-is-revolutionizing-international-terrorism-2015-5. {Accessed: 16-Mar-2016}."},{"key":"e_1_3_2_1_2_1","unstructured":"H. Young \"The digital language divide \" 2014. {Online}. Available: http:\/\/labs.theguardian.com\/digital-language-divide\/. {Accessed: 27-Nov-2016}.  H. Young \"The digital language divide \" 2014. {Online}. Available: http:\/\/labs.theguardian.com\/digital-language-divide\/. {Accessed: 27-Nov-2016}."},{"key":"e_1_3_2_1_3_1","unstructured":"G. C. | in T. D. Maker September 16 2013 and 8: 43 Am Pst \"Use big data to fight cybercrime \" TechRepublic. {Online}. Available: https:\/\/www.techrepublic.com\/blog\/tech-decision-maker\/use-big-data-to-fight-cybercrime\/. {Accessed: 12-Nov-2017}.  G. C. | in T. D. Maker September 16 2013 and 8:43 Am Pst \"Use big data to fight cybercrime \" TechRepublic. {Online}. Available: https:\/\/www.techrepublic.com\/blog\/tech-decision-maker\/use-big-data-to-fight-cybercrime\/. {Accessed: 12-Nov-2017}."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2010.5606466"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqs003"},{"key":"e_1_3_2_1_6_1","first-page":"53","volume-title":"Detecting deceptive reviews using lexical and syntactic features,\" in 2013 13th International Conference on Intelligent Systems Design and Applications (ISDA)","author":"Shojaee S.","year":"2013","unstructured":"S. Shojaee , M. A. A. Murad , A. B. Azman , N. M. Sharef , and S. Nadali , \" Detecting deceptive reviews using lexical and syntactic features,\" in 2013 13th International Conference on Intelligent Systems Design and Applications (ISDA) , 2013 , pp. 53 -- 58 . S. Shojaee, M. A. A. Murad, A. B. Azman, N. M. Sharef, and S. Nadali, \"Detecting deceptive reviews using lexical and syntactic features,\" in 2013 13th International Conference on Intelligent Systems Design and Applications (ISDA), 2013, pp. 53--58."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3208440"},{"key":"e_1_3_2_1_8_1","volume-title":"LIBSVM: a Library for Support Vector Machines","author":"Chang C.","year":"2001","unstructured":"C. Chang and C.-J. Lin , LIBSVM: a Library for Support Vector Machines . 2001 . C. Chang and C.-J. Lin, LIBSVM: a Library for Support Vector Machines. 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093241.3093280"},{"key":"e_1_3_2_1_10_1","volume-title":"Conf. Technol. Manag.","author":"Mbaziira A.","year":"2016","unstructured":"A. Mbaziira and J. Jones , \" A Text-based Deception Detection Model for Cybercrime,\" Int . Conf. Technol. Manag. , Jul. 2016 . A. Mbaziira and J. Jones, \"A Text-based Deception Detection Model for Cybercrime,\" Int. Conf. Technol. Manag., Jul. 2016."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045779"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.01.015"},{"key":"e_1_3_2_1_15_1","first-page":"338","volume-title":"Nagoya","author":"Feng V. W.","year":"2013","unstructured":"V. W. Feng and G. Hirst , \" Detecting Deceptive Opinions with Profile Compatibility.,\" in International Joint Conference on Natural Language Processing , Nagoya , Japan , 2013 , pp. 338 -- 346 . V. W. Feng and G. Hirst, \"Detecting Deceptive Opinions with Profile Compatibility.,\" in International Joint Conference on Natural Language Processing, Nagoya, Japan, 2013, pp. 338--346."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-642-45252-9_9","volume-title":"Scam detection in Twitter,\" in Data Mining for Service","author":"Chen X.","year":"2014","unstructured":"X. Chen , R. Chandramouli , and K. P. Subbalakshmi , \" Scam detection in Twitter,\" in Data Mining for Service , Springer , 2014 , pp. 133 -- 150 . X. Chen, R. Chandramouli, and K. P. Subbalakshmi, \"Scam detection in Twitter,\" in Data Mining for Service, Springer, 2014, pp. 133--150."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.22"},{"key":"e_1_3_2_1_20_1","unstructured":"W. Cohen \"Enron Email Dataset \" 08-May-2015. {Online}. Available: http:\/\/www.cs.cmu.edu\/~enron\/. {Accessed: 29-Mar-2016}.  W. Cohen \"Enron Email Dataset \" 08-May-2015. {Online}. Available: http:\/\/www.cs.cmu.edu\/~enron\/. {Accessed: 29-Mar-2016}."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002512"},{"key":"e_1_3_2_1_22_1","unstructured":"DoJ \"Former Enron CEO Jeffrey Skilling Resentenced to 168 Months for Fraud Conspiracy Charges \" 21-Jun-2013. {Online}. Available: https:\/\/www.justice.gov\/opa\/pr\/former-enron-ceo-jeffrey-skilling-resentenced-168-months-fraud-conspiracy-charges. {Accessed: 02-Apr-2017}.  DoJ \"Former Enron CEO Jeffrey Skilling Resentenced to 168 Months for Fraud Conspiracy Charges \" 21-Jun-2013. {Online}. Available: https:\/\/www.justice.gov\/opa\/pr\/former-enron-ceo-jeffrey-skilling-resentenced-168-months-fraud-conspiracy-charges. {Accessed: 02-Apr-2017}."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2886202"}],"event":{"name":"ICCDA 2018: 2018 The 2nd International Conference on Compute and Data Analysis","acronym":"ICCDA 2018","location":"DeKalb IL USA"},"container-title":["Proceedings of the 2nd International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193077.3193080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3193077.3193080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:09Z","timestamp":1750213569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193077.3193080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,23]]},"references-count":23,"alternative-id":["10.1145\/3193077.3193080","10.1145\/3193077"],"URL":"https:\/\/doi.org\/10.1145\/3193077.3193080","relation":{},"subject":[],"published":{"date-parts":[[2018,3,23]]},"assertion":[{"value":"2018-03-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}