{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:39:36Z","timestamp":1768297176253,"version":"3.49.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030934194","type":"print"},{"value":"9783030934200","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93420-0_9","type":"book-chapter","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:46:22Z","timestamp":1642034782000},"page":"88-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Prediction of Perception of Security Using Social Media Content"],"prefix":"10.1007","author":[{"given":"Cristian","family":"Pulido","sequence":"first","affiliation":[]},{"given":"Luisa Fernanda","family":"Chaparro","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Rudas","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Victorino","sequence":"additional","affiliation":[]},{"given":"Camilo","family":"Estrada","sequence":"additional","affiliation":[]},{"given":"Luz Angela","family":"Narvaez","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"G\u00f3mez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"9_CR1","unstructured":"Skogan, W.G., Maxfield, M.G.: Coping with Crime: Individual and Neighborhood Reactions. Sage Publications, Beverly Hills (1981)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1080\/13669870600813811","volume":"9","author":"T Rundmo","year":"2006","unstructured":"Rundmo, T., Moen, B.: Risk perception and demand for risk mitigation in transport: a comparison of lay people, politicians and experts. J. Risk Res. 9, 623\u2013640 (2006)","journal-title":"J. Risk Res."},{"key":"9_CR3","unstructured":"Skogan, W.: The Various Meanings of Fear, pp. 131\u2013140. Enke (1993)"},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1080\/136698798377231","volume":"1","author":"A Boholm","year":"1998","unstructured":"Boholm, A.: Comparative studies of risk perception: a review of twenty years of research. J. Risk Res. 1(2), 135\u2013163 (1998)","journal-title":"J. Risk Res."},{"issue":"21","key":"9_CR5","doi-asserted-by":"publisher","first-page":"4654","DOI":"10.3390\/s19214654","volume":"19","author":"JC Pereira-Kohatsu","year":"2019","unstructured":"Pereira-Kohatsu, J.C., Quijano-S\u00e1nchez, L., Liberatore, F., Camacho-Collados, M.: Detecting and monitoring hate speech in twitter. Sensors 19(21), 4654 (2019)","journal-title":"Sensors"},{"issue":"1","key":"9_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/s41599-019-0368-9","volume":"6","author":"RP Curiel","year":"2020","unstructured":"Curiel, R.P., Cresci, S., Muntean, C.I., Bishop, S.R.: Crime and its fear in social media. Palgrave Commun. 6(1), 1\u201312 (2020)","journal-title":"Palgrave Commun."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Rizoiu, M.A., Lee, Y., Mishra, S., Xie, L.: A tutorial on hawkes processes for events in social media. arXiv preprint arXiv:1708.06401 (2017)","DOI":"10.1145\/3122865.3122874"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Chaparro, L., et al.: Sentiment analysis of social network content to characterize the perception of security. In: 2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 685\u2013691. IEEE Computer Society, Los Alamitos, December 2020","DOI":"10.1109\/ASONAM49781.2020.9381434"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Kobayashi, R., Lambiotte, R.: Tideh: time-dependent hawkes process for predicting retweet dynamics. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 10 (2016)","DOI":"10.1609\/icwsm.v10i1.14717"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Erdogdu, M.A., He, H.Y., Rajaraman, A., Leskovec, J.: Seismic: a self-exciting point process model for predicting tweet popularity. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1513\u20131522 (2015)","DOI":"10.1145\/2783258.2783401"},{"issue":"3","key":"9_CR11","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1002\/jcop.22330","volume":"49","author":"M Brown","year":"2020","unstructured":"Brown, M., Dustman, P., Barthelemy, J.: Twitter impact on a community trauma: an examination of who, what, and why it radiated. J. Community Psychol. 49(3), 838\u2013853 (2020)","journal-title":"J. Community Psychol."},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-00528-2_7","volume-title":"Advances in Web Mining and Web Usage Analysis","author":"A Java","year":"2009","unstructured":"Java, A., Song, X., Finin, T., Tseng, B.: Why we twitter: an analysis of a microblogging community. In: Zhang, H., et al. (eds.) SNAKDD\/WebKDD -2007. LNCS (LNAI), vol. 5439, pp. 118\u2013138. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00528-2_7"},{"key":"9_CR13","unstructured":"Reinhart, A.: Point process modeling with spatiotemporal covariates for predicting crime. Ph.D. thesis, Carnegie Mellon University (2016)"},{"issue":"2203","key":"9_CR14","doi-asserted-by":"publisher","first-page":"20170156","DOI":"10.1098\/rspa.2017.0156","volume":"473","author":"R Prieto Curiel","year":"2017","unstructured":"Prieto Curiel, R., Bishop, S.: Modelling the fear of crime. Proc. Roy. Soc. A: Mathe. Phys. Eng. Sci. 473(2203), 20170156 (2017)","journal-title":"Proc. Roy. Soc. A: Mathe. Phys. Eng. Sci."},{"issue":"399","key":"9_CR15","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1080\/01621459.1987.10478502","volume":"82","author":"JF Lawless","year":"1987","unstructured":"Lawless, J.F.: Regression methods for poisson process data. J. Am. Stat. Assoc. 82(399), 808\u2013815 (1987)","journal-title":"J. Am. Stat. Assoc."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93420-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T01:03:20Z","timestamp":1768266200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93420-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030934194","9783030934200"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93420-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"13 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CIARP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberoamerican Congress on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ciarp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ciarp2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"82","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}