@inproceedings{scholars2814, year = {2012}, journal = {2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012 - Conference Proceedings}, pages = {215--220}, volume = {1}, note = {cited By 8; Conference of 2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012 ; Conference Date: 12 June 2012 Through 14 June 2012; Conference Code:93334}, doi = {10.1109/ICCISci.2012.6297242}, address = {Kuala Lumpur}, title = {Distance-based hoax detection system}, keywords = {Detection system; Distance-based; Levenshtein distance; Misleading informations; Sensitivity and specificity; Text-matching, Information science; Technology; Viruses, Electronic mail}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867907147&doi=10.1109\%2fICCISci.2012.6297242&partnerID=40&md5=6c8c9e2f5e8a36d5ab822c6a273d52c5}, abstract = {Hoaxes are non malicious viruses. They live on deceiving human?s perception by conveying false claims as truth. Throughout history, hoaxes have actually able to influence a lot of people to the extent of tarnishing the victim?s image and credibility. Moreover, wrong and misleading information has always been a distortion to a human?s growth. Some hoaxes were created in a way that they can even obtain personal data by convincing the victims that those data were required for official purposes. Hoaxes are different from spams in a way that they masquerade themselves through the address of those related either directly or indirectly to us. Most of the time, they appear as a forwarded message and sometimes from legit companies. This paper addresses this issue by developing a hoax detection system by incorporating text matching method using Levenshtein Distance measure. The proposed model is used to identify text-based hoax emails. Sensitivity and specificity are used to evaluate the accuracy of the system identifying hoax emails. {\^A}{\copyright} 2012 IEEE.}, author = {Ishak, A. and Chen, Y. Y. and Yong, S.-P.}, isbn = {9781467319386} }