{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:20:51Z","timestamp":1759962051595},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_18","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T04:01:31Z","timestamp":1196481691000},"page":"232-248","source":"Crossref","is-referenced-by-count":29,"title":["Untangling Criminal Networks: A Case Study"],"prefix":"10.1007","author":[{"given":"Jennifer","family":"Xu","sequence":"first","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"issue":"17","key":"18_CR1","first-page":"17","volume":"38","author":"T. Anderson","year":"1994","unstructured":"Anderson, T., Arbetter, L., Benawides, A., Longmore-Etheridge, A.: Security works. Security Management, Vol. 38, No. 17. (1994) 17\u201320.","journal-title":"Security Management"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/0022-2496(78)90034-2","volume":"17","author":"P. Arabie","year":"1978","unstructured":"Arabie, P., Boorman, S. A., Levitt, P. R.: Constructing blockmodels: How and why. Journal of Mathematical Psychology, Vol. 17. (1978) 21\u201363.","journal-title":"Journal of Mathematical Psychology"},{"issue":"12","key":"18_CR3","doi-asserted-by":"publisher","first-page":"837","DOI":"10.2307\/2095954","volume":"58","author":"W. E. Baker","year":"1993","unstructured":"Baker, W. E., Faulkner R. R.: The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. American Sociological Review, Vol. 58, No. 12. (1993) 837\u2013860.","journal-title":"American Sociological Review"},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.2307\/2577097","volume":"55","author":"R. S. Burt","year":"1976","unstructured":"Burt, R. S.: Positions in networks. Social Forces, Vol. 55, No. 1. (1976) 93\u2013122.","journal-title":"Social Forces"},{"issue":"5","key":"18_CR5","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/21.179830","volume":"22","author":"H. Chen","year":"1992","unstructured":"Chen, H., Lynch, K. J.: Automatic construction of networks of concepts characterizing document databases. IEEE Transactions on Systems, Man and Cybernetics, Vol. 22, No. 5. (1992) 885\u2013902.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"issue":"4","key":"18_CR6","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1093\/comjnl\/20.4.364","volume":"20","author":"D. Defays","year":"1977","unstructured":"Defays, D.: An efficient algorithm for a complete link method. Computer Journal, Vo. 20, No. 4. (1977) 364\u2013366.","journal-title":"Computer Journal"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"E. Dijkstra","year":"1959","unstructured":"Dijkstra, E.: A note on two problems in connection with graphs, Numerische Mathematik, Vol. 1. (1959) 269\u2013271.","journal-title":"Numerische Mathematik"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1020723730930","volume":"8","author":"M. J. Dombroski","year":"2002","unstructured":"Dombroski, M. J., Carley, K. M.: NETEST: Estimating a terrorist network\u2019s structure. Computational & Mathematical Organization Theory, Vol. 8. (2002) 235\u2013241.","journal-title":"Computational & Mathematical Organization Theory"},{"key":"18_CR9","first-page":"181","volume-title":"Interorganizational Decision-making","author":"W. M. Evan","year":"1972","unstructured":"Evan, W. M.: An organization-set model of interorganizational relations. In: M. Tuite, R. Chisholm, M. Radnor (eds.): Interorganizational Decision-making. Aldine, Chicago (1972) 181\u2013200."},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L. Freeman","year":"1979","unstructured":"Freeman, L.: Centrality in social networks: Conceptual clarification. Social Networks, Vol. 1. (1979) 215\u2013239.","journal-title":"Social Networks"},{"key":"18_CR11","unstructured":"Goldberg, H. G., Senator, T. E.: Restructuring databases for knowledge discovery by consolidation and link formation. In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis, (1998)."},{"issue":"2","key":"18_CR12","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1177\/001872087501700206","volume":"17","author":"W. R. Harper","year":"1975","unstructured":"Harper, W. R., Harris, D. H.: The application of link analysis to police intelligence. Human Factors, Vol. 17, No. 2. (1975) 157\u2013164.","journal-title":"Human Factors"},{"issue":"3","key":"18_CR13","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/2.989927","volume":"35","author":"R. V. Hauck","year":"2002","unstructured":"Hauck, R. V., Atabakhsh, H., Ongvasith, P., Gupta, H., Chen H.: Using Coplink to analyze criminal-justice data. IEEE Computer, Vol. 35, No. 3. (2002) 30\u201337.","journal-title":"IEEE Computer"},{"issue":"3","key":"18_CR14","first-page":"53","volume":"24","author":"P. Klerks","year":"2001","unstructured":"Klerks, P.: The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands, Connections, Vo. 24, No. 3. (2001) 53\u201365.","journal-title":"Recent developments in the Netherlands, Connections"},{"issue":"3","key":"18_CR15","first-page":"43","volume":"24","author":"V. E. Krebs","year":"2001","unstructured":"Krebs, V. E.: Mapping networks of terrorist cells. Connections, Vo. 24, No. 3. (2001) 43\u201352.","journal-title":"Connections"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/0022250X.1971.9989788","volume":"1","author":"F. P. Lorrain","year":"1971","unstructured":"Lorrain, F. P., White, H. C.: Structural equivalence of individuals in social networks, Journal of Mathematical Sociology, Vol. 1. (1971) 49\u201380.","journal-title":"Journal of Mathematical Sociology"},{"key":"18_CR17","first-page":"53","volume-title":"The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III","author":"D. McAndrew","year":"1999","unstructured":"McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.): The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III, Aldershot, Dartmouth (1999) 53\u201394."},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1023\/A:1008354713842","volume":"32","author":"J. S. McIllwain","year":"1999","unstructured":"McIllwain, J. S.: Organized crime: A social network approach. Crime, Law & Social Change, Vol. 32. (1999). 301\u2013323.","journal-title":"Crime, Law & Social Change"},{"key":"18_CR19","unstructured":"Ronfeldt, D., Arquilla, J.: What next for networks and netwars? In: Arquilla, J., Ronfeldt, D. (eds.): Networks and Netwars: The Future of Terror, Crime, and Militancy. Rand Press, (2001)."},{"key":"18_CR20","unstructured":"Saether, M., Canter, D.V.: A structural analysis of fraud and armed robbery networks in Norway. In Proceedings of the 6th International Investigative Psychology Conference, Liverpool, (2001)."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"M. K. Sparrow","year":"1991","unstructured":"Sparrow, M. K.: The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, Vol. 13. (1991) 251\u2013274.","journal-title":"Social Networks"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/BF02288916","volume":"17","author":"W. S. Torgerson","year":"1952","unstructured":"Torgerson, W. S.: Multidimensional scaling: Theory and method. Psychometrika, Vol. 17. (1952) 401\u2013419.","journal-title":"Psychometrika"},{"key":"18_CR23","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications, Cambridge, Cambridge University Press, (1994)."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T01:18:14Z","timestamp":1551143894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}