Acceso abierto

Research on Social Network Data Analysis and Criminal Network Identification in Criminal Law

  
05 nov 2024

Cite
Descargar portada

Ghani, N. A., Hamid, S., Hashem, I. A. T., & Ahmed, E. (2019). Social media big data analytics: A survey. Computers in Human behavior, 101, 417-428. Search in Google Scholar

Camacho, D., Panizo-LLedot, A., Bello-Orgaz, G., Gonzalez-Pardo, A., & Cambria, E. (2020). The four dimensions of social network analysis: An overview of research methods, applications, and software tools. Information Fusion, 63, 88-120. Search in Google Scholar

Zhang, J., & Luo, Y. (2017, March). Degree centrality, betweenness centrality, and closeness centrality in social network. In 2017 2nd international conference on modelling, simulation and applied mathematics (MSAM2017) (pp. 300-303). Atlantis press. Search in Google Scholar

Rath, M., Pati, B., & Pattanayak, B. K. (2018). An overview on social networking: design, issues, emerging trends, and security. Social Network Analytics: Computational Research Methods and Techniques, 21. Search in Google Scholar

Lehrer, C., Wieneke, A., Vom Brocke, J. A. N., Jung, R., & Seidel, S. (2018). How big data analytics enables service innovation: materiality, affordance, and the individualization of service. Journal of Management Information Systems, 35(2), 424-460. Search in Google Scholar

Basu, K., & Sen, A. (2021). Identifying individuals associated with organized criminal networks: A social network analysis. Social Networks, 64, 42-54. Search in Google Scholar

Bailey, L., Harinam, V., & Ariel, B. (2020). Victims, offenders and victim-offender overlaps of knife crime: A social network analysis approach using police records. PLoS one, 15(12), e0242621. Search in Google Scholar

Rabasa, A., Schnaubelt, C. M., Chalk, P., Farah, D., Midgette, G., & Shatz, H. J. (2017). Counternetwork: Countering the expansion of transnational criminal networks. Rand Corporation. Search in Google Scholar

Diviák, T. (2018). Sinister connections: How to analyse organised crime with social network analysis?. Acta Universitatis Carolinae Philosophica et Historica, 24(2), 115-135. Search in Google Scholar

Colladon, A. F., & Remondi, E. (2017). Using social network analysis to prevent money laundering. Expert Systems with Applications, 67, 49-58. Search in Google Scholar

Lim, M., Abdullah, A., & Jhanjhi, N. Z. (2021). Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. Journal of King Saud University-Computer and Information Sciences, 33(10), 1202-1210. Search in Google Scholar

Fan, Y. O. U. R. O. N. G., Yang, T., Jiang, G. U. O. Q. I. N. G., Zhu, L., & Peng, R. U. X. I. A. N. G. (2017). Identifying criminals’ interactive behavior and social relations through data mining on call detail records. DEStech Transactions on Computer Science and Engineering (aiea). Search in Google Scholar

Tabassum, S., Pereira, F. S., Fernandes, S., & Gama, J. (2018). Social network analysis: An overview. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 8(5), e1256. Search in Google Scholar

Freeman, L. C. (2017). Research methods in social network analysis. Routledge. Search in Google Scholar

Fu, W., Liu, S., & Srivastava, G. (2019). Optimization of big data scheduling in social networks. Entropy, 21(9), 902. Search in Google Scholar

McAndrew, D. (2021). The structural analysis of criminal networks. In The social psychology of crime (pp. 51-94). Routledge. Search in Google Scholar

Ahmadi, Z., Nguyen, H. H., Zhang, Z., Bozhkov, D., Kudenko, D., Jofre, M., ... & Solewicz, Y. (2023). Inductive and transductive link prediction for criminal network analysis. Journal of Computational Science, 72, 102063. Search in Google Scholar

Asif, W., Ray, I. G., Tahir, S., & Rajarajan, M. (2018, June). Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. In 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp. 329-334). IEEE. Search in Google Scholar

Chenwei Zhang,Ying Wang,Tao Zheng & Kaifeng Zhang.(2024).Complex network theory-based optimization for enhancing resilience of large-scale multi-energy System.Applied Energy123593-. Search in Google Scholar

Zehua Si, Zhixue He, Chen Shen & Jun Tanimoto. (2024). Mixed strategy approach destabilizes cooperation in finite populations with clustering coefficient.Chaos (Woodbury, N.Y.)(5), Search in Google Scholar

Nina Taylor,M Margaret Dolcini,Joseph A Catania,Gary Harper,Audrey Cristobal & April Timmons Tyler.(2024).Examining Sexual Health Organizational Networks in Urban African American Communities Using Social Network Theory. American journal of health promotion: AJHP89011712412 40211-8901171241240211. Search in Google Scholar