The Community for Technology Leaders
RSS Icon
Issue No.04 - April (2013 vol.46)
pp: 54-61
Awais Rashid , Lancaster University, UK
Alistair Baron , Lancaster University, UK
Paul Rayson , Lancaster University, UK
Corinne May-Chahal , Lancaster University, UK
Phil Greenwood , Isis Forensics, Lancaster, UK
James Walkerdine , Isis Forensics, Lancaster, UK
The Isis toolkit offers the sophisticated capabilities required to analyze digital personas and provide investigators with clues to the identity of the individual or group hiding behind one or more personas.
computing milieu, cybersecurity, computers and society
Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood, James Walkerdine, "Who Am I? Analyzing Digital Personas in Cybercrime Investigations", Computer, vol.46, no. 4, pp. 54-61, April 2013, doi:10.1109/MC.2013.68
1. A. Rashid et al., Technological Solutions to Offending, Willan, 2012, pp. 228-243.
2. M.T. Whitty and T. Buchanan, "The Online Dating Romance Scam: A Serious Crime," CyberPsychology, Behavior, and Social Networking, vol. 15, no. 3, pp. 181-183.
3. G. Weimann and K. von Knop,"Applying the Notion of Noise to Countering Online Terrorism," Studies in Conflict and Terrorism, vol. 31, no. 10, 2008, pp. 883-902.
4. H. Davulcu et al., "Analyzing Sentiment Markers Describing Radical and Counter-Radical Elements in Online News," Proc. 2nd Int'l Conf. Privacy, Security, Risk and Trust (PASSAT 10), IEEE, 2010, pp. 335-340.
5. J. Diesner and K. Carley, "Using Network Text Analysis to Detect the Organizational Structure of Covert Networks," Proc. Conf. Computational Analysis of Social and Organizational Systems (CASOS 04), Nat'l Assoc. Computational Social and Organizational Science, 2004; NAACSOS_2004_Diesner_Carley_Detect_Covert_Networks.pdf .
6. H. Bisgin et al., "A Study of Homophily on Social Media," World Wide Web, vol. 15, no. 2, 2012, pp. 213-232.
7. P. Greenwood et al., "Udesignit: Towards Social Media for Community-Driven Design," Proc. Int'l Conf. Software Engineering (ICSE 12), IEEE, 2012, pp. 1321-1324.
8. S. Prentice et al., "The Language of Islamic Extremism: Towards an Automated Identification of Beliefs, Motivations and Justifications," Int'l J. Corpus Linguistics, vol. 17, no. 2, 2012, pp. 259-286.
9. E. Stamatatos, "A Survey of Modern Authorship Attribution Methods," J. Am Soc. Information Science and Technology, vol. 60, no. 3, 2009, pp. 538-556.
10. S. Afroz et al., "Detecting Hoaxes, Frauds, and Deception in Writing Style Online," Proc. IEEE Symp. Security and Privacy (S&P 12), IEEE, 2012, pp. 461-475.
11. A. Narayanan et al., "On the Feasibility of Internet-Scale Author Identification," Proc. IEEE Symp. Security and Privacy (S&P 12), IEEE, 2012, pp. 300-314.
12. P. Rayson, "From Key Words to Key Semantic Domains," Int'l J. Corpus Linguistics, vol. 13, no. 4, 2008, pp. 519-549.
32 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool