Show simple item record

dc.creatorVarela, Noel
dc.creatorGALVEZ VALEGA, JESUS ARTURO
dc.creatorPineda Lezama, Omar Bonerge
dc.date.accessioned2021-01-15T18:02:48Z
dc.date.available2021-01-15T18:02:48Z
dc.date.issued2020
dc.identifier.issn1877-0509
dc.identifier.urihttps://hdl.handle.net/11323/7698
dc.description.abstractIn this type of explanation, strictly economic or criminal motives predominate: mainly the control of routes and places, and the punishment of desertion or treason. The precarious and fragmentary nature of the public discourse of drug traffickers as well as the preponderance of police narratives has concealed the strictly political dimension of "criminal" violence in Colombia. In pragmatic terms, organized crime and politics are more similar than we would like to assume. They have in common the objective of dominating territories, resources and populations; both tend to stand as a system of "parasitic intermediation". Both mafias and the state offer "protection" in exchange for payment of fees, reward loyalty and punish treason. It is the discursive acts that accompany violence and the series of institutional procedures in which they are registered that allow us to draw the line between the political and the criminal, the legitimate and the illegitimate, the just and the unjust. In Colombia, that border has lost clarity. In this study, an analysis of narco-messages found in banners, social networks and other databases is carried out by applying data mining, in order to propose a geospatial model through which it is possible to identify and geographically distribute the authors of the messages.spa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherCorporación Universidad de la Costaspa
dc.rightsCC0 1.0 Universal*
dc.rights.urihttp://creativecommons.org/publicdomain/zero/1.0/*
dc.sourceProcedia Computer Sciencespa
dc.subjectText analysis modelspa
dc.subjectIdentification of authorsspa
dc.subjectCriminal messagesspa
dc.titleAnalysis of behavior of automatic learning algorithms to identify criminal messagesspa
dc.typearticlespa
dcterms.references[1] Srinivasan, L., & Nalini, C. (2019). An improved framework for authorship identification in online messages. Cluster Computing, 22(5), 12101-12110.spa
dcterms.references[2] Manek, A. S., Shenoy, P. D., Mohan, M. C., & Venugopal, K. R. (2017). Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier. World wide web, 20(2), 135-154.spa
dcterms.references[3] Gottlieb, A. (2017). The effect of message frames on public attitudes toward criminal justice reform for nonviolent offenses. Crime & Delinquency, 63(5), 636-656.spa
dcterms.references[4] Iqbal, F., Fung, B. C., Debbabi, M., Batool, R., & Marrington, A. (2019). Wordnet-based criminal networks mining for cybercrime investigation. IEEE Access, 7, 22740-22755.spa
dcterms.references[5] Duarte, N., Llanso, E., & Loup, A. (2018, January). Mixed Messages? The Limits of Automated Social Media Content Analysis. In FAT (p. 106).spa
dcterms.references[6] Kounadi, O., Ristea, A., Leitner, M., & Langford, C. (2018). Population at risk: using areal interpolation and Twitter messages to create population models for burglaries and robberies. Cartography and geographic information science, 45(3), 205-220.spa
dcterms.references[7] Ajao, O., Bhowmik, D., & Zargari, S. (2018, July). Fake news identification on twitter with hybrid cnn and rnn models. In Proceedings of the 9th International Conference on Social Media and Society (pp. 226-230).spa
dcterms.references[8] Barbon, S., Igawa, R. A., & Zarpelão, B. B. (2017). Authorship verification applied to detection of compromised accounts on online social networks. Multimedia Tools and Applications, 76(3), 3213-3233.spa
dcterms.references[9] Venckauskas, A., Karpavicius, A., Damaševičius, R., Marcinkevičius, R., Kapočiūte-Dzikiené, J., & Napoli, C. (2017, September). Open class authorship attribution of lithuanian internet comments using one-class classifier. In 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (pp. 373-382). IEEE.spa
dcterms.references[10] Tundis, A., & Mühlhäuser, M. (2017, October). A multi-language approach towards the identification of suspicious users on social networks. In 2017 International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE.spa
dcterms.references[11] Tundis, A., & Mühlhäuser, M. (2017, October). A multi-language approach towards the identification of suspicious users on social networks. In 2017 International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE.spa
dcterms.references[12] Tracy, S. J. (2019). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact. John Wiley & Sons.spa
dcterms.references[13] Soundarya, V., Kanimozhi, U., & Manjula, D. (2017). Recommendation System for Criminal Behavioral Analysis on Social Network using Genetic Weighted K-Means Clustering. JCP, 12(3), 212-220.spa
dcterms.references[14] Chang, V. (2018). A proposed social network analysis platform for big data analytics. Technological Forecasting and Social Change, 130, 57-68.spa
dcterms.references[15] Tundis, A., Bhatia, G., Jain, A., & Mühlhäuser, M. (2018, November). Supporting the identification and the assessment of suspicious users on twitter social media. In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (pp. 1-10). IEEE.spa
dcterms.references[16] Tseng, T. Y., Krebs, P., Schoenthaler, A., Wong, S., Sherman, S., Gonzalez, M., ... & Shelley, D. (2017). Combining text messaging and telephone counseling to increase varenicline adherence and smoking abstinence among cigarette smokers living with HIV: a randomized controlled study. AIDS and Behavior, 21(7), 1964-1974.spa
dcterms.references[17] Tundis, A., Jain, A., Bhatia, G., & Muhlhauser, M. (2019, July). Similarity Analysis of Criminals on Social Networks: An Example on Twitter. In 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE.spa
dcterms.references[18] DeHart, D., Dwyer, G., Seto, M. C., Moran, R., Letourneau, E., & Schwarz-Watts, D. (2017). Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of sexual aggression, 23(1), 77-89.spa
dcterms.references[19] Vorobeva, A. A. (2016, April). Examining the performance of classification algorithms for imbalanced data sets in web author identification. In 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT) (pp. 385-390). IEEE.spa
dcterms.references[20] Sarna, G., & Bhatia, M. P. S. (2017). Content based approach to find the credibility of user in social networks: an application of cyberbullying. International Journal Of Machine Learning and Cybernetics, 8(2), 677-689.spa
dcterms.references[21] Scrivens, R., Davies, G., & Frank, R. (2018). Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors. Behavioral sciences of terrorism and political aggression, 10(1), 39-59.spa
dcterms.references[22] Macnair, L., & Frank, R. (2018). The mediums and the messages: Exploring the language of Islamic State media through sentiment analysis. Critical Studies on Terrorism, 11(3), 438-457.spa
dcterms.references[23] Kamatkar, S. J., Tayade, A., Viloria, A., & Hernández-Chacín, A. (2018). Application of classification technique of data mining for employee management system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10943 LNCS, pp. 434–444). Springer Verlag. https://doi.org/10.1007/978-3-319-93803-5_41spa
dcterms.references[24] Balaguera, M. I., Vargas, M. C., Lis-Gutierrez, J. P., Viloria, A., & Malagón, L. E. (2018). Architecture of an object-oriented modeling framework for human occupation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10942 LNCS, pp. 452–460). Springer Verlag. https://doi.org/10.1007/978-3-319-93818-9_43spa
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersionspa
dc.source.urlhttps://www.sciencedirect.com/science/article/pii/S1877050920316987spa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.identifier.doihttps://doi.org/10.1016/j.procs.2020.07.019


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC0 1.0 Universal
Except where otherwise noted, this item's license is described as CC0 1.0 Universal