Identifying cyber predators through forensic authorship analysis of chat logs

Faith Amuchi, Ameer Al-Nemrat, Mamoun Alazab, Robert Layton

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

15 Citations (Scopus)

Abstract

Online Grooming is a growing phenomenon within online environments. One of the major problems encountered in qualitative internet research of chat communication is the issue of anonymity which is being exploited and greatly enjoyed by chatters. An important question that has been asked in the literature is 'How can a researcher be sure to analyse the communication of children and adolescents and not the chat communication of adults who pretend to be under 18?'. Our reply to this question would be the field of Authorship Analysis. Authorship Analysis offers a way to unmask the anonymity of cyber predators. Stylometry, as used in this chat log analysis, is a type of Authorship Analysis that is not based on an author's handwriting but includes contextual clues from the content of their writings. This research paper will analyse the application of different authorship attribution techniques to chat log from a forensic perspective.

Original languageEnglish
Title of host publicationProceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012
Place of PublicationLos Alamitos, CA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages28-37
Number of pages10
ISBN (Print)9780769549408
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012 - Ballarat, VIC, Australia
Duration: 29 Oct 201230 Oct 2012

Other

Other2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012
Country/TerritoryAustralia
CityBallarat, VIC
Period29/10/1230/10/12

Fingerprint

Dive into the research topics of 'Identifying cyber predators through forensic authorship analysis of chat logs'. Together they form a unique fingerprint.

Cite this