[1]
A. M. Miller, ‘Review of R for Data Science: Import, Tidy, Transform, Visualize, and Model Data by Hadley Wickham and Garrett Grolemund’, ACM SIGACT News, vol. 48, no. 3, pp. 14–19, Sep. 2017, doi: 10.1145/3138860.3138865.
[2]
M. L. Williams, P. Burnap, and L. Sloan, ‘Crime Sensing with Big Data: The Affordances and Limitations of using Open Source Communications to Estimate Crime Patterns’, British Journal of Criminology, Mar. 2016, doi: 10.1093/bjc/azw031.
[3]
X. Chen, Y. Cho, and S. Y. Jang, ‘Crime prediction using Twitter sentiment and weather’, in 2015 Systems and Information Engineering Design Symposium, Apr. 2015, pp. 63–68, doi: 10.1109/SIEDS.2015.7117012 [Online]. Available: http://ieeexplore.ieee.org/document/7117012/
[4]
M. Wang and M. S. Gerber, ‘Using Twitter for Next-Place Prediction, with an Application to Crime Prediction’, in 2015 IEEE Symposium Series on Computational Intelligence, Dec. 2015, pp. 941–948, doi: 10.1109/SSCI.2015.138 [Online]. Available: http://ieeexplore.ieee.org/document/7376713/
[5]
A. Ristea, C. Langford, and M. Leitner, ‘Relationships between crime and Twitter activity around stadiums’, in 2017 25th International Conference on Geoinformatics, Aug. 2017, pp. 1–5, doi: 10.1109/GEOINFORMATICS.2017.8090933 [Online]. Available: http://ieeexplore.ieee.org/document/8090933/
[6]
Kostakos, P., ‘Public perceptions on organised crime, Mafia, and Terrorism: A big data analysis based on Twitter and Google Trends’, International Journal of Cyber Criminology, vol. 12, no. 1, pp. 282–299, doi: 10.5281/zenodo.1467919. [Online]. Available: https://ucl-new-primo.hosted.exlibrisgroup.com/primo-explore/fulldisplay?docid=TN_scopus2-s2.0-85056655876&context=PC&vid=UCL_VU2&lang=en_US&search_scope=CSCOP_UCL&adaptor=primo_central_multiple_fe&tab=local&query=any,contains,Kostakos,%20P.%20(2018).%20Public%20Perceptions%20On%20Organised%20Crime,%20Mafia,%20And%20Terrorism:%20A%20Big%20Data%20Analysis%20Based%20On%20Twitter%20And%20Google%20Trends.%20International%20Journal%20of%20Cyber%20Criminology.%20https:%2F%2Fdoi.org%2F10.5281%2Fzenodo.1467919&sortby=rank
[7]
A. Almehmadi, Z. Joudaki, and R. Jalali, ‘Language usage on Twitter predicts crime rates’, in Proceedings of the 10th International Conference on Security of Information and Networks  - SIN ’17, 2017, pp. 307–310, doi: 10.1145/3136825.3136854 [Online]. Available: http://dl.acm.org/citation.cfm?doid=3136825.3136854
[8]
J. Pfeffer, K. Mayer, and F. Morstatter, ‘Tampering with Twitter’s Sample API’, EPJ Data Science, vol. 7, no. 1, Dec. 2018, doi: 10.1140/epjds/s13688-018-0178-0.
[9]
R. Solymosi, K. J. Bowers, and T. Fujiyama, ‘Crowdsourcing Subjective Perceptions of Neighbourhood Disorder: Interpreting Bias in Open Data’, The British Journal of Criminology, vol. 58, no. 4, pp. 944–967, Jun. 2018, doi: 10.1093/bjc/azx048.
[10]
Founta, Antigoni-Maria, ‘Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior’ [Online]. Available: https://ucl-new-primo.hosted.exlibrisgroup.com/primo-explore/fulldisplay?docid=TN_arxiv1802.00393&context=PC&vid=UCL_VU2&lang=en_US&search_scope=CSCOP_UCL&adaptor=primo_central_multiple_fe&tab=local&query=any,contains,Founta,%20A.-M.,%20Djouvas,%20C.,%20Chatzakou,%20D.,%20Leontiadis,%20I.,%20Blackburn,%20J.,%20Stringhini,%20G.,%20%E2%80%A6%20Kourtellis,%20N.%20(2018).%20Large%20Scale%20Crowdsourcing%20and%20Characterization%20of%20Twitter%20Abusive%20Behavior.%20ArXiv:1802.00393%20%5BCs%5D.%20Retrieved%20from%20%5Bhttp:%2F%2Farxiv.org%2Fabs%2F1802.00393%5D(http:%2F%2Farxiv.org%2Fabs%2F1802.00393)&sortby=rank
[11]
‘HTML basics | MDN’. [Online]. Available: https://developer.mozilla.org/en-US/docs/Learn/Getting_started_with_the_web/HTML_basics
[12]
‘R Web Scraping Tutorial with rvest (article) - DataCamp’. [Online]. Available: https://www.datacamp.com/community/tutorials/r-web-scraping-rvest
[13]
‘Web scraping tutorial in R – Towards Data Science’. [Online]. Available: https://towardsdatascience.com/web-scraping-tutorial-in-r-5e71fd107f32
[14]
‘Learn To Create Your Own Datasets — Web Scraping in R’. [Online]. Available: https://towardsdatascience.com/learn-to-create-your-own-datasets-web-scraping-in-r-f934a31748a5
[15]
Hadley Wickham, ‘Easily Harvest (Scrape) Web Pages [R package rvest version 0.3.2]’ [Online]. Available: https://cran.r-project.org/web/packages/rvest/index.html
[16]
ElSherief, Mai, ‘Hate Lingo: A Target-based Linguistic Analysis of Hate Speech in Social Media’, 2018 [Online]. Available: https://arxiv.org/abs/1804.04257
[17]
‘14 Strings | R for Data Science’. [Online]. Available: https://r4ds.had.co.nz/strings.html
[18]
‘Replication of Chapter 5 of <em>Quantitative Social Science: An Introduction</em> • quanteda’. [Online]. Available: https://quanteda.io/articles/pkgdown/replication/qss.html
[19]
‘Example: textual data visualization • quanteda’. [Online]. Available: https://quanteda.io/articles/pkgdown/examples/plotting.html
[20]
Kleinberg, Bennett, ‘Identifying the sentiment styles of YouTube’s vloggers’ [Online]. Available: https://ucl-new-primo.hosted.exlibrisgroup.com/primo-explore/fulldisplay?docid=TN_arxiv1808.09722&amp;context=PC&amp;vid=UCL_VU2&amp;lang=en_US&amp;search_scope=CSCOP_UCL&amp;adaptor=primo_central_multiple_fe&amp;tab=local&amp;query=any,contains,Kleinberg,%20B.,%20Mozes,%20M.,%20&amp;%20Van%20der%20Vegt,%20I.%20(2018).%20Identifying%20the%20sentiment%20styles%20of%20YouTube%E2%80%99s%20vloggers.%20Proceedings%20of%20the%202018%20Conference%20on%20Empirical%20Methods%20in%20Natural%20Language%20Processing,%203581%E2%80%933590.%20Retrieved%20from%20%5Bhttp:%2F%2Faclweb.org%2Fanthology%2FD18-1394%5D(http:%2F%2Faclweb.org%2Fanthology%2FD18-1394)&amp;offset=0
[21]
Pérez-Rosas, Verónica, ‘Automatic Detection of Fake News’ [Online]. Available: https://ucl-new-primo.hosted.exlibrisgroup.com/primo-explore/fulldisplay?docid=TN_arxiv1708.07104&amp;context=PC&amp;vid=UCL_VU2&amp;lang=en_US&amp;search_scope=CSCOP_UCL&amp;adaptor=primo_central_multiple_fe&amp;tab=local&amp;query=any,contains,P%C3%A9rez-Rosas,%20V.,%20Kleinberg,%20B.,%20Lefevre,%20A.,%20&amp;%20Mihalcea,%20R.%20(2018).%20Automatic%20Detection%20of%20Fake%20News.%20In%20Proceedings%20of%20the%2027th%20International%20Conference%20on%20Computational%20Linguistics%20(pp.%203391%E2%80%933401).%20Santa%20Fe,%20New%20Mexico,%20USA:%20Association%20for%20Computational%20Linguistics.%20Retrieved%20from%20%5Bhttp:%2F%2Faclweb.org%2Fanthology%2FC18-1287%5D(http:%2F%2Faclweb.org%2Fanthology%2FC18-1287)&amp;sortby=rank
[22]
M. Kuhn and K. Johnson, Applied predictive modeling. New York, NY: Springer, 2013 [Online]. Available: http://UCL.eblib.com/patron/FullRecord.aspx?p=1317001
[23]
T. Hastie, R. Tibshirani, and J. H. Friedman, The elements of statistical learning: data mining, inference, and prediction, Second editon. New York: Springer Verlag, 2009 [Online]. Available: http://ucl.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=4193318630004761&institutionId=4761&customerId=4760
[24]
‘An Introduction to Machine Learning with R’. [Online]. Available: https://lgatto.github.io/IntroMachineLearningWithR/unsupervised-learning.html
[25]
‘R: Unsupervised Learning | DataCamp’. [Online]. Available: https://www.datacamp.com/courses/unsupervised-learning-in-r
[26]
P. V. Coveney, E. R. Dougherty, and R. R. Highfield, ‘Big data need big theory too’, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 374, no. 2080, Nov. 2016, doi: 10.1098/rsta.2016.0153.
[27]
L. Quijano-Sánchez, F. Liberatore, J. Camacho-Collados, and M. Camacho-Collados, ‘Applying automatic text-based detection of deceptive language to police reports: Extracting behavioral patterns from a multi-step classification model to understand how we lie to the police’, Knowledge-Based Systems, vol. 149, pp. 155–168, Jun. 2018, doi: 10.1016/j.knosys.2018.03.010.
[28]
C. Kadar and I. Pletikosa, ‘Mining large-scale human mobility data for long-term crime prediction’, EPJ Data Science, vol. 7, no. 1, Dec. 2018, doi: 10.1140/epjds/s13688-018-0150-z.
[29]
P. Burnap and M. L. Williams, ‘Us and them: identifying cyber hate on Twitter across multiple protected characteristics’, EPJ Data Science, vol. 5, no. 1, Dec. 2016, doi: 10.1140/epjds/s13688-016-0072-6.