Analysis of behavior of automatic learning algorithms to identify criminal messages
In this type of explanation, strictly economic or criminal motives predominate: mainly the control of routes and places, and the punishment of desertion or treason. The precarious and fragmentary nature of the public discourse of drug traffickers as well as the preponderance of police narratives has...
- Autores:
-
Varela, Noel
GALVEZ VALEGA, JESUS ARTURO
Pineda Lezama, Omar Bonerge
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2020
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/7698
- Acceso en línea:
- https://hdl.handle.net/11323/7698
https://doi.org/10.1016/j.procs.2020.07.019
https://repositorio.cuc.edu.co/
- Palabra clave:
- Text analysis model
Identification of authors
Criminal messages
- Rights
- openAccess
- License
- CC0 1.0 Universal
id |
RCUC2_61c5bdf2c72cb948b973aa025cd6995e |
---|---|
oai_identifier_str |
oai:repositorio.cuc.edu.co:11323/7698 |
network_acronym_str |
RCUC2 |
network_name_str |
REDICUC - Repositorio CUC |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Analysis of behavior of automatic learning algorithms to identify criminal messages |
title |
Analysis of behavior of automatic learning algorithms to identify criminal messages |
spellingShingle |
Analysis of behavior of automatic learning algorithms to identify criminal messages Text analysis model Identification of authors Criminal messages |
title_short |
Analysis of behavior of automatic learning algorithms to identify criminal messages |
title_full |
Analysis of behavior of automatic learning algorithms to identify criminal messages |
title_fullStr |
Analysis of behavior of automatic learning algorithms to identify criminal messages |
title_full_unstemmed |
Analysis of behavior of automatic learning algorithms to identify criminal messages |
title_sort |
Analysis of behavior of automatic learning algorithms to identify criminal messages |
dc.creator.fl_str_mv |
Varela, Noel GALVEZ VALEGA, JESUS ARTURO Pineda Lezama, Omar Bonerge |
dc.contributor.author.spa.fl_str_mv |
Varela, Noel GALVEZ VALEGA, JESUS ARTURO Pineda Lezama, Omar Bonerge |
dc.subject.spa.fl_str_mv |
Text analysis model Identification of authors Criminal messages |
topic |
Text analysis model Identification of authors Criminal messages |
description |
In this type of explanation, strictly economic or criminal motives predominate: mainly the control of routes and places, and the punishment of desertion or treason. The precarious and fragmentary nature of the public discourse of drug traffickers as well as the preponderance of police narratives has concealed the strictly political dimension of "criminal" violence in Colombia. In pragmatic terms, organized crime and politics are more similar than we would like to assume. They have in common the objective of dominating territories, resources and populations; both tend to stand as a system of "parasitic intermediation". Both mafias and the state offer "protection" in exchange for payment of fees, reward loyalty and punish treason. It is the discursive acts that accompany violence and the series of institutional procedures in which they are registered that allow us to draw the line between the political and the criminal, the legitimate and the illegitimate, the just and the unjust. In Colombia, that border has lost clarity. In this study, an analysis of narco-messages found in banners, social networks and other databases is carried out by applying data mining, in order to propose a geospatial model through which it is possible to identify and geographically distribute the authors of the messages. |
publishDate |
2020 |
dc.date.issued.none.fl_str_mv |
2020 |
dc.date.accessioned.none.fl_str_mv |
2021-01-15T18:02:48Z |
dc.date.available.none.fl_str_mv |
2021-01-15T18:02:48Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
acceptedVersion |
dc.identifier.issn.spa.fl_str_mv |
1877-0509 |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/11323/7698 |
dc.identifier.doi.spa.fl_str_mv |
https://doi.org/10.1016/j.procs.2020.07.019 |
dc.identifier.instname.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.identifier.reponame.spa.fl_str_mv |
REDICUC - Repositorio CUC |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.cuc.edu.co/ |
identifier_str_mv |
1877-0509 Corporación Universidad de la Costa REDICUC - Repositorio CUC |
url |
https://hdl.handle.net/11323/7698 https://doi.org/10.1016/j.procs.2020.07.019 https://repositorio.cuc.edu.co/ |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.references.spa.fl_str_mv |
[1] Srinivasan, L., & Nalini, C. (2019). An improved framework for authorship identification in online messages. Cluster Computing, 22(5), 12101-12110. [2] Manek, A. S., Shenoy, P. D., Mohan, M. C., & Venugopal, K. R. (2017). Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier. World wide web, 20(2), 135-154. [3] Gottlieb, A. (2017). The effect of message frames on public attitudes toward criminal justice reform for nonviolent offenses. Crime & Delinquency, 63(5), 636-656. [4] Iqbal, F., Fung, B. C., Debbabi, M., Batool, R., & Marrington, A. (2019). Wordnet-based criminal networks mining for cybercrime investigation. IEEE Access, 7, 22740-22755. [5] Duarte, N., Llanso, E., & Loup, A. (2018, January). Mixed Messages? The Limits of Automated Social Media Content Analysis. In FAT (p. 106). [6] Kounadi, O., Ristea, A., Leitner, M., & Langford, C. (2018). Population at risk: using areal interpolation and Twitter messages to create population models for burglaries and robberies. Cartography and geographic information science, 45(3), 205-220. [7] Ajao, O., Bhowmik, D., & Zargari, S. (2018, July). Fake news identification on twitter with hybrid cnn and rnn models. In Proceedings of the 9th International Conference on Social Media and Society (pp. 226-230). [8] Barbon, S., Igawa, R. A., & Zarpelão, B. B. (2017). Authorship verification applied to detection of compromised accounts on online social networks. Multimedia Tools and Applications, 76(3), 3213-3233. [9] Venckauskas, A., Karpavicius, A., Damaševičius, R., Marcinkevičius, R., Kapočiūte-Dzikiené, J., & Napoli, C. (2017, September). Open class authorship attribution of lithuanian internet comments using one-class classifier. In 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (pp. 373-382). IEEE. [10] Tundis, A., & Mühlhäuser, M. (2017, October). A multi-language approach towards the identification of suspicious users on social networks. In 2017 International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE. [11] Tundis, A., & Mühlhäuser, M. (2017, October). A multi-language approach towards the identification of suspicious users on social networks. In 2017 International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE. [12] Tracy, S. J. (2019). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact. John Wiley & Sons. [13] Soundarya, V., Kanimozhi, U., & Manjula, D. (2017). Recommendation System for Criminal Behavioral Analysis on Social Network using Genetic Weighted K-Means Clustering. JCP, 12(3), 212-220. [14] Chang, V. (2018). A proposed social network analysis platform for big data analytics. Technological Forecasting and Social Change, 130, 57-68. [15] Tundis, A., Bhatia, G., Jain, A., & Mühlhäuser, M. (2018, November). Supporting the identification and the assessment of suspicious users on twitter social media. In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (pp. 1-10). IEEE. [16] Tseng, T. Y., Krebs, P., Schoenthaler, A., Wong, S., Sherman, S., Gonzalez, M., ... & Shelley, D. (2017). Combining text messaging and telephone counseling to increase varenicline adherence and smoking abstinence among cigarette smokers living with HIV: a randomized controlled study. AIDS and Behavior, 21(7), 1964-1974. [17] Tundis, A., Jain, A., Bhatia, G., & Muhlhauser, M. (2019, July). Similarity Analysis of Criminals on Social Networks: An Example on Twitter. In 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE. [18] DeHart, D., Dwyer, G., Seto, M. C., Moran, R., Letourneau, E., & Schwarz-Watts, D. (2017). Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of sexual aggression, 23(1), 77-89. [19] Vorobeva, A. A. (2016, April). Examining the performance of classification algorithms for imbalanced data sets in web author identification. In 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT) (pp. 385-390). IEEE. [20] Sarna, G., & Bhatia, M. P. S. (2017). Content based approach to find the credibility of user in social networks: an application of cyberbullying. International Journal Of Machine Learning and Cybernetics, 8(2), 677-689. [21] Scrivens, R., Davies, G., & Frank, R. (2018). Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors. Behavioral sciences of terrorism and political aggression, 10(1), 39-59. [22] Macnair, L., & Frank, R. (2018). The mediums and the messages: Exploring the language of Islamic State media through sentiment analysis. Critical Studies on Terrorism, 11(3), 438-457. [23] Kamatkar, S. J., Tayade, A., Viloria, A., & Hernández-Chacín, A. (2018). Application of classification technique of data mining for employee management system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10943 LNCS, pp. 434–444). Springer Verlag. https://doi.org/10.1007/978-3-319-93803-5_41 [24] Balaguera, M. I., Vargas, M. C., Lis-Gutierrez, J. P., Viloria, A., & Malagón, L. E. (2018). Architecture of an object-oriented modeling framework for human occupation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10942 LNCS, pp. 452–460). Springer Verlag. https://doi.org/10.1007/978-3-319-93818-9_43 |
dc.rights.spa.fl_str_mv |
CC0 1.0 Universal |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/publicdomain/zero/1.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
CC0 1.0 Universal http://creativecommons.org/publicdomain/zero/1.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.source.spa.fl_str_mv |
Procedia Computer Science |
institution |
Corporación Universidad de la Costa |
dc.source.url.spa.fl_str_mv |
https://www.sciencedirect.com/science/article/pii/S1877050920316987 |
bitstream.url.fl_str_mv |
https://repositorio.cuc.edu.co/bitstreams/bb6ce06e-bf53-40d9-b826-1a757fb82d21/download https://repositorio.cuc.edu.co/bitstreams/cdc1f636-29ab-466e-98fa-2a5a9e8d0120/download https://repositorio.cuc.edu.co/bitstreams/c74f82e7-f66e-4691-8e9d-c8e5072786be/download https://repositorio.cuc.edu.co/bitstreams/e7e1fdd8-c75e-4458-a9c3-ef21e2fadc68/download https://repositorio.cuc.edu.co/bitstreams/3e354308-93a3-448f-be03-932d37bbe191/download |
bitstream.checksum.fl_str_mv |
88dcff0089de5fd85fd456ae11a06199 42fd4ad1e89814f5e4a476b409eb708c e30e9215131d99561d40d6b0abbe9bad c64d6cb3974f38aedfa3977c0703c5e0 25835bfacea003599fd78583d0b3c059 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio de la Universidad de la Costa CUC |
repository.mail.fl_str_mv |
repdigital@cuc.edu.co |
_version_ |
1811760852508868608 |
spelling |
Varela, NoelGALVEZ VALEGA, JESUS ARTUROPineda Lezama, Omar Bonerge2021-01-15T18:02:48Z2021-01-15T18:02:48Z20201877-0509https://hdl.handle.net/11323/7698https://doi.org/10.1016/j.procs.2020.07.019Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/In this type of explanation, strictly economic or criminal motives predominate: mainly the control of routes and places, and the punishment of desertion or treason. The precarious and fragmentary nature of the public discourse of drug traffickers as well as the preponderance of police narratives has concealed the strictly political dimension of "criminal" violence in Colombia. In pragmatic terms, organized crime and politics are more similar than we would like to assume. They have in common the objective of dominating territories, resources and populations; both tend to stand as a system of "parasitic intermediation". Both mafias and the state offer "protection" in exchange for payment of fees, reward loyalty and punish treason. It is the discursive acts that accompany violence and the series of institutional procedures in which they are registered that allow us to draw the line between the political and the criminal, the legitimate and the illegitimate, the just and the unjust. In Colombia, that border has lost clarity. In this study, an analysis of narco-messages found in banners, social networks and other databases is carried out by applying data mining, in order to propose a geospatial model through which it is possible to identify and geographically distribute the authors of the messages.Varela, NoelGALVEZ VALEGA, JESUS ARTURO-will be generated-orcid-0000-0002-1380-2032-600Pineda Lezama, Omar Bonergeapplication/pdfengCorporación Universidad de la CostaCC0 1.0 Universalhttp://creativecommons.org/publicdomain/zero/1.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Procedia Computer Sciencehttps://www.sciencedirect.com/science/article/pii/S1877050920316987Text analysis modelIdentification of authorsCriminal messagesAnalysis of behavior of automatic learning algorithms to identify criminal messagesArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersion[1] Srinivasan, L., & Nalini, C. (2019). An improved framework for authorship identification in online messages. Cluster Computing, 22(5), 12101-12110.[2] Manek, A. S., Shenoy, P. D., Mohan, M. C., & Venugopal, K. R. (2017). Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier. World wide web, 20(2), 135-154.[3] Gottlieb, A. (2017). The effect of message frames on public attitudes toward criminal justice reform for nonviolent offenses. Crime & Delinquency, 63(5), 636-656.[4] Iqbal, F., Fung, B. C., Debbabi, M., Batool, R., & Marrington, A. (2019). Wordnet-based criminal networks mining for cybercrime investigation. IEEE Access, 7, 22740-22755.[5] Duarte, N., Llanso, E., & Loup, A. (2018, January). Mixed Messages? The Limits of Automated Social Media Content Analysis. In FAT (p. 106).[6] Kounadi, O., Ristea, A., Leitner, M., & Langford, C. (2018). Population at risk: using areal interpolation and Twitter messages to create population models for burglaries and robberies. Cartography and geographic information science, 45(3), 205-220.[7] Ajao, O., Bhowmik, D., & Zargari, S. (2018, July). Fake news identification on twitter with hybrid cnn and rnn models. In Proceedings of the 9th International Conference on Social Media and Society (pp. 226-230).[8] Barbon, S., Igawa, R. A., & Zarpelão, B. B. (2017). Authorship verification applied to detection of compromised accounts on online social networks. Multimedia Tools and Applications, 76(3), 3213-3233.[9] Venckauskas, A., Karpavicius, A., Damaševičius, R., Marcinkevičius, R., Kapočiūte-Dzikiené, J., & Napoli, C. (2017, September). Open class authorship attribution of lithuanian internet comments using one-class classifier. In 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (pp. 373-382). IEEE.[10] Tundis, A., & Mühlhäuser, M. (2017, October). A multi-language approach towards the identification of suspicious users on social networks. In 2017 International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE.[11] Tundis, A., & Mühlhäuser, M. (2017, October). A multi-language approach towards the identification of suspicious users on social networks. In 2017 International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE.[12] Tracy, S. J. (2019). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact. John Wiley & Sons.[13] Soundarya, V., Kanimozhi, U., & Manjula, D. (2017). Recommendation System for Criminal Behavioral Analysis on Social Network using Genetic Weighted K-Means Clustering. JCP, 12(3), 212-220.[14] Chang, V. (2018). A proposed social network analysis platform for big data analytics. Technological Forecasting and Social Change, 130, 57-68.[15] Tundis, A., Bhatia, G., Jain, A., & Mühlhäuser, M. (2018, November). Supporting the identification and the assessment of suspicious users on twitter social media. In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (pp. 1-10). IEEE.[16] Tseng, T. Y., Krebs, P., Schoenthaler, A., Wong, S., Sherman, S., Gonzalez, M., ... & Shelley, D. (2017). Combining text messaging and telephone counseling to increase varenicline adherence and smoking abstinence among cigarette smokers living with HIV: a randomized controlled study. AIDS and Behavior, 21(7), 1964-1974.[17] Tundis, A., Jain, A., Bhatia, G., & Muhlhauser, M. (2019, July). Similarity Analysis of Criminals on Social Networks: An Example on Twitter. In 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE.[18] DeHart, D., Dwyer, G., Seto, M. C., Moran, R., Letourneau, E., & Schwarz-Watts, D. (2017). Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of sexual aggression, 23(1), 77-89.[19] Vorobeva, A. A. (2016, April). Examining the performance of classification algorithms for imbalanced data sets in web author identification. In 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT) (pp. 385-390). IEEE.[20] Sarna, G., & Bhatia, M. P. S. (2017). Content based approach to find the credibility of user in social networks: an application of cyberbullying. International Journal Of Machine Learning and Cybernetics, 8(2), 677-689.[21] Scrivens, R., Davies, G., & Frank, R. (2018). Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors. Behavioral sciences of terrorism and political aggression, 10(1), 39-59.[22] Macnair, L., & Frank, R. (2018). The mediums and the messages: Exploring the language of Islamic State media through sentiment analysis. Critical Studies on Terrorism, 11(3), 438-457.[23] Kamatkar, S. J., Tayade, A., Viloria, A., & Hernández-Chacín, A. (2018). Application of classification technique of data mining for employee management system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10943 LNCS, pp. 434–444). Springer Verlag. https://doi.org/10.1007/978-3-319-93803-5_41[24] Balaguera, M. I., Vargas, M. C., Lis-Gutierrez, J. P., Viloria, A., & Malagón, L. E. (2018). Architecture of an object-oriented modeling framework for human occupation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10942 LNCS, pp. 452–460). Springer Verlag. https://doi.org/10.1007/978-3-319-93818-9_43PublicationORIGINALAnalysis of behavior of automatic learning algorithms to identify criminal messages.pdfAnalysis of behavior of automatic learning algorithms to identify criminal messages.pdfapplication/pdf727507https://repositorio.cuc.edu.co/bitstreams/bb6ce06e-bf53-40d9-b826-1a757fb82d21/download88dcff0089de5fd85fd456ae11a06199MD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8701https://repositorio.cuc.edu.co/bitstreams/cdc1f636-29ab-466e-98fa-2a5a9e8d0120/download42fd4ad1e89814f5e4a476b409eb708cMD52LICENSElicense.txtlicense.txttext/plain; charset=utf-83196https://repositorio.cuc.edu.co/bitstreams/c74f82e7-f66e-4691-8e9d-c8e5072786be/downloade30e9215131d99561d40d6b0abbe9badMD53THUMBNAILAnalysis of behavior of automatic learning algorithms to identify criminal messages.pdf.jpgAnalysis of behavior of automatic learning algorithms to identify criminal messages.pdf.jpgimage/jpeg45884https://repositorio.cuc.edu.co/bitstreams/e7e1fdd8-c75e-4458-a9c3-ef21e2fadc68/downloadc64d6cb3974f38aedfa3977c0703c5e0MD54TEXTAnalysis of behavior of automatic learning algorithms to identify criminal messages.pdf.txtAnalysis of behavior of automatic learning algorithms to identify criminal messages.pdf.txttext/plain42652https://repositorio.cuc.edu.co/bitstreams/3e354308-93a3-448f-be03-932d37bbe191/download25835bfacea003599fd78583d0b3c059MD5511323/7698oai:repositorio.cuc.edu.co:11323/76982024-09-17 14:11:22.128http://creativecommons.org/publicdomain/zero/1.0/CC0 1.0 Universalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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 |