<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-3607</journal-id>
<journal-title><![CDATA[PAAKAT: revista de tecnología y sociedad]]></journal-title>
<abbrev-journal-title><![CDATA[PAAKAT: rev. tecnol. soc.]]></abbrev-journal-title>
<issn>2007-3607</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guadalajara, Sistema de Universidad Virtual]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-36072025000100001</article-id>
<article-id pub-id-type="doi">10.32870/pk.a15n28.899</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Percepción social de la extorsión en fronteras mexicanas: un análisis en X]]></article-title>
<article-title xml:lang="en"><![CDATA[Social perception of extortion on the Mexican borders: An analysis on X]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Alvarado Lagunas]]></surname>
<given-names><![CDATA[Elías]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Nuevo León  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2025</year>
</pub-date>
<volume>15</volume>
<numero>28</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-36072025000100001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-36072025000100001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-36072025000100001&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este artículo examina la percepción social de la extorsión en las fronteras mexicanas a través del análisis de 23,861 publicaciones en la plataforma X (antes Twitter) desde agosto de 2023 hasta abril de 2024. Se utilizan técnicas de Big Data y Text Mining. Se desarrolla un índice de percepción geoespacial que identifica altos niveles de percepción de extorsión en la frontera norte -Baja California, Chihuahua, Coahuila, Nuevo León, Sonora y Tamaulipas- y la frontera sur -Campeche, Chiapas, Tabasco y Quintana Roo-. El estudio resalta la importancia de comprender cómo las dinámicas socioculturales y tecnológicas influyen en la conversación digital sobre la extorsión. Los hallazgos contribuyen a un análisis multidimensional de las dinámicas sociales en contextos transfronterizos, ofreciendo perspectivas para la creación de estrategias de intervención y políticas públicas más efectivas en estas zonas.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This article examines the social perception of extortion in Mexican border regions through the analysis of 23,861 posts on the platform X (formerly Twitter) from August 2023 to April 2024. Using Big Data and Text Mining techniques, a geospatial perception index is developed, identifying high levels of extortion perception in the northern border-Baja California, Chihuahua, Coahuila, Nuevo León, Sonora, and Tamaulipas-and the southern border-Campeche, Chiapas, Tabasco, and Quintana Roo. The study highlights the importance of understanding how sociocultural and technological dynamics influence the digital conversation about extortion. The findings contribute to a multidimensional analysis of social dynamics in cross-border contexts, offering insights for creating more effective intervention strategies and public policies in these areas.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Extorsión]]></kwd>
<kwd lng="es"><![CDATA[percepción social]]></kwd>
<kwd lng="es"><![CDATA[plataforma X]]></kwd>
<kwd lng="es"><![CDATA[Text Mining]]></kwd>
<kwd lng="en"><![CDATA[extortion]]></kwd>
<kwd lng="en"><![CDATA[social perception]]></kwd>
<kwd lng="en"><![CDATA[social network X]]></kwd>
<kwd lng="en"><![CDATA[Text Mining]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agarwal]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Ravikumar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A novel approach to big data veracity using crowdsourcing techniques and Bayesian predictors]]></source>
<year>2017</year>
<conf-name><![CDATA[ 15thIEEE International Conference on Machine Learning and Applications, ICMLA 2016]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>1020-3</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alten]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gadre]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Kulkarni]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing Happiness Index Based on Geographical Locations]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2ndInternational Conference on Artificial Intelligence and Big Data, ICAIBD 2019]]></conf-name>
<conf-date>2019</conf-date>
<conf-loc> </conf-loc>
<page-range>45-51</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Duana]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Valencia]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Determinantes del gasto en seguridad como una forma de competitividad por micronegocio debido a la delincuencia. Un caso de estudio para el área metropolitana de Monterrey]]></article-title>
<source><![CDATA[Economía, Teoría y Práctica]]></source>
<year>2021</year>
<volume>29</volume>
<numero>55</numero>
<issue>55</issue>
<page-range>127-48</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortiz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Determinantes de la probabilidad de robo a micronegocios en el área metropolitana de Monterrey]]></article-title>
<source><![CDATA[Revista de Economía]]></source>
<year>2020</year>
<volume>37</volume>
<numero>94</numero>
<issue>94</issue>
<page-range>57-80</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortiz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Iturralde]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El robo a micronegocios y su interrelación con el entorno: un comparativo por género para la zona metropolitana de Monterrey]]></article-title>
<source><![CDATA[Revista de El Colegio de San Luis]]></source>
<year>2020</year>
<volume>10</volume>
<numero>21</numero>
<issue>21</issue>
<page-range>1-32</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Percepción social del crimen organizado y seguridad en la frontera noreste de México y Texas: Un análisis en X]]></article-title>
<source><![CDATA[Norteamérica]]></source>
<year>2025</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Valencia]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Iturralde]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Impacto del entorno social en el robo a microempresas del área metropolitana de Monterrey]]></article-title>
<source><![CDATA[Economía, Sociedad y Territorio]]></source>
<year>2019</year>
<volume>18</volume>
<numero>59</numero>
<issue>59</issue>
<page-range>1035-58</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrade]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las pandillas salvadoreñas y el delito de extorsión. Desafíos y prioridades en relación con el fenómeno extorsivo]]></article-title>
<source><![CDATA[Revista Policía y Seguridad Pública]]></source>
<year>2015</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>103-48</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>Alianza Nacional de Pequeños Comerciantes-ANPEC</collab>
<source><![CDATA[Alianza Nacional de Pequeños Comerciantes advierte de los efectos de la extorsión]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashwin]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kammarpally]]></surname>
<given-names><![CDATA[Prashanth]]></given-names>
</name>
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Veracity of information in twitter data: A case study]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016International Conference on Big Data and Smart Computing, BigComp 2016]]></conf-name>
<conf-loc> </conf-loc>
<page-range>129-36</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bissler]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fear of crime and social networks: A community study of two local public housing complexes]]></source>
<year>2003</year>
<publisher-name><![CDATA[North Carolina State University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castells]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Portes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[World underneath: The origins, dynamics and effects of the informal economy]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Portes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Castells]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Benton]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The informal economy: Studies in advanced and less developed countries]]></source>
<year>1989</year>
<page-range>11-40</page-range><publisher-name><![CDATA[Johns Hopkins University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Celedón]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Saleme]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pardo]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reflexiones sobre el delito de extorsión y los procesos cognoscitivos que se desarrollan en las víctimas y victimarios]]></article-title>
<source><![CDATA[Revista de la Facultad de Psicología Universidad Cooperativa de Colombia]]></source>
<year>2009</year>
<page-range>108-16</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Folk devils and moral panics]]></source>
<year>2011</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coleman]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social capital in the creation of human capital]]></article-title>
<source><![CDATA[American Journal of Sociology]]></source>
<year>1988</year>
<volume>94</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>95-120</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Döbler]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The social construction of reality: A treatise in the sociology of knowledge]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Spiller]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rudeloff]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Döbler]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Schlüsselwerke: Theorien (in) der Kommunikationswissenschaft]]></source>
<year>2022</year>
<page-range>171-86</page-range><publisher-loc><![CDATA[Wiesbaden ]]></publisher-loc>
<publisher-name><![CDATA[Springer VS]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Echeburúa]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[De Corral]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Amor]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluación del daño psicológico en las víctimas de delitos violentos]]></article-title>
<source><![CDATA[Psicología Clínica, Legal y Forense]]></source>
<year>2004</year>
<page-range>227-44</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>Encuesta Nacional de Victimización Empresarial-ENVE</collab>
<source><![CDATA[Resultados de la prevalencia e incidencia delictiva]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dumitrica]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Teruelle]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social media obstacles in grassroots civic mobilizations]]></source>
<year>2018</year>
<conf-name><![CDATA[ ACM International Conference Proceeding Series]]></conf-name>
<conf-loc> </conf-loc>
<page-range>71-81</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferguson]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[C.]]></surname>
<given-names><![CDATA[Mindel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling Fear of Crime in Dallas Neighborhoods: A Test of Social Capital Theory]]></article-title>
<source><![CDATA[Crime &amp; Delinquency]]></source>
<year>2007</year>
<volume>53</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>322-49</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goicoechea]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[La extorsión. Un estudio desde la fenomenología y la psicopatología]]></source>
<year>2018</year>
<publisher-name><![CDATA[Universidad del País Vasco]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Griffith]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Seidman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Review of understanding media: the extensions of man, by Marshall McLuhan]]></article-title>
<source><![CDATA[College Composition and Communication]]></source>
<year>1968</year>
<volume>19</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>69-72</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Held]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[McGrew]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldblatt]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Perraton]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Global transformations: politics, economics and culture]]></source>
<year>1999</year>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrera]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sauceda]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La justicia restaurativa como mecanismo de solución alternativa en el delito de extorsión empresarial]]></article-title>
<source><![CDATA[Eirene Estudios de Paz y Conflictos]]></source>
<year>2019</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>73-90</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>Instituto Nacional de Estadística y Geografía-INEGI</collab>
<source><![CDATA[Catálogo Único de Claves de Áreas Geoestadísticas Estatales, Municipales y Localidades]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>Índice de Paz México</collab>
<source><![CDATA[El cambiante panorama de la delincuencia organizada]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Liderar desde la Seguridad y la Salud]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Santander, España ]]></publisher-loc>
<publisher-name><![CDATA[FREMAP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lugmayr]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Stockleben]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Scheib]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mathew]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cognitive big data: survey and review on big data research and its implications. What is really &#8220;new&#8221; in big data?]]></article-title>
<source><![CDATA[Journal of Knowledge Management]]></source>
<year>2017</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>197-212</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mantilla]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El delito de extorsión: momento consumativo y tentativa]]></article-title>
<source><![CDATA[Revista Universidad EAFIT]]></source>
<year>2015</year>
<page-range>52-75</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mehta]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mehta]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chheda]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chawan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sentiment Analysis and Influence Tracking using Twitter]]></article-title>
<source><![CDATA[International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)]]></source>
<year>2012</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>72-9</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moncada]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lopera]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[¿Cómo comprender la extorsión hoy en Medellín? Por La Democracia y La Paz]]></source>
<year>2017</year>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mondragón]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Posible, un antídoto contra la inseguridad pública]]></article-title>
<source><![CDATA[Cámara del Periodismo Legislativo]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kiciman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Counts]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Narcotweets: Social Media in Wartime]]></source>
<year>2015</year>
<page-range>515-8</page-range><publisher-name><![CDATA[Artificial Intelligence]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SocioScope: A framework for understanding Internet of Social Knowledge]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2018</year>
<numero>83</numero>
<issue>83</issue>
<page-range>358-65</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ottoni]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Cunha]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Magno]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bernardina]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Meira]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing right-wing youtube channels: Hate, violence and discrimination]]></source>
<year>2018</year>
<conf-name><![CDATA[ 10thACM Conference on Web Science]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>323-32</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paya]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Cardona]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Monsalve]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Montoya]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Extorsión: Comportamiento del Delito en el Posconflicto Comparado con Otros Delitos Similares]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Cali, Colombia ]]></publisher-loc>
<publisher-name><![CDATA[Universidad ICESI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Santín]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Minería de datos: técnicas y herramientas]]></source>
<year>2007</year>
<publisher-name><![CDATA[Editorial Thompson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Vélez]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivas]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Vélez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evolución de la extorsión en México: un análisis estadístico regional 2012-2013]]></article-title>
<source><![CDATA[Revista Mexicana de Opinión Pública]]></source>
<year>2015</year>
<numero>18</numero>
<issue>18</issue>
<page-range>113-35</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Plutchik]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Emotion: A Psychoevolutionary Synthesis]]></source>
<year>1980</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Harper &amp; Row]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[De Choudhury]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Modeling stress with social media around incidents of gun violence on college campuses]]></source>
<year>2017</year>
<conf-name><![CDATA[ Proceedings of the ACM on Human-Computer Interaction, 1(CSCW)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salgado]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Creencias y conductas irracionales presentes en familiares y víctimas de secuestro y extorsión]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2010</year>
<volume>52</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>33-54</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shenghua]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fuxin]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fangtao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Xueqi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Huawei]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Adaptive co-training SVM for sentiment classification on tweets]]></source>
<year>2013</year>
<conf-name><![CDATA[ 22ndACM international conference on Information &amp; Knowledge Management (CIKM '13)]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>2079-88</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Grado de percepción social sobre la violencia en México a partir de datos difundidos en la red social online de Twitter]]></source>
<year>2020</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Cristóbal Colón]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Paredes]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Marín]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Guzmán]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Percepción social sobre violencia en México desde la red social online de Twitter]]></source>
<year>2020</year>
<conf-name><![CDATA[ IXCongreso de la Asociación Latinoamericana de Población]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Paredes]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Marín]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Guzmán]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Guarneros]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Measuring Violence Levels in Mexico Through Tweets]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Zapata-Cortés]]></surname>
<given-names><![CDATA[Julián]]></given-names>
</name>
<name>
<surname><![CDATA[Alor-Hernández]]></surname>
<given-names><![CDATA[Giner]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez-Ramírez]]></surname>
<given-names><![CDATA[Cuauhtémoc]]></given-names>
</name>
<name>
<surname><![CDATA[García-Alcaraz]]></surname>
<given-names><![CDATA[Jorge]]></given-names>
</name>
</person-group>
<source><![CDATA[New Perspectives on Enterprise Decision-Making Applying Artificial Intelligence Techniques]]></source>
<year>2021</year>
<publisher-name><![CDATA[Springer Link]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Velázquez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Yazdani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Socialbots Supporting Human Rights]]></source>
<year>2018</year>
<conf-name><![CDATA[ Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>290-6</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suthanthira]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Karthika]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Veracity Analysis of Rumors in Social Media]]></source>
<year>2018</year>
<conf-name><![CDATA[ 2ndInternational Conference on Computer, Communication, and Signal Processing: Special Focus on Technology and Innovation for Smart Environment, ICCCSP 2018, Icccsp]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-4</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tinoco]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Extorsión en México ha aumentado 26% en los últimos años, según estudio del Senado]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<collab>United Nations</collab>
<article-title xml:lang=""><![CDATA[Human security now: Protecting and empowering people]]></article-title>
<source><![CDATA[Report of the Commission on Human Security]]></source>
<year>2003</year>
<publisher-name><![CDATA[United Nations]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vaidya]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Votipka]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazurek]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sherr]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Does Being Verified Make You More Credible?]]></source>
<year>2019</year>
<conf-name><![CDATA[ CHI Conference on Human Factors in Computing Systems - CHI &#8217;19]]></conf-name>
<conf-date>2019</conf-date>
<conf-loc> </conf-loc>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vilalta]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fear of Crime in Public Transport: Research in Mexico City]]></article-title>
<source><![CDATA[Crime Prevention &amp; Community Safety]]></source>
<year>2011</year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>171-86</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
