A review of research in illicit supply-chain networks and new directions to thwart them

R Anzoom, R Nagi, C Vogiatzis - IISE Transactions, 2021 - Taylor & Francis
Illicit trades have emerged as a significant problem to almost every government across the
world. Their gradual expansion and diversification throughout the years suggests the …

Depression intensity estimation via social media: A deep learning approach

S Ghosh, T Anwar - IEEE Transactions on Computational …, 2021 - ieeexplore.ieee.org
Depression has become a big problem in our society today. It is also a major reason for
suicide, especially among teenagers. In the current outbreak of coronavirus disease (COVID …

Influencer Marketing

S Yesiloglu, J Costello - Building Brand Communities and …, 2020 - api.taylorfrancis.com
Names: Yesiloglu, Sevil, editor.| Costello, Joyce, editor. Title: Influencer marketing: building
brand communities and engagement/edited by Sevil Yesiloglu and Joyce Costello …

NLP-based digital forensic investigation platform for online communications

D Sun, X Zhang, KKR Choo, L Hu, F Wang - computers & security, 2021 - Elsevier
Digital (forensic) investigations will be increasingly important in both criminal investigations
and civil litigations (eg, corporate espionage, and intellectual property theft) as more of our …

BiSAL–A bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security

K Al-Rowaily, M Abulaish, NAH Haldar, M Al-Rubaian - Digital Investigation, 2015 - Elsevier
In this paper, we present the development of a Bilingual Sentiment Analysis Lexicon (BiSAL)
for cyber security domain, which consists of a Sentiment Lexicon for ENglish (SentiLEN) and …

Early warning system: From face recognition by surveillance cameras to social media analysis to detecting suspicious people

S Afra, R Alhajj - Physica A: Statistical Mechanics and its Applications, 2020 - Elsevier
Surveillance security cameras are increasingly deployed in almost every location for
monitoring purposes, including watching people and their actions for security purposes. For …

[PDF][PDF] Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review

VDH De Carvalho, A Costa - Socioecon. Anal, 2023 - periodicos.ufpe.br
Text mining and related analytics emerge as a technological approach to support human
activities in extracting useful knowledge through texts in several formats. From a managerial …

A comprehensive study on the effects of using data mining techniques to predict tie strength

MK Sohrabi, S Akbari - Computers in Human behavior, 2016 - Elsevier
The use of social networks has grown noticeably in recent years and this fact has led to the
production of numerous volumes of data. Data that are widely used by users on the social …

Context‐aware language‐learning application in the green technology building: Which group can benefit the most?

HY Wang, V Lin, GJ Hwang… - Journal of Computer …, 2019 - Wiley Online Library
To assess the effects and learner perceptions of context‐aware ubiquitous language
learning (CAULL), a green‐building English‐learning application (GBELA) employing …

Shedding light on the dark web: Authorship attribution in radical forums

L Ranaldi, F Ranaldi, F Fallucchi, FM Zanzotto - Information, 2022 - mdpi.com
Online users tend to hide their real identities by adopting different names on the Internet. On
Facebook or LinkedIn, for example, people usually appear with their real names. On other …