{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:44:39Z","timestamp":1767138279011,"version":"build-2238731810"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811064265","type":"print"},{"value":"9789811064272","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_13","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T06:32:16Z","timestamp":1506148336000},"page":"150-160","source":"Crossref","is-referenced-by-count":0,"title":["An Approach to Build a Database for Crimes in India Using Twitter"],"prefix":"10.1007","author":[{"given":"Ranu","family":"Sinha","sequence":"first","affiliation":[]},{"given":"Mohit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Saptarsi","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Wang, X., Brown, D., Gerber, M.: Spatio-temporal modelling of criminal incidents using geographic, demographic, and twitter-derived information. In: Intelligence and Security Informatics. IEEE Press (2012)","DOI":"10.1109\/ISI.2012.6284088"},{"key":"13_CR2","unstructured":"Goswami, S., Saha, U., Bose, S.: An information management system for crime against women in India from news: a big data solution. Data Mining Knowl. Eng. 8(2), 48\u201357 (2016)"},{"issue":"2","key":"13_CR3","first-page":"47","volume":"II","author":"S Chakravorty","year":"2015","unstructured":"Chakravorty, S., Daripa, S., Saha, U., Bose, S., Goswami, S., Mitra, S.: Data mining techniques for analyzing murder related structured and unstructured data. Am. J. Adv. Comput. II(2), 47\u201354 (2015)","journal-title":"Am. J. Adv. Comput."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"De Bruin, J.S., et al.: Data mining approaches to criminal career analysis. In: Data Mining (2006)","DOI":"10.1109\/ICDM.2006.47"},{"key":"13_CR5","unstructured":"Barnawal, A.K., Choudhary, G.K., Swarnim, R., Kedia, A., Goswami, S., Das, A.K.: Application of twitter in health care sector for India. In: 3rd International Conference on Recent Advances in Information Technology (RAIT). IEEE (2016)"},{"key":"13_CR6","unstructured":"Kumar, S., Maskara, S., Chandak, N., Goswami, S.: Empirical study of relationship between twitter mood and stock market from an Indian context. Int. J. Appl. Inf. Syst. 8(7), 1\u20135 (2015)"},{"key":"13_CR7","unstructured":"Chen, R., Lazer, M.: Sentiment analysis of twitter feeds for the prediction of stock market movement (2013)"},{"key":"13_CR8","unstructured":"Kagan, V., Stevens, A., Subrahmanian, V.S.: Using twitter sentiment to forecast the 2013 Pakistani election and the 2014 Indian election. IEEE Intell. Syst. 30(1), 2\u20135 (2015)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Duffy, A., Freelon, D., Hussain, M., Mari, W., Mazaid, M.: Opening closed regimes: what was the role of social media during the Arab Spring? Technical report, Project on Information Technology and Political Islam, University of Washington, Seattle (2011)","DOI":"10.2139\/ssrn.2595096"},{"key":"13_CR10","unstructured":"R Development Core Team: R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria (2008). ISBN 3-900051-07-0"},{"key":"13_CR11","unstructured":"Kearney, M.W.: rtweet. [Package rtweet version 0.2.4] (2016). https:\/\/CRAN.R-project.org\/package=rtweet"},{"key":"13_CR12","unstructured":"Hornik, K.: NLP-Natural Language Processing Infrastructure (2016). https:\/\/CRAN.R-project.org\/package=NLP"},{"key":"13_CR13","unstructured":"https:\/\/www.emarketer.com\/Article\/Asia-Pacific-Grabs-Largest-Twitter-User-Share-Worldwide\/1010905"},{"key":"13_CR14","unstructured":"Hornik, K.: openNLP. https:\/\/cran.r-project.org\/web\/packages\/openNLP\/index.html"},{"key":"13_CR15","unstructured":"https:\/\/fcw.com\/articles\/2012\/09\/24\/fedlist-most-followed-agencies-on-twitter.aspx (2016)"},{"key":"13_CR16","unstructured":"Mishra1, A.J., Patel, A.B.: Crimes against the elderly in India: a content analysis on factors causing fear of crime. Int. J. Crim. Justice Sci. 8(1), 13\u201323 (2013)"},{"key":"13_CR17","unstructured":"Gupta, M., Chandra, B., Gupta, M.P.: Crime Data Mining for Indian Police Information System. Computer Society of India"},{"key":"13_CR18","unstructured":"Hussain, K.Z., Durairaj, M., Farzana, G.R.J.: Criminal behavior analysis by using data mining techniques. In: IEEE-International Conference on Advances in Engineering, Science and Management (2012)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Tayal, D.K., Jain, A., Arora, S., Agarwal, S., Gupta, T., Tyagi, N.: Crime detection and criminal identification in India using data mining techniques. J. Knowl. Culture Commun. 30(1), 117\u2013127 (2015). AI & SOCIETY","DOI":"10.1007\/s00146-014-0539-6"},{"key":"13_CR20","unstructured":"Renushe, H.N., Rasal, P.R., Desai, A.S.: Data mining practices for effective investigation of crime. Int. J. Comput. Technol. Appl. 3(3), 865\u2013870 (2012)"},{"key":"13_CR21","unstructured":"Bajpai, D.: Emerging trends in utilization of data mining in criminal investigation: an overview. J. Environ. Sci. Comput. Sci. Eng. Technol. 2, 124\u2013131(2012)"}],"updated-by":[{"DOI":"10.1007\/978-981-10-6427-2_47","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T00:00:00Z","timestamp":1517270400000}}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T18:07:58Z","timestamp":1570126078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}