Central Actor Identification of Crime Group using Semantic Social Network Analysis

Sylvert Prian Tahalea, Azhari SN


The Police as law enforcers who authorize in terms of social protection are expected to do both the prevention and investigation efforts also the settlement of criminal cases that occurred in the society. This research can help police to identify the main actor faster and leads to solving crime-cases. The use of overall centrality is very helpful in determining the main actors from other centrality measures. The purpose of this research is to identify the central actor of crimes done by several people. Semantic Social Network Analysis is used to perform central actor identification using five centrality measurements, such as degree centrality, betweenness centrality, closeness centrality, eigenvector centrality, and overall centrality. As for the relationship between actors, this research used social relation such as friendship, colleague, family, date or lover, and acquaintances. The relationship between actors is measured by first four centrality measures then accumulated by overall centrality to determine the main actor. The result showed 80.39% accuracy from 102 criminal cases collected with at least 3 actors involved in each case.


Social Network Analysis; overall centrality; crime group; central actor

Full Text:



G. Marciani, M. Porretta, M. Nardelli, and G. F. Italiano, “A data streaming approach to link mining in criminal networks,” Proc. - 2017 5th Int. Conf. Futur. Internet Things Cloud Work. W-FiCloud 2017, pp. 138–143, 2017.

M. a. Tayebi and U. Glasser, “Organized Crime Structures in Co-offending Networks,” 2011 IEEE Ninth Int. Conf. Dependable, Auton. Secur. Comput., pp. 846–853, 2011.

S. M. Alam, N. Islam, and M. S. Hosain, “Detecting most central actors of an unknown network using friendship paradox,” in 2016 International Conference on Informatics and Computing, ICIC 2016, 2017, pp. 343–348.

A. Rasheed, U. K. Wiil, and M. Niazi, “Evaluating PEVNET: A framework for visualization of criminal networks,” Commun. Comput. Inf. Sci., vol. 540, no. Asonam, pp. 131–149, 2015.

K. Taha and P. D. Yoo, “SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 4, pp. 811–822, 2016.

S. Ahajjam, M. El Haddad, and H. Badir, “Influentials identification for community detection in complex networks,” Colloq. Inf. Sci. Technol. Cist, pp. 111–115, 2017.

H. Sarvari, E. Abozinadah, A. Mbaziira, and D. Mccoy, “Constructing and Analyzing Criminal Networks,” 2014 IEEE Secur. Priv. Work., pp. 84–91, 2014.

R. Maddox, R. Davey, R. Lovett, A. Van Der Sterren, J. Corbett, and T. Cochrane, “A systematic review protocol: Social network analysis of tobacco use,” Syst. Rev., vol. 3, no. 1, pp. 1–5, 2014.

D. Jarman, E. Theodoraki, H. Hall, and J. Ali-Knight, “Social network analysis and festival cities: an exploration of concepts, literature and methods,” Int. J. Event Festiv. Manag., vol. 5, no. 3, pp. 311–322, 2014.

O. Dziadkowiec, S. Wituk, and D. Franklin, “A social network analysis of South Central Kansas Workforce Innovations in Regional Economic Development,” J. Place Manag. Dev., vol. 8, no. 1, pp. 6–22, 2015.

B. K. Wichmann and L. Kaufmann, “Social network analysis in supply chain management research,” Int. J. Phys. Distrib. Logist. Manag., vol. 46, no. 8, pp. 740–762, 2016.

A. Mangas-Vega, R. Gomez-Diaz, and J. A. Cordon-Garcia, “Approach to self-publishing with a combination of bibliometric study and social network analysis techniques,” Electron. Libr., vol. 34, no. 6, pp. 902–914, 2016.

V. L. M. Schropfer, J. Tah, and E. Kurul, “Mapping the knowledge flow in sustainable construction project teams using social network analysis,” Eng. Constr. Archit. Manag., vol. 24, no. 2, pp. 229–259, 2017.

B. J. Kim, H.-G. Park, and J.-B. Chung, “Social network analysis of the Korean disaster-safety industry,” Disaster Prev. Manag., vol. 27, no. 1, pp. 28–42, 2018.

A. El Kassiri and F. Z. Belouadha, “Towards a unified semantic model for online social networks analysis and interoperability,” 2015 10th Int. Conf. Intell. Syst. Theor. Appl. SITA 2015, 2015.

F. Bisio, C. Meda, R. Zunino, R. Surlinelli, E. Scillia, and A. Ottaviano, “Real-time monitoring of Twitter traffic by using semantic networks,” Proc. 2015 IEEE/ACM Int. Conf. Adv. Soc. Networks Anal. Min. 2015 - ASONAM ’15, pp. 966–969, 2015.

C. Fu, L. Chuang, Y. Jiahai, and X. Yuemei, “A study on online social networks theme semantic computing model,” Proc. - 2016 IEEE Int. Conf. Web Serv. ICWS 2016, pp. 244–251, 2016.

P. S. Raji and S. Surendran, “RDF approach on social network analysis,” Int. Conf. Res. Adv. Integr. Navig. Syst. RAINS 2016, pp. 6–9, 2016.

P. Seidler, R. Adderley, A. Badii, and M. Raffaelli, “MOSAIC: Criminal network analysis for multi-modal surveillance and decision support,” ASONAM 2014 - Proc. 2014 IEEE/ACM Int. Conf. Adv. Soc. Networks Anal. Min., no. Asonam, pp. 257–260, 2014.

G. Oatley and B. Ewart, “Data mining and crime analysis,” Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 1, no. 2, pp. 147–153, 2011.

K. Taha and P. D. Yoo, “A System for Analyzing Criminal Social Networks,” Proc. 2015 IEEE/ACM Int. Conf. Adv. Soc. Networks Anal. Min. 2015 - ASONAM ’15, pp. 1017–1023, 2015.

M. A. Tayebi, L. Bakker, U. Glässer, and V. Dabbaghian, “Locating Central Actors in Co-offending Networks,” 2011 Int. Conf. Adv. Soc. Networks Anal. Min., pp. 171–179, 2011.

C. Morselli, Inside Criminal Networks, vol. 8. 2009.

T. Dörfler, E. Stollenwerk, and J. Schibberges, Uncovering Covert Structures: Social Network Analysis and Terrorist Organizations. 2019.

G. S. Lee and M. A. Djauhari, “An Overall Centrality Measure : The Case of U . S Stock Market,” Int. J. Basic Appl. Sci., vol. 12, no. 06, pp. 99–104, 2012.

R. Zafarani, M. A. Abbasi, and H. Liu, “Social Media Mining An Introduction,” Cambridge Univ. Press, p. 382, 2014.

M. Naderifar, H. Goli, and F. Ghaljaie, “Snowball Sampling: A Purposeful Method of Sampling in Qualitative Research,” Strides Dev. Med. Educ., vol. 14, no. 3, Sep. 2017.

A. von der Fehr, J. Sølberg, and J. Bruun, “Validation of networks derived from snowball sampling of municipal science education actors,” Int. J. Res. Method Educ., 2018.

J. Illenberger, M. Kowald, K. W. Axhausen, and K. Nagel, “Insights into a spatially embedded social network from a large-scale snowball sample,” in European Physical Journal B, 2011.

R. Miller and J. Brewer, “Sampling, snowball: accessing hidden and hard-to-reach populations,” in The A-Z of Social Research, 2016.

DOI: https://doi.org/10.24002/ijis.v2i1.2354


  • There are currently no refbacks.

Copyright (c) 2019 Indonesian Journal of Information Systems

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.