{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T04:51:46Z","timestamp":1758862306007,"version":"3.37.3"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Bank of National Investment Programs and Projects","award":["BPIN:2016000100036"],"award-info":[{"award-number":["BPIN:2016000100036"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3114675","type":"journal-article","created":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T20:03:29Z","timestamp":1632341009000},"page":"139201-139213","source":"Crossref","is-referenced-by-count":7,"title":["Quantifying Perception of Security Through Social Media and Its Relationship With Crime"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6570-9075","authenticated-orcid":false,"given":"Luisa Fernanda","family":"Chaparro","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0785-7683","authenticated-orcid":false,"given":"Cristian","family":"Pulido","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3432-8576","authenticated-orcid":false,"given":"Jorge","family":"Rudas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3331-4340","authenticated-orcid":false,"given":"Jorge","family":"Victorino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9128-8051","authenticated-orcid":false,"given":"Ana Maria","family":"Reyes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6595-7001","authenticated-orcid":false,"given":"Camilo","family":"Estrada","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4129-1687","authenticated-orcid":false,"given":"Luz Angela","family":"Narvaez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4553-5343","authenticated-orcid":false,"given":"Francisco","family":"Gomez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1057\/s41300-017-0015-6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2016.7580846"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-020-0430-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4324\/9781315114903"},{"key":"ref31","article-title":"Ideological differences in engagement in public debate on Twitter","author":"gaisbauer","year":"2020","journal-title":"arXiv 2009 01666"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0121848","article-title":"Exploring Twitter to analyze the public&#x2019;s reaction patterns to recently reported homicides in London","volume":"10","author":"kounadi","year":"2015","journal-title":"PLoS ONE"},{"key":"ref37","article-title":"Modelling the fear of crime","volume":"473","author":"curiel","year":"2017","journal-title":"Proc Roy Soc A Math Phys Eng Sci"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1111\/ssqu.12096"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/1057567715596048"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/esr\/jcq010"},{"article-title":"Data filtering and classification for the identification of texts related to security in Bogot&#x00E1;, Colombia","year":"0","author":"pulido","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2018.8745971"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1177\/1741659005057644"},{"key":"ref63","article-title":"Can big data provide good quality statistics? A case study on sentiment analysis on Twitter data","author":"biffignandi","year":"2018","journal-title":"Proc Int Total Surv Error Workshop Duke Initiat Surv Methodol (ITSEW-DISM)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/15230406.2014.905756"},{"key":"ref27","article-title":"Investigating crime-to-Twitter relationships in urban environments-facilitating a virtual neighborhood watch","author":"bendler","year":"2014","journal-title":"Proc ECIS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2018.03.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0962-6298(95)00053-D"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.bjc.a014203"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IC3IoT.2018.8668140"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/00220410910970276"},{"key":"ref21","first-page":"194","article-title":"Schwab, Klaus. The fourth industrial revolution. Ginebra: World economic forum, 2016, 172 pp","volume":"41","author":"lazo","year":"2018","journal-title":"Econom&#x00ED;a"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29047-3_28"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554600"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2015.7117012"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.31979\/etd.6jmu-9xdt","article-title":"Document classification using machine learning","author":"basarkar","year":"2017"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.07.003"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0207791"},{"journal-title":"Citizen security conceptual framework and empirical evidence","year":"2012","author":"bank","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1213\/ANE.0000000000002864"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1214\/009053607000000505"},{"journal-title":"Estad&#x00ED;stica Delictiva","year":"0","key":"ref55"},{"journal-title":"Sistema de Informaci&#x00F3;n Estad&#x00ED;stico Delincuencial Contravencional y Operativo de la Polic&#x00ED;a Nacional&#x2014;SIEDCO","year":"0","author":"seguridad","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_565"},{"key":"ref52","first-page":"685","article-title":"Sentiment analysis of social network content to characterize the perception of security","author":"chaparro","year":"2020","journal-title":"Proc IEEE\/ACM Int Conf Adv Social Netw Anal Mining (ASONAM)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/S1472669616000219"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1086\/268957"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/0011128710382263"},{"journal-title":"Encuesta de Percepci&#x00F3;n y Victimizaci&#x00F3;n","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00528-2_7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3239566"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/2056305119834595"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/jbdcn.2011070101"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.026"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0138441"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21149"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/13669870600813811"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/136698798377231"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0047-2352(02)00148-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/13218719.2020.1742235"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-016-0060-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.healthplace.2014.10.008"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"34","DOI":"10.9790\/0661-16153438","article-title":"Text classification by augmenting bag of words (BOW) representation with co-occurrence feature","volume":"16","author":"soumya","year":"2014","journal-title":"IOSR Journal of Computer Engineering"},{"key":"ref9","article-title":"Risk perception and behavior using in mobile security","volume":"5","author":"c bathma","year":"2018","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/lnco.362"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.31979\/etd.xyck-7nnx","article-title":"Clustering of Twitter technology tweets and the impact of stopwords on clusters","author":"bhagvat","year":"2011"},{"key":"ref48","first-page":"6","article-title":"Data mining: Accuracy and error measures for classification and prediction","author":"galdi","year":"2018","journal-title":"Encycl Bioinf Comput Biol"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"journal-title":"Country Security Report&#x2014;Colombia 2020 Crime&#x2014;Safety Report","year":"0","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.36.4.343"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2013.08.006"},{"article-title":"Security and sustainable development in Bogot&#x00E1;, Colombia","year":"2018","author":"godoy","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09546786.pdf?arnumber=9546786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:42Z","timestamp":1639770942000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9546786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3114675","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}