SlideShare a Scribd company logo
1 of 8
Research Proposal, Initial Literature
Research
Table of Contents
1. Introduction 3
Part One 3
2. Project Title 3
3. Project Topic 3
4. Clients, Audience and Motivation 3
5. Primary Research Plan 4
Part Two 5
Abstract 5
6. Initial / Mini Literature Review 5
6.1 Crime Prediction 5
6.2 Social media prediction 6
7. Methodology 6
8. Social media: many opportunities for violent crime 6
8.1Multiple victims 7
8.2 Data is easy to collect 7
8.3 Cooperation between perpetrators 7
8.4 Characteristics of individual offenders 7
8.5 New crimes 7
9. Conceptualizing crime and violence in social networks 8
9.1 Symbolic violence on social media 8
10. Challenges Regulating and prosecuting crime and violence on social media 8
Conclusion 8
Reference 10
1. Introduction
Ever since the Wi-Fi Alliance announced the first Wi-Fi Direct specifications, many
projects looking for this technology for shared network connections have promised features
and use cases. Indeed, the temporary self-organizing, self-driving delivery of cellular
networks on a large scale is key to many field applications, from military operations to
disaster management, games and infotainment systems. Wi-Fi Direct is designed to
implement a private peer-to-peer private network based on modern cells and other portable
devices.
Part One
2. Project Title
Estimating the crime rate by analysing social media data on Twitter
3. Project Topic
This research is done to answer related questions:
1. How does the collective data collection process on Twitter help criminal groups identify
crime scenes?
2. What website and software do you need to predict crime areas Twitter will use?
3. How effective is Twitter as a crime prediction tool?
4. Clients, Audience and Motivation
This research report is conducted to better understand the seriousness of the crime in
the region in near real-world by gathering information from online media on the Twitter
online platform. As stated in this research paper, current research is based on crime structures
that use recorded information that cannot be done in the real world. Dynamic changes in
technology make data exchange easier. Criminology researchers believe that thanks to the
power of social networks such as Twitter, this technique could be an important milestone in
building a model for crime detection.
Networked media is a new invention that allows people to express their thoughts and
interact over the internet. Facebook and Twitter, the two largest online media, were founded
in 2004 and 2006 respectively. Facebook currently has around 38 million users in the UK and
Twitter has 17 million users. In addition to well-known providers, there are different stages in
the creation of online media with a different focus of action, but all have the same purpose -
to allow people to interact with each other while using the Internet distant interpersonal
communication. While online media is often useful for promoting freedom of expression on
the Internet, it is similar to next-generation crimes, from terrorism to cyberbullying, erotic
revenge entertainment, and activation of virtual education sexual etc.
5. Primary Research Plan
Crime can be estimated using qualitative and quantitative methods. For example, this
study uses quantitative research to predict crime. Analysing information obtained from the
Federal Bureau of Investigation (FBI) at the Chicago Police Station is used as the only source
of critical information.
• Recorded crime and environmental expertise to identify future crimes
• Identify the various components that have an impact on the crime close
to the problem area.
• Design and implement a program that will allow Twitter to be recorded
naturally after a crime, regardless of the images and language used
• Identify the elements of the environment that affect the number of
crimes committed by intelligence agencies on Twitter
• Identify gaps in the software application used to collect Twitter files
via the Twitter Authorized Streaming API
These issues are handled through UK Crystal. The UK is a good example for
evaluating the impact of such a tender. There are no very broad freedoms of expression laws
that allow concrete action to be taken as the United States. Since different states with
different social values cannot agree on a universal practice, it is possible to examine the
representation of needs in a local area, not an international one. There is a recognizable
guardianship for the author that allows them to take into account various social and legal
components, for example, the influence of the European Court of Human Rights and the
European Court of Justice. Given the growing role of online media in the daily life of the
country and the idea of not responding to the crime through online media and hence the
general idea of participation, this question is relevant and obviously on the current agenda of
the UK. For example, the number of ideas increases to understand and alleviate the problem.
Online media is a very young phenomenon and there is an urgent need to fill this research
gap, especially about the sustainability of law. Overall, the project will show how academic
legal research can be used to solve life problems. The main thesis of the project is that
registering users with public identification numbers in the media causes more problems than
in the UK.
It is concerned with the definition of problems in the regulation and investigation of
crimes on the Internet. This will destroy new opportunities for unique thugs and criminal
gangs created by online media, which is the crime concept of online media. The chapter ends
with a description of the most important regulatory issues. This section proposes to link users'
online media records to their generic identification number, concerning systems where a
similar measure has already been implemented focused on limitations in the ability of online
media users to link their records to generic identification numbers. In this research discusses
the practical difficulties of implementing the measure in the UK and its recommendations on
information security, protection of information and freedom of expression.
Part Two
Abstract
Data is generated daily, and the result is the development of vast sets of data similar
to the scenario of online media like Twitter. Large trends and patterns can be inferred by
extracting large data sets. The main purpose of the research is to analyse Twitter and find
evidence of criminal offences in the distribution of standard tweeters and take action to
visualize crime hotspots in the directory by identifying the specific purpose of these tweeters'
attached metadata. As a result, the agreement will create a mapping program site that will
propose the geographic distribution of crime by crime type. The report also describes more
serious criminal conspiracy cases tracked using the crime crew application program interface
(API), which was launched to provide true optical communication. Pearson chi-square and
the logic test is taken seriously to compare the number of criminal sites on Twitter and actual
crimes for spatial space to find out if online media records need to be checked for
perpetrators covers the metropolitan area.
6. Initial / Mini Literature Review
6.1 Crime Prediction
The traditional method of analysing and visualizing crime in space and time is to map
problem areas. Relevant techniques applied include kernel density estimation (KDE), which
can be used to determine two-dimensional longitudinal probability densities of past
violations. This method enables the zoning professional to quickly visualize and identify
verifiable crime zones, making point maps a useful tool for predicting crimes. For example,
with the emergence of new methods, self-motivating point process models play a crucial role
in capturing a global crime sequence. These methods are important but have certain
limitations. However, they are ambiguously meaningful; the problem area model for one
geographic area cannot be used to describe another geographic region. Second, the method
should provide verifiable data on the crime of interest. This means that the model cannot be
developed for areas where no crime information was previously available. Also, the method
of researching these criminal structures is not part of the surprising social landscape of the
region.
Theorists studied two flaws in the problem area of hot-spot plots by predicting the
course of a crime scene on a representative planet that describes all areas of relative
proximity, as follows: The police station and the back roads. This planet is often designed
using modest methods such as conservative models. The importance of this methodology is
obvious: the layout can take into account a large number of variables recorded with the same
spatiality in the estimation at the same time. It is also possible to predict geographic areas
without chronic crime data if these zones are linked to the required 3D data. For example
streets and areas of the police department.
6.2 Social media prediction
In an upcoming study, a well-designed social media demo describes some
applications that distribute various test logs on a similar report. This is a sign that researchers
are trying to use social media to analyse the results of infection, the macroeconomic cycle
like crime, election results, common wonders like jolts, and watching movies, the critical
uniqueness of almost all of these reviews and current research on 3D resolution (Maskell,
2017). While breakthroughs such as survey results and infection events can be seen as a
spatial solution speculating an entire city, poorly planned exercises can create a sharp contrast
between the streets of each city. Research by (Santos and Matos, 2014) brings us closer to
modern research using tweets from local news organizations. The researcher has produced
substantial evidence that such tweets can be applied to rapid incidents and crime inside and
outside. In any case, this study forgot to abandon some important parts of guessing social
media crime. Initially, these analysts only used tweets with certain news organizations. So,
given the nature of these talented writers, it was easier to work with existing subject testing
strategies. Likewise, it has been done by ignoring many messages that can be helpful.
Second, the tweets used by (Santos and Matos, 2014) have never been linked to data from
the GPS field, usually found in Twitter messages and showing the customer's location when
the tweet was sent. As a result, these professionals were disqualified for entering the true
source of Twitter posts and the link between the original post and criminal practices. Third,
these scientists studied only two different types of crime following the criminal group's
meetings and were also unable to analyse the different patterns on maps of old-style problem
areas
On-going research will remove all of the above limitations. Combine authentic
criminal reporting with Twitter logs collected from all potential Twitter customers in the
relevant geological regions. In addition, some of the initially difficult printing problems such
as jargon and non-standard images are solved by real speech processing techniques and use
GPS location information attached to each tweet. Additionally, it shows a representation of
philosophy in various types of crime and compares the outcomes and results obtained using
standard problem area strategies.
7. Methodology
Due to the large gap in social media, traditional subjective legal research strategies
(strict prohibition, review of the field of study and examination of relevant legislation, case
law and academic entities) will be associated with research for extracurricular resources. This
is done to stay current and fill any gaps in the academic exam if it is a basic exam. For similar
purposes, the challenge will gain an interdisciplinary methodology by drawing controversial
areas in place of laws such as criminology, brain research, humanism, legislative issues, and
international relations.
8. Social media: many opportunities for violent crime
The widespread use of security in social media follows the proverb crime follows
opportunity. Social media crime was less of an issue in 2008, four years after Facebook's
launch, but crime reporting increased sevenfold between 2008 and 2012. Social media offers
many open doors for crocodiles to commit crimes.
8.1Multiple victims
Social media mainly offers lots of potential victims and data to focus on. Nowadays,
people are investing more and more energy on social networks. According to Statistic, clients
spend an average of 118 minutes a day managing social systems (Ristea et al., 2018). The
world population on social media is over 2 billion. With this prediction of potential victims,
it's not surprising that social media appeals to lawmakers.
8.2 Data is easy to collect
It's easy for bullies to collect data about a particular victim, as customers post almost
anything on social media. This solved Kim Kardashian's jewellery stealing case in Paris.
Kardashian is one of the stars of social networks: she shared a photo of her wearing a huge
diamond ring a few days before the thief. Likewise, at a fashion show in Paris, he published
what he was always doing and what he was interested in. This gave him a clear target for
thieves.
8.3 Cooperation between perpetrators
Its ease of communication and its instantaneous nature encourages communication
between bullies and lawmakers and relevant individuals, making coordinated crime and
criminal collection easier and less scary. Bullies can increase the need for temporary
measures and pool their skills and knowledge (Kim, Cha and Sandholm, 2014). For example,
having a paedophilic background not only allows paedophiles to express themselves more
easily but also increases their motivation to commit crimes by allowing them to involve and
oppose themselves and others. Using strategic saws to achieve their political goals, terrorist
organizations use social media to register, advertise, raise money, share attack strategies, and
collect data.
8.4 Characteristics of individual offenders
By promoting coordinated crime, social media enables an offender referred to as self-
employed to commit common and complex crimes beyond their means that can sometimes be
corrected indefinitely, financially and organizationally.
8.5 New crimes
Social media can lead to new crimes, such as revenge pornography: The unanimous
reporting of footage of one of the accomplices in a relationship after being disconnected from
motives of humiliation in front of the partner, employees and employers of the relationship.
At the same time, social networks propose new strategies for committing pre-committed
crimes such as harassment, badger and danger.
9. Conceptualizing crime and violence in social networks
9.1 Symbolic violence on social media
Social media violence is objective rather than subjective. Subjective violence such as
robbery or psychological repression is more pronounced, whereas targeted violence, such as
social media, is violence and symbolic language: it is essentially violence through language.
Social networks continue to be representative violence (Sadhana and Sangareddy, 2016).
While customers think they know who they are communicating with on social media, they
are actually looking at a computer screen. Most of the social media fans are unrivalled. The
anticipation of what would be considered potentially hostile in another context and a brief
reaction is unthinkable.
10. Challenges Regulating and prosecuting crime and violence on social media
Jurisdiction is a key issue in regulating crime and violence on social media: The
cross-border nature of the Internet haunts local hooligans whenever possible. British courts
examined this question awaiting jurisdiction as to whether a substantial part of the crimes was
committed in England. However, if the guilty party is entirely outside the UK and there is no
binding factor between them and the UK, there is anything the UK can do to justify their
actions reduce (Prathap and Ramesha, 2019). If the act in question is legal in the country of
birth, regardless of whether it is illegal in the country of destination, the country of
destination has limited influence on the rare offender. For example, if it concerns crime, the
government may force Internet Service Providers (ISPs) to transmit content or create open
websites from non-traditional providers from law-compliant countries close. However, the
state cannot lift or blame the criminal. This is because three types of jurisdictions have
traditionally been created: administrative, judicial, and licensing power over the concept of
regions. Therefore, the legislature cannot judge rare legislators by the legislature; the
executive is not responsible for such cases and demands that organizations cannot enforce the
law against them.
Conclusion
The UK's current approach to combating crime and violence on social media is based
on the assumption that something that is not an internet crime should not be viewed as an
internet crime. This is a matching rule that is assumed to be offline. However, as the example
of cyberbullying shows, there are significant differences between similar crimes in the real
world and on social media in terms of extent, scope and extent of harm. There are also
secondary crimes on social media that are not suitable for the criminal justice system. These
variables mean that current anti-crime legislation in the UK is insufficient to address the issue
of evidence of a crime on social media. The proposal, borrowed from the proportionality
standard, required by social system administrative measures to require the national number of
clients for registration, has been disabled online. It was first introduced in the context of
mobile phones in some states and public institutions in China with the requirement for SIM
card registration. In both cases, there were compliance issues that were mainly caused by the
client's attempts to evade action in various ways. This measure offers limited options to
reduce investigative and regulatory issues related to social media crime in the UK. This can
promote the naming of criminal offences and similarly eliminate intimidation exercises. In
addition, there is real potential to reduce the cost and time spent investigating social media
crimes and reducing the number of fake and childish recordings and registries.
Reference
Curiel, R.P., Cresci, S., Muntean, C.I. and Bishop, S.R., 2020. Crime and its fear in social
media. Palgrave Communications, 6(1), pp.1-12.
Da Silva, S., Boivin, R. and Fortin, F. (2019) 'Social media as a predictor of urban crime',
Criminologie.
Kim, J., Cha, M. and Sandholm, T. (2014) 'SocRoutes: Safe routes based on tweet
sentiments', in WWW 2014 Companion - Proceedings of the 23rd International Conference
on World Wide Web. doi: 10.1145/2567948.2577023.
Liu, S. and Young, S.D., 2018. A survey of social media data analysis for physical activity
surveillance. Journal of forensic and legal medicine, 57, pp.33-36.
Maskell, S. (2017) 'When does Social Media add Value to Pharmacovigilance?', DRUG
SAFETY.
Prathap, B. R. and Ramesha, K. (2019) 'Twitter sentiment for analysing different types of
crimes', in Proceedings of the 2018 International Conference On Communication, Computing
and Internet of Things, IC3IoT 2018. doi: 10.1109/IC3IoT.2018.8668140.
Prathap, B.R. and Ramesha, K., 2018, February. Twitter sentiment for analysing different
types of crimes. In 2018 International Conference on Communication, Computing and
Internet of Things (IC3IoT) (pp. 483-488). IEEE.
Ristea, A. et al. (2018) 'Estimating the spatial distribution of crime events around a football
stadium from georeferenced tweets', in ISPRS International Journal of Geo-Information. doi:
10.3390/ijgi7020043.
Sadhana, C. S. and Sangareddy, B. K. (2016) 'Survey on Predicting Crime Using Twitter
Sentiment and Weather Data', National Conference on Emerging Trends and Advances in
Information Technology.
Santos, J. C. and Matos, S. (2014) 'Analysing Twitter and web queries for flu trend
prediction', Theoretical Biology and Medical Modelling. doi: 10.1186/1742-4682-11-S1-S6.
Williams, M.L., Burnap, P. and Sloan, L., 2017. Towards an ethical framework for
publishing Twitter data in social research: Taking into account users' views, online context
and algorithmic estimation. Sociology, 51(6), pp.1149-1168. Ozalp, S., Williams, M.L.,
Burnap, P., Liu, H. and Mostafa, M., 2020. Antisemitism on Twitter: Collective efficacy and
the role of community organisations in challenging online hate speech. Social Media+
Society, 6(2), p.2056305120916850.

More Related Content

What's hot

Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkEditor IJCATR
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social networkakash_mishra
 
The role of online monitoring in influencing political behaviour: an explorat...
The role of online monitoring in influencing political behaviour: an explorat...The role of online monitoring in influencing political behaviour: an explorat...
The role of online monitoring in influencing political behaviour: an explorat...Simon Collister & Associates
 
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1crore projects
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataValerii Klymchuk
 
Isi 2017 presentation on Big Data and bias
Isi 2017 presentation on Big Data and biasIsi 2017 presentation on Big Data and bias
Isi 2017 presentation on Big Data and biasPiet J.H. Daas
 
Data Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresData Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresLiliana Bounegru
 
Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)SocialMediaMining
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social mediai4box Anon
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3archiejones4
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Mediahome
 
Mining social data
Mining social dataMining social data
Mining social dataMalk Zameth
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGPrasadu Peddi
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social mediarangesharp
 
Predictive analysis of crime forecasting
Predictive analysis of crime forecastingPredictive analysis of crime forecasting
Predictive analysis of crime forecastingFrank Smilda
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Rohit Desai
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsRESHAN FARAZ
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
IRJET- Sentiment Analysis using Machine Learning
IRJET- Sentiment Analysis using Machine LearningIRJET- Sentiment Analysis using Machine Learning
IRJET- Sentiment Analysis using Machine LearningIRJET Journal
 

What's hot (20)

Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social network
 
The role of online monitoring in influencing political behaviour: an explorat...
The role of online monitoring in influencing political behaviour: an explorat...The role of online monitoring in influencing political behaviour: an explorat...
The role of online monitoring in influencing political behaviour: an explorat...
 
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
 
Analytics anecdotes
Analytics anecdotesAnalytics anecdotes
Analytics anecdotes
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation Data
 
Isi 2017 presentation on Big Data and bias
Isi 2017 presentation on Big Data and biasIsi 2017 presentation on Big Data and bias
Isi 2017 presentation on Big Data and bias
 
Data Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresData Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data Infrastructures
 
Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social media
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Media
 
Mining social data
Mining social dataMining social data
Mining social data
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social media
 
Predictive analysis of crime forecasting
Predictive analysis of crime forecastingPredictive analysis of crime forecasting
Predictive analysis of crime forecasting
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
IRJET- Sentiment Analysis using Machine Learning
IRJET- Sentiment Analysis using Machine LearningIRJET- Sentiment Analysis using Machine Learning
IRJET- Sentiment Analysis using Machine Learning
 

Similar to Individual project 2.20

Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusioncsandit
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
 
Fusing text and image for event
Fusing text and image for eventFusing text and image for event
Fusing text and image for eventijma
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...kevig
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...kevig
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisZhongLI28
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docxAttaUrRahman78
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxhealdkathaleen
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxtodd271
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxhealdkathaleen
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
 
EllisPredictivePolicing
EllisPredictivePolicingEllisPredictivePolicing
EllisPredictivePolicingDennis Ellis
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
 
SENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITY
SENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITYSENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITY
SENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITYSangeetha Mam
 

Similar to Individual project 2.20 (20)

sun2021.pdf
sun2021.pdfsun2021.pdf
sun2021.pdf
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
Fusing text and image for event
Fusing text and image for eventFusing text and image for event
Fusing text and image for event
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
 
Capsm twitter study 2010
Capsm twitter study 2010Capsm twitter study 2010
Capsm twitter study 2010
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
EllisPredictivePolicing
EllisPredictivePolicingEllisPredictivePolicing
EllisPredictivePolicing
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social Intelligence
 
SENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITY
SENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITYSENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITY
SENTIMENT ANALYSIS AND GEOGRAPHICAL ANALYSIS FOR ENHANCING SECURITY
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Individual project 2.20

  • 1. Research Proposal, Initial Literature Research Table of Contents 1. Introduction 3 Part One 3 2. Project Title 3 3. Project Topic 3 4. Clients, Audience and Motivation 3 5. Primary Research Plan 4 Part Two 5 Abstract 5 6. Initial / Mini Literature Review 5 6.1 Crime Prediction 5 6.2 Social media prediction 6 7. Methodology 6 8. Social media: many opportunities for violent crime 6 8.1Multiple victims 7 8.2 Data is easy to collect 7 8.3 Cooperation between perpetrators 7 8.4 Characteristics of individual offenders 7 8.5 New crimes 7 9. Conceptualizing crime and violence in social networks 8 9.1 Symbolic violence on social media 8
  • 2. 10. Challenges Regulating and prosecuting crime and violence on social media 8 Conclusion 8 Reference 10 1. Introduction Ever since the Wi-Fi Alliance announced the first Wi-Fi Direct specifications, many projects looking for this technology for shared network connections have promised features and use cases. Indeed, the temporary self-organizing, self-driving delivery of cellular networks on a large scale is key to many field applications, from military operations to disaster management, games and infotainment systems. Wi-Fi Direct is designed to implement a private peer-to-peer private network based on modern cells and other portable devices. Part One 2. Project Title Estimating the crime rate by analysing social media data on Twitter 3. Project Topic This research is done to answer related questions: 1. How does the collective data collection process on Twitter help criminal groups identify crime scenes? 2. What website and software do you need to predict crime areas Twitter will use? 3. How effective is Twitter as a crime prediction tool? 4. Clients, Audience and Motivation This research report is conducted to better understand the seriousness of the crime in the region in near real-world by gathering information from online media on the Twitter online platform. As stated in this research paper, current research is based on crime structures that use recorded information that cannot be done in the real world. Dynamic changes in technology make data exchange easier. Criminology researchers believe that thanks to the power of social networks such as Twitter, this technique could be an important milestone in building a model for crime detection. Networked media is a new invention that allows people to express their thoughts and interact over the internet. Facebook and Twitter, the two largest online media, were founded in 2004 and 2006 respectively. Facebook currently has around 38 million users in the UK and Twitter has 17 million users. In addition to well-known providers, there are different stages in the creation of online media with a different focus of action, but all have the same purpose -
  • 3. to allow people to interact with each other while using the Internet distant interpersonal communication. While online media is often useful for promoting freedom of expression on the Internet, it is similar to next-generation crimes, from terrorism to cyberbullying, erotic revenge entertainment, and activation of virtual education sexual etc. 5. Primary Research Plan Crime can be estimated using qualitative and quantitative methods. For example, this study uses quantitative research to predict crime. Analysing information obtained from the Federal Bureau of Investigation (FBI) at the Chicago Police Station is used as the only source of critical information. • Recorded crime and environmental expertise to identify future crimes • Identify the various components that have an impact on the crime close to the problem area. • Design and implement a program that will allow Twitter to be recorded naturally after a crime, regardless of the images and language used • Identify the elements of the environment that affect the number of crimes committed by intelligence agencies on Twitter • Identify gaps in the software application used to collect Twitter files via the Twitter Authorized Streaming API These issues are handled through UK Crystal. The UK is a good example for evaluating the impact of such a tender. There are no very broad freedoms of expression laws that allow concrete action to be taken as the United States. Since different states with different social values cannot agree on a universal practice, it is possible to examine the representation of needs in a local area, not an international one. There is a recognizable guardianship for the author that allows them to take into account various social and legal components, for example, the influence of the European Court of Human Rights and the European Court of Justice. Given the growing role of online media in the daily life of the country and the idea of not responding to the crime through online media and hence the general idea of participation, this question is relevant and obviously on the current agenda of the UK. For example, the number of ideas increases to understand and alleviate the problem. Online media is a very young phenomenon and there is an urgent need to fill this research gap, especially about the sustainability of law. Overall, the project will show how academic legal research can be used to solve life problems. The main thesis of the project is that registering users with public identification numbers in the media causes more problems than in the UK. It is concerned with the definition of problems in the regulation and investigation of crimes on the Internet. This will destroy new opportunities for unique thugs and criminal gangs created by online media, which is the crime concept of online media. The chapter ends with a description of the most important regulatory issues. This section proposes to link users' online media records to their generic identification number, concerning systems where a similar measure has already been implemented focused on limitations in the ability of online media users to link their records to generic identification numbers. In this research discusses
  • 4. the practical difficulties of implementing the measure in the UK and its recommendations on information security, protection of information and freedom of expression. Part Two Abstract Data is generated daily, and the result is the development of vast sets of data similar to the scenario of online media like Twitter. Large trends and patterns can be inferred by extracting large data sets. The main purpose of the research is to analyse Twitter and find evidence of criminal offences in the distribution of standard tweeters and take action to visualize crime hotspots in the directory by identifying the specific purpose of these tweeters' attached metadata. As a result, the agreement will create a mapping program site that will propose the geographic distribution of crime by crime type. The report also describes more serious criminal conspiracy cases tracked using the crime crew application program interface (API), which was launched to provide true optical communication. Pearson chi-square and the logic test is taken seriously to compare the number of criminal sites on Twitter and actual crimes for spatial space to find out if online media records need to be checked for perpetrators covers the metropolitan area. 6. Initial / Mini Literature Review 6.1 Crime Prediction The traditional method of analysing and visualizing crime in space and time is to map problem areas. Relevant techniques applied include kernel density estimation (KDE), which can be used to determine two-dimensional longitudinal probability densities of past violations. This method enables the zoning professional to quickly visualize and identify verifiable crime zones, making point maps a useful tool for predicting crimes. For example, with the emergence of new methods, self-motivating point process models play a crucial role in capturing a global crime sequence. These methods are important but have certain limitations. However, they are ambiguously meaningful; the problem area model for one geographic area cannot be used to describe another geographic region. Second, the method should provide verifiable data on the crime of interest. This means that the model cannot be developed for areas where no crime information was previously available. Also, the method of researching these criminal structures is not part of the surprising social landscape of the region. Theorists studied two flaws in the problem area of hot-spot plots by predicting the course of a crime scene on a representative planet that describes all areas of relative proximity, as follows: The police station and the back roads. This planet is often designed using modest methods such as conservative models. The importance of this methodology is obvious: the layout can take into account a large number of variables recorded with the same spatiality in the estimation at the same time. It is also possible to predict geographic areas without chronic crime data if these zones are linked to the required 3D data. For example streets and areas of the police department. 6.2 Social media prediction
  • 5. In an upcoming study, a well-designed social media demo describes some applications that distribute various test logs on a similar report. This is a sign that researchers are trying to use social media to analyse the results of infection, the macroeconomic cycle like crime, election results, common wonders like jolts, and watching movies, the critical uniqueness of almost all of these reviews and current research on 3D resolution (Maskell, 2017). While breakthroughs such as survey results and infection events can be seen as a spatial solution speculating an entire city, poorly planned exercises can create a sharp contrast between the streets of each city. Research by (Santos and Matos, 2014) brings us closer to modern research using tweets from local news organizations. The researcher has produced substantial evidence that such tweets can be applied to rapid incidents and crime inside and outside. In any case, this study forgot to abandon some important parts of guessing social media crime. Initially, these analysts only used tweets with certain news organizations. So, given the nature of these talented writers, it was easier to work with existing subject testing strategies. Likewise, it has been done by ignoring many messages that can be helpful. Second, the tweets used by (Santos and Matos, 2014) have never been linked to data from the GPS field, usually found in Twitter messages and showing the customer's location when the tweet was sent. As a result, these professionals were disqualified for entering the true source of Twitter posts and the link between the original post and criminal practices. Third, these scientists studied only two different types of crime following the criminal group's meetings and were also unable to analyse the different patterns on maps of old-style problem areas On-going research will remove all of the above limitations. Combine authentic criminal reporting with Twitter logs collected from all potential Twitter customers in the relevant geological regions. In addition, some of the initially difficult printing problems such as jargon and non-standard images are solved by real speech processing techniques and use GPS location information attached to each tweet. Additionally, it shows a representation of philosophy in various types of crime and compares the outcomes and results obtained using standard problem area strategies. 7. Methodology Due to the large gap in social media, traditional subjective legal research strategies (strict prohibition, review of the field of study and examination of relevant legislation, case law and academic entities) will be associated with research for extracurricular resources. This is done to stay current and fill any gaps in the academic exam if it is a basic exam. For similar purposes, the challenge will gain an interdisciplinary methodology by drawing controversial areas in place of laws such as criminology, brain research, humanism, legislative issues, and international relations. 8. Social media: many opportunities for violent crime The widespread use of security in social media follows the proverb crime follows opportunity. Social media crime was less of an issue in 2008, four years after Facebook's launch, but crime reporting increased sevenfold between 2008 and 2012. Social media offers many open doors for crocodiles to commit crimes. 8.1Multiple victims
  • 6. Social media mainly offers lots of potential victims and data to focus on. Nowadays, people are investing more and more energy on social networks. According to Statistic, clients spend an average of 118 minutes a day managing social systems (Ristea et al., 2018). The world population on social media is over 2 billion. With this prediction of potential victims, it's not surprising that social media appeals to lawmakers. 8.2 Data is easy to collect It's easy for bullies to collect data about a particular victim, as customers post almost anything on social media. This solved Kim Kardashian's jewellery stealing case in Paris. Kardashian is one of the stars of social networks: she shared a photo of her wearing a huge diamond ring a few days before the thief. Likewise, at a fashion show in Paris, he published what he was always doing and what he was interested in. This gave him a clear target for thieves. 8.3 Cooperation between perpetrators Its ease of communication and its instantaneous nature encourages communication between bullies and lawmakers and relevant individuals, making coordinated crime and criminal collection easier and less scary. Bullies can increase the need for temporary measures and pool their skills and knowledge (Kim, Cha and Sandholm, 2014). For example, having a paedophilic background not only allows paedophiles to express themselves more easily but also increases their motivation to commit crimes by allowing them to involve and oppose themselves and others. Using strategic saws to achieve their political goals, terrorist organizations use social media to register, advertise, raise money, share attack strategies, and collect data. 8.4 Characteristics of individual offenders By promoting coordinated crime, social media enables an offender referred to as self- employed to commit common and complex crimes beyond their means that can sometimes be corrected indefinitely, financially and organizationally. 8.5 New crimes Social media can lead to new crimes, such as revenge pornography: The unanimous reporting of footage of one of the accomplices in a relationship after being disconnected from motives of humiliation in front of the partner, employees and employers of the relationship. At the same time, social networks propose new strategies for committing pre-committed crimes such as harassment, badger and danger. 9. Conceptualizing crime and violence in social networks 9.1 Symbolic violence on social media Social media violence is objective rather than subjective. Subjective violence such as robbery or psychological repression is more pronounced, whereas targeted violence, such as social media, is violence and symbolic language: it is essentially violence through language. Social networks continue to be representative violence (Sadhana and Sangareddy, 2016). While customers think they know who they are communicating with on social media, they are actually looking at a computer screen. Most of the social media fans are unrivalled. The
  • 7. anticipation of what would be considered potentially hostile in another context and a brief reaction is unthinkable. 10. Challenges Regulating and prosecuting crime and violence on social media Jurisdiction is a key issue in regulating crime and violence on social media: The cross-border nature of the Internet haunts local hooligans whenever possible. British courts examined this question awaiting jurisdiction as to whether a substantial part of the crimes was committed in England. However, if the guilty party is entirely outside the UK and there is no binding factor between them and the UK, there is anything the UK can do to justify their actions reduce (Prathap and Ramesha, 2019). If the act in question is legal in the country of birth, regardless of whether it is illegal in the country of destination, the country of destination has limited influence on the rare offender. For example, if it concerns crime, the government may force Internet Service Providers (ISPs) to transmit content or create open websites from non-traditional providers from law-compliant countries close. However, the state cannot lift or blame the criminal. This is because three types of jurisdictions have traditionally been created: administrative, judicial, and licensing power over the concept of regions. Therefore, the legislature cannot judge rare legislators by the legislature; the executive is not responsible for such cases and demands that organizations cannot enforce the law against them. Conclusion The UK's current approach to combating crime and violence on social media is based on the assumption that something that is not an internet crime should not be viewed as an internet crime. This is a matching rule that is assumed to be offline. However, as the example of cyberbullying shows, there are significant differences between similar crimes in the real world and on social media in terms of extent, scope and extent of harm. There are also secondary crimes on social media that are not suitable for the criminal justice system. These variables mean that current anti-crime legislation in the UK is insufficient to address the issue of evidence of a crime on social media. The proposal, borrowed from the proportionality standard, required by social system administrative measures to require the national number of clients for registration, has been disabled online. It was first introduced in the context of mobile phones in some states and public institutions in China with the requirement for SIM card registration. In both cases, there were compliance issues that were mainly caused by the client's attempts to evade action in various ways. This measure offers limited options to reduce investigative and regulatory issues related to social media crime in the UK. This can promote the naming of criminal offences and similarly eliminate intimidation exercises. In addition, there is real potential to reduce the cost and time spent investigating social media crimes and reducing the number of fake and childish recordings and registries. Reference Curiel, R.P., Cresci, S., Muntean, C.I. and Bishop, S.R., 2020. Crime and its fear in social media. Palgrave Communications, 6(1), pp.1-12.
  • 8. Da Silva, S., Boivin, R. and Fortin, F. (2019) 'Social media as a predictor of urban crime', Criminologie. Kim, J., Cha, M. and Sandholm, T. (2014) 'SocRoutes: Safe routes based on tweet sentiments', in WWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web. doi: 10.1145/2567948.2577023. Liu, S. and Young, S.D., 2018. A survey of social media data analysis for physical activity surveillance. Journal of forensic and legal medicine, 57, pp.33-36. Maskell, S. (2017) 'When does Social Media add Value to Pharmacovigilance?', DRUG SAFETY. Prathap, B. R. and Ramesha, K. (2019) 'Twitter sentiment for analysing different types of crimes', in Proceedings of the 2018 International Conference On Communication, Computing and Internet of Things, IC3IoT 2018. doi: 10.1109/IC3IoT.2018.8668140. Prathap, B.R. and Ramesha, K., 2018, February. Twitter sentiment for analysing different types of crimes. In 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT) (pp. 483-488). IEEE. Ristea, A. et al. (2018) 'Estimating the spatial distribution of crime events around a football stadium from georeferenced tweets', in ISPRS International Journal of Geo-Information. doi: 10.3390/ijgi7020043. Sadhana, C. S. and Sangareddy, B. K. (2016) 'Survey on Predicting Crime Using Twitter Sentiment and Weather Data', National Conference on Emerging Trends and Advances in Information Technology. Santos, J. C. and Matos, S. (2014) 'Analysing Twitter and web queries for flu trend prediction', Theoretical Biology and Medical Modelling. doi: 10.1186/1742-4682-11-S1-S6. Williams, M.L., Burnap, P. and Sloan, L., 2017. Towards an ethical framework for publishing Twitter data in social research: Taking into account users' views, online context and algorithmic estimation. Sociology, 51(6), pp.1149-1168. Ozalp, S., Williams, M.L., Burnap, P., Liu, H. and Mostafa, M., 2020. Antisemitism on Twitter: Collective efficacy and the role of community organisations in challenging online hate speech. Social Media+ Society, 6(2), p.2056305120916850.