{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T18:52:49Z","timestamp":1775674369832,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T00:00:00Z","timestamp":1443398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,28]]},"DOI":"10.1145\/2815782.2815811","type":"proceedings-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T14:32:43Z","timestamp":1450449163000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["The use of Facebook by a Community Policing Forum to combat crime"],"prefix":"10.1145","author":[{"given":"M. J.","family":"Hattingh","sequence":"first","affiliation":[{"name":"Department of Informatics, University of Pretoria, South Africa, +2712 420 5322"}]}],"member":"320","published-online":{"date-parts":[[2015,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Civilian Secretariat for Police. \"Community Safety Forums Policy.\" N.d.  Civilian Secretariat for Police. \"Community Safety Forums Policy.\" N.d."},{"key":"e_1_3_2_1_2_1","volume-title":"Tel Aviv","author":"Bendler J.","year":"2014"},{"key":"e_1_3_2_1_3_1","volume-title":"National White Collar Crime Centre","author":"Boone J.","year":"2011"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_5_1","unstructured":"Brodie N. \"Guide: Understanding crime statistics in South Africa -- what you need to know.\" Africa Check. 2013. See more at: http:\/\/africacheck.org\/factsheets\/a-guide-to-crime-statistics-in-south-africa-what-you-need-to-know\/#sthash.ynpMjgQc.dpuf (accessed 06 04 2015).  Brodie N. \"Guide: Understanding crime statistics in South Africa -- what you need to know.\" Africa Check. 2013. See more at: http:\/\/africacheck.org\/factsheets\/a-guide-to-crime-statistics-in-south-africa-what-you-need-to-know\/#sthash.ynpMjgQc.dpuf (accessed 06 04 2015)."},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"120","article-title":"Teaching thematic analysis: Over-coming challenges and developing strategies for effective learning","volume":"26","author":"Clarke V.","year":"2013","journal-title":"The Psychologist"},{"key":"e_1_3_2_1_7_1","unstructured":"Dewing M. \"Social Media: An introduction.\" Publication No 2010-03E Ottawa Canada Library of Parliament.  Dewing M. \"Social Media: An introduction.\" Publication No 2010-03E Ottawa Canada Library of Parliament."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551512437638"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Featherstone C. \"Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime.\" Adaptive Science and Technology. 2013a.  Featherstone C. \"Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime.\" Adaptive Science and Technology. 2013a.","DOI":"10.1109\/ICASTech.2013.6707494"},{"key":"e_1_3_2_1_10_1","volume-title":"International Information Management Coorporation","author":"Featherstone C.","year":"2013"},{"key":"e_1_3_2_1_11_1","volume-title":"Helinski","author":"Fitzgerald B.","year":"1998"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Lee M. R. (2000). \"Community Cohesion and Violent Predatory Victimization: A Theoretical Extension.\" Social Forces 79 no. 2 (2000): 683--706.  Lee M. R. (2000). \"Community Cohesion and Violent Predatory Victimization: A Theoretical Extension.\" Social Forces 79 no. 2 (2000): 683--706.","DOI":"10.2307\/2675513"},{"key":"e_1_3_2_1_14_1","unstructured":"LexisNexis Risk Solutions. \"Survey of Law Enforcement Personnel and Their Use of Social Media.\" 2014.  LexisNexis Risk Solutions. \"Survey of Law Enforcement Personnel and Their Use of Social Media.\" 2014."},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"28","article-title":"Building a Network Theory of Social Capital","volume":"2","author":"Lin N.","year":"1999","journal-title":"Connections"},{"key":"e_1_3_2_1_16_1","unstructured":"Mayring P. \"Qualitative Content Analysis.\" Forum: Qualitative Social Research 1 no. 2 (2000).  Mayring P. \"Qualitative Content Analysis.\" Forum: Qualitative Social Research 1 no. 2 (2000)."},{"key":"e_1_3_2_1_17_1","unstructured":"McCullagh D. \"FBI seeks crowdsourcing help in Boston bombing case: ID these two men!\" CNET. 18 April 2013. http:\/\/www.cnet.com\/news\/fbi-seeks-crowdsourcing-help-in-boston-bombing-case-id-these-two-men\/ (accessed June 3 2015).  McCullagh D. \"FBI seeks crowdsourcing help in Boston bombing case: ID these two men!\" CNET. 18 April 2013. http:\/\/www.cnet.com\/news\/fbi-seeks-crowdsourcing-help-in-boston-bombing-case-id-these-two-men\/ (accessed June 3 2015)."},{"key":"e_1_3_2_1_18_1","first-page":"14","article-title":"Sense of Community: A definition and Theory","author":"McMillan D.","year":"1986","journal-title":"Journal of Community Psychology"},{"key":"e_1_3_2_1_19_1","volume-title":"Research and National Coordination Organized Crime Division Law Enforcement and Policy Branch Public Safety Canada","author":"Morselli C.","year":"2010"},{"key":"e_1_3_2_1_20_1","unstructured":"News24.com. SA needs new approach to crime - ISS. 2015. http:\/\/www.news24.com\/SouthAfrica\/News\/SA-needs-new-approach-to-crime-ISS-20140919 (accessed June 2 2015).  News24.com. SA needs new approach to crime - ISS. 2015. http:\/\/www.news24.com\/SouthAfrica\/News\/SA-needs-new-approach-to-crime-ISS-20140919 (accessed June 2 2015)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1086\/210356"},{"issue":"2","key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.15353\/joci.v1i2.2046","article-title":"Community Informatics and Sustainability: Why Social Capital Matters","volume":"1","author":"Simpson L.","year":"2005","journal-title":"The Journal of Community Informatics"},{"key":"e_1_3_2_1_23_1","volume-title":"Office of Community Oriented Policing Services","author":"Social Media U.S.","year":"2011"},{"key":"e_1_3_2_1_24_1","unstructured":"South African Government. MEC Nomusa Dube-Ncube condemns the brutal murder of Councillor Vusi Ntombela. (2015). (accessed 06 04 2015).  South African Government. MEC Nomusa Dube-Ncube condemns the brutal murder of Councillor Vusi Ntombela. (2015). (accessed 06 04 2015)."},{"key":"e_1_3_2_1_25_1","unstructured":"\"South African Social Media Landscape 2014.\" 2014. http:\/\/www.worldwideworx.com\/wp-content\/uploads\/2013\/10\/Exec-Summary-Social-Media-2014.pdf  \"South African Social Media Landscape 2014.\" 2014. http:\/\/www.worldwideworx.com\/wp-content\/uploads\/2013\/10\/Exec-Summary-Social-Media-2014.pdf"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29047-3_28"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Wang X. & Nayir D. (2006). How and when is social networking important? Comparing European expatriate adjustment in China and Turkey. Jouranl of International Managmeent 12 449--472.  Wang X. & Nayir D. (2006). How and when is social networking important? Comparing European expatriate adjustment in China and Turkey. Jouranl of International Managmeent 12 449--472.","DOI":"10.1016\/j.intman.2006.02.014"},{"key":"e_1_3_2_1_28_1","volume-title":"Home Office Online Report","author":"Wedlock E.","year":"2006"}],"event":{"name":"SAICSIT '15: The 2015 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists","location":"Stellenbosch South Africa","acronym":"SAICSIT '15"},"container-title":["Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815782.2815811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,28]]},"references-count":28,"alternative-id":["10.1145\/2815782.2815811","10.1145\/2815782"],"URL":"https:\/\/doi.org\/10.1145\/2815782.2815811","relation":{},"subject":[],"published":{"date-parts":[[2015,9,28]]},"assertion":[{"value":"2015-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}