Reading Between the Lines: Human-centred Classification of Communication Patterns and Intentions
Author identification will benefit from the deeper understanding of human’s approach to infer the intention of an author by some kind of text-content analysis, informal speaking by “read between the lines”. This so-called qualitative text analysis aims to derive purpose, context and tone of a communication. By determining characteristics of text that serve as information carrier for communication intents as well as possible interpretations of those information it is assumed to be feasible to develop advanced computer-based methods. So far, however, only few studies on the information carrier and communication intends are performed. In addition, there is no public benchmark dataset available that can support the development and testing of computational methods.
After giving an overview of the current state of art in research and forensic author identification, this paper details a case study on the identification of text-based characteristics and their linkage to specific individuals or target groups by using indicator patterns of human communication and behaviour. Communication patterns determined in this pilot study can be adopted in several other communication contexts and target groups. Moreover, these pattern found will support further research and development of computational methods for qualitative text analysis and the identification of authors.
KeywordsTarget Group Communication Pattern Virtual Learning Environment Author Identification Conversation Situation
Unable to display preview. Download preview PDF.
- 1.Sabine Ehrhardt: Sprache und Verbrechen – Forensische Linguistik im Bundeskriminalamt, Ringvorlesung zum Jahr der Geisteswissenschaften, Stuttgart, 21.Mai 2007.Google Scholar
- 2.JesÚs Mena: Investigative Data Mining for Security and Criminal Detection, Butterworth Heinemann / Elsevier Science (USA), 2003, ISBN:0-7506-7613-2.Google Scholar
- 3.Stokar von Neuforn: Geschlechtsstereotype Rezeption textbasierter Kommunikation in virtuellen Lernumgebungen, Shaker Verlag GmbH, Aachen, ISBN: 978-3-8322-5778-1, 2006.Google Scholar
- 4.De Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining E-Mail content for author identification forensics. SIMOD Record, 30(4), 2001,55-64. www.sigmod.org/record/issues/0112/SPECIAL/6.pdfGoogle Scholar
- 5.Ahmed Abbasi, Hsinchun Chen: Visualizing Authorship for Identification, Department of Management Information Systems, The University of Arizona, Tucson, AZ 85721, USA,2006Google Scholar
- 7.Dark Web Terrorism Research, http://ai.arizona.edu/research/terror/index.htm, Oct. 2007.Google Scholar
- 8.Fiske, Susan T., Neuberg, Steven L. (1990). A continuum of impression formation from categorybased to individuating processes: Influences of information and motivation on attention and interpretation. In: Advances in experimental social psychology. Hg. Mark P. Zanna, S. 1-74.New York: Academic Press.Google Scholar
- 9.Fiske, Susan T., Neuberg, Steven L. (1999). The continuum model: Ten years later. In S. Chaiken and Y. Trope (Hrsg.), Dual process theories in social psychology (S.231 – 254). New York: Guilford.Google Scholar
- 10.Mayring, Philipp : Qualitative Inhaltsanalyse. Grundlagen und Techniken, Weinheim,1988Google Scholar
- 11.Lamnek, Siegfried (1993). Qualitative Sozialforschung, Band 2, Methoden und Techniken, S.202 ff, Weinheim: Belz, Psychologie Verlags Union.Google Scholar
- 12.Stokar von Neuforn, D., Thomaschewski, J.: Enhanging the motivation to learn through decoding text based communication reception in virtual learning environments – Case Study for the online course of media informatics, EDEN 2006 Annual Conference, E-Competences for Life, Employment and Innovation, Vienna University of Technology, Austria, 06.2006.Google Scholar