使用数据挖掘来指出虚拟(电子邮件)欺凌

K. Burn-Thornton, T. Burman
{"title":"使用数据挖掘来指出虚拟(电子邮件)欺凌","authors":"K. Burn-Thornton, T. Burman","doi":"10.1109/GCIS.2012.107","DOIUrl":null,"url":null,"abstract":"In this paper we describe how a novel application of Data Mining techniques can be used to provide the engine for a tool which can be used to identify email correspondence which may be an early indication of virtual bullying or harassment. The approach which we have taken makes use of linear discriminant approaches to classify normal, and non-normal, style of email correspondence for each sender. This change in email style could be used to provide an early indication of virtual harassment/bullying.. This approach has great potential for use in large organization where it is often appears to be hard to identify unacceptable information transmission between two colleagues. By identifying indicative behavior it should be possible to instigate company anti bullying processes in a more timely manner. This should ensure a more effective work force in terms of work place efficiency and reduction of stress related absence resulting from harassment or bullying. We show that it is possible to improve the identification of the number of sender signature styles contained within the email pages, irrespective of the number of pages concerned. The implications of the use of SSSs, and ASSSs, for identification of future email interactions are discussed.","PeriodicalId":337629,"journal":{"name":"2012 Third Global Congress on Intelligent Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"The Use of Data Mining to Indicate Virtual (Email) Bullying\",\"authors\":\"K. Burn-Thornton, T. Burman\",\"doi\":\"10.1109/GCIS.2012.107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we describe how a novel application of Data Mining techniques can be used to provide the engine for a tool which can be used to identify email correspondence which may be an early indication of virtual bullying or harassment. The approach which we have taken makes use of linear discriminant approaches to classify normal, and non-normal, style of email correspondence for each sender. This change in email style could be used to provide an early indication of virtual harassment/bullying.. This approach has great potential for use in large organization where it is often appears to be hard to identify unacceptable information transmission between two colleagues. By identifying indicative behavior it should be possible to instigate company anti bullying processes in a more timely manner. This should ensure a more effective work force in terms of work place efficiency and reduction of stress related absence resulting from harassment or bullying. We show that it is possible to improve the identification of the number of sender signature styles contained within the email pages, irrespective of the number of pages concerned. The implications of the use of SSSs, and ASSSs, for identification of future email interactions are discussed.\",\"PeriodicalId\":337629,\"journal\":{\"name\":\"2012 Third Global Congress on Intelligent Systems\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third Global Congress on Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GCIS.2012.107\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third Global Congress on Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCIS.2012.107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

在本文中,我们描述了如何使用数据挖掘技术的新应用来为一种工具提供引擎,该工具可用于识别电子邮件通信,这可能是虚拟欺凌或骚扰的早期迹象。我们采用的方法使用线性判别方法对每个发件人的正常和非正常电子邮件通信风格进行分类。这种电子邮件风格的变化可以用来提供虚拟骚扰/欺凌的早期迹象。这种方法在大型组织中具有很大的应用潜力,因为在大型组织中,很难识别两个同事之间不可接受的信息传输。通过识别指示性行为,应该有可能以更及时的方式煽动公司反欺凌程序。这将确保在工作场所效率和减少因骚扰或欺凌而造成的压力而缺勤方面更有效的工作队伍。我们表明,无论有关页面的数量如何,都可以改进对电子邮件页面中包含的发件人签名样式数量的识别。讨论了使用SSSs和ASSSs识别未来电子邮件交互的含义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Use of Data Mining to Indicate Virtual (Email) Bullying
In this paper we describe how a novel application of Data Mining techniques can be used to provide the engine for a tool which can be used to identify email correspondence which may be an early indication of virtual bullying or harassment. The approach which we have taken makes use of linear discriminant approaches to classify normal, and non-normal, style of email correspondence for each sender. This change in email style could be used to provide an early indication of virtual harassment/bullying.. This approach has great potential for use in large organization where it is often appears to be hard to identify unacceptable information transmission between two colleagues. By identifying indicative behavior it should be possible to instigate company anti bullying processes in a more timely manner. This should ensure a more effective work force in terms of work place efficiency and reduction of stress related absence resulting from harassment or bullying. We show that it is possible to improve the identification of the number of sender signature styles contained within the email pages, irrespective of the number of pages concerned. The implications of the use of SSSs, and ASSSs, for identification of future email interactions are discussed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Temperature Prediction Based on Different Meteorological Series The Design and Application for a Bio-inspired Nonlinear Intelligent Controller Problem-Specific Knowledge Based Heuristic Algorithm to Solve Satellite Broadcast Scheduling Problem Micro Pitch and Vary Speed for Extreme Value Search MPPT Method of DFIG Academic Relation Classification Rules Extraction with Correlation Feature Weight Selection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1