{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:12:02Z","timestamp":1760044322717,"version":"3.41.2"},"reference-count":40,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T00:00:00Z","timestamp":1479081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSIT"],"published-print":{"date-parts":[[2016,11,14]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>A number of crisis situations, such as natural disasters, have affected the planet over the past decade. The outcomes of such disasters are catastrophic for the infrastructures of modern societies. Furthermore, after large disasters, societies come face-to-face with important issues, such as the loss of human lives, people who are missing and the increment of the criminality rate. In many occasions, they seem unprepared to face such issues. This paper aims to present an automated social media and crowdsourcing data mining system for the synchronization of the police and law enforcement agencies for the prevention of criminal activities during and post a large crisis situation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper realized qualitative research in the form of a review of the literature. This review focuses on the necessity of using social media and crowdsourcing data mining techniques in combination with advanced Web technologies for the purpose of providing solutions to problems related to criminal activities caused during and after a crisis. The paper presents the ATHENA crisis management system, which uses a number of data mining techniques to collect and analyze crisis-related data from social media for the purpose of crime prevention.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Conclusions are drawn on the significance of social media and crowdsourcing data mining techniques for the resolution of problems related to large crisis situations with emphasis to the ATHENA system.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The paper shows how the integrated use of social media and data mining algorithms can contribute in the resolution of problems that are developed during and after a large crisis.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jsit-06-2016-0039","type":"journal-article","created":{"date-parts":[[2016,11,18]],"date-time":"2016-11-18T13:11:13Z","timestamp":1479474673000},"page":"364-382","source":"Crossref","is-referenced-by-count":24,"title":["A social media and crowdsourcing data mining system for crime prevention during and post-crisis situations"],"prefix":"10.1108","volume":"18","author":[{"given":"Konstantinos","family":"Domdouzis","sequence":"first","affiliation":[]},{"given":"Babak","family":"Akhgar","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Andrews","sequence":"additional","affiliation":[]},{"given":"Helen","family":"Gibson","sequence":"additional","affiliation":[]},{"given":"Laurence","family":"Hirsch","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"4","key":"key2020121121591779400_ref001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5120\/14433-2579","article-title":"Crime analysis using K-means clustering","volume":"83","year":"2013","journal-title":"International Journal of Computer Applications (0975-8887)"},{"issue":"4","key":"key2020121121591779400_ref002","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s11633-012-0665-x","article-title":"A novel feature selection framework for automatic web page classification","volume":"9","year":"2012","journal-title":"International Journal of Automation and Computing"},{"issue":"5","key":"key2020121121591779400_ref004","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1002\/bult.2010.1720360510","article-title":"Communities communicating with formal and informal systems: being more resilient in times of need","volume":"36","year":"2010","journal-title":"Bulletin of the American Society for Information Science & Technology"},{"key":"key2020121121591779400_ref005","unstructured":"Belavkin, R.V. (2014), Lecture 7: Formal Concept Analysis, BIS4410 \u2013 Knowledge Management Strategies at Middlesex University London, available at: www.eis.mdx.ac.uk\/staffpages\/rvb\/teaching\/BIS4410\/hand07.pdf (accessed 19 May 2016)."},{"key":"key2020121121591779400_ref006","unstructured":"Berg, L.A. (2010), \u201cCrime, politics and violence in post-earthquake Haiti\u201d, available at: www.usip.org\/sites\/default\/files\/PB%2058%20-%20Crime%20Politics%20and%20Violence%20in%20Post-Earthquake%20Haiti.pdf (accessed 10 August 2015)."},{"key":"key2020121121591779400_ref007","doi-asserted-by":"crossref","unstructured":"Berrebi, C. and Ostwald, J. (2011), \u201cEarthquakes, hurricanes, and terrorism - do natural disasters incite terror? Rand labor and population\u201d, available at: www.rand.org\/content\/dam\/rand\/pubs\/working_papers\/2011\/RAND_WR876.pdf (accessed 10 August 2015).","DOI":"10.7249\/WR876"},{"key":"key2020121121591779400_ref008","unstructured":"Bjelopera, J.P. and Finklea, K.M. (2012), \u201cOrganized crime: an evolving challenge for US law enforcement\u201d, CRS Report for Service, pp. 137-177, available at: www.fas.org\/sgp\/crs\/misc\/R41547.pdf (accessed 10 August 2015)."},{"issue":"1","key":"key2020121121591779400_ref009","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1177\/1354856507084420","article-title":"Crowdsourcing as a model for problem solving \u2013 an introduction and cases","volume":"14","year":"2008","journal-title":"Convergence: The International Journal of Research into New Media Technologies"},{"first-page":"1","article-title":"Crime data mining: an overview and case studies","year":"2003","key":"key2020121121591779400_ref010"},{"issue":"4","key":"key2020121121591779400_ref011","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.1297301","article-title":"Crime data mining: a general framework and some examples","volume":"37","year":"2004","journal-title":"Computer: IEEE Computer Society"},{"issue":"11","key":"key2020121121591779400_ref012","first-page":"1467","article-title":"Finding related pages in the World Wide Web","volume":"31","year":"1999","journal-title":"Computer Networks"},{"issue":"4","key":"key2020121121591779400_ref014","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2436256.2436274","article-title":"Techniques and applications for sentiment analysis","volume":"56","year":"2013","journal-title":"Communications of the ACM"},{"key":"key2020121121591779400_ref015","unstructured":"Gibbs, M. (2015), \u201cBig data and intelligence: minimizing or preventing violence against citizens and the destruction of property\u201d, available at: www.networkworld.com\/article\/2923045\/security0\/big-data-and-intelligence-minimizing-or-preventing-violence-against-citizens-and-the-destruction-of.html (accessed 11 August 2015)."},{"first-page":"202","article-title":"Combining big social media data and FCA for crisis response","year":"2014","key":"key2020121121591779400_ref016"},{"key":"key2020121121591779400_ref017","first-page":"784","article-title":"Topic-sensitive pagerank: a context-sensitive ranking algorithm for web search","year":"2003","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"key2020121121591779400_ref018","unstructured":"Howe, J. (2006), \u201cCrowdsourcing: a definition\u201d, available at: http:\/\/crowdsourcing.typepad.com\/cs\/2006\/06\/crowdsourcing_a.html (accessed 19 July 2015)."},{"issue":"1","key":"key2020121121591779400_ref019","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","article-title":"Users of the world, unite! The challenges and opportunities of social media","volume":"53","year":"2010","journal-title":"Business Horizons"},{"issue":"2","key":"key2020121121591779400_ref020","first-page":"87","article-title":"Organized crime, situational crime prevention and routine activity theory","volume":"15","year":"2012","journal-title":"Trends in Organized Crime"},{"volume-title":"Text Mining and Cybercrime In Text Mining: Application and Theory","year":"2009","key":"key2020121121591779400_ref021"},{"volume-title":"Sentiment Analysis and Opinion Mining","year":"2012","key":"key2020121121591779400_ref022"},{"issue":"1","key":"key2020121121591779400_ref024","doi-asserted-by":"crossref","first-page":"32","DOI":"10.21061\/jots.v32i1.a.5","article-title":"Technology-enabled crime, policing, and security","volume":"32","year":"2006","journal-title":"Journal of Technology Studies"},{"year":"2003","key":"key2020121121591779400_ref025","article-title":"Sentiment analysis: capturing favorability using natural language processing"},{"issue":"4","key":"key2020121121591779400_ref027","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.diin.2005.11.004","article-title":"Criminal profiling and insider cybercrime","volume":"2","year":"2005","journal-title":"Digital Investigation"},{"issue":"5","key":"key2020121121591779400_ref028","first-page":"467","article-title":"Crisis in a networked world: features of computer-mediated communication in the April 16, 2007, VA Tech event","volume":"27","year":"2009","journal-title":"Social Science Computer Review: Special Issue on e-Social Science"},{"article-title":"The intelligent surfer: probabilistic combination of link and content information in pagerank","volume-title":"Advances in Neural Information Processing Systems","year":"2002","key":"key2020121121591779400_ref029"},{"issue":"5","key":"key2020121121591779400_ref030","doi-asserted-by":"crossref","first-page":"804","DOI":"10.3844\/jcssp.2012.804.808","article-title":"Normalized web distance based web query classification","volume":"8","year":"2012","journal-title":"Journal of Computer Science"},{"issue":"2","key":"key2020121121591779400_ref032","first-page":"18","article-title":"Sentiment analysis: a review and comparative analysis of web services","volume":"311","year":"2015","journal-title":"Information Sciences"},{"first-page":"521","article-title":"Crowdsafe: crowd sourcing of crime incidents and safe routing on mobile devices","year":"2011","key":"key2020121121591779400_ref033"},{"issue":"2","key":"key2020121121591779400_ref034","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1108\/13287260710839247","article-title":"An approach to sustainability for information systems","volume":"9","year":"2007","journal-title":"Emerald Journal of Systems and Information Technology (JSIT)"},{"issue":"2","key":"key2020121121591779400_ref035","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1108\/13287261211232171","article-title":"Exploring uses of social media in a global corporation","volume":"14","year":"2012","journal-title":"Emerald Journal of Systems and Information Technology (JSIT)"},{"key":"key2020121121591779400_ref037","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11528784_1","article-title":"Formal concept analysis as mathematical theory of concepts and concept hierarchies","volume":"3626","year":"2005","journal-title":"Formal Concept Analysis"},{"key":"key2020121121591779400_ref038","doi-asserted-by":"crossref","first-page":"7987","DOI":"10.1016\/j.eswa.2014.06.044","article-title":"Brief survey of crowdsourcing for data mining","volume":"41","year":"2014","journal-title":"Expert Systems with Applications"},{"first-page":"609","article-title":"Combining link- and text-based retrieval methods for web IR","year":"2002","key":"key2020121121591779400_ref039"},{"issue":"22","key":"key2020121121591779400_ref040","doi-asserted-by":"crossref","first-page":"2796","DOI":"10.1093\/eurheartj\/ehs288","article-title":"The great east Japan earthquake disaster and cardiovascular diseases","volume":"33","year":"2012","journal-title":"European Heart Journal"},{"issue":"4","key":"key2020121121591779400_ref041","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1924421.1924442","article-title":"Crowdsourcing systems on the world-wide web","volume":"54","year":"2011","journal-title":"Communications of the ACM"},{"issue":"5","key":"key2020121121591779400_ref042","doi-asserted-by":"crossref","first-page":"804","DOI":"10.3844\/jcssp.2012.804.808","article-title":"Normalized web distance based web query classification","volume":"8","year":"2012","journal-title":"Journal of Computer Science"},{"key":"key2020121121591779400_ref043","unstructured":"Nelson, A., Sigal, I. and Zambrano, D. (2015), \u201cMedia, information systems and communities: lessons from Haiti\u201d, available at: http:\/\/knightfoundation.org\/media\/uploads\/publication_pdfs\/KF_Haiti_Report_English.pdf (accessed 15 July 2015)."},{"key":"key2020121121591779400_ref044","unstructured":"Sahana Software Foundation (2014), \u201cVesuvius\u201d, available at: http:\/\/sahanafoundation.org\/products\/vesuvius (accessed 15 July 2015)."},{"year":"2009","key":"key2020121121591779400_ref045","article-title":"Using formal concept analysis to construct and visualise social hierarchies of software developers"},{"issue":"1","key":"key2020121121591779400_ref046","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.ijinfomgt.2010.10.001","article-title":"Emergency knowledge management and social media technologies: a case study of the 2010 Haitian earthquake","volume":"31","year":"2011","journal-title":"International Journal of Information Management"}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JSIT-06-2016-0039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-06-2016-0039\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-06-2016-0039\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:23:49Z","timestamp":1753395829000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/18\/4\/364-382\/250528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,14]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11,14]]}},"alternative-id":["10.1108\/JSIT-06-2016-0039"],"URL":"https:\/\/doi.org\/10.1108\/jsit-06-2016-0039","relation":{},"ISSN":["1328-7265"],"issn-type":[{"type":"print","value":"1328-7265"}],"subject":[],"published":{"date-parts":[[2016,11,14]]}}}