<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2683-2852</journal-id>
<journal-title><![CDATA[Carta económica regional]]></journal-title>
<abbrev-journal-title><![CDATA[Carta econ. reg.]]></abbrev-journal-title>
<issn>2683-2852</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guadalajara, Centro Universitario de Ciencias Económico Administrativas]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2683-28522025000200093</article-id>
<article-id pub-id-type="doi">10.32870/cer.v0i136.7931</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Percepción social de la extorsión en micronegocios y su impacto regional en México]]></article-title>
<article-title xml:lang="en"><![CDATA[Social perception of extortion in micro-businesses and its regional impact in México]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Alvarado Lagunas]]></surname>
<given-names><![CDATA[Elías]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Nuevo León Facultad de Contaduría Pública y Administración ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2025</year>
</pub-date>
<volume>38</volume>
<numero>136</numero>
<fpage>93</fpage>
<lpage>123</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2683-28522025000200093&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2683-28522025000200093&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2683-28522025000200093&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este artículo analiza la percepción social sobre la extorsión a micronegocios en México y destaca su impacto en el desarrollo económico regional. Con base en 97 081 publicaciones de la plataforma digital X (antes Twitter), recopiladas entre agosto de 2023 y abril de 2024, se aplicaron técnicas de big data y text mining para elaborar un índice de percepción social geoespacial. Los hallazgos evidencian una alta percepción de la extorsión en las regiones Centro, Occidente y Sur del país, con particular énfasis en Colima, Guerrero, Quintana Roo, Ciudad de México y Tamaulipas. Este análisis resalta cómo las dinámicas regionales de inseguridad afectan las microeconomías locales y su potencial de desarrollo, lo que proporciona una base para estrategias específicas de mitigación.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The article analyzes the social perception of micro-business extortion in México, high-lighting its impact on regional economic development. Based on 97 081 posts from the digital platform X (formerly Twitter), collected between August 2023 and April 2024, big data and text mining techniques were applied to develop a geospatial index of social perception. The findings show a high perception of extortion in the Central, Western, and Southern regions of the country, with particular emphasis on Colima, Guerrero, Quintana Roo, México City, and Tamaulipas. This analysis highlights how the dynamics of regional insecurity affect local microeconomies and their potential for development, providing a basis for specific strategies of mitigation.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[extorsión]]></kwd>
<kwd lng="es"><![CDATA[cobro de piso]]></kwd>
<kwd lng="es"><![CDATA[percepción social]]></kwd>
<kwd lng="es"><![CDATA[plataforma X]]></kwd>
<kwd lng="en"><![CDATA[extortion]]></kwd>
<kwd lng="en"><![CDATA[floor collection]]></kwd>
<kwd lng="en"><![CDATA[social perception]]></kwd>
<kwd lng="en"><![CDATA[social network X]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agarwal]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Ravikumar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel approach to big data veracity using crowd-sourcing techniques and Bayesian predictors]]></article-title>
<source><![CDATA[Proceedings-2016 15th IEEE International Conference on Machine Learning and Applications (ICML a )]]></source>
<year>2017</year>
<page-range>1020-3</page-range><publisher-name><![CDATA[ACM Digital Library]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alten]]></surname>
<given-names><![CDATA[A.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Gadre]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Kulkarni]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[C.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analyzing happiness index based on geographical locations]]></article-title>
<source><![CDATA[2019 2nd International Conference on Artificial Intelligence and Big Data, ICAIBD 2019]]></source>
<year>2019</year>
<page-range>45-51</page-range><publisher-name><![CDATA[IEEE Explore]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Percepción social de la extorsión en las fronteras mexicanas: un análisis en X]]></article-title>
<source><![CDATA[PAAKAT. Revista de Tecnología y Sociedad]]></source>
<year>2025</year>
<volume>28</volume>
<numero>15</numero>
<issue>15</issue>
<page-range>1-24</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Duana]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Valencia]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Determinantes del gasto en seguridad como una forma de competitividad por micronegocio debido a la delincuencia. Un caso de estudio para el área metropolitana de Monterrey]]></article-title>
<source><![CDATA[Economía. Teoría y Práctica]]></source>
<year>2021</year>
<volume>29</volume>
<numero>55</numero>
<issue>55</issue>
<page-range>127-48</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortiz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Determinantes de la probabilidad de robo a micronegocios en el área metropolitana de Monterrey]]></article-title>
<source><![CDATA[Revista de Economía]]></source>
<year>2020</year>
<volume>37</volume>
<numero>94</numero>
<issue>94</issue>
<page-range>57-80</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortiz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Iturralde]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El robo a micronegocios y su interrelación con el entorno: un comparativo por género para la zona metropolitana de Monterrey]]></article-title>
<source><![CDATA[Revista de El Colegio de San Luis]]></source>
<year>2020</year>
<volume>10</volume>
<numero>21</numero>
<issue>21</issue>
<page-range>1-32</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efectos del crimen organizado sobre el desarrollo empresarial en la frontera noreste de México y Texas]]></article-title>
<source><![CDATA[Norteamérica]]></source>
<year>2024</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-27</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarado]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Valencia]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Iturralde]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Impacto del entorno social en el robo a microempresas del área metropolitana de Monterrey]]></article-title>
<source><![CDATA[Economía, Sociedad y Territorio]]></source>
<year>2019</year>
<volume>18</volume>
<numero>59</numero>
<issue>59</issue>
<page-range>1035-58</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrade]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las pandillas salvadoreñas y el delito de extorsión. Desafíos y prioridades en relación al fenómeno extorsivo]]></article-title>
<source><![CDATA[Revista Policía y Seguridad Pública]]></source>
<year>2015</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>103-48</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashwin]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kammarpally]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Veracity of information in Twitter data: a case study]]></article-title>
<source><![CDATA[2016 International Conference on Big Data and Smart Computing (Big Comp)]]></source>
<year>2016</year>
<page-range>129-36</page-range><publisher-name><![CDATA[IEEE Explore]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bodnar]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Tucker]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hopkinson]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bilén]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Increasing the veracity of event detection on social media networks through user trust modeling]]></article-title>
<source><![CDATA[Proceedings-2014 IEEE International Conference on Big Data (Big Data)]]></source>
<year>2015</year>
<page-range>636-43</page-range><publisher-name><![CDATA[IEEE Explore]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cabrera]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sistema nacional de extorsiones. Se afianza el modelo de la mafia siciliana]]></source>
<year>2014</year>
<publisher-name><![CDATA[Emeequis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Celedón]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Saleme]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pardo]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reflexiones sobre el delito de extorsión y los procesos cognoscitivos que se desarrollan en las víctimas y victimarios]]></article-title>
<source><![CDATA[Pensando Psicología]]></source>
<year>2009</year>
<volume>5</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>108-16</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adaptive cotraining svm for sentiment classification on tweets]]></article-title>
<source><![CDATA[CIKM ´13: Proceedings of the Conference on Neural Information Processing Systems (NIPS)]]></source>
<year>2013</year>
<page-range>2079-88</page-range><publisher-name><![CDATA[ACM Digital Library]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Echeburúa]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[De Corral]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Amor]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluación del daño psicológico en las víctimas de delitos violentos]]></article-title>
<source><![CDATA[Psicología Clínica, Legal y Forense]]></source>
<year>2004</year>
<numero>4</numero>
<issue>4</issue>
<page-range>227-44</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dumitrica]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Teruelle]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social media obstacles in grassroots civic mobilizations]]></article-title>
<source><![CDATA[ACM International Conference Proceeding Series]]></source>
<year>2018</year>
<page-range>71-81</page-range><publisher-name><![CDATA[ACM Digital Library]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goicoechea]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[La extorsión. Un estudio desde la fenomenología y la psicopatología]]></source>
<year>2018</year>
<publisher-name><![CDATA[Universidad del País Vasco]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrera]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sauceda]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La justicia restaurativa como mecanismo de solución alternativa en el delito de extorsión empresarial]]></article-title>
<source><![CDATA[Eirene. Estudios de Paz y Conflictos]]></source>
<year>2019</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>73-90</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>Instituto Nacional de Estadística y Geografía</collab>
<source><![CDATA[Catálogo Único de Claves de Áreas Geoestadísticas Estatales, Municipales y Localidades]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lara]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Extorsión y otros círculos del infierno]]></article-title>
<source><![CDATA[La extorsión, el gran desafío para las sociedades latinoamericanas]]></source>
<year>2013</year>
<publisher-name><![CDATA[Fundación Heinrich Böll Stiftung]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Liderar desde la seguridad y la salud]]></source>
<year>2016</year>
<publisher-name><![CDATA[FREMAP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lugmayr]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Stockleben]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Scheib]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mailaparampil]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cognitive big data: survey and review on big data research and its implications. What is really «new» in big data?]]></article-title>
<source><![CDATA[Journal of Knowledge Management]]></source>
<year>2017</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>197-212</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mantilla]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El delito de extorsión: momento consumativo y tentativa]]></article-title>
<source><![CDATA[Revista Universidad EAFIT]]></source>
<year>2015</year>
<page-range>52-75</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mehta]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mehta]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chheda]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chawan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sentiment analysis and influence tracking using Twitter]]></article-title>
<source><![CDATA[International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)]]></source>
<year>2012</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>72-9</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moncada]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lopera]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[¿Cómo comprender la extorsión hoy en Medellín?]]></article-title>
<source><![CDATA[Por la Democracia y la Paz]]></source>
<year>2017</year>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mondragón]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Posible, un antídoto contra la inseguridad pública]]></article-title>
<source><![CDATA[Cámara. Periodismo Legislativo]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kiciman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Boyd]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Counts]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Narcotweets: social media in wartime]]></article-title>
<source><![CDATA[Artificial Intelligence]]></source>
<year>2015</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>515-8</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SocioScope: a framework for understanding internet of social knowledge]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2018</year>
<numero>83</numero>
<issue>83</issue>
<page-range>358-65</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<collab>Observatorio Nacional Ciudadano de Seguridad, Justicia y Legalidad</collab>
<source><![CDATA[Estudio sobre los 5 delitos de alto impacto]]></source>
<year>2013</year>
<publisher-name><![CDATA[Observatorio Nacional Ciudadano de Seguridad, Justicia y Legalidad]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<collab>Observatorio Nacional Ciudadano de Seguridad, Justicia y Legalidad</collab>
<source><![CDATA[Reporte sobre delitos de alto impacto]]></source>
<year>2018</year>
<publisher-name><![CDATA[Observatorio Nacional Ciudadano de Seguridad, Justicia y Legalidad]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ottoni]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Cunha]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Magno]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bernardina]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Meira]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analyzing right-wing YouTube channels: hate, violence and discrimination]]></article-title>
<source><![CDATA[WebSci 2018-Proceedings of the 10th ACM Conference on Web Science]]></source>
<year>2018</year>
<page-range>323-32</page-range><publisher-name><![CDATA[ACM Digital Library]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paya]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Cardona]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Monsalve]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Montoya]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Extorsión: comportamiento del delito en el posconflicto comparado con otros delitos similares]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Cali, Colombia ]]></publisher-loc>
<publisher-name><![CDATA[Universidad ICESI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Santín]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Minería de datos: técnicas y herramientas]]></source>
<year>2007</year>
<publisher-name><![CDATA[Editorial Thompson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Vélez]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivas]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Vélez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evolución de la extorsión en México: un análisis estadístico regional (2012-2013)]]></article-title>
<source><![CDATA[Revista Mexicana de Opinión Pública]]></source>
<year>2015</year>
<numero>18</numero>
<issue>18</issue>
<page-range>112-35</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Plutchik]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Emotion: a psychoevolutionary synthesis]]></source>
<year>1980</year>
<publisher-name><![CDATA[Harper &amp; Row]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reforma penal: los beneficios procesales a favor de la víctima de delito]]></source>
<year>2008</year>
<publisher-name><![CDATA[Centro de Estudios Sociales y de Opinión Pública]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rojas]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[justicia y seguridad ven más corrupción]]></article-title>
<source><![CDATA[El Economista]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[De Choudhury]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling stress with social media around incidents of gun violence on college campuses]]></article-title>
<source><![CDATA[Proceedings of the ACM on Human-Computer Interaction, 1(CSCW)]]></source>
<year>2017</year>
<volume>1</volume>
<page-range>1-27</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salgado]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Creencias y conductas irracionales presentes en familiares y víctimas de secuestro y extorsión]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2010</year>
<volume>52</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>33-54</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Santoro]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Percepción social]]></article-title>
<source><![CDATA[Psicología social]]></source>
<year>2014</year>
<page-range>77-109</page-range><publisher-name><![CDATA[Trillas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<collab>Secretaría de Economía</collab>
<article-title xml:lang=""><![CDATA[Programa Sectorial de Economía 2020-2024]]></article-title>
<source><![CDATA[Diario Oficial de la Federación]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="">
<collab>Secretariado Ejecutivo del Sistema Nacional de Seguridad Pública</collab>
<source><![CDATA[Cifras de nueva metodología e incidencia del fuero común]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Senapati]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Njilla]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A method for scalable first-order rule learning on Twitter data]]></article-title>
<source><![CDATA[2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW)]]></source>
<year>2019</year>
<page-range>274-7</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Grado de percepción social sobre la violencia en México a partir de datos difundidos en la red social online de Twitter]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Veracruz, Veracruz, México ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Cristóbal Colón]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Paredes]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Marín]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Guzmán]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Percepción social sobre violencia en México desde la red social online de Twitter]]></article-title>
<source><![CDATA[Ponencia presentada en el IX Congreso de la Asociación Latinoamericana de Población]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Paredes]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Marín]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Guzmán]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Guarneros]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Measuring violence levels in Mexico through tweets]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Zapata-Cortés]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Alor-Hernández]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez-Ramírez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[García-Alcaraz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[New perspectives on enterprise decision-making applying artificial intelligence techniques]]></source>
<year>2021</year>
<page-range>XX</page-range><publisher-name><![CDATA[Springer Link]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suárez]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Velázquez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Yazdani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Socialbots supporting human rights]]></article-title>
<source><![CDATA[AIES 2018-Proceedings of the 2018 AAAI/ACM Conference on ai, ethics, and society]]></source>
<year>2018</year>
<page-range>290-6</page-range><publisher-name><![CDATA[ACM Digital Library]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suthanthira]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Karthika]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Veracity analysis of rumors in social media]]></article-title>
<source><![CDATA[2nd International Conference on Computer, Communication, and Signal Processing: Special Focus on Techno-logy and Innovation for Smart Environment, ICCCSP 2018]]></source>
<year>2018</year>
<page-range>1-4</page-range><publisher-name><![CDATA[ICAIBD Explore]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tinoco]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Extorsión en México ha aumentado 26% en los últimos años, según estudio del Senado]]></article-title>
<source><![CDATA[Infobae]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vaidya]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Votipka]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazurek]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sherr]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Does being verified make you more credible?]]></article-title>
<source><![CDATA[Proceedings of the 2019 chi Conference on Human Factors in Computing Systems - CHI &#8217;19]]></source>
<year>2019</year>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vilalta]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Los determinantes de la percepción de inseguridad frente al delito en México]]></source>
<year>2012</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
