AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
Individual project 2.20
1. Research Proposal, Initial Literature
Research
Table of Contents
1. Introduction 3
Part One 3
2. Project Title 3
3. Project Topic 3
4. Clients, Audience and Motivation 3
5. Primary Research Plan 4
Part Two 5
Abstract 5
6. Initial / Mini Literature Review 5
6.1 Crime Prediction 5
6.2 Social media prediction 6
7. Methodology 6
8. Social media: many opportunities for violent crime 6
8.1Multiple victims 7
8.2 Data is easy to collect 7
8.3 Cooperation between perpetrators 7
8.4 Characteristics of individual offenders 7
8.5 New crimes 7
9. Conceptualizing crime and violence in social networks 8
9.1 Symbolic violence on social media 8
2. 10. Challenges Regulating and prosecuting crime and violence on social media 8
Conclusion 8
Reference 10
1. Introduction
Ever since the Wi-Fi Alliance announced the first Wi-Fi Direct specifications, many
projects looking for this technology for shared network connections have promised features
and use cases. Indeed, the temporary self-organizing, self-driving delivery of cellular
networks on a large scale is key to many field applications, from military operations to
disaster management, games and infotainment systems. Wi-Fi Direct is designed to
implement a private peer-to-peer private network based on modern cells and other portable
devices.
Part One
2. Project Title
Estimating the crime rate by analysing social media data on Twitter
3. Project Topic
This research is done to answer related questions:
1. How does the collective data collection process on Twitter help criminal groups identify
crime scenes?
2. What website and software do you need to predict crime areas Twitter will use?
3. How effective is Twitter as a crime prediction tool?
4. Clients, Audience and Motivation
This research report is conducted to better understand the seriousness of the crime in
the region in near real-world by gathering information from online media on the Twitter
online platform. As stated in this research paper, current research is based on crime structures
that use recorded information that cannot be done in the real world. Dynamic changes in
technology make data exchange easier. Criminology researchers believe that thanks to the
power of social networks such as Twitter, this technique could be an important milestone in
building a model for crime detection.
Networked media is a new invention that allows people to express their thoughts and
interact over the internet. Facebook and Twitter, the two largest online media, were founded
in 2004 and 2006 respectively. Facebook currently has around 38 million users in the UK and
Twitter has 17 million users. In addition to well-known providers, there are different stages in
the creation of online media with a different focus of action, but all have the same purpose -
3. to allow people to interact with each other while using the Internet distant interpersonal
communication. While online media is often useful for promoting freedom of expression on
the Internet, it is similar to next-generation crimes, from terrorism to cyberbullying, erotic
revenge entertainment, and activation of virtual education sexual etc.
5. Primary Research Plan
Crime can be estimated using qualitative and quantitative methods. For example, this
study uses quantitative research to predict crime. Analysing information obtained from the
Federal Bureau of Investigation (FBI) at the Chicago Police Station is used as the only source
of critical information.
• Recorded crime and environmental expertise to identify future crimes
• Identify the various components that have an impact on the crime close
to the problem area.
• Design and implement a program that will allow Twitter to be recorded
naturally after a crime, regardless of the images and language used
• Identify the elements of the environment that affect the number of
crimes committed by intelligence agencies on Twitter
• Identify gaps in the software application used to collect Twitter files
via the Twitter Authorized Streaming API
These issues are handled through UK Crystal. The UK is a good example for
evaluating the impact of such a tender. There are no very broad freedoms of expression laws
that allow concrete action to be taken as the United States. Since different states with
different social values cannot agree on a universal practice, it is possible to examine the
representation of needs in a local area, not an international one. There is a recognizable
guardianship for the author that allows them to take into account various social and legal
components, for example, the influence of the European Court of Human Rights and the
European Court of Justice. Given the growing role of online media in the daily life of the
country and the idea of not responding to the crime through online media and hence the
general idea of participation, this question is relevant and obviously on the current agenda of
the UK. For example, the number of ideas increases to understand and alleviate the problem.
Online media is a very young phenomenon and there is an urgent need to fill this research
gap, especially about the sustainability of law. Overall, the project will show how academic
legal research can be used to solve life problems. The main thesis of the project is that
registering users with public identification numbers in the media causes more problems than
in the UK.
It is concerned with the definition of problems in the regulation and investigation of
crimes on the Internet. This will destroy new opportunities for unique thugs and criminal
gangs created by online media, which is the crime concept of online media. The chapter ends
with a description of the most important regulatory issues. This section proposes to link users'
online media records to their generic identification number, concerning systems where a
similar measure has already been implemented focused on limitations in the ability of online
media users to link their records to generic identification numbers. In this research discusses
4. the practical difficulties of implementing the measure in the UK and its recommendations on
information security, protection of information and freedom of expression.
Part Two
Abstract
Data is generated daily, and the result is the development of vast sets of data similar
to the scenario of online media like Twitter. Large trends and patterns can be inferred by
extracting large data sets. The main purpose of the research is to analyse Twitter and find
evidence of criminal offences in the distribution of standard tweeters and take action to
visualize crime hotspots in the directory by identifying the specific purpose of these tweeters'
attached metadata. As a result, the agreement will create a mapping program site that will
propose the geographic distribution of crime by crime type. The report also describes more
serious criminal conspiracy cases tracked using the crime crew application program interface
(API), which was launched to provide true optical communication. Pearson chi-square and
the logic test is taken seriously to compare the number of criminal sites on Twitter and actual
crimes for spatial space to find out if online media records need to be checked for
perpetrators covers the metropolitan area.
6. Initial / Mini Literature Review
6.1 Crime Prediction
The traditional method of analysing and visualizing crime in space and time is to map
problem areas. Relevant techniques applied include kernel density estimation (KDE), which
can be used to determine two-dimensional longitudinal probability densities of past
violations. This method enables the zoning professional to quickly visualize and identify
verifiable crime zones, making point maps a useful tool for predicting crimes. For example,
with the emergence of new methods, self-motivating point process models play a crucial role
in capturing a global crime sequence. These methods are important but have certain
limitations. However, they are ambiguously meaningful; the problem area model for one
geographic area cannot be used to describe another geographic region. Second, the method
should provide verifiable data on the crime of interest. This means that the model cannot be
developed for areas where no crime information was previously available. Also, the method
of researching these criminal structures is not part of the surprising social landscape of the
region.
Theorists studied two flaws in the problem area of hot-spot plots by predicting the
course of a crime scene on a representative planet that describes all areas of relative
proximity, as follows: The police station and the back roads. This planet is often designed
using modest methods such as conservative models. The importance of this methodology is
obvious: the layout can take into account a large number of variables recorded with the same
spatiality in the estimation at the same time. It is also possible to predict geographic areas
without chronic crime data if these zones are linked to the required 3D data. For example
streets and areas of the police department.
6.2 Social media prediction
5. In an upcoming study, a well-designed social media demo describes some
applications that distribute various test logs on a similar report. This is a sign that researchers
are trying to use social media to analyse the results of infection, the macroeconomic cycle
like crime, election results, common wonders like jolts, and watching movies, the critical
uniqueness of almost all of these reviews and current research on 3D resolution (Maskell,
2017). While breakthroughs such as survey results and infection events can be seen as a
spatial solution speculating an entire city, poorly planned exercises can create a sharp contrast
between the streets of each city. Research by (Santos and Matos, 2014) brings us closer to
modern research using tweets from local news organizations. The researcher has produced
substantial evidence that such tweets can be applied to rapid incidents and crime inside and
outside. In any case, this study forgot to abandon some important parts of guessing social
media crime. Initially, these analysts only used tweets with certain news organizations. So,
given the nature of these talented writers, it was easier to work with existing subject testing
strategies. Likewise, it has been done by ignoring many messages that can be helpful.
Second, the tweets used by (Santos and Matos, 2014) have never been linked to data from
the GPS field, usually found in Twitter messages and showing the customer's location when
the tweet was sent. As a result, these professionals were disqualified for entering the true
source of Twitter posts and the link between the original post and criminal practices. Third,
these scientists studied only two different types of crime following the criminal group's
meetings and were also unable to analyse the different patterns on maps of old-style problem
areas
On-going research will remove all of the above limitations. Combine authentic
criminal reporting with Twitter logs collected from all potential Twitter customers in the
relevant geological regions. In addition, some of the initially difficult printing problems such
as jargon and non-standard images are solved by real speech processing techniques and use
GPS location information attached to each tweet. Additionally, it shows a representation of
philosophy in various types of crime and compares the outcomes and results obtained using
standard problem area strategies.
7. Methodology
Due to the large gap in social media, traditional subjective legal research strategies
(strict prohibition, review of the field of study and examination of relevant legislation, case
law and academic entities) will be associated with research for extracurricular resources. This
is done to stay current and fill any gaps in the academic exam if it is a basic exam. For similar
purposes, the challenge will gain an interdisciplinary methodology by drawing controversial
areas in place of laws such as criminology, brain research, humanism, legislative issues, and
international relations.
8. Social media: many opportunities for violent crime
The widespread use of security in social media follows the proverb crime follows
opportunity. Social media crime was less of an issue in 2008, four years after Facebook's
launch, but crime reporting increased sevenfold between 2008 and 2012. Social media offers
many open doors for crocodiles to commit crimes.
8.1Multiple victims
6. Social media mainly offers lots of potential victims and data to focus on. Nowadays,
people are investing more and more energy on social networks. According to Statistic, clients
spend an average of 118 minutes a day managing social systems (Ristea et al., 2018). The
world population on social media is over 2 billion. With this prediction of potential victims,
it's not surprising that social media appeals to lawmakers.
8.2 Data is easy to collect
It's easy for bullies to collect data about a particular victim, as customers post almost
anything on social media. This solved Kim Kardashian's jewellery stealing case in Paris.
Kardashian is one of the stars of social networks: she shared a photo of her wearing a huge
diamond ring a few days before the thief. Likewise, at a fashion show in Paris, he published
what he was always doing and what he was interested in. This gave him a clear target for
thieves.
8.3 Cooperation between perpetrators
Its ease of communication and its instantaneous nature encourages communication
between bullies and lawmakers and relevant individuals, making coordinated crime and
criminal collection easier and less scary. Bullies can increase the need for temporary
measures and pool their skills and knowledge (Kim, Cha and Sandholm, 2014). For example,
having a paedophilic background not only allows paedophiles to express themselves more
easily but also increases their motivation to commit crimes by allowing them to involve and
oppose themselves and others. Using strategic saws to achieve their political goals, terrorist
organizations use social media to register, advertise, raise money, share attack strategies, and
collect data.
8.4 Characteristics of individual offenders
By promoting coordinated crime, social media enables an offender referred to as self-
employed to commit common and complex crimes beyond their means that can sometimes be
corrected indefinitely, financially and organizationally.
8.5 New crimes
Social media can lead to new crimes, such as revenge pornography: The unanimous
reporting of footage of one of the accomplices in a relationship after being disconnected from
motives of humiliation in front of the partner, employees and employers of the relationship.
At the same time, social networks propose new strategies for committing pre-committed
crimes such as harassment, badger and danger.
9. Conceptualizing crime and violence in social networks
9.1 Symbolic violence on social media
Social media violence is objective rather than subjective. Subjective violence such as
robbery or psychological repression is more pronounced, whereas targeted violence, such as
social media, is violence and symbolic language: it is essentially violence through language.
Social networks continue to be representative violence (Sadhana and Sangareddy, 2016).
While customers think they know who they are communicating with on social media, they
are actually looking at a computer screen. Most of the social media fans are unrivalled. The
7. anticipation of what would be considered potentially hostile in another context and a brief
reaction is unthinkable.
10. Challenges Regulating and prosecuting crime and violence on social media
Jurisdiction is a key issue in regulating crime and violence on social media: The
cross-border nature of the Internet haunts local hooligans whenever possible. British courts
examined this question awaiting jurisdiction as to whether a substantial part of the crimes was
committed in England. However, if the guilty party is entirely outside the UK and there is no
binding factor between them and the UK, there is anything the UK can do to justify their
actions reduce (Prathap and Ramesha, 2019). If the act in question is legal in the country of
birth, regardless of whether it is illegal in the country of destination, the country of
destination has limited influence on the rare offender. For example, if it concerns crime, the
government may force Internet Service Providers (ISPs) to transmit content or create open
websites from non-traditional providers from law-compliant countries close. However, the
state cannot lift or blame the criminal. This is because three types of jurisdictions have
traditionally been created: administrative, judicial, and licensing power over the concept of
regions. Therefore, the legislature cannot judge rare legislators by the legislature; the
executive is not responsible for such cases and demands that organizations cannot enforce the
law against them.
Conclusion
The UK's current approach to combating crime and violence on social media is based
on the assumption that something that is not an internet crime should not be viewed as an
internet crime. This is a matching rule that is assumed to be offline. However, as the example
of cyberbullying shows, there are significant differences between similar crimes in the real
world and on social media in terms of extent, scope and extent of harm. There are also
secondary crimes on social media that are not suitable for the criminal justice system. These
variables mean that current anti-crime legislation in the UK is insufficient to address the issue
of evidence of a crime on social media. The proposal, borrowed from the proportionality
standard, required by social system administrative measures to require the national number of
clients for registration, has been disabled online. It was first introduced in the context of
mobile phones in some states and public institutions in China with the requirement for SIM
card registration. In both cases, there were compliance issues that were mainly caused by the
client's attempts to evade action in various ways. This measure offers limited options to
reduce investigative and regulatory issues related to social media crime in the UK. This can
promote the naming of criminal offences and similarly eliminate intimidation exercises. In
addition, there is real potential to reduce the cost and time spent investigating social media
crimes and reducing the number of fake and childish recordings and registries.
Reference
Curiel, R.P., Cresci, S., Muntean, C.I. and Bishop, S.R., 2020. Crime and its fear in social
media. Palgrave Communications, 6(1), pp.1-12.
8. Da Silva, S., Boivin, R. and Fortin, F. (2019) 'Social media as a predictor of urban crime',
Criminologie.
Kim, J., Cha, M. and Sandholm, T. (2014) 'SocRoutes: Safe routes based on tweet
sentiments', in WWW 2014 Companion - Proceedings of the 23rd International Conference
on World Wide Web. doi: 10.1145/2567948.2577023.
Liu, S. and Young, S.D., 2018. A survey of social media data analysis for physical activity
surveillance. Journal of forensic and legal medicine, 57, pp.33-36.
Maskell, S. (2017) 'When does Social Media add Value to Pharmacovigilance?', DRUG
SAFETY.
Prathap, B. R. and Ramesha, K. (2019) 'Twitter sentiment for analysing different types of
crimes', in Proceedings of the 2018 International Conference On Communication, Computing
and Internet of Things, IC3IoT 2018. doi: 10.1109/IC3IoT.2018.8668140.
Prathap, B.R. and Ramesha, K., 2018, February. Twitter sentiment for analysing different
types of crimes. In 2018 International Conference on Communication, Computing and
Internet of Things (IC3IoT) (pp. 483-488). IEEE.
Ristea, A. et al. (2018) 'Estimating the spatial distribution of crime events around a football
stadium from georeferenced tweets', in ISPRS International Journal of Geo-Information. doi:
10.3390/ijgi7020043.
Sadhana, C. S. and Sangareddy, B. K. (2016) 'Survey on Predicting Crime Using Twitter
Sentiment and Weather Data', National Conference on Emerging Trends and Advances in
Information Technology.
Santos, J. C. and Matos, S. (2014) 'Analysing Twitter and web queries for flu trend
prediction', Theoretical Biology and Medical Modelling. doi: 10.1186/1742-4682-11-S1-S6.
Williams, M.L., Burnap, P. and Sloan, L., 2017. Towards an ethical framework for
publishing Twitter data in social research: Taking into account users' views, online context
and algorithmic estimation. Sociology, 51(6), pp.1149-1168. Ozalp, S., Williams, M.L.,
Burnap, P., Liu, H. and Mostafa, M., 2020. Antisemitism on Twitter: Collective efficacy and
the role of community organisations in challenging online hate speech. Social Media+
Society, 6(2), p.2056305120916850.