113,801 research outputs found

    1st International Workshop on Search and Mining Terrorist Online Content and Advances in Data Science for Cyber Security and Risk on the Web

    Get PDF
    The deliberate misuse of technical infrastructure (including the Web and social media) for cyber deviant and cybercriminal behaviour, ranging from the spreading of extremist and terrorism-related material to online fraud and cyber security attacks, is on the rise. This workshop aims to better understand such phenomena and develop methods for tackling them in an effective and efficient manner. The workshop brings together interdisciplinary researchers and experts in Web search, security informatics, social media analysis, machine learning, and digital forensics, with particular interests in cyber security. The workshop programme includes refereed papers, invited talks and a panel discussion for better understanding the current landscape, as well as the future of data mining for detecting cyber deviance

    A Systematic Literature Review of the Use of Computational Text Analysis Methods in Intimate Partner Violence Research

    Get PDF
    Purpose: Computational text mining methods are proposed as a useful methodological innovation in Intimate Partner Violence (IPV) research. Text mining can offer researchers access to existing or new datasets, sourced from social media or from IPV-related organisations, that would be too large to analyse manually. This article aims to give an overview of current work applying text mining methodologies in the study of IPV, as a starting point for researchers wanting to use such methods in their own work. Methods This article reports the results of a systematic review of academic research using computational text mining to research IPV. A review protocol was developed according to PRISMA guidelines, and a literature search of 8 databases was conducted, identifying 22 unique studies that were included in the review. Results: The included studies cover a wide range of methodologies and outcomes. Supervised and unsupervised approaches are represented, including rule-based classification (n = 3), traditional Machine Learning (n = 8), Deep Learning (n = 6) and topic modelling (n = 4) methods. Datasets are mostly sourced from social media (n = 15), with other data being sourced from police forces (n = 3), health or social care providers (n = 3), or litigation texts (n = 1). Evaluation methods mostly used a held-out, labelled test set, or k-fold Cross Validation, with Accuracy and F1 metrics reported. Only a few studies commented on the ethics of computational IPV research. Conclusions: Text mining methodologies offer promising data collection and analysis techniques for IPV research. Future work in this space must consider ethical implications of computational approaches

    Mining social media and web searches for disease detection

    Get PDF
    Web-based social media is increasingly being used across different settings in the health care industry. The increased frequency in the use of the Internet via computer or mobile devices provides an opportunity for social media to be the medium through which people can be provided with valuable health information quickly and directly. While traditional methods of detection relied predominately on hierarchical or bureaucratic lines of communication, these often failed to yield timely and accurate epidemiological intelligence. New web-based platforms promise increased opportunities for a more timely and accurate spreading of information and analysis. This article aims to provide an overview and discussion of the availability of timely and accurate information. It is especially useful for the rapid identification of an outbreak of an infectious disease that is necessary to promptly and effectively develop public health responses. These web-based platforms include search queries, data mining of web and social media, process and analysis of blogs containing epidemic key words, text mining, and geographical information system data analyses. These new sources of analysis and information are intended to complement traditional sources of epidemic intelligence. Despite the attractiveness of these new approaches, further study is needed to determine the accuracy of blogger statements, as increases in public participation may not necessarily mean the information provided is more accurate

    Emotional Reactions to the Perception of Risk in the Pompeii Archaeological Park

    Get PDF
    The assessment of perceived risk by people is extremely important for safety and security management. Each person is based on the opinion of others to make a choice and the Internet represents the place where these opinions are mostly researched, found and reviewed. Social networks have a decisive impact: 92% of consumers say they have more trust in social media reviews than in any other form of advertising. For this reason, Opinion Mining and Sentiment Analysis have found interesting applications in the most diverse context, among which the most innovative is certainly represented by public safety and security. Security managers can use the perceptions expressed by people to discover the unexpected and potential weaknesses of a controlled environment or otherwise the risk and security perception of people that sometimes can be very different from real level of risk and security of a given site. Since the perceptions are the result of mostly unconscious elaborations, it is necessary to go deeper and to search for the emotions, triggered by the sensorial stimuli, that determine them. The objective of this paper is to study the perception of risk within the Pompeii Archaeological Park, giving emphasis to the emotional components, using the semantic analysis of the textual contents present in Twitter.Peer reviewe
    • …
    corecore