{"title":"使用数据挖掘来指出虚拟(电子邮件)欺凌","authors":"K. Burn-Thornton, T. Burman","doi":"10.1109/GCIS.2012.107","DOIUrl":null,"url":null,"abstract":"In this paper we describe how a novel application of Data Mining techniques can be used to provide the engine for a tool which can be used to identify email correspondence which may be an early indication of virtual bullying or harassment. The approach which we have taken makes use of linear discriminant approaches to classify normal, and non-normal, style of email correspondence for each sender. This change in email style could be used to provide an early indication of virtual harassment/bullying.. This approach has great potential for use in large organization where it is often appears to be hard to identify unacceptable information transmission between two colleagues. By identifying indicative behavior it should be possible to instigate company anti bullying processes in a more timely manner. This should ensure a more effective work force in terms of work place efficiency and reduction of stress related absence resulting from harassment or bullying. We show that it is possible to improve the identification of the number of sender signature styles contained within the email pages, irrespective of the number of pages concerned. The implications of the use of SSSs, and ASSSs, for identification of future email interactions are discussed.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"The Use of Data Mining to Indicate Virtual (Email) Bullying\",\"authors\":\"K. Burn-Thornton, T. Burman\",\"doi\":\"10.1109/GCIS.2012.107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we describe how a novel application of Data Mining techniques can be used to provide the engine for a tool which can be used to identify email correspondence which may be an early indication of virtual bullying or harassment. The approach which we have taken makes use of linear discriminant approaches to classify normal, and non-normal, style of email correspondence for each sender. This change in email style could be used to provide an early indication of virtual harassment/bullying.. This approach has great potential for use in large organization where it is often appears to be hard to identify unacceptable information transmission between two colleagues. By identifying indicative behavior it should be possible to instigate company anti bullying processes in a more timely manner. This should ensure a more effective work force in terms of work place efficiency and reduction of stress related absence resulting from harassment or bullying. We show that it is possible to improve the identification of the number of sender signature styles contained within the email pages, irrespective of the number of pages concerned. The implications of the use of SSSs, and ASSSs, for identification of future email interactions are discussed.\",\"PeriodicalId\":337629,\"journal\":{\"name\":\"2012 Third Global Congress on Intelligent Systems\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third Global Congress on Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GCIS.2012.107\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third Global Congress on Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCIS.2012.107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Use of Data Mining to Indicate Virtual (Email) Bullying
In this paper we describe how a novel application of Data Mining techniques can be used to provide the engine for a tool which can be used to identify email correspondence which may be an early indication of virtual bullying or harassment. The approach which we have taken makes use of linear discriminant approaches to classify normal, and non-normal, style of email correspondence for each sender. This change in email style could be used to provide an early indication of virtual harassment/bullying.. This approach has great potential for use in large organization where it is often appears to be hard to identify unacceptable information transmission between two colleagues. By identifying indicative behavior it should be possible to instigate company anti bullying processes in a more timely manner. This should ensure a more effective work force in terms of work place efficiency and reduction of stress related absence resulting from harassment or bullying. We show that it is possible to improve the identification of the number of sender signature styles contained within the email pages, irrespective of the number of pages concerned. The implications of the use of SSSs, and ASSSs, for identification of future email interactions are discussed.