{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:49:50Z","timestamp":1749271790374},"reference-count":50,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"abstract":"<jats:p>One of the current essential methods for communication is electronic email (e-mail). It is currently considered the official method for different business activities such as conducting agreements, the setup of official meetings, and team collaboration. This continuous interest in e-mails as a communication channel has drawn the attention to the need for eliminating spam which have a vital effect on both network resources and business activities. This research focuses on generating a ham-spam lexicon based on text analysis which is aimed to be one of the main resources for detecting personal spam e-mails. The lexicon generation is a key step to efficiently and economically successful spam elimination. The proposed framework has proven its applicability on a dataset of six groups and the classification algorithms have been examined to prove the efficient classification. The research is a step in a wider view for general intelligent business communication and collaboration framework.<\/jats:p>","DOI":"10.4018\/ijec.2020040104","type":"journal-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T14:55:57Z","timestamp":1582296957000},"page":"45-64","source":"Crossref","is-referenced-by-count":4,"title":["Automated Ham-Spam Lexicon Generation Based on Semantic Relations Extraction"],"prefix":"10.4018","volume":"16","author":[{"given":"Ayman E.","family":"Khedr","sequence":"first","affiliation":[{"name":"Faculty of Computers and Information Technology, Future University in Egypt, New Cairo, Egypt"}]},{"given":"Amira M.","family":"Idrees","sequence":"additional","affiliation":[{"name":"Faculty of Computers and Information, Fayoum University, Egypt"}]},{"given":"Essam","family":"Shaaban","sequence":"additional","affiliation":[{"name":"Information Systems Department, Beni-Suef University, Beni Suef, Egypt"}]}],"member":"2432","reference":[{"issue":"5","key":"IJeC.2020040104-0","first-page":"382","article-title":"An Evaluation Framework for Business Process Modeling Techniques.","volume":"15","author":"M. A.Abdel-Fattah","year":"2017","journal-title":"International Journal of Computer Science and Information Security"},{"issue":"4","key":"IJeC.2020040104-1","article-title":"A Conceptual Framework for Software Requirements Validation.","volume":"5","author":"A. A.Ahmed","year":"2019","journal-title":"Journal of Applied Sciences (Faisalabad)"},{"issue":"2","key":"IJeC.2020040104-2","article-title":"Diagnostic expert system using non-monotonic reasoning.","volume":"23","author":"E.Azhary","year":"2002","journal-title":"Expert Systems with Applications"},{"journal-title":"Automatic categorization of email into folders: benchmark experiments on Enron and SRI corpora. Technical report","year":"2004","author":"R.Beckermann","key":"IJeC.2020040104-3"},{"key":"IJeC.2020040104-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.catena.2016.11.032"},{"issue":"9","key":"IJeC.2020040104-5","first-page":"3126","article-title":"Email Spam Filtering using Supervised Machine Learning Techniques.","volume":"2","author":"V.Christina","year":"2010","journal-title":"International Journal on Computer Science and Engineering"},{"issue":"2","key":"IJeC.2020040104-6","article-title":"Pattern Based Concept Extraction for Arabic Documents.","volume":"10","author":"M. Y.Dahab","year":"2010","journal-title":"International Journal of Intelligent Computing and Information Sciences"},{"issue":"1","key":"IJeC.2020040104-7","first-page":"22","article-title":"Proposed a Structured Framework for Enhancing Software Projects Quality.","volume":"4","author":"A.Darwish","year":"2015","journal-title":"International Journal of Computer Science and Software Engineering"},{"key":"IJeC.2020040104-8","doi-asserted-by":"crossref","unstructured":"Dou, J., Yamagishi, H., Zhu, Z., Yunus, A., & Chen, C. (2018). A Comparative Study of the Binary Logistic Regression (BLR) and Artificial Neural Network (ANN) Models for GIS-Based Spatial Predicting Landslides at a Regional Scale. Landslide Dynamics: ISDR-ICL Landslide Interactive Teaching Tools (pp. 139\u2013151). Academic Press.","DOI":"10.1007\/978-3-319-57774-6_10"},{"key":"IJeC.2020040104-9","first-page":"241","article-title":"Improving Terminology Mapping in Clinical Text with Context-Sensitive Spelling Correction.","volume":"235","author":"J.Dziadek","year":"2017","journal-title":"Informatics for Health: Connected Citizen-Led Wellness and Population Health"},{"key":"IJeC.2020040104-10","unstructured":"El Seddawy, A. B., Sultan, T., & Khedr, A. E. (2013). Enhanced K-mean Algorithm to Improve Decision Support System under Uncertain Situations. International Journal of Computer Science and Network Security, 13(7)."},{"key":"IJeC.2020040104-11","doi-asserted-by":"crossref","unstructured":"Elmasry, H. E., Khedr, A. E., & Nasr, M. M. (2019). An adaptive technique for cost reduction in cloud data centre environment. International journal of Grid and Utility Computing, 10(5), 448-464.","DOI":"10.1504\/IJGUC.2019.102011"},{"issue":"4","key":"IJeC.2020040104-12","first-page":"1407","article-title":"An effective and efficient two-stage Dimensionality reduction algorithm for content-based spam filtering.","volume":"9","author":"Y.Feng","year":"2013","journal-title":"Journal of Computer Information Systems"},{"key":"IJeC.2020040104-13","doi-asserted-by":"publisher","DOI":"10.5121\/ijcses.2015.6202"},{"key":"IJeC.2020040104-14","doi-asserted-by":"crossref","unstructured":"Hassan, H., Dahab,, M., Bahnassy, K., Idrees, A., & Gamal, F. (2015). Arabic Documents classification method a Step towards Efficient Documents Summarization. International Journal on Recent and Innovation Trends in Computing and Communication, 351-359.","DOI":"10.17762\/ijritcc2321-8169.150171"},{"key":"IJeC.2020040104-15","unstructured":"Hassan, H. A., Dahab, M. Y., Bahnasy, K., Idrees, A. M., & Gamal, F. (2014). Query answering approach based on document summarization. International Open Access Journal of Modern Engineering Research, 4(12)."},{"key":"IJeC.2020040104-16","unstructured":"Hassan, H. A., & Idrees, A. M. (2010). Sampling Technique Selection Framework for Knowledge Discovery. Proceedings of the7th International Conference on Informatics and Systems (INFOS), Cairo (pp. 1 - 8). Academic Press."},{"key":"IJeC.2020040104-17","doi-asserted-by":"publisher","DOI":"10.1109\/EHB.2015.7391367"},{"issue":"4","key":"IJeC.2020040104-18","article-title":"An Enhanced Business Intelligence Approach for Increasing Customer Satisfaction Using Mining Techniques.","volume":"17","author":"Y.Helmy","year":"2019","journal-title":"International Journal of Computer Science and Information Security"},{"key":"IJeC.2020040104-19","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387"},{"key":"IJeC.2020040104-20","doi-asserted-by":"crossref","unstructured":"Idrees, A. M., & Ibrahim, A. B. (2015). Enhancing information technology services for e-business-the road towards optimization. Proceedings of the 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015) (pp. 72-77). IEEE.","DOI":"10.1109\/ICTKE.2015.7368474"},{"issue":"11","key":"IJeC.2020040104-21","article-title":"A Proposed Framework Targeting the Enhancement of Students\u2019 Performance in Fayoum University.","volume":"9","author":"A. M.Idrees","year":"2018","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"IJeC.2020040104-22","doi-asserted-by":"publisher","DOI":"10.24297\/ijct.v14i6.1913"},{"issue":"3","key":"IJeC.2020040104-23","first-page":"150","article-title":"Adoption of cloud computing framework in higher education to enhance educational process.","volume":"3","author":"A.Khedr","year":"2015","journal-title":"International Journal of Innovative Research in Computer Science and Technology"},{"key":"IJeC.2020040104-24","doi-asserted-by":"publisher","DOI":"10.23956\/ijarcsse\/SV7I5\/0163"},{"issue":"4","key":"IJeC.2020040104-25","first-page":"161","article-title":"Towards Three Dimensional Analyses for Applying E-Learning Evaluation Model: The Case of E-Learning in Helwan University.","volume":"9","author":"A. E.Khedr","year":"2012","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"IJeC.2020040104-26","doi-asserted-by":"publisher","DOI":"10.24297\/ijct.v4i2a2.3176"},{"issue":"3","key":"IJeC.2020040104-27","first-page":"43","article-title":"A Literature Review of Business Process Modeling Techniques.","volume":"5","author":"A. E.Khedr","year":"2015","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"IJeC.2020040104-28","doi-asserted-by":"crossref","unstructured":"Khedr, A. E., & Borgman, H. (2006). Adoption of New Technologies in a Highly Uncertain Environment: The Case of Egyptian Public Banks. Proceedings of theInternational Conference on Innovative Techniques and Applications of Artificial Intelligence (pp. 223-227). Academic Press.","DOI":"10.1007\/978-1-84628-666-7_17"},{"key":"IJeC.2020040104-29","doi-asserted-by":"publisher","DOI":"10.17706\/jcp.12.3.250-257"},{"key":"IJeC.2020040104-30","doi-asserted-by":"crossref","unstructured":"Khedr, A. E., Idrees, A. M., & El Seddawy, A. I. (2016). Adaptive Classification Method Based on Data Decomposition. Journal of Computer Sciences, 12(1), 31.38.","DOI":"10.3844\/jcssp.2016.31.38"},{"key":"IJeC.2020040104-31","doi-asserted-by":"crossref","unstructured":"Khedr, A. E., Idrees, A. M., & Elseddawy, A. (2016). Enhancing Iterative Dichotomiser 3 algorithm for classification decision tree. WIREs Data Mining and Knowledge Discovery, 6.","DOI":"10.1002\/widm.1177"},{"key":"IJeC.2020040104-32","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34749-3_21"},{"key":"IJeC.2020040104-33","unstructured":"Lafferty, J., McCallum, A., & Pereira, F. (2001). Conditional random fields: Probabilistic models for segmenting and labeling sequence data. Proceedings of the 18th International Conference on Machine Learning (ICML 2001). Academic Press."},{"key":"IJeC.2020040104-34","doi-asserted-by":"crossref","first-page":"852","DOI":"10.1002\/asi.21234","article-title":"Introduction to information retrieval.","volume":"61","author":"R.Larson","year":"2010","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"IJeC.2020040104-35","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. nature, 521(7553), 436.","DOI":"10.1038\/nature14539"},{"key":"IJeC.2020040104-36","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.12.1131"},{"key":"IJeC.2020040104-37","unstructured":"Metsis, V., Androutsopoulos, I., & Paliouras, G. (2006). Spam Filtering with Naive Bayes \u2013 Which Naive Bayes? Proceedings of the CEAS 2006 Third Conference on Email and AntiSpam. Academic Press."},{"issue":"1","key":"IJeC.2020040104-38","article-title":"A Proposed Approach for Emotion Lexicon Enrichement.","volume":"10","author":"A.Mohsen","year":"2016","journal-title":"International Journal of Computer Electrical Automation Control and Information Engineering"},{"issue":"1","key":"IJeC.2020040104-39","first-page":"252","article-title":"Documents Emotions Classification Model Based on TF-IDF Weighting.","volume":"10","author":"A.Mohsen","year":"2016","journal-title":"International Journal of Computer Electrical Automation Control and Information Engineering"},{"key":"IJeC.2020040104-40","doi-asserted-by":"publisher","DOI":"10.4018\/IJeC.2019010103"},{"key":"IJeC.2020040104-41","doi-asserted-by":"publisher","DOI":"10.17706\/jcp.11.5.400-410"},{"key":"IJeC.2020040104-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.10.004"},{"key":"IJeC.2020040104-43","first-page":"226","article-title":"Analysis of Na\u00efve Bayes Algorithm for Email Spam Filtering across Multiple Datasets.","author":"N.Rusland","year":"2017","journal-title":"IOP Conference Series. Materials Science and Engineering"},{"key":"IJeC.2020040104-44","first-page":"365","article-title":"Accuracy evaluation of Arabic text classification.","author":"M.Sayed","year":"2017","journal-title":"12th International Conference on Computer Engineering and Systems (ICCES)"},{"key":"IJeC.2020040104-45","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2019.098601"},{"key":"IJeC.2020040104-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"IJeC.2020040104-47","doi-asserted-by":"publisher","DOI":"10.3923\/jai.2017.59.65"},{"key":"IJeC.2020040104-48","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2013.040127"},{"issue":"1","key":"IJeC.2020040104-49","article-title":"Efficient support vector machines for spam detection: A survey.","volume":"13","author":"Z.Torabi","year":"2015","journal-title":"International Journal of Computer Science and Information Security"}],"container-title":["International Journal of e-Collaboration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=249669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T22:45:29Z","timestamp":1722465929000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJeC.2020040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":50,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijec.2020040104","relation":{},"ISSN":["1548-3673","1548-3681"],"issn-type":[{"type":"print","value":"1548-3673"},{"type":"electronic","value":"1548-3681"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}