Analysis of E-mail communication activities for detecting patterns of pathological behaviour
E-mail is one of the most popular and widely used form of electronic communication used today. The patterns in the social interactions or contacts between people by e-mail can be analysed using social network analysis and user behaviour analysis. In this paper we provide a review of the work related...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2017-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/fruct20/files/Neg.pdf
|
id |
doaj-1b33eda3ae47447694c669a38ee3e75a |
---|---|
record_format |
Article |
spelling |
doaj-1b33eda3ae47447694c669a38ee3e75a2020-11-24T23:26:37ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372017-04-017762032232710.23919/FRUCT.2017.8071329Analysis of E-mail communication activities for detecting patterns of pathological behaviourMichael Negnevitsky0Mark Jyn-Huey Lim1Jacky Hartnett2School of Engineering and ICT (Hobart), University of Tasmania, Hobart, Tasmania 7001, AustraliaSchool of Engineering and ICT (Hobart), University of Tasmania, Hobart, Tasmania 7001, AustraliaSchool of Engineering and ICT (Launceston), University of Tasmania, Hobart, Tasmania 7001, AustraliaE-mail is one of the most popular and widely used form of electronic communication used today. The patterns in the social interactions or contacts between people by e-mail can be analysed using social network analysis and user behaviour analysis. In this paper we provide a review of the work related to the areas of dynamic modelling and link prediction of social networks, and anomaly detection for detecting changes in the behaviour of e-mail usage. We then discuss about the benefits of applying artificial intelligence techniques to these fields.https://fruct.org/publications/fruct20/files/Neg.pdf E-mail communicationPattern recognitionPathological BehaviourTerrorist suspects |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Michael Negnevitsky Mark Jyn-Huey Lim Jacky Hartnett |
spellingShingle |
Michael Negnevitsky Mark Jyn-Huey Lim Jacky Hartnett Analysis of E-mail communication activities for detecting patterns of pathological behaviour Proceedings of the XXth Conference of Open Innovations Association FRUCT E-mail communication Pattern recognition Pathological Behaviour Terrorist suspects |
author_facet |
Michael Negnevitsky Mark Jyn-Huey Lim Jacky Hartnett |
author_sort |
Michael Negnevitsky |
title |
Analysis of E-mail communication activities for detecting patterns of pathological behaviour |
title_short |
Analysis of E-mail communication activities for detecting patterns of pathological behaviour |
title_full |
Analysis of E-mail communication activities for detecting patterns of pathological behaviour |
title_fullStr |
Analysis of E-mail communication activities for detecting patterns of pathological behaviour |
title_full_unstemmed |
Analysis of E-mail communication activities for detecting patterns of pathological behaviour |
title_sort |
analysis of e-mail communication activities for detecting patterns of pathological behaviour |
publisher |
FRUCT |
series |
Proceedings of the XXth Conference of Open Innovations Association FRUCT |
issn |
2305-7254 2343-0737 |
publishDate |
2017-04-01 |
description |
E-mail is one of the most popular and widely used form of electronic communication used today. The patterns in the social interactions or contacts between people by e-mail can be analysed using social network analysis and user behaviour analysis. In this paper we provide a review of the work related to the areas of dynamic modelling and link prediction of social networks, and anomaly detection for detecting changes in the behaviour of e-mail usage. We then discuss about the benefits of applying artificial intelligence techniques to these fields. |
topic |
E-mail communication Pattern recognition Pathological Behaviour Terrorist suspects |
url |
https://fruct.org/publications/fruct20/files/Neg.pdf
|
work_keys_str_mv |
AT michaelnegnevitsky analysisofemailcommunicationactivitiesfordetectingpatternsofpathologicalbehaviour AT markjynhueylim analysisofemailcommunicationactivitiesfordetectingpatternsofpathologicalbehaviour AT jackyhartnett analysisofemailcommunicationactivitiesfordetectingpatternsofpathologicalbehaviour |
_version_ |
1725554212057645056 |