Skip to main content

Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime

  • Conference paper
Intelligence and Security Informatics (ISI 2008)

Abstract

We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other civil security decision-makers the ability to achieve predictive situation awareness. Techniques based on these ideas have been demonstrated in the EU PASR project HiTS/ISAC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Raab, J., Milward, H.B.: Dark networks as problems. J. Public Administration Research and Theory 13(4), 413–439 (2003)

    Article  Google Scholar 

  2. Chang, K.C.-C., He, B., Li, C., Patel, M., Zhang, Z.: Structured Databases on the Web: Observations and Implications. SIGMOD Record 33(3), 61–70 (2004)

    Article  Google Scholar 

  3. Popp, R., Poindexter, J.: Countering terrorism through information and privacy protection technologies. IEEE Security & Privacy, 18–27 (November/December 2006)

    Google Scholar 

  4. Sköld, M.: Social Network Visualization. M Sc thesis report, KTH School of Computer Science and Communication, Stockholm, Sweden (2008)

    Google Scholar 

  5. Asadi, H.C.: Design and Implementation of a Middleware for Data Analysis of Social Networks. M Sc thesis report, KTH School of Computer Science and Communication, Stockholm, Sweden (2007)

    Google Scholar 

  6. Kjaerulff, U.B., Madsen, A.L.: Bayesian Networks and Influence Diagrams. A Guide to Construction and Analysis. Springer, New York (2008)

    MATH  Google Scholar 

  7. Koelle, D., Pfautz, J., Farry, M., Cox, Z., Catto, G., Campolongo, J.: Applications of Bayesian Belief Networks in Social Network Analysis. In: Proc. of the 4th Bayesian Modelling Applications Workshop (2006)

    Google Scholar 

  8. Pan, A., Raposo, J., Álvarez, M., Montoto, P., Orjales, V., Hidalgo, J., Ardao, L., Molano y Ángel Viña, A.: The DENODO Data Integration Platform. In: Proc. 28th Int. VLDB Conf., pp. 986–989. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  9. Carley, K.M., Lee, J.-S., Krackhardt, D.: Destabilizing Networks. Connections 24(3), 79–92 (2002)

    Google Scholar 

  10. Carley, K.M.: Estimating Vulnerabilities in Large Covert Networks. In: Proc. of the 2004 International Symposium on Command and Control Research and Technology. Evidence Based Research, Vienna, VA, USA (2004)

    Google Scholar 

  11. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

    Book  Google Scholar 

  12. Redner, S.: Citation Statistics from 110 Years of Physical Review. Physics Today 58, 49 (2005)

    Article  Google Scholar 

  13. Page, L., Brin, S.: The Anatomy of a Large-Scale Hypertextual Web Search Engine. In: Proceedings of the Seventh International World Wide Web Conference, vol. 30(1-7), pp. 107–117 (1998)

    Google Scholar 

  14. Newman, M.E.J.: A Measure of Betweenness Centrality Based on Random Walks. Social Networks 27, 39–54 (2005)

    Article  Google Scholar 

  15. Svenson, P., Mårtenson, C., Carling, C.: Complex Networks: Models and Dynamics, Swedish Defence Research Agency Technical Report FOI-R—1766—SE, Stockholm, Sweden (2005)

    Google Scholar 

  16. Clauset, A., Newman, M.E.J., Moore, C.: Finding Community Structure in Very Large Networks. Physical Review E70, 066111 (2004)

    Google Scholar 

  17. Newman, M.E.J.: Modularity and Community Structure in Networks. Proc. Natl. Acad. Sci. USA 103, 8577–8582 (2006), http://arxiv.org/abs/physics/0602124

    Article  Google Scholar 

  18. Klerks, P.: The Network Paradigm Applied to Criminal Organizations: Theoretical Nitpicking or a Relevant Doctrine for Investigators? Recent Developments in the Netherlands. Connections 24(3), 53–65 (2001)

    Google Scholar 

  19. Gottschalk, P.: Stages of Knowledge Management Systems in Police Investigations. Knowledge-Based Systems 19, 381–387 (2006)

    Article  Google Scholar 

  20. Proceedings of the International Conferences on Information Fusion 1998-2005. International Society of Information Fusion, Mountain View, CA, USA

    Google Scholar 

  21. Bass, T.: Intrusion Detection Systems and Multi-sensor Data Fusion. Comm. ACM 43(4), 99–105 (2000)

    Article  Google Scholar 

  22. Fredriksson, J., Svensson, P., Risch, T.: Mediator-Based Evolutionary Design and Development of Image Meta-Analysis Environments. J. Intell. Information Systems 17(2/3), 301–322 (2001)

    Article  MATH  Google Scholar 

  23. Ackerman, M.S.: The Intellectual Challenge of CSCW: The Gap between Social Requirements and Technical Feasibility. Human-Computer Interaction 15, 179–203 (2000)

    Article  Google Scholar 

  24. Jensen, D.: PROXIMITY 4.2 Tutorial. Knowledge Discovery Laboratory, Department of Computer Science, University of Massachusetts at Amherst (2006)

    Google Scholar 

  25. Manegold, S., Boncz, P.A., Kersten, M.L.: Optimizing Database Architecture for the New Bottleneck: Memory Access. VLDB Journal 9(9), 231–246 (2000)

    Article  MATH  Google Scholar 

  26. Heer, J., Card, S.K., Landay, J.A.: Prefuse: a Toolkit for Interactive Information Visualization. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Portland, Oregon, USA (2005)

    Google Scholar 

  27. International Society of Information Fusion, http://www.isif.org (accessed 2008-03-27)

  28. http://www.denodo.com (accessed 2008-03-27)

  29. http://jung.sourceforge.net/ (accessed 2008-03-27)

  30. http://www.hugin.com (accessed 2008-03-27)

  31. http://tools.ietf.org/html/rfc3550 (accessed 2008-03-27)

  32. http://www.hits-isac.eu/ (accessed 2008-03-2)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ferrara, L. et al. (2008). Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69304-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69136-5

  • Online ISBN: 978-3-540-69304-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics