{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:08:04Z","timestamp":1743109684519,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031569975"},{"type":"electronic","value":"9783031569982"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56998-2_12","type":"book-chapter","created":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T08:01:50Z","timestamp":1711785710000},"page":"138-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sentiment Analysis of Crypto Currency Trading Applications in India Using Machine Learning"],"prefix":"10.1007","author":[{"given":"Gourav","family":"Vakare","sequence":"first","affiliation":[]},{"given":"Faraz","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Aaradhaya","family":"Naikwade","sequence":"additional","affiliation":[]},{"given":"Dipanshu","family":"Rautela","sequence":"additional","affiliation":[]},{"given":"Hemraj Shobharam","family":"Lamkuche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,31]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.joi.2009.01.003","volume":"3","author":"R Prabowo","year":"2009","unstructured":"Prabowo, R., Thelwall, M.: Sentiment analysis: a combined approach. J. Informetr. 3(2), 143\u2013157 (2009). https:\/\/doi.org\/10.1016\/j.joi.2009.01.003","journal-title":"J. Informetr."},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Gon\u00e7alves, P., Ara\u00fajo, M., Benevenuto, F., Cha, M.: Comparing and combining sentiment analysis methods. In: COSN 2013 - Proc. 2013 Conf. Online Soc. Networks, pp. 27\u201337 (2013). https:\/\/doi.org\/10.1145\/2512938.2512951","DOI":"10.1145\/2512938.2512951"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.procs.2016.05.124","volume":"87","author":"MD Devika","year":"2016","unstructured":"Devika, M.D., Sunitha, C., Ganesh, A.: Sentiment analysis: a comparative study on different approaches. Procedia Comput. Sci. 87, 44\u201349 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.05.124","journal-title":"Procedia Comput. Sci."},{"key":"12_CR4","unstructured":"Mejova, Y.: Sentiment Analysis\u202f: An Overview Comprehensive Exam Paper. Science (80), 1\u201334 (2009). http:\/\/www.cs.uiowa.edu\/~ymejova\/publications\/CompsYelenaMejova.pdf"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Zhang, L., Wang, S., Liu, B.: Deep learning for sentiment analysis: a survey. Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 8, no. 4 (2018). https:\/\/doi.org\/10.1002\/widm.1253","DOI":"10.1002\/widm.1253"},{"key":"12_CR6","doi-asserted-by":"publisher","unstructured":"Balapour, A., Nikkhah, H.R., Sabherwal, R.: Mobile application security: role of perceived privacy as the predictor of security perceptions. Int. J. Inf. Manage. 52 (2020). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.102063","DOI":"10.1016\/j.ijinfomgt.2019.102063"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Lero, A.R.S., Lero, J.B., Le Gear, A.: Privacy and security analysis of cryptocurrency mobile applications. In: 2019 5th Int. Conf. Mob. Secur. Serv. MOBISECSERV 2019, no. 1, pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/MOBISECSERV.2019.8686583","DOI":"10.1109\/MOBISECSERV.2019.8686583"},{"issue":"October","key":"12_CR8","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1063\/1.5005393","volume":"1891","author":"A Hussain","year":"2017","unstructured":"Hussain, A., Mkpojiogu, E.O.C., Musa, J., Mortada, S.: A user experience evaluation of Amazon Kindle mobile application. AIP Conf. Proc. 1891(October), 2017 (2017). https:\/\/doi.org\/10.1063\/1.5005393","journal-title":"AIP Conf. Proc."},{"issue":"4","key":"12_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.4018\/IJESMA.2020100102","volume":"12","author":"Y Elsantil","year":"2020","unstructured":"Elsantil, Y.: User perceptions of the security of mobile applications. Int. J. E-Services Mob. Appl. 12(4), 24\u201341 (2020). https:\/\/doi.org\/10.4018\/IJESMA.2020100102","journal-title":"Int. J. E-Services Mob. Appl."},{"key":"12_CR10","unstructured":"Dehlinger, J., Dixon, J.: Mobile application software engineering: challenges and research directions. Proc. Work. Mob. Softw. Eng., pp. 29\u201332 (2011). http:\/\/www.mobileseworkshop.org\/papers\/7_Dehlinger_Dixon.pdf"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Yang, W., Xiao, X., Pandita, R., Enck, W., Xie, T.: Improving mobile application security via bridging user expectations and application behaviors. In: ACM Int. Conf. Proceeding Ser., pp. 1\u20132 (2014). https:\/\/doi.org\/10.1145\/2600176.2600208","DOI":"10.1145\/2600176.2600208"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Assal, H.,  Hurtado, S.,  Imran, A., Chiasson, S.: What\u2019s the deal with privacy apps? A comprehensive exploration of user perception and usability. In: ACM Int. Conf. Proceeding Ser., vol. 30-November, pp. 25\u201336 (2015). https:\/\/doi.org\/10.1145\/2836041.2836044","DOI":"10.1145\/2836041.2836044"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Zhu, H., Xiong, H., Ge, Y., Chen, E.: Mobile app recommendations with security and privacy awareness. In: Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., pp. 951\u2013960 (2014). https:\/\/doi.org\/10.1145\/2623330.2623705","DOI":"10.1145\/2623330.2623705"},{"issue":"2","key":"12_CR14","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1108\/09685220910963983","volume":"17","author":"JC Roca","year":"2009","unstructured":"Roca, J.C., Garc\u00eda, J.J., de la Vega, J.J.: The importance of perceived trust, security and privacy in online trading systems. Inf. Manag. Comput. Secur.Manag. Comput. Secur. 17(2), 96\u2013113 (2009). https:\/\/doi.org\/10.1108\/09685220910963983","journal-title":"Inf. Manag. Comput. Secur.Manag. Comput. Secur."},{"issue":"1","key":"12_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5772\/51645","volume":"4","author":"E Fife","year":"2012","unstructured":"Fife, E., Orjuela, J.: The privacy calculus: mobile apps and user perceptions of privacy and security. Int. J. Eng. Bus. Manag. 4(1), 1 (2012). https:\/\/doi.org\/10.5772\/51645","journal-title":"Int. J. Eng. Bus. Manag."}],"container-title":["Communications in Computer and Information Science","Computing, Communication and Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56998-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T08:03:26Z","timestamp":1711785806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56998-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031569975","9783031569982"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56998-2_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CoCoLe","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computing, Communication and Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warangal","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cocole2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ic-cocole.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"120","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}