{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T07:25:44Z","timestamp":1775805944993,"version":"3.50.1"},"reference-count":86,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DTA"],"published-print":{"date-parts":[[2019,7,1]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to develop a methodology for knowledge discovery in emergency response service databases based on police occurrence reports, generating information to help law enforcement agencies plan actions to investigate and combat criminal activities.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The developed model employs a methodology for knowledge discovery involving text mining techniques and uses latent Dirichlet allocation (LDA) with collapsed Gibbs sampling to obtain topics related to crime.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The method used in this study enabled identification of the most common crimes that occurred in the period from 1 January to 31 December of 2016. An analysis of the identified topics reaffirmed that crimes do not occur in a linear manner in a given locality. In this study, 40 per cent of the crimes identified in integrated public safety area 5, or AISP 5 (the historic centre of the city of RJ), had no correlation with AISP 19 (Copacabana \u2013 RJ), and 33 per cent of the crimes in AISP 19 were not identified in AISP 5.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The collected data represent the social dynamics of neighbourhoods in the central and southern zones of the city of Rio de Janeiro during the specific period from January 2013 to December 2016. This limitation implies that the results cannot be generalised to areas with different characteristics.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The developed methodology contributes in a complementary manner to the identification of criminal practices and their characteristics based on police occurrence reports stored in emergency response databases. The generated knowledge enables law enforcement experts to assess, reformulate and construct differentiated strategies for combating crimes in a given locality.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title>\n<jats:p>The production of knowledge from the emergency service database contributes to the government integrating information with other databases, thus enabling the improvement of strategies to combat local crime. The proposed model contributes to research on big data, on the innovation aspect and on decision support, for it breaks with a paradigm of analysis of criminal information.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The originality of the study lies in the integration of text mining techniques and LDA to detect crimes in a given locality on the basis of the criminal occurrence reports stored in emergency response service databases.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/dta-12-2018-0109","type":"journal-article","created":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T06:54:47Z","timestamp":1566284087000},"page":"333-372","source":"Crossref","is-referenced-by-count":19,"title":["Identification of operational demand in law enforcement agencies"],"prefix":"10.1108","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9453-741X","authenticated-orcid":false,"given":"Marcio Pereira","family":"Basilio","sequence":"first","affiliation":[]},{"given":"Valdecy","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Gabrielle","family":"Brum","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"2","key":"key2019090208500755000_ref001","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1111\/1745-9125.12104","article-title":"A theory of crime resistance and susceptibility","volume":"54","year":"2016","journal-title":"Criminology"},{"issue":"2","key":"key2019090208500755000_ref002","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1504\/IJBIS.2015.067261","article-title":"Text data mining: a proposed framework and future perspectives","volume":"18","year":"2015","journal-title":"International Journal of Business Information Systems"},{"issue":"2","key":"key2019090208500755000_ref003","doi-asserted-by":"crossref","first-page":"16","DOI":"10.4018\/jdcf.2011040102","article-title":"Towards the ordering of events from multiple textual evidence sources","volume":"3","year":"2011","journal-title":"International Journal of Digital Crime and Forensics"},{"issue":"3","key":"key2019090208500755000_ref004","first-page":"236","article-title":"Precision rate in the information retrieval process: the use of text mining","volume":"35","year":"2006","journal-title":"Ci\u00eancia da Informa\u00e7\u00e3o"},{"issue":"2","key":"key2019090208500755000_ref005","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1057\/sj.2013.3","article-title":"Automating social network analysis: a power tool for counter-terrorism","volume":"29","year":"2016","journal-title":"Security Journal"},{"issue":"2","key":"key2019090208500755000_ref006","first-page":"121","article-title":"A Survey of text mining concepts","volume":"5","year":"2015","journal-title":"International Journal of Innovations in Engineering and Technology"},{"issue":"1","key":"key2019090208500755000_ref007","first-page":"106","article-title":"Classifying the integrated public safety areas (IPSAs): a multi-criteria based approach","volume":"14","year":"2018","journal-title":"Journal of Modelling in Management"},{"key":"key2019090208500755000_ref008","volume-title":"Police for the Future","year":"1994"},{"issue":"2","key":"key2019090208500755000_ref009","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1590\/1981-5344\/1834","article-title":"Minera\u00e7\u00e3o de texto aplicada \u00e0s publica\u00e7\u00f5es cient\u00edficas sobre gest\u00e3o do conhecimento no per\u00edodo de 2003 a 2012","volume":"19","year":"2014","journal-title":"Perspectivas em Ci\u00eancia da Informa\u00e7\u00e3o"},{"issue":"5","key":"key2019090208500755000_ref010","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1177\/1477370815600609","article-title":"The international classification of crime for statistical purposes: a new instrument to improve comparative criminological research","volume":"12","year":"2015","journal-title":"European Journal of Criminology"},{"key":"key2019090208500755000_ref011","article-title":"Introduction to probabilistic topic models","year":"2011","journal-title":"Communications of the ACM"},{"issue":"4","key":"key2019090208500755000_ref012","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/2133806.2133826","article-title":"Probabilistic topic models","volume":"55","year":"2012","journal-title":"Communications of the ACM"},{"key":"key2019090208500755000_ref013","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","year":"2003","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"key2019090208500755000_ref014","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1177\/000271620157800107","article-title":"The effects of hot spots policing on crime","volume":"578","year":"2001","journal-title":"The Annals of the American Academy of Political and Social Science"},{"issue":"3","key":"key2019090208500755000_ref015","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s11292-005-8133-z","article-title":"Hot spots policing and crime prevention: a systematic review of randomized controlled trials","volume":"1","year":"2005","journal-title":"Journal of Experimental Criminology"},{"issue":"3","key":"key2019090208500755000_ref016","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1111\/j.1745-9125.1999.tb00496.x","article-title":"Problem-oriented policing in violent crime places: a randomized controlled experiment","volume":"37","year":"1999","journal-title":"Criminology"},{"issue":"2","key":"key2019090208500755000_ref017","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TITS.2015.2472580","article-title":"Text mining the contributors to rail accidents","volume":"17","year":"2016","journal-title":"IEEE Intelligent Transportation Systems Society"},{"issue":"3","key":"key2019090208500755000_ref018","doi-asserted-by":"crossref","first-page":"697","DOI":"10.3233\/IDA-170883","article-title":"Forecasting, clustering and patrolling criminal activities","volume":"21","year":"2017","journal-title":"Intelligent Data Analysis"},{"issue":"1","key":"key2019090208500755000_ref019","first-page":"9","article-title":"The cognitive power of artificial neural networks model ART1 for information retrieval","volume":"38","year":"2009","journal-title":"Ci\u00eancia da Informa\u00e7\u00e3o"},{"key":"key2019090208500755000_ref020","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2017.04.006","article-title":"Forum latent Dirichlet allocation for user interest discovery","volume":"126","year":"2017","journal-title":"Knowledge-Based Systems"},{"issue":"2","key":"key2019090208500755000_ref021","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1002\/asi.22767","article-title":"A text mining approach to assist the general public in the retrieval of legal documents","volume":"64","year":"2013","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2019090208500755000_ref022","doi-asserted-by":"crossref","unstructured":"Correia, A. and Gon\u00e7alves, A. (2017), \u201cTopics discovery in text mining\u201d, in Rocha, \u00c1., Correia, A., Adeli, H., Reis, L. and Costanzo, S. (Eds), Recent Advances in Information Systems and Technologies, 5th World Conference on Information Systems and Technologies, Vol. 569, Springer-Verlag, Porto Santo Island, pp. 251-256.","DOI":"10.1007\/978-3-319-56535-4_25"},{"key":"key2019090208500755000_ref023","volume-title":"Nova gram\u00e1tica do portugu\u00eas contempor\u00e2neo","year":"2001","edition":"3rd ed."},{"key":"key2019090208500755000_ref300","article-title":"A theoretical and practical implementation tutorial on topic modeling and gibbs sampling","year":"2011"},{"key":"key2019090208500755000_ref024","first-page":"1127","article-title":"Deep learning for financial sentiment analysis on finance news providers","year":"2016"},{"key":"key2019090208500755000_ref025","first-page":"557","article-title":"Email analytics for activity management and insight discovery","year":"2013"},{"issue":"5","key":"key2019090208500755000_ref026","doi-asserted-by":"crossref","first-page":"2739","DOI":"10.1007\/s11135-013-9921-6","article-title":"Inference of the Russian drug community from one of the largest social networks in the Russian Federation","volume":"48","year":"2014","journal-title":"Quality & Quantity"},{"key":"key2019090208500755000_ref027","unstructured":"Elkan, C.P. (2014), \u201cText mining and topic models.available at: http:\/\/cseweb.ucsd.edu\/~elkan\/250B\/topicmodels.pdf (accessed 10 June 2017)."},{"key":"key2019090208500755000_ref028","unstructured":"Faleiros, T.D. and Lopes, A.D. (2016), \u201cProbabilistic models of topics: desvending the latent Dirichlet allocation\u201d, Technical Report No. 409, Instituto de Ci\u00eancias Matem\u00e1ticas e de Computa\u00e7\u00e3o, Universidade de S\u00e3o Paulo, S\u00e3o Carlos."},{"issue":"9","key":"key2019090208500755000_ref029","first-page":"77","article-title":"Tapping the power of text mining","volume":"49","year":"2006","journal-title":"Communications of the ACM"},{"issue":"5","key":"key2019090208500755000_ref301","first-page":"1","article-title":"Text mining infrastructure in R","volume":"25","year":"2008","journal-title":"Journal of Statistical Software"},{"key":"key2019090208500755000_ref030","unstructured":"Feldman, R. and Dagan, I. (1995), \u201cKnowledge discovery in textual databases (KDT)\u201d, in Fayyad, U. and Uthurusamy, R. (Eds), The First International Conference on Knowledge Discovery and Data Mining, AAAI Press, Montreal, pp. 112-117."},{"key":"key2019090208500755000_ref031","volume-title":"The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data","year":"2007"},{"issue":"3","key":"key2019090208500755000_ref032","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1023\/A:1008623632443","article-title":"Mining text using keyword distributions","volume":"10","year":"1998","journal-title":"Journal of Intelligent Information Systems"},{"issue":"1","key":"key2019090208500755000_ref033","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1177\/1534765608315632","article-title":"A digital library for recovery, research, and learning from April 16, 2007, at Virginia Tech","volume":"14","year":"2008","journal-title":"Traumatology"},{"issue":"2","key":"key2019090208500755000_ref034","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3846\/tede.2010.14","article-title":"Text and data mining techniques in aspect of knowledge acquisition for decision support system in construction industry","volume":"16","year":"2010","journal-title":"Technological and Economic Development of Economy"},{"key":"key2019090208500755000_ref035","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.jocs.2017.01.001","article-title":"Assessing the usefulness of online message board mining in automatic stock prediction systems","volume":"19","year":"2017","journal-title":"Journal of Computational Science"},{"key":"key2019090208500755000_ref036","volume-title":"Problem-Oriented Policing","year":"1990"},{"issue":"2","key":"key2019090208500755000_ref037","first-page":"481","article-title":"Enhancing the digital data retrieval system","volume":"66","year":"2014","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"1","key":"key2019090208500755000_ref038","first-page":"5228","article-title":"Finding scientific topics","volume":"101","year":"2004","journal-title":"PNAS"},{"issue":"13","key":"key2019090208500755000_ref302","first-page":"1","article-title":"Topicmodels: an R package for fitting topic models","volume":"40","year":"2011","journal-title":"Journal of Statistical Software"},{"key":"key2019090208500755000_ref039","first-page":"147","article-title":"Text mining in \u2018request for comments document series\u2019","year":"2002"},{"issue":"2","key":"key2019090208500755000_ref040","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1111\/1745-9133.12303","article-title":"Overlapping hot spots? Examination of the spatial heterogeneity of hot spots of different crime types","volume":"16","year":"2017","journal-title":"Criminology and Public Policy"},{"issue":"4","key":"key2019090208500755000_ref041","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1108\/JFC-01-2016-0001","article-title":"Social media content and sentiment analysis on consumer security breaches","volume":"23","year":"2016","journal-title":"Journal of Financial Crime"},{"key":"key2019090208500755000_ref042","first-page":"2485","article-title":"A task-oriented framework for evaluating theme detection systems: a discussion paper","year":"2006"},{"key":"key2019090208500755000_ref043","doi-asserted-by":"crossref","unstructured":"Kaur, J., Yusof, M.F., Boursier, P. and Ogier, J.M. (2010), \u201cAutomated scientific document retrieval\u201d, in Tony, M. and Nicholas, S. (Eds), 2nd International Conference on Computer and Automation Engineering, IEEE, Singapore, pp. 732-736.","DOI":"10.1109\/ICCAE.2010.5451344"},{"issue":"2","key":"key2019090208500755000_ref044","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.techfore.2007.11.005","article-title":"Literature-related discovery (LRD): potential treatments for Raynaud\u2019s phenomenon","volume":"75","year":"2008","journal-title":"Technological Forecasting and Social Change"},{"issue":"4","key":"key2019090208500755000_ref045","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.giq.2014.08.003","article-title":"A decision support system: automated crime report analysis and classification for e-government","volume":"31","year":"2014","journal-title":"Government Information Quarterly"},{"issue":"2","key":"key2019090208500755000_ref046","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.compedu.2012.01.017","article-title":"Knowledge maps for e-learning","volume":"59","year":"2012","journal-title":"Computers & Education"},{"issue":"6","key":"key2019090208500755000_ref047","doi-asserted-by":"crossref","first-page":"7864","DOI":"10.1016\/j.eswa.2010.12.114","article-title":"Development of a patent retrieval and analysis platform \u2013 a hybrid approach","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"key2019090208500755000_ref303","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSWIS.2017010101","article-title":"Big data and data analytics research: from metaphors to value space for collective wisdom in human decision making and smart machines","volume":"13","year":"2017","journal-title":"International Journal on Semantic Web and Information Systems (IJSWIS)"},{"issue":"2-3","key":"key2019090208500755000_ref048","first-page":"107","article-title":"Introduction to the special issue on bibliometric-enhanced information retrieval and natural language processing for digital libraries (BIRNDL)","volume":"19","year":"2017","journal-title":"International Journal on Digital Libraries"},{"issue":"4","key":"key2019090208500755000_ref049","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1016\/j.asej.2014.04.011","article-title":"Sentiment analysis algorithms and applications: a survey","volume":"5","year":"2014","journal-title":"Ain Shams Engineering Journal"},{"key":"key2019090208500755000_ref050","unstructured":"Morais, E. and Ambr\u00f3sio, A. (2007), \u201cMinera\u00e7\u00e3o de Textos\u201d, Technical Report \u2013 INF_005\/07, Instituto de Inform\u00e1tica, Universidade Federal de Goi\u00e1s, Goiania."},{"issue":"3","key":"key2019090208500755000_ref051","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1080\/15614263.2012.674300","article-title":"Myth and reality: interpreting the dynamics of crime trends: lies, damn lies and (criminal) statistics","volume":"14","year":"2013","journal-title":"Police Practice and Research"},{"issue":"10","key":"key2019090208500755000_ref052","first-page":"769","article-title":"Unify framework for crime data summarization using RSS feed service","volume":"14","year":"2017","journal-title":"Walailak Journal of Science & Technology"},{"issue":"12","key":"key2019090208500755000_ref053","doi-asserted-by":"crossref","first-page":"10583","DOI":"10.1016\/j.eswa.2012.02.138","article-title":"Soft computing based imputation and hybrid data and text mining: the case of predicting the severity of phishing alerts","volume":"39","year":"2012","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"key2019090208500755000_ref054","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/s00146-015-0596-5","article-title":"Digital technologies and artificial intelligence\u2019s present and foreseeable impact on lawyering, judging, policing and law enforcement","volume":"32","year":"2017","journal-title":"AI & Society"},{"issue":"3","key":"key2019090208500755000_ref055","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.pec.2017.09.014","article-title":"Contents of Japanese pro- and anti-HPV vaccination websites: a text mining analysis","volume":"101","year":"2018","journal-title":"Patient Education and Counseling"},{"issue":"4","key":"key2019090208500755000_ref056","doi-asserted-by":"crossref","first-page":"3116","DOI":"10.1016\/j.eswa.2010.08.103","article-title":"Formally analysing the concepts of domestic violence","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"issue":"9","key":"key2019090208500755000_ref057","doi-asserted-by":"crossref","first-page":"11864","DOI":"10.1016\/j.eswa.2009.04.027","article-title":"Gaining insight in domestic violence with emergent self organizing maps","volume":"36","year":"2009","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"key2019090208500755000_ref058","first-page":"1","article-title":"Big data analytics for security and criminal investigations","volume":"7","year":"2017","journal-title":"WIREs Data Mining and Knowledge Discovery"},{"key":"key2019090208500755000_ref059","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.knosys.2016.01.030","article-title":"Multi-document summarization using closed patterns","volume":"99","year":"2016","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"key2019090208500755000_ref060","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1080\/19439962.2014.959585","article-title":"A novel approach to assessing road-curve crash severity","volume":"7","year":"2015","journal-title":"Journal of Transportation Safety & Security"},{"issue":"2","key":"key2019090208500755000_ref061","first-page":"1","article-title":"Enhancing multi-document summarization using concepts","volume":"43","year":"2018","journal-title":"Sadhana \u2013 Academy Proceedings in Engineering Sciences"},{"issue":"1","key":"key2019090208500755000_ref062","first-page":"101","article-title":"Computing similarity of text-based assembly processes for knowledge retrieval and reuse","volume":"39","year":"2016","journal-title":"Journal of Manufacturing Systems"},{"key":"key2019090208500755000_ref063","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.dss.2016.02.002","article-title":"A knowledge based scheme for risk assessment in loan processing by banks","volume":"84","year":"2016","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2019090208500755000_ref064","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1080\/07418829500096221","article-title":"General deterrent effects of police patrol in crime hot spots: a randomized controlled trial","volume":"12","year":"1995","journal-title":"Justice Quarterly"},{"issue":"1","key":"key2019090208500755000_ref065","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1111\/j.1745-9125.1989.tb00862.x","article-title":"Hot spots of predatory crime: routine activities and the criminology of place","volume":"27","year":"1989","journal-title":"Criminology"},{"key":"key2019090208500755000_ref066","article-title":"Preventing crime: what works, what doesn\u2019t, what\u2019s promising","year":"1998"},{"key":"key2019090208500755000_ref067","volume-title":"The New Blue Line: Police Innovation in Six American Cities","year":"1986"},{"key":"key2019090208500755000_ref068","volume-title":"PreTexT: a reestrutura\u00e7\u00e3o da ferramenta de pr\u00e9-processamento de textos","year":"2008"},{"issue":"6","key":"key2019090208500755000_ref069","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1016\/j.jadohealth.2016.07.025","article-title":"Data mining of web-based documents on social networking sites that included suicide-related words among Korean adolescents","volume":"59","year":"2016","journal-title":"Journal of Adolescent Health"},{"issue":"5","key":"key2019090208500755000_ref070","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1016\/j.ipm.2006.11.011","article-title":"Text mining techniques for patent analysis","volume":"43","year":"2007","journal-title":"Information Processing & Management"},{"issue":"11","key":"key2019090208500755000_ref071","doi-asserted-by":"crossref","first-page":"10082","DOI":"10.1016\/j.eswa.2012.02.052","article-title":"). Mining term networks from text collections for crime investigation","volume":"39","year":"2012","journal-title":"Expert Systems with Applications"},{"key":"key2019090208500755000_ref072","doi-asserted-by":"crossref","unstructured":"van Banerveld, M., Kechadi, M. and Le-Khac, N. (2016), \u201cA natural language processing tool for white collar crime investigation\u201d, in Hameurlain, A., K\u00fcng, J., Wagner, R., Dang, T. and Thoai, N. (Eds), Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII, Vol. 9480 Lecture Notes in Computer Science, Springer, Berlin and Heidelberg, pp. 1-22.","DOI":"10.1007\/978-3-662-49175-1_1"},{"key":"key2019090208500755000_ref073","doi-asserted-by":"crossref","unstructured":"Ven\u010dkauskas, A., Dama\u0161evi\u010dius, R., Marcinkevi\u010dius, R. and Karpavi\u010dius, A. (2015), \u201cProblems of authorship identification of the national language electronic discourse\u201d, in Dregvaite, G. and Damasevicius, R. (Eds), 1st International Conference on Information and Software Technologies Vol. 538, Springer-Verlag, Druskininkai, pp. 415-432.","DOI":"10.1007\/978-3-319-24770-0_36"},{"issue":"2","key":"key2019090208500755000_ref304","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1108\/JSTPM-02-2018-0020","article-title":"Rescaling and refocusing smart cities research: from mega cities to smart villages","volume":"9","year":"2018","journal-title":"Journal of Science and Technology Policy Management"},{"key":"key2019090208500755000_ref074","first-page":"1","article-title":"Distance variance score: an efficient feature selection method in text classification","volume":"2015","year":"2015","journal-title":"Mathematical Problems in Engineering"},{"key":"key2019090208500755000_ref075","first-page":"2","article-title":"Text mining for identifying topics in the literatures about adolescent substance use and depression","volume":"16","year":"2016","journal-title":"BMC Public Health"},{"issue":"1","key":"key2019090208500755000_ref076","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1177\/0002716203262548","article-title":"What can police do to reduce crime, disorder, and fear?","volume":"593","year":"2004","journal-title":"The Annals of the American Academy of Political and Social Science"},{"issue":"2","key":"key2019090208500755000_ref077","first-page":"29","article-title":"Challenges to supervision in community policing: observations on a pilot project","volume":"7","year":"1988","journal-title":"American Journal of Police"},{"key":"key2019090208500755000_ref078","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.knosys.2012.08.003","article-title":"Multi-aspect sentiment analysis for Chinese online social reviews based on topic modeling and HowNet lexicon","volume":"37","year":"2013","journal-title":"Knowledge-Based Systems"},{"key":"key2019090208500755000_ref079","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.cose.2016.11.002","article-title":"Modeling and analysis of identity threat behaviors through text mining of identity theft stories","volume":"65","year":"2017","journal-title":"Computers & Security"},{"issue":"1","key":"key2019090208500755000_ref080","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2049662.2049663","article-title":"The University of Florida sparse matrix collection","volume":"38","year":"2011","journal-title":"ACM Transactions on Mathematical Software"},{"issue":"1","key":"key2019090208500755000_ref081","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/62038.62043","article-title":"Sparse matrix test problems","volume":"15","year":"1989","journal-title":"ACM Transactions on Mathematical Software"}],"container-title":["Data Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/DTA-12-2018-0109\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/DTA-12-2018-0109\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:15:30Z","timestamp":1753398930000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/dta\/article\/53\/3\/333-372\/36805"}},"subtitle":["An application based on a probabilistic model of topics"],"short-title":[],"issued":{"date-parts":[[2019,7,1]]},"references-count":86,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,7,1]]}},"alternative-id":["10.1108\/DTA-12-2018-0109"],"URL":"https:\/\/doi.org\/10.1108\/dta-12-2018-0109","relation":{},"ISSN":["2514-9288"],"issn-type":[{"value":"2514-9288","type":"print"}],"subject":[],"published":{"date-parts":[[2019,7,1]]}}}