Identifying cyber predators through forensic authorship analysis of chat logs

Faith Amuchi, Ameer Al-Nemrat, Mamoun Alazab, Robert Layton

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Citations (Scopus)

    Abstract

    Online Grooming is a growing phenomenon within online environments. One of the major problems encountered in qualitative internet research of chat communication is the issue of anonymity which is being exploited and greatly enjoyed by chatters. An important question that has been asked in the literature is 'How can a researcher be sure to analyse the communication of children and adolescents and not the chat communication of adults who pretend to be under 18?'. Our reply to this question would be the field of Authorship Analysis. Authorship Analysis offers a way to unmask the anonymity of cyber predators. Stylometry, as used in this chat log analysis, is a type of Authorship Analysis that is not based on an author's handwriting but includes contextual clues from the content of their writings. This research paper will analyse the application of different authorship attribution techniques to chat log from a forensic perspective.

    Original languageEnglish
    Title of host publicationProceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012
    PublisherIEEE Computer Society
    Pages28-37
    Number of pages10
    ISBN (Print)9780769549408
    DOIs
    Publication statusPublished - 2012
    Event2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012 - Ballarat, VIC, Australia
    Duration: 29 Oct 201230 Oct 2012

    Publication series

    NameProceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012

    Conference

    Conference2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012
    Country/TerritoryAustralia
    CityBallarat, VIC
    Period29/10/1230/10/12

    Fingerprint

    Dive into the research topics of 'Identifying cyber predators through forensic authorship analysis of chat logs'. Together they form a unique fingerprint.

    Cite this