2019
DOI: 10.3906/elk-1712-17
|View full text |Cite
|
Sign up to set email alerts
|

Data analysis through social media according to the classified crime

Abstract: The amount and variety of data generated through social media sites has increased along with the widespread use of social media sites. In addition, the data production rate has increased in the same way. The inclusion of personal information within these data makes it important to process the data and reach meaningful information within it. This process can be called intelligence and this meaningful information may be for commercial, academic, or security purposes.An example application is developed in this st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 37 publications
0
9
0
1
Order By: Relevance
“…( 2015 ). Discovering and disseminating events from diverse online social networks and with a variety of modes (e.g., text, image) have been the focus in many research studies, such as crypto-currencies Savaş ( 2021 ), crime intelligence SAVAŞ and TOPALOĞLU ( 2019 ), politics Adedoyin-Olowe et al. ( 2016 ), traffic analysis Alkouz and Al Aghbari ( 2020 ), and fashion analysis Wazarkar and Keshavamurthy ( 2020 ).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…( 2015 ). Discovering and disseminating events from diverse online social networks and with a variety of modes (e.g., text, image) have been the focus in many research studies, such as crypto-currencies Savaş ( 2021 ), crime intelligence SAVAŞ and TOPALOĞLU ( 2019 ), politics Adedoyin-Olowe et al. ( 2016 ), traffic analysis Alkouz and Al Aghbari ( 2020 ), and fashion analysis Wazarkar and Keshavamurthy ( 2020 ).…”
Section: Related Workmentioning
confidence: 99%
“…The dynamic updates of such events by the live communities in social media lay the ground for developing plenty of intelligent location-based services (LBSs). These LBSs can support a variety of domain applications, such as trip planning, emergency management, transportation, navigation, city exploration, education, and crime intelligence (Savaş and Topaloğlu 2017 ; SAVAŞ and TOPALOĞLU 2019 ).…”
Section: Introductionmentioning
confidence: 99%
“…Cyber environments have now become real-life itself (Savaş and Topaloğlu 2019 ), and people spend most of the day in digital environments. For this reason, real-life threats can also be seen in digital environments.…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…After these operations, text normalization is performed. To do this, natural language processing tools such as NLTK [33] and Zemberek [34] are used to convert capital letters, convert numbers to text, remove punctuation and markups, remove spaces, open abbreviations and remove unnecessary words [35]. When there are a lot of texts to process, sometimes it is necessary to decrease the amount of the texts.…”
Section: A Natural Language Processing and Latent Semantic Analysismentioning
confidence: 99%