Skip to main content

Prediction of Perception of Security Using Social Media Content

  • Conference paper
  • First Online:
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications (CIARP 2021)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 12702))

Included in the following conference series:

  • 678 Accesses

Abstract

The Perception of Security (PoS) refers to the opinion that persons have about security or insecurity in a place or situation. Real-time monitoring and the capacity of anticipation of citizen’s PoS are highly relevant for citizen’s security planning. Surveys represent the most widely used strategy to quantify PoS. Nevertheless, this approach cannot be applied continuously to obtain real-time monitoring or to predict future PoS. Recent evidence suggests that social network content may provide valuable information to quantify PoS. However, the prediction of these PoS quantifications remains poorly studied. We propose a novel strategy to quantify and anticipate PoS in short time windows using social network data. The model considers the external factors that may contribute to the publication of posts related to PoS and the retweeting phenomena. Results show that the proposed model may provide competitive predictive performances while keeps high levels of interpretability about the factors influencing PoS.

This work was funded by the project “Diseño y validación de modelos de analítica predictiva de fenómenos de seguridad y convivencia para la toma de decisiones en Bogotá”, at Bank of National Investment Programs and Projects, National Planning Department, Government of Colombia (BPIN: 2016000100036).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The fans of these team shave previously caused disturbances in the city on the game dates.

References

  1. Skogan, W.G., Maxfield, M.G.: Coping with Crime: Individual and Neighborhood Reactions. Sage Publications, Beverly Hills (1981)

    Google Scholar 

  2. Rundmo, T., Moen, B.: Risk perception and demand for risk mitigation in transport: a comparison of lay people, politicians and experts. J. Risk Res. 9, 623–640 (2006)

    Article  Google Scholar 

  3. Skogan, W.: The Various Meanings of Fear, pp. 131–140. Enke (1993)

    Google Scholar 

  4. Boholm, A.: Comparative studies of risk perception: a review of twenty years of research. J. Risk Res. 1(2), 135–163 (1998)

    Article  Google Scholar 

  5. Pereira-Kohatsu, J.C., Quijano-Sánchez, L., Liberatore, F., Camacho-Collados, M.: Detecting and monitoring hate speech in twitter. Sensors 19(21), 4654 (2019)

    Article  Google Scholar 

  6. Curiel, R.P., Cresci, S., Muntean, C.I., Bishop, S.R.: Crime and its fear in social media. Palgrave Commun. 6(1), 1–12 (2020)

    Article  Google Scholar 

  7. Rizoiu, M.A., Lee, Y., Mishra, S., Xie, L.: A tutorial on hawkes processes for events in social media. arXiv preprint arXiv:1708.06401 (2017)

  8. Chaparro, L., et al.: Sentiment analysis of social network content to characterize the perception of security. In: 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 685–691. IEEE Computer Society, Los Alamitos, December 2020

    Google Scholar 

  9. Kobayashi, R., Lambiotte, R.: Tideh: time-dependent hawkes process for predicting retweet dynamics. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 10 (2016)

    Google Scholar 

  10. Zhao, Q., Erdogdu, M.A., He, H.Y., Rajaraman, A., Leskovec, J.: Seismic: a self-exciting point process model for predicting tweet popularity. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1513–1522 (2015)

    Google Scholar 

  11. Brown, M., Dustman, P., Barthelemy, J.: Twitter impact on a community trauma: an examination of who, what, and why it radiated. J. Community Psychol. 49(3), 838–853 (2020)

    Article  Google Scholar 

  12. Java, A., Song, X., Finin, T., Tseng, B.: Why we twitter: an analysis of a microblogging community. In: Zhang, H., et al. (eds.) SNAKDD/WebKDD -2007. LNCS (LNAI), vol. 5439, pp. 118–138. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00528-2_7

    Chapter  Google Scholar 

  13. Reinhart, A.: Point process modeling with spatiotemporal covariates for predicting crime. Ph.D. thesis, Carnegie Mellon University (2016)

    Google Scholar 

  14. Prieto Curiel, R., Bishop, S.: Modelling the fear of crime. Proc. Roy. Soc. A: Mathe. Phys. Eng. Sci. 473(2203), 20170156 (2017)

    Article  Google Scholar 

  15. Lawless, J.F.: Regression methods for poisson process data. J. Am. Stat. Assoc. 82(399), 808–815 (1987)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jorge Rudas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pulido, C. et al. (2021). Prediction of Perception of Security Using Social Media Content. In: Tavares, J.M.R.S., Papa, J.P., González Hidalgo, M. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2021. Lecture Notes in Computer Science(), vol 12702. Springer, Cham. https://doi.org/10.1007/978-3-030-93420-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-93420-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-93419-4

  • Online ISBN: 978-3-030-93420-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics