Is it spam or ham? testing asynchronous CMC deception detection theory

Fletcher H. Glancy, Surya B. Yadav

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper presents two empirical evaluations of Asynchronous CMC Deception Detection Theory (ACDDT) in the CMC genres of legitimate and spam e-mail. The ACDDT theorizes that deception detection in asynchronous text is indicated by the presence of the constructs of concealment, normality, and isolation. The ACDDT was tested on two common types of e-mail that attempt to deceive the reader/recipient, e-mail that attempted to steal the recipient's personal identification information and e-mail that attempted to steal the recipient's money. The e-mail was clustered using the text mining. The terms representing the clusters were analyzed using text analysis. The constructs developed from the text analysis provided measures of the hypotheses. Both tests confirmed that ACDDT provides a theoretical base for detection of deception in e-mail. The contributions of this work are support for the ACDDT and a development of a new and unique method of detecting fraudulent e-mail.

Original languageEnglish
Title of host publicationICIS 2010 Proceedings - Thirty First International Conference on Information Systems
StatePublished - 2010
Event31st International Conference on Information Systems, ICIS 2010 - Saint Louis, MO, United States
Duration: Dec 12 2010Dec 15 2010

Publication series

NameICIS 2010 Proceedings - Thirty First International Conference on Information Systems

Conference

Conference31st International Conference on Information Systems, ICIS 2010
Country/TerritoryUnited States
CitySaint Louis, MO
Period12/12/1012/15/10

Keywords

  • Acddt
  • Asynchronous CMC
  • Concealment
  • Deception detection
  • E-mail
  • Isolation
  • Normality
  • Spam

Fingerprint

Dive into the research topics of 'Is it spam or ham? testing asynchronous CMC deception detection theory'. Together they form a unique fingerprint.

Cite this