{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:53Z","timestamp":1750220333704,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1145\/3501247.3539507","type":"proceedings-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T22:41:09Z","timestamp":1656110469000},"page":"471-475","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Topic modeling approaches to counter online grooming"],"prefix":"10.1145","author":[{"given":"Nikolaos","family":"Lykousas","sequence":"first","affiliation":[{"name":"Department of Informatics, University of Piraeus, Greece"}]},{"given":"Constantinos","family":"Patsakis","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Piraeus, Greece and Information Management Systems Institute, Athena Research Centre, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexander Babuta Marion Oswald and Christine Rinik. 2018. Machine learning algorithms and police decision-making: legal ethical and regulatory challenges. (2018).  Alexander Babuta Marion Oswald and Christine Rinik. 2018. Machine learning algorithms and police decision-making: legal ethical and regulatory challenges. (2018)."},{"key":"e_1_3_2_1_2_1","volume-title":"Analyzing topics and authors in chat logs for crime investigation. Knowledge and information systems 39, 2","author":"Basher Abdur","year":"2014","unstructured":"Abdur Rahman\u00a0MA Basher and Benjamin\u00a0 CM Fung . 2014. Analyzing topics and authors in chat logs for crime investigation. Knowledge and information systems 39, 2 ( 2014 ), 351\u2013381. Abdur Rahman\u00a0MA Basher and Benjamin\u00a0CM Fung. 2014. Analyzing topics and authors in chat logs for crime investigation. Knowledge and information systems 39, 2 (2014), 351\u2013381."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Marcio\u00a0Pereira Basilio Gabrielle\u00a0Souza Brum and Valdecy Pereira. 2020. A model of policing strategy choice: the integration of the Latent Dirichlet Allocation (LDA) method with ELECTRE I. Journal of Modelling in Management(2020).  Marcio\u00a0Pereira Basilio Gabrielle\u00a0Souza Brum and Valdecy Pereira. 2020. A model of policing strategy choice: the integration of the Latent Dirichlet Allocation (LDA) method with ELECTRE I. Journal of Modelling in Management(2020).","DOI":"10.1108\/JM2-10-2018-0166"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-020-00127-4"},{"key":"e_1_3_2_1_5_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei M","year":"2003","unstructured":"David\u00a0 M Blei , Andrew\u00a0 Y Ng , and Michael\u00a0 I Jordan . 2003 . Latent dirichlet allocation . Journal of machine Learning research 3 , Jan (2003), 993 \u2013 1022 . David\u00a0M Blei, Andrew\u00a0Y Ng, and Michael\u00a0I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research 3, Jan (2003), 993\u20131022.","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_2_1_7_1","volume-title":"Jumping NLP curves: A review of natural language processing research","author":"Cambria Erik","year":"2014","unstructured":"Erik Cambria and Bebo White . 2014. Jumping NLP curves: A review of natural language processing research . IEEE Computational intelligence magazine 9, 2 ( 2014 ), 48\u201357. Erik Cambria and Bebo White. 2014. Jumping NLP curves: A review of natural language processing research. IEEE Computational intelligence magazine 9, 2 (2014), 48\u201357."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Victor Diogho Heuer\u00a0de Carvalho and Ana Paula Cabral\u00a0Seixas Costa. 2022. Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review. (2022). https:\/\/doi.org\/10.1590\/scielopreprints.3518  Victor Diogho Heuer\u00a0de Carvalho and Ana Paula Cabral\u00a0Seixas Costa. 2022. Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review. (2022). https:\/\/doi.org\/10.1590\/scielopreprints.3518","DOI":"10.1590\/SciELOPreprints.3518"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2015.7389660"},{"volume-title":"Internet Organised Crime Threat Assessment (IOCTA","year":"2021","key":"e_1_3_2_1_10_1","unstructured":"Europol. 2021. Internet Organised Crime Threat Assessment (IOCTA 2021 ). European Union Agency for Law Enforcement Cooperation (Europol) . Europol. 2021. Internet Organised Crime Threat Assessment (IOCTA 2021). European Union Agency for Law Enforcement Cooperation (Europol)."},{"key":"e_1_3_2_1_11_1","volume-title":"Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data mining and knowledge discovery 8, 1","author":"Han Jiawei","year":"2004","unstructured":"Jiawei Han , Jian Pei , Yiwen Yin , and Runying Mao . 2004. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data mining and knowledge discovery 8, 1 ( 2004 ), 53\u201387. Jiawei Han, Jian Pei, Yiwen Yin, and Runying Mao. 2004. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data mining and knowledge discovery 8, 1 (2004), 53\u201387."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964870"},{"key":"e_1_3_2_1_13_1","unstructured":"Nikolaos Lykousas and Costantions Patsakis. 2019. Large-scale analysis of grooming in modern social networks. https:\/\/doi.org\/10.5281\/zenodo.3560365  Nikolaos Lykousas and Costantions Patsakis. 2019. Large-scale analysis of grooming in modern social networks. https:\/\/doi.org\/10.5281\/zenodo.3560365"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114808"},{"key":"e_1_3_2_1_15_1","volume-title":"Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships","author":"Lykousas Nikolaos","year":"2018","unstructured":"Nikolaos Lykousas , Constantinos Patsakis , and Vicen\u00e7 G\u00f3mez . 2018. Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships . In IEEE\/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, Barcelona, Spain, August 28-31, 2018, Ulrik Brandes, Chandan Reddy, and Andrea Tagarelli (Eds.). IEEE Computer Society , 375\u2013382. https:\/\/doi.org\/10.1109\/ASONAM.2018.8508246 Nikolaos Lykousas, Constantinos Patsakis, and Vicen\u00e7 G\u00f3mez. 2018. Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships. In IEEE\/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, Barcelona, Spain, August 28-31, 2018, Ulrik Brandes, Chandan Reddy, and Andrea Tagarelli (Eds.). IEEE Computer Society, 375\u2013382. https:\/\/doi.org\/10.1109\/ASONAM.2018.8508246"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.poetic.2013.06.004"},{"key":"e_1_3_2_1_17_1","unstructured":"Bill Melugin. 2018. Pedophiles using app to manipulate underage girls into sexual acts sell recordings as child porn. https:\/\/www.foxla.com\/news\/pedophiles-using-app-to-manipulate-underage-girls-into-sexual-acts-sell-recordings-as-child-porn. [Online; last accessed 12-March-2020].  Bill Melugin. 2018. Pedophiles using app to manipulate underage girls into sexual acts sell recordings as child porn. https:\/\/www.foxla.com\/news\/pedophiles-using-app-to-manipulate-underage-girls-into-sexual-acts-sell-recordings-as-child-porn. [Online; last accessed 12-March-2020]."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.108017"},{"key":"e_1_3_2_1_19_1","volume-title":"Workshop on Explanations for AI: Computable or Not? at 12th ACM Web Science Conference, Southampton 2020 (07\/07\/20 - 07\/07\/20)","author":"O\u2019hara Kieron","year":"2020","unstructured":"Kieron O\u2019hara . 2020 . In no circumstances can or should explanations of AI outputs in sensitive contexts be wholly computable . In Workshop on Explanations for AI: Computable or Not? at 12th ACM Web Science Conference, Southampton 2020 (07\/07\/20 - 07\/07\/20) . https:\/\/eprints.soton.ac.uk\/442338\/ Kieron O\u2019hara. 2020. In no circumstances can or should explanations of AI outputs in sensitive contexts be wholly computable. In Workshop on Explanations for AI: Computable or Not? at 12th ACM Web Science Conference, Southampton 2020 (07\/07\/20 - 07\/07\/20). https:\/\/eprints.soton.ac.uk\/442338\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587384"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.12.002"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45\u201350","author":"\u0158eh\u016f\u0159ek Radim","year":"2010","unstructured":"Radim \u0158eh\u016f\u0159ek and Petr Sojka . 2010 . Software Framework for Topic Modelling with Large Corpora . In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45\u201350 . Radim \u0158eh\u016f\u0159ek and Petr Sojka. 2010. Software Framework for Topic Modelling with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45\u201350."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685324"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-3110"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.210750"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10717"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1996889.1996934"}],"event":{"name":"WebSci '22: 14th ACM Web Science Conference 2022","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Barcelona Spain","acronym":"WebSci '22"},"container-title":["14th ACM Web Science Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501247.3539507","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501247.3539507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:18Z","timestamp":1750191138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501247.3539507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":27,"alternative-id":["10.1145\/3501247.3539507","10.1145\/3501247"],"URL":"https:\/\/doi.org\/10.1145\/3501247.3539507","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]},"assertion":[{"value":"2022-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}