Abstract
<jats:sec>
<jats:title content-type="abstract-heading">Purpose</jats:title>
<jats:p> – The purpose of this paper is to investigate the feasibility of identifying the gender of an author by measuring the keystroke duration when typing a message. </jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-heading">Design/methodology/approach</jats:title>
<jats:p> – Three classifiers were constructed and tested. The authors empirically evaluated the effectiveness of the classifiers by using empirical data. The authors used primary data as well as a publicly available dataset containing keystrokes from a different language to validate the language independence assumption. </jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-heading">Findings</jats:title>
<jats:p> – The results of this paper indicate that it is possible to identify the gender of an author by analyzing keystroke durations with a probability of success in the region of 70 per cent. </jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-heading">Research limitations/implications</jats:title>
<jats:p> – The proposed approach was validated with a limited number of participants and languages, yet the statistical tests show the significance of the results. However, this approach will be further tested with other languages. </jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-heading">Practical implications</jats:title>
<jats:p> – Having the ability to identify the gender of an author of a certain piece of text has value in digital forensics, as the proposed method will be a source of circumstantial evidence for “putting fingers on keyboard” and for arbitrating cases where the true origin of a message needs to be identified. </jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-heading">Social implications</jats:title>
<jats:p> – If the proposed method is included as part of a text-composing system (such as e-mail, and instant messaging applications), it could increase trust toward the applications that use it and may also work as a deterrent for crimes involving forgery. </jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-heading">Originality/value</jats:title>
<jats:p> – The proposed approach combines and adapts techniques from the domains of biometric authentication and data classification.</jats:p>
</jats:sec>
Original language | English |
---|---|
Pages (from-to) | 286-301 |
Number of pages | 0 |
Journal | Information & Computer Security |
Volume | 23 |
Issue number | 3 |
DOIs | |
Publication status | Published - 13 Jul 2015 |