{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:27:35Z","timestamp":1777854455908,"version":"3.51.4"},"reference-count":26,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T00:00:00Z","timestamp":1326153600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2012,2]]},"abstract":"<jats:p>Detecting alert e-mails received daily by millions of subscribers from online news providers is a relatively new area of research which falls within the e-mail filtering field of research. Alert e-mails may address government, political issues, breaking news, and criminal attacks. This article proposes a hybrid approach based on both the Graham statistical filter and rule-based filters to detect and filter Arabic alert e-mails. The approach is basically language-independent. To test the performance of the proposed approach, several experiments have been conducted using a set of 1500 Arabic messages related to criminal activities collected manually from some news websites such as Al-Jazeera Net and BBC Arabic news. The results showed that the proposed approach has achieved a competitive performance in terms of accuracy, precision, and F-measure, where about 87% of the messages tested have been correctly detected and filtered by the proposed filter.<\/jats:p>","DOI":"10.1177\/0165551511423151","type":"journal-article","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T20:32:43Z","timestamp":1326227563000},"page":"87-99","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["A hybrid approach to detecting alerts in Arabic e-mail messages"],"prefix":"10.1177","volume":"38","author":[{"given":"Qasem A.","family":"Al-Radaideh","sequence":"first","affiliation":[{"name":"Yarmouk University, Jordan"}]},{"given":"Ahmed F.","family":"AlEroud","sequence":"additional","affiliation":[{"name":"University of Maryland, MD, USA"}]},{"given":"Emad M.","family":"Al-Shawakfa","sequence":"additional","affiliation":[{"name":"Yarmouk University, Jordan"}]}],"member":"179","published-online":{"date-parts":[[2012,1,10]]},"reference":[{"key":"bibr1-0165551511423151","first-page":"316","volume-title":"Proceedings of the IEEE international conference on intelligence and security informatics; ISI 2007","author":"Appavu S"},{"issue":"2","key":"bibr2-0165551511423151","first-page":"81","volume":"14","author":"Appavu S","year":"2008","journal-title":"International Journal of Information Technology"},{"key":"bibr3-0165551511423151","doi-asserted-by":"publisher","DOI":"10.1080\/19312430701646046"},{"key":"bibr4-0165551511423151","unstructured":"Al-Radaideh Q, AlEroud A, Al-Shawakfa E. Evaluating rule based and statistical filters for detecting Arabic alert e-mail. International Journal of Information Technology & Decision Making (IJITDM), 2012, in press."},{"key":"bibr5-0165551511423151","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"bibr6-0165551511423151","unstructured":"Graham P. Better Bayesian filtering. Paper presented at the MIT spam conference, 2003. Available at: http:\/\/baulgraham.com\/better.html."},{"key":"bibr7-0165551511423151","first-page":"44","volume-title":"Proceedings of the 6th conference on empirical methods in natural language processing","author":"Sakkis G"},{"key":"bibr8-0165551511423151","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6264-3_67"},{"key":"bibr9-0165551511423151","first-page":"41","volume-title":"Proceedings of the 8th Australasian document computing symposium (ADC\u20192003)","author":"Koprinska I"},{"issue":"3","key":"bibr10-0165551511423151","first-page":"153","volume":"3","author":"Gajewski P","year":"2006","journal-title":"International Journal of Information Technology"},{"issue":"1","key":"bibr11-0165551511423151","first-page":"34","volume":"9","author":"Sheu J","year":"2009","journal-title":"International Journal of Network Security"},{"key":"bibr12-0165551511423151","first-page":"1","volume-title":"Proceedings of IEEE 19th international conference on pattern recognition (ICPR)","author":"Chen C"},{"key":"bibr13-0165551511423151","first-page":"125","volume-title":"Proceedings of the ECML\/PKDD discovery challenge workshop","author":"Nazir JK"},{"key":"bibr14-0165551511423151","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081885"},{"issue":"1","key":"bibr15-0165551511423151","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3923\/itj.2009.1.15","volume":"8","author":"Chiemeke SC","year":"2008","journal-title":"Journal of Information Technology"},{"key":"bibr16-0165551511423151","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.3.271-275"},{"key":"bibr17-0165551511423151","first-page":"3931","volume-title":"Proceedings of the IEEE international geoscience and remote sensing symposium","author":"Blanzieri E"},{"key":"bibr18-0165551511423151","volume-title":"Proceedings of the 4th conference on email and antispam (CEAS)","author":"Blanzieri E"},{"key":"bibr19-0165551511423151","volume-title":"Proceedings of RSCD","author":"Kyriakopoulou A"},{"key":"bibr20-0165551511423151","first-page":"861","volume-title":"Proceedings of the 6th international conference on intelligent systems design and applications (ISDA)","author":"Yang Z"},{"key":"bibr21-0165551511423151","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.12.005"},{"key":"bibr22-0165551511423151","doi-asserted-by":"publisher","DOI":"10.1145\/1039621.1039625"},{"key":"bibr23-0165551511423151","first-page":"201","volume-title":"Proceedings of the 7th Australasian data mining conference (AusDM)","author":"Simeon M"},{"issue":"5","key":"bibr24-0165551511423151","first-page":"119","volume":"4","author":"Abu-El-Khair I","year":"2006","journal-title":"International Journal of Computing & Information Sciences"},{"key":"bibr25-0165551511423151","volume-title":"Introduction to modern information retrieval","author":"Salton G","year":"1983"},{"key":"bibr26-0165551511423151","unstructured":"University of Konstanz. KNIME (Konstanz Information Miner Tool). University of Konstanz, Germany, http:\/\/www.knime.org\/ (accessed February 2011)."}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551511423151","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0165551511423151","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551511423151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:08:13Z","timestamp":1777504093000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551511423151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,10]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["10.1177\/0165551511423151"],"URL":"https:\/\/doi.org\/10.1177\/0165551511423151","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,10]]}}}