based on semiotic fingerprint matching. Our approach
uses the rich media content of web documents to build
a set of features, thus allowing stylometric analysis on
small documents.
REFERENCES
AOL/NCSA (2004). Aol/ncsa online safety study. Tech-
nical report, America Online and the National Cyber
Security Alliance.
Ardet, N. (2004). Teenagers, Internet and Black Metal mu-
sic. Conference Proceedings CIM 2004.
Ardet, N. and Thome, M. (2004). Virtual Ethnography: a
Computer-Based Approach. Computer and their Ap-
plications, Conference Proceedings (2004), 79–82.
ATIS (2001). Alliance for telecommunications industry so-
lutions telecom glossary.
Baayen, H., Halteren, H., and Tweedie, F. (1996). Outside
the cave of shadows: Using syntactic annotation to en-
hance authorship attribution. Literary and Linguistic
Computing, 11.
Chandler, D. (2002). Semiotics: The Basics. London,
Routeledge.
Clarke, R. (1999). Identified, anonymous and pseudony-
mous transactions: The spectrum of choice. User
Identification & Privacy Protection Conference,
Stockholm.
Cranor, L. F. (2002). Web Privacy with P3P. O’Reilly &
Associates.
De Vel, O., Anderson, A., and Corney, M. (2001a). Min-
ing e-mail content for author identification forensics.
ACM Sigmod, Volume 30 , Issue 4 (December 2001).
De Vel, O., Andersond, A., and Corney, M. (2001b). Multi-
topic-e-mail authorship attribution forensics. In ACM
Conference on Computer Security - Workshop on Data
Mining for Security Applications, November 8, 2001,
Philadelphia, PA, USA.
Garton, L. (1997). Studying on-line social networks.
JCMC (Journal of Computer Mediated Communica-
tion) Vol.3, Issue 1, 1997.
Ha, L. A. (2003). Extracting important domain-specific
concepts and relations from a glossary. In Proceed-
ings of the 6th CLUK Colloquium, pages 49–56, Ed-
inburgh, UK.
Hauben, M. and Hauben, R. (1997). Netizens: On the His-
tory and Impact of Usenet and the Internet. Wiley-
IEEE Computer Society Press.
Holmes, D. I. (1994). Authorship attribution. Computers
and the Humanities, Nr. 28:87–106.
Huchra, J. and Geller, M. (1982). Groups of Galaxies I.
Nearby Groups. ApJ 257 423.
Jacobson, D. (1999). Doing research in cyberspace. Fields
Methods, Vol. 11, No. 2, November 1999:pp. 127–
145.
Kantor, B. and Lapsley, P. (1986). Network news transfer
protocol. Technical report, U.C. San Diego.
Koppel, M., Argamon, S., and Shimoni, A. (2003). Auto-
matically categorizing written texts by author gender.
Literary and Linguistic Computing 17(4), November
2002, pp. 401–412.
Mantovani, G. (2001). The psychological construction of
the internet. from information foraging to social gath-
ering to cultural mediation. Cyberpsychology And Be-
havior. Vol. 4 (1), Pp. 47-56.
Meyer (2001). Extracting knowledge-rich contexts for ter-
minography. In D. Bourigault, C. J. and LHomme,
M. C., editors, Recent Advances in Computational
Terminology. Amsterdam, John Benjamins.
Nottingham, M. (2003). The atom syndication format 0.3
(pre-draft). Technical report, Atom Working Group.
Oakes, M. P. (1998). Statistics for Corpus Linguistics. Ed-
inburgh.
Pfitzmann, A. (2004). Anonymity, unobservability,
pseudonymity, and identity management a proposal
for terminology (draft v0.21 sep. 03, 2004). Technical
report, TU Dresden.
Pfitzmann, A. and K
¨
ohntopp, M. (2001). Anonymity, un-
observability, and pseudonymity a proposal for ter-
minology. Technical report, proposal.
Pilgrim, M. (2002). What is rss? www.xml.com.
PLAI (2005). The plain language association international
glossary. http://www.plainlanguagenetwork.org/.
Preece, J. (2000). Online communities. Wiley.
Sack, W. (2000). Conversation map: A content-based
usenet newsgroup browser. In in the Proceedings of
the International Conference on Intelligent User In-
terfaces (New Orleans, LA: Association for Comput-
ing Machinery, January 2000).
Smith, M. (1983). Recent Experience and New Develop-
ments of Methods for the Determination of Author-
ship. Association for Literary and Linguistic Com-
puting Bulletin, 11, 1983, S. 73-82.
Stamatatos, E., N. F. and Kokkinakis, G. (2001). Computer-
based authorship attribution without lexical measures.
Computers and the Humanities 35, pages 193–214.
STOA (1998). An appraisal of technologies of politi-
cal control, interim study. Technical report, STOA
Programme, Directorate-General for Research Direc-
torate B, Eastman 112, rue Belliard 97-113, B-1047
Bruxelles., http://cryptome.org/stoa-atpc.htm.
Wasserman, S. and Faust, K. (1994). Social Network Analy-
sis: Methods and Applications. Cambridge University
Press.
Wellman, B. (1997). Cultures of the Internet, chapter An
electronic group is virtually a social network, page
pages 179205. Lawrence Erlbaum Publications, Mah-
wah, New Jersey.
Wikipedia (2005). Wikipedia Encyclopedia.
www.wikipedia.com.
WEBIST 2005 - WEB INTERFACES AND APPLICATIONS
310