Central Actor Identification of Crime Group using Semantic Social Network Analysis
Abstract
Keywords
Full Text:
PDFReferences
G. Marciani, M. Porretta, M. Nardelli, and G. F. Italiano, “A data streaming approach to link mining in criminal networks,” Proc. - 2017 5th Int. Conf. Futur. Internet Things Cloud Work. W-FiCloud 2017, pp. 138–143, 2017.
M. a. Tayebi and U. Glasser, “Organized Crime Structures in Co-offending Networks,” 2011 IEEE Ninth Int. Conf. Dependable, Auton. Secur. Comput., pp. 846–853, 2011.
S. M. Alam, N. Islam, and M. S. Hosain, “Detecting most central actors of an unknown network using friendship paradox,” in 2016 International Conference on Informatics and Computing, ICIC 2016, 2017, pp. 343–348.
A. Rasheed, U. K. Wiil, and M. Niazi, “Evaluating PEVNET: A framework for visualization of criminal networks,” Commun. Comput. Inf. Sci., vol. 540, no. Asonam, pp. 131–149, 2015.
K. Taha and P. D. Yoo, “SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 4, pp. 811–822, 2016.
S. Ahajjam, M. El Haddad, and H. Badir, “Influentials identification for community detection in complex networks,” Colloq. Inf. Sci. Technol. Cist, pp. 111–115, 2017.
H. Sarvari, E. Abozinadah, A. Mbaziira, and D. Mccoy, “Constructing and Analyzing Criminal Networks,” 2014 IEEE Secur. Priv. Work., pp. 84–91, 2014.
R. Maddox, R. Davey, R. Lovett, A. Van Der Sterren, J. Corbett, and T. Cochrane, “A systematic review protocol: Social network analysis of tobacco use,” Syst. Rev., vol. 3, no. 1, pp. 1–5, 2014.
D. Jarman, E. Theodoraki, H. Hall, and J. Ali-Knight, “Social network analysis and festival cities: an exploration of concepts, literature and methods,” Int. J. Event Festiv. Manag., vol. 5, no. 3, pp. 311–322, 2014.
O. Dziadkowiec, S. Wituk, and D. Franklin, “A social network analysis of South Central Kansas Workforce Innovations in Regional Economic Development,” J. Place Manag. Dev., vol. 8, no. 1, pp. 6–22, 2015.
B. K. Wichmann and L. Kaufmann, “Social network analysis in supply chain management research,” Int. J. Phys. Distrib. Logist. Manag., vol. 46, no. 8, pp. 740–762, 2016.
A. Mangas-Vega, R. Gomez-Diaz, and J. A. Cordon-Garcia, “Approach to self-publishing with a combination of bibliometric study and social network analysis techniques,” Electron. Libr., vol. 34, no. 6, pp. 902–914, 2016.
V. L. M. Schropfer, J. Tah, and E. Kurul, “Mapping the knowledge flow in sustainable construction project teams using social network analysis,” Eng. Constr. Archit. Manag., vol. 24, no. 2, pp. 229–259, 2017.
B. J. Kim, H.-G. Park, and J.-B. Chung, “Social network analysis of the Korean disaster-safety industry,” Disaster Prev. Manag., vol. 27, no. 1, pp. 28–42, 2018.
A. El Kassiri and F. Z. Belouadha, “Towards a unified semantic model for online social networks analysis and interoperability,” 2015 10th Int. Conf. Intell. Syst. Theor. Appl. SITA 2015, 2015.
F. Bisio, C. Meda, R. Zunino, R. Surlinelli, E. Scillia, and A. Ottaviano, “Real-time monitoring of Twitter traffic by using semantic networks,” Proc. 2015 IEEE/ACM Int. Conf. Adv. Soc. Networks Anal. Min. 2015 - ASONAM ’15, pp. 966–969, 2015.
C. Fu, L. Chuang, Y. Jiahai, and X. Yuemei, “A study on online social networks theme semantic computing model,” Proc. - 2016 IEEE Int. Conf. Web Serv. ICWS 2016, pp. 244–251, 2016.
P. S. Raji and S. Surendran, “RDF approach on social network analysis,” Int. Conf. Res. Adv. Integr. Navig. Syst. RAINS 2016, pp. 6–9, 2016.
P. Seidler, R. Adderley, A. Badii, and M. Raffaelli, “MOSAIC: Criminal network analysis for multi-modal surveillance and decision support,” ASONAM 2014 - Proc. 2014 IEEE/ACM Int. Conf. Adv. Soc. Networks Anal. Min., no. Asonam, pp. 257–260, 2014.
G. Oatley and B. Ewart, “Data mining and crime analysis,” Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 1, no. 2, pp. 147–153, 2011.
K. Taha and P. D. Yoo, “A System for Analyzing Criminal Social Networks,” Proc. 2015 IEEE/ACM Int. Conf. Adv. Soc. Networks Anal. Min. 2015 - ASONAM ’15, pp. 1017–1023, 2015.
M. A. Tayebi, L. Bakker, U. Glässer, and V. Dabbaghian, “Locating Central Actors in Co-offending Networks,” 2011 Int. Conf. Adv. Soc. Networks Anal. Min., pp. 171–179, 2011.
C. Morselli, Inside Criminal Networks, vol. 8. 2009.
T. Dörfler, E. Stollenwerk, and J. Schibberges, Uncovering Covert Structures: Social Network Analysis and Terrorist Organizations. 2019.
G. S. Lee and M. A. Djauhari, “An Overall Centrality Measure : The Case of U . S Stock Market,” Int. J. Basic Appl. Sci., vol. 12, no. 06, pp. 99–104, 2012.
R. Zafarani, M. A. Abbasi, and H. Liu, “Social Media Mining An Introduction,” Cambridge Univ. Press, p. 382, 2014.
M. Naderifar, H. Goli, and F. Ghaljaie, “Snowball Sampling: A Purposeful Method of Sampling in Qualitative Research,” Strides Dev. Med. Educ., vol. 14, no. 3, Sep. 2017.
A. von der Fehr, J. Sølberg, and J. Bruun, “Validation of networks derived from snowball sampling of municipal science education actors,” Int. J. Res. Method Educ., 2018.
J. Illenberger, M. Kowald, K. W. Axhausen, and K. Nagel, “Insights into a spatially embedded social network from a large-scale snowball sample,” in European Physical Journal B, 2011.
R. Miller and J. Brewer, “Sampling, snowball: accessing hidden and hard-to-reach populations,” in The A-Z of Social Research, 2016.
DOI: https://doi.org/10.24002/ijis.v2i1.2354
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Indonesian Journal of Information Systems

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.