{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:10:07Z","timestamp":1773655807243,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030375447","type":"print"},{"value":"9783030375454","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:00:00Z","timestamp":1575936000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37545-4_12","type":"book-chapter","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T15:04:51Z","timestamp":1575990291000},"page":"181-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Towards Designing a Knowledge Graph-Based Framework for Investigating and Preventing Crime on Online Social Networks"],"prefix":"10.1007","author":[{"given":"Ogerta","family":"Elezaj","sequence":"first","affiliation":[]},{"given":"Sule Yildirim","family":"Yayilgan","sequence":"additional","affiliation":[]},{"given":"Edlira","family":"Kalemi","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Wendelberg","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Abomhara","sequence":"additional","affiliation":[]},{"given":"Javed","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-07632-4_1","volume-title":"Social Computing and Social Media","author":"A Abdalla","year":"2014","unstructured":"Abdalla, A., Yayilgan, S.Y.: A review of using online social networks for investigative activities. In: Meiselwitz, G. (ed.) SCSM 2014. LNCS, vol. 8531, pp. 3\u201312. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07632-4_1"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ali, M.M., Mohammed, K.M., Rajamani, L.: Framework for surveillance of instant messages in instant messengers and social networking sites using data mining and ontology. In: Proceedings of the 2014 IEEE Students Technology Symposium (2014)","DOI":"10.1109\/TechSym.2014.6808064"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-016-0321-5","volume":"15","author":"A Almaatouq","year":"2016","unstructured":"Almaatouq, A., et al.: If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int. J. Inf. Secur. 15, 1\u201317 (2016)","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"12_CR4","doi-asserted-by":"publisher","first-page":"01","DOI":"10.5121\/ijdkp.2015.5401","volume":"5","author":"Tahani Almanie","year":"2015","unstructured":"Almanie, T., Mirza, R., Lor, E.: Crime prediction based on crime types and using spatial and temporal criminal hotspots. Int. J. Data Min. Knowl. Manag. Process 5(4), 01\u201319 (2015)","journal-title":"International Journal of Data Mining & Knowledge Management Process"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Alsubaiee, S., Carey, M.J., Li, C.: LSM-based storage and indexing: an old idea with timely benefits. In: ACM Workshop on Managing and Mining Enriched Geo-Spatial Data - GeoRich 2015, pp. 1\u20136 (2015)","DOI":"10.1145\/2786006.2786007"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/978-3-319-49340-4_17","volume-title":"Handbook of Big Data Technologies","author":"AP Appel","year":"2017","unstructured":"Appel, A.P., Moyano, L.G.: Link and graph mining in the big data era. In: Zomaya, A., Sakr, S. (eds.) Handbook of Big Data Technologies, pp. 583\u2013616. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-49340-4_17"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.diin.2019.04.002","volume":"29","author":"H Arshad","year":"2019","unstructured":"Arshad, H., Jantan, A., Hoon, G., Butt, A.: A multilayered semantic framework for integrated forensic acquisition on social media. Digit. Invest. 29, 147\u2013158 (2019)","journal-title":"Digit. Invest."},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-01172-6_10","volume-title":"The Social Semantic Web","author":"John G. Breslin","year":"2009","unstructured":"Breslin, J., Bojars, U., Passant, A., Fernandez, S., Decker, S.: SIOC: content exchange and semantic interoperability between social networks. In: W3C Workshop on the Future of Social Networking, pp. 15\u201316 (2009)"},{"key":"12_CR9","unstructured":"Brusa, G., Caliusco, M.L., Chiotti, O.: A process for building a domain ontology: an experience in developing a government budgetary ontology. In: 2nd Australasian Workshop on Advances in Ontologies, Hobart, TAS, Australia, 72, pp. 7\u201315 (2006)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/s13278-014-0206-4","volume":"4","author":"P Burnap","year":"2014","unstructured":"Burnap, P., et al.: Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Soc. Netw. Anal. Min. 4, 206 (2014)","journal-title":"Soc. Netw. Anal. Min."},{"key":"12_CR11","unstructured":"Caviglione, L., Wendzel, S., Mazurczyk, W.: The future of digital forensics: challenges and the road ahead. In: IEEE Security and Privacy, vol. 6, pp. 12\u201317 (2017). Investigation, vol. 29, pp. 147\u2013158 (2019)"},{"issue":"3","key":"12_CR12","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0167-9236(02)00121-5","volume":"34","author":"H Chen","year":"2003","unstructured":"Chen, H., Schroeder, J., Hauck, R.V., et al.: COPLINK connect: information and knowledge management for law enforcement. Decis. Support Syst. 34(3), 271\u2013285 (2003)","journal-title":"Decis. Support Syst."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Chen, Y., Chen, Y.: Decomposing DAGs into spanning trees: a new way to compress transitive closures. In: 2011 IEEE 27th International Conference on Data Engineering, Hannover, pp. 1007\u20131018 (2011)","DOI":"10.1109\/ICDE.2011.5767832"},{"issue":"2","key":"12_CR14","first-page":"7","volume":"13","author":"J Cosic","year":"2015","unstructured":"Cosic, J., Baca, M.: Leveraging DEMF to ensure and represent 5ws&1h in digital forensic domain. Int. J. Comput. Sci. Inf. Secur. 13(2), 7 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ijsl.2006.09.002","volume":"34","author":"G Dean","year":"2006","unstructured":"Dean, G., Fahsing, I.A., Gottschalk, P.: Profiling police investigative thinking: a study of police officers in Norway. Int. J. Sociol. Law 34, 221\u2013228 (2006)","journal-title":"Int. J. Sociol. Law"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Elbattah, M., Roushdy, M., Aref, M., Salem, A.M.: Large-scale ontology storage and query using graph database-oriented approach: the case of freebase, pp. 39\u201343 (2015)","DOI":"10.1109\/IntelCIS.2015.7397191"},{"key":"12_CR17","doi-asserted-by":"crossref","DOI":"10.3138\/9781442678590","volume-title":"Policing the Risk Society","author":"RV Ericson","year":"1997","unstructured":"Ericson, R.V., Haggerty, K.: Policing the Risk Society. University of Toronto Press, Toronto (1997)"},{"key":"12_CR18","unstructured":"Europol. Crime in the age of technology, Europol unclassified - Basic protection level, The Hague 12.10.207, EDOC#924156v7 (2017)"},{"issue":"5\u20136","key":"12_CR19","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"TR Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Int. J. Hum Comput. Stud. 43(5\u20136), 907\u2013928 (1995)","journal-title":"Int. J. Hum Comput. Stud."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Gupta, A., Tyagi, S., Panwar, N., Sachdeva, S., Saxena, U.: NoSQL databases: critical analysis and comparison. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN) (2017)","DOI":"10.1109\/IC3TSN.2017.8284494"},{"issue":"2","key":"12_CR21","first-page":"139","volume":"43","author":"G Hart","year":"1996","unstructured":"Hart, G.: The five W\u2019s: an old tool for the new task of task analysis. Tech. Commun. 43(2), 139\u2013145 (1996)","journal-title":"Tech. Commun."},{"issue":"4","key":"12_CR22","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/2771588","volume":"47","author":"M Imran","year":"2015","unstructured":"Imran, M., Castillo, C., Diaz, F., Vieweg, S.: Processing social media messages in mass emergency: a survey. ACM Comput. Surv. 47(4), 67 (2015)","journal-title":"ACM Comput. Surv."},{"issue":"2\/3","key":"12_CR23","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1504\/IJMSO.2017.090756","volume":"12","author":"E Kalemi","year":"2017","unstructured":"Kalemi, E., Yildirim, S., Domnori, E., Elezaj, O.: SMONT: an ontology for crime solving through social media. Int. J. Metadata Semant. Ontol. 12(2\/3), 71\u201381 (2017)","journal-title":"Int. J. Metadata Semant. Ontol."},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-319-20367-6_16","volume-title":"Social Computing and Social Media","author":"Z Kastrati","year":"2015","unstructured":"Kastrati, Z., Imran, A.S., Yildirim-Yayilgan, S., Dalipi, F.: Analysis of online social networks posts to investigate suspects using SEMCON. In: Meiselwitz, G. (ed.) SCSM 2015. LNCS, vol. 9182, pp. 148\u2013157. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20367-6_16"},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jnca.2016.03.005","volume":"66","author":"S Khan","year":"2016","unstructured":"Khan, S., Gani, A., Wahab, A.W., Shiraz, M., Ahmad, I.: Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66, 214\u2013235 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.chb.2015.10.017","volume":"55","author":"CM Kokkinos","year":"2016","unstructured":"Kokkinos, C.M., Baltzidis, E., Xynogala, D.: Prevalence and personality correlates of Facebook bullying among university undergraduates. Comput. Hum. Behav. 55, 840\u2013850 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"12_CR27","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/computers8010008","volume":"8","author":"M Lim","year":"2019","unstructured":"Lim, M., Abdullah, A., Jhanjhi, N., Supramaniam, M.: Hidden link prediction in criminal networks using the deep reinforcement learning technique. Computers 8(1), 8 (2019)","journal-title":"Computers"},{"issue":"4","key":"12_CR28","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1080\/01972243.2014.915276","volume":"30","author":"S Lomborg","year":"2014","unstructured":"Lomborg, S., Bechmann, A.: Using APIs for data collection on social media. Inf. Soc. 30(4), 256\u2013265 (2014)","journal-title":"Inf. Soc."},{"key":"12_CR29","unstructured":"Mason, S., et al.: Electronic Evidence, Elsevier (UK) Ltd. (2012). Currie, R.J., Coughlan, S.: Chapter 9, Canada, p. 293 (2012)"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Mcdaniel, M., Sloan, E., Nick, W., Mayes, J., Esterline, A.: Ontologies for situation-based crime scene identities. In: SoutheastCon 2017, pp. 1\u20138 (2017)","DOI":"10.1109\/SECON.2017.7925329"},{"key":"12_CR31","volume-title":"Investigative Data Mining for Security and Criminal Detection","author":"J Mena","year":"2003","unstructured":"Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann, Amsterdam (2003)"},{"key":"12_CR32","unstructured":"Moore, K.: Social media \u2018at least half\u2019 of calls passed to front-line police. BBC Radio 4\u2019s Law in Action. (2014). http:\/\/www.bbc.co.uk\/news\/uk-27949674"},{"key":"12_CR33","first-page":"1","volume":"XIX","author":"J Murphy","year":"2013","unstructured":"Murphy, J., Fontecilla, A.: Social media evidence in government investigations and criminal proceedings: a frontier of new legal issues. Rich JL Tech. XIX, 1\u201330 (2013)","journal-title":"Rich JL Tech."},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Nouh, M., Nurse, J.R., Goldsmith, M.: Towards designing a multipurpose cybercrime intelligence framework. In: 2016 European Intelligence and Security Informatics Conference (EISIC) (2016)","DOI":"10.1109\/EISIC.2016.018"},{"key":"12_CR35","unstructured":"Noy, N., McGuinness, D.: Ontology development 101: a guide to creating your first ontology. Stanford University (2000)"},{"key":"12_CR36","first-page":"755","volume":"9","author":"AI Oludare","year":"2018","unstructured":"Oludare, A.I., Jantan, A., Omolara, A.E., Singh, M.M., Anbar, M., Zaaba, Z.F.: Forensic DNA profiling for identifying an individual crime. Int. J. Civil Eng. Technol. 9, 755\u2013765 (2018)","journal-title":"Int. J. Civil Eng. Technol."},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Pramanik, M.I., Zhang, W., Lau, R.Y., Li, C.: A framework for criminal network analysis using big data. In: e-Business Engineering (ICEBE), pp. 17\u201323 (2016)","DOI":"10.1109\/ICEBE.2016.015"},{"key":"12_CR38","unstructured":"Prot\u00e9g\u00e9 5.5.0. https:\/\/protege.stanford.edu\/ . Accessed June 2019"},{"key":"12_CR39","unstructured":"Recchia, M.: Court of Appeals Declares Facebook \u201cPrivate Data\u201d and Other Social Media Subject to Discovery, New York Law Journal. www.law.com"},{"key":"12_CR40","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.diin.2015.04.004","volume":"13","author":"B Turnbull","year":"2015","unstructured":"Turnbull, B., Randhawa, S.: Automated event and social network extraction from digital evidence sources with ontological mapping. Digit. Invest. 13, 94\u2013106 (2015)","journal-title":"Digit. Invest."},{"key":"12_CR41","volume-title":"New Terrorism and New Media","author":"G Weimann","year":"2014","unstructured":"Weimann, G.: New Terrorism and New Media. Commons Lab of the Woodrow Wilson International Center for Scholars, Washington, DC (2014)"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Williams, D.W., Huan, J., Wang, W.: Graph database indexing using structured graph decomposition. In: IEEE 23rd International Conference on Data Engineering, pp. 976\u2013985 (2007)","DOI":"10.1109\/ICDE.2007.368956"}],"container-title":["Communications in Computer and Information Science","E-Democracy \u2013 Safeguarding Democracy and Human Rights in the Digital Age"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37545-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T10:29:20Z","timestamp":1613039360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37545-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,10]]},"ISBN":["9783030375447","9783030375454"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37545-4_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,10]]},"assertion":[{"value":"10 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"e-Democracy","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Democracy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"edemocracy2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/edemocracy2019.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}