Application of Social Networks and Data Mining on Crime Victims

2021 ◽  
pp. 693-703
Author(s):  
Suchandra Dutta ◽  
Sohom Roy ◽  
Dhrubasish Sarkar ◽  
Dipak K. Kole
2013 ◽  
Vol 9 (1) ◽  
pp. 36-53
Author(s):  
Evis Trandafili ◽  
Marenglen Biba

Social networks have an outstanding marketing value and developing data mining methods for viral marketing is a hot topic in the research community. However, most social networks remain impossible to be fully analyzed and understood due to prohibiting sizes and the incapability of traditional machine learning and data mining approaches to deal with the new dimension in the learning process related to the large-scale environment where the data are produced. On one hand, the birth and evolution of such networks has posed outstanding challenges for the learning and mining community, and on the other has opened the possibility for very powerful business applications. However, little understanding exists regarding these business applications and the potential of social network mining to boost marketing. This paper presents a review of the most important state-of-the-art approaches in the machine learning and data mining community regarding analysis of social networks and their business applications. The authors review the problems related to social networks and describe the recent developments in the area discussing important achievements in the analysis of social networks and outlining future work. The focus of the review in not only on the technical aspects of the learning and mining approaches applied to social networks but also on the business potentials of such methods.


Data Mining ◽  
2013 ◽  
pp. 1230-1252
Author(s):  
Luca Cagliero ◽  
Alessandro Fiori

This chapter presents an overview of social network features such as user behavior, social models, and user-generated content to highlight the most notable research trends and application systems built over such appealing models and online media data. It first describes the most popular social networks by analyzing the growth trend, the user behaviors, the evolution of social groups and models, and the most relevant types of data continuously generated and updated by the users. Next, the most recent and valuable applications of data mining techniques to social network models and user-generated content are presented. Discussed works address both social model extractions tailored to semantic knowledge inference and automatic understanding of the user-generated content. Finally, prospects of data mining research on social networks are provided as well.


Author(s):  
Jiri Panek

Crowdsroucing of emotional information can take many forms, from social networks data mining to large-scale surveys. The author presents the case-study of emotional mapping in Ostrava´s district Ostrava-Poruba, Czech Republic. Together with the local administration, the author crowdsourced the emotional perceptions of the location from almost 400 citizens, who created 4,051 spatial features. Additional to the spatial data there were 1,244 comments and suggestions for improvements in the district. Furthermore, the author is looking for patterns and hot-spots within the city and if there are any relevant linkages between certain emotions and spatial locations within the city.


Author(s):  
Kathy J. Liszka ◽  
Chien-Chung Chan ◽  
Chandra Shekar

Microblogs are one of a growing group of social network tools. Twitter is, at present, one of the most popular forums for microblogging in online social networks, and the fastest growing. Fifty million messages flow through servers, computers, and cell phones on a wide variety of topics exchanged daily. With this considerable volume, Twitter is a natural and obvious target for spreading spam via the messages, called tweets. The challenge is how to determine if a tweet is a spam or not, and more specifically a special category advertising pharmaceutical products. The authors look at the essential characteristics of spam tweets and what makes microblogging spam unique from email or other types of spam. They review methods and tools currently available to identify general spam tweets. Finally, this work introduces a new methodology of applying text mining and data mining techniques to generate classifiers that can be used for pharmaceutical spam detection in the context of microblogging.


2015 ◽  
pp. 1539-1556
Author(s):  
Dhiraj Murthy ◽  
Alexander Gross ◽  
Alex Takata

This chapter identifies a number of the most common data mining toolkits and evaluates their utility in the extraction of data from heterogeneous online social networks. It introduces not only the complexities of scraping data from the diverse forms of data manifested in these sources, but also critically evaluates currently available tools. This analysis is followed by a presentation and discussion on the development of a hybrid system, which builds upon the work of the open-source Web-Harvest framework, for the collection of information from online social networks. This tool, VoyeurServer, attempts to address the weaknesses of tools identified in earlier sections, as well as prototype the implementation of key functionalities thought to be missing from commonly available data extraction toolkits. The authors conclude the chapter with a case study and subsequent evaluation of the VoyeurServer system itself. This evaluation presents future directions, remaining challenges, and additional extensions thought to be important to the effective development of data mining tools for the study of online social networks.


Author(s):  
Jose Luiz Goldfarb ◽  
Odecio Souza

Since data mining uses notions from areas such as cybernetics and artificial intelligence, it is worth evoking here ages-old fears elicited by the idea of automatons created to help humans, but which eventually turned against their creators. Examples might range from the Jewish myth of the Golem to the more famous Frankenstein, Hal from Stanley Kubrick’s 2001: A Space Odyssey (1968), and the more recent Her, by Spike Jonze (2013). In this discussion we pay special attention to the fact that in the 21st-century it seems to be less a matter of creating an individual cybernetic creature, than of the rise of social networks, which are alluded by many as collective intelligence. Such collective intelligence might involve, for instance, the responsive ability of IBM’s Watson.


Sign in / Sign up

Export Citation Format

Share Document