{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:54:13Z","timestamp":1743101653491,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031183034"},{"type":"electronic","value":"9783031183041"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18304-1_5","type":"book-chapter","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T03:31:02Z","timestamp":1664508662000},"page":"79-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unsupervised Labor Intelligence Systems: A Detection Approach and\u00a0Its Evaluation"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Cascavilla","sequence":"first","affiliation":[]},{"given":"Gemma","family":"Catolino","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[]},{"given":"Andreas S.","family":"Andreou","sequence":"additional","affiliation":[]},{"given":"Damian A.","family":"Tamburri","sequence":"additional","affiliation":[]},{"given":"Willem-Jan","family":"Van Den Heuvel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,1]]},"reference":[{"key":"5_CR1","unstructured":"Appendix: unsupervised labor intelligence systems: a detection approach and its evaluation (2022). https:\/\/doi.org\/10.6084\/m9.figshare.19481339.v1"},{"key":"5_CR2","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3, 993\u20131022 (2003)"},{"issue":"4","key":"5_CR3","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1111\/j.1540-5982.2012.01738.x","volume":"45","author":"V Bren\u010di\u010d","year":"2012","unstructured":"Bren\u010di\u010d, V.: Wage posting: evidence from job ads. Can. J. Econ.\/Revue canadienne d\u2019\u00e9conomique 45(4), 1529\u20131559 (2012)","journal-title":"Can. J. Econ.\/Revue canadienne d\u2019\u00e9conomique"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Burbano, D., Hernandez-Alvarez, M.: Identifying human trafficking patterns online. In: 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ETCM.2017.8247461"},{"key":"5_CR5","unstructured":"Chang, J., Gerrish, S., Wang, C., Boyd-Graber, J.L., Blei, D.M.: Reading tea leaves: how humans interpret topic models. In: Advances in Neural Information Processing Systems, pp. 288\u2013296 (2009)"},{"key":"5_CR6","unstructured":"Chinnov, A., Kerschke, P., Meske, C., Stieglitz, S., Trautmann, H.: An overview of topic discovery in twitter communication through social media analytics. In: Americas Conference on Information System (2015)"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11292-017-9321-3","volume":"14","author":"E Cockbain","year":"2018","unstructured":"Cockbain, E., Bowers, K., Dimitrova, G.: Human trafficking for labour exploitation: the results of a two-phase systematic review mapping the European evidence base and synthesising key scientific research evidence. J. Exp. Criminol. 14(3), 319\u2013360 (2018)","journal-title":"J. Exp. Criminol."},{"key":"5_CR8","unstructured":"Cordeiro, M.: Twitter event detection: combining wavelet analysis and topic inference summarization. In: Doctoral Symposium on Informatics Engineering, vol. 1, pp. 11\u201316 (2012)"},{"key":"5_CR9","unstructured":"Council of Europe: Third Report on the Progress Made in the Fight Against Trafficking in Human Beings. European Commission (2020)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Cvijikj, I.P., Michahelles, F.: Monitoring trends on facebook. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 895\u2013902. IEEE (2011)","DOI":"10.1109\/DASC.2011.150"},{"key":"5_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2020.101692","volume":"50","author":"Q Deng","year":"2020","unstructured":"Deng, Q., Gao, Y., Wang, C., Zhang, H.: Detecting information requirements for crisis communication from social media data: an interactive topic modeling approach. Int. J. Disast. Risk Reduct. 50, 101692 (2020)","journal-title":"Int. J. Disast. Risk Reduct."},{"key":"5_CR12","unstructured":"Di Nicola, A., et al.: Surf and sound. The role of the internet in people smuggling and human trafficking. eCrime (2017)"},{"key":"5_CR13","first-page":"13","volume":"16","author":"E Forte","year":"2017","unstructured":"Forte, E., Schotte, T., Strupp, S.: Serious and organised crime in the EU: The EU serious and organised crime threat assessment (SOCTA) 2017. Eur. Police Sci. Res. Bull. 16, 13 (2017)","journal-title":"Eur. Police Sci. Res. Bull."},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.dss.2014.02.003","volume":"61","author":"MS Gerber","year":"2014","unstructured":"Gerber, M.S.: Predicting crime using twitter and kernel density estimation. Decis. Support Syst. 61, 115\u2013125 (2014)","journal-title":"Decis. Support Syst."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Godin, F., Slavkovikj, V., De Neve, W., Schrauwen, B., Van de Walle, R.: Using topic models for twitter hashtag recommendation. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 593\u2013596 (2013)","DOI":"10.1145\/2487788.2488002"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1), 389\u2013422 (2002)","journal-title":"Mach. Learn."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Hensher, D.A., Stopher, P.R.: Behavioural Travel Modelling. Routledge, London (2021)","DOI":"10.4324\/9781003156055"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Hong, L., Davison, B.D.: Empirical study of topic modeling in twitter. In: Proceedings of the First Workshop on Social Media Analytics, pp. 80\u201388 (2010)","DOI":"10.1145\/1964858.1964870"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"215824401455358","DOI":"10.1177\/2158244014553585","volume":"4","author":"DM Hughes","year":"2014","unstructured":"Hughes, D.M.: Trafficking in human beings in the European Union: gender, sexual exploitation, and digital communication technologies. SAGE Open 4(4), 2158244014553585 (2014)","journal-title":"SAGE Open"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1109\/ACCESS.2015.2490723","volume":"3","author":"A Immonen","year":"2015","unstructured":"Immonen, A., P\u00e4\u00e4kk\u00f6nen, P., Ovaska, E.: Evaluating the quality of social media data in big data architecture. IEEE Access 3, 2028\u20132043 (2015)","journal-title":"IEEE Access"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.ijinfomgt.2017.09.009","volume":"48","author":"B Jeong","year":"2019","unstructured":"Jeong, B., Yoon, J., Lee, J.M.: Social media mining for product planning: a product opportunity mining approach based on topic modeling and sentiment analysis. Int. J. Inf. Manage. 48, 280\u2013290 (2019)","journal-title":"Int. J. Inf. Manage."},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan, S.P., Melville, P., Banerjee, A., Sindhwani, V.: Emerging topic detection using dictionary learning. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 745\u2013754 (2011)","DOI":"10.1145\/2063576.2063686"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-319-68204-4_25","volume-title":"The Semantic Web \u2013 ISWC 2017","author":"M Kejriwal","year":"2017","unstructured":"Kejriwal, M., Szekely, P.: An investigative search engine for the human trafficking domain. In: d\u2019Amato, C., et al. (eds.) ISWC 2017. LNCS, vol. 10588, pp. 247\u2013262. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68204-4_25"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Khanjarinezhadjooneghani, Z., Tabrizi, N.: Social media analytics: an overview of applications and approaches. In: Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2021) - Volume 1: KDIR, pp. 233\u2013240I (2021)","DOI":"10.5220\/0010657600003064"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1109\/ACCESS.2017.2780046","volume":"6","author":"N Ko","year":"2017","unstructured":"Ko, N., Jeong, B., Choi, S., Yoon, J.: Identifying product opportunities using social media mining: application of topic modeling and chance discovery theory. IEEE Access 6, 1680\u20131693 (2017)","journal-title":"IEEE Access"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Latonero, M.: Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. SSRN 2045851 (2011)","DOI":"10.2139\/ssrn.2045851"},{"key":"5_CR27","unstructured":"McFadden, D., et al.: Conditional Logit Analysis of Qualitative Choice Behavior. Academic Press, New York (1973)"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-19656-0_4","volume-title":"Social Computing, Behavioral-Cultural Modeling and Prediction","author":"KW Prier","year":"2011","unstructured":"Prier, K.W., Smith, M.S., Giraud-Carrier, C., Hanson, C.L.: Identifying health-related topics on twitter. In: Salerno, J., Yang, S.J., Nau, D., Chai, S.-K. (eds.) SBP 2011. LNCS, vol. 6589, pp. 18\u201325. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19656-0_4"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"R\u00f6der, M., Both, A., Hinneburg, A.: Exploring the space of topic coherence measures. In: Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, pp. 399\u2013408 (2015)","DOI":"10.1145\/2684822.2685324"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Rohani, V.A., Shayaa, S., Babanejaddehaki, G.: Topic modeling for social media content: A practical approach. In: 2016 3rd International Conference on Computer and Information Sciences (ICCOINS), pp. 397\u2013402. IEEE (2016)","DOI":"10.1109\/ICCOINS.2016.7783248"},{"key":"5_CR31","first-page":"1","volume":"240","author":"B Rosario","year":"2000","unstructured":"Rosario, B.: Latent semantic indexing: an overview. Techn. rep. INFOSYS 240, 1\u201316 (2000)","journal-title":"Techn. rep. INFOSYS"},{"issue":"6","key":"5_CR32","first-page":"5993","volume":"29","author":"Z Shahbazi","year":"2020","unstructured":"Shahbazi, Z., Byun, Y.C.: Analysis of domain-independent unsupervised text segmentation using LDA topic modeling over social media contents. Int. J. Adv. Sci. Technol 29(6), 5993\u20136014 (2020)","journal-title":"Int. J. Adv. Sci. Technol"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Siddiqui, T., Amer, A.Y.A., Khan, N.A.: Criminal activity detection in social network by text mining: comprehensive analysis. In: 2019 4th International Conference on Information Systems and Computer Networks (ISCON), pp. 224\u2013229. IEEE (2019)","DOI":"10.1109\/ISCON47742.2019.9036157"},{"issue":"1","key":"5_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12992-018-0427-9","volume":"14","author":"WM Sweileh","year":"2018","unstructured":"Sweileh, W.M.: Research trends on human trafficking: a bibliometric analysis using scopus database. Glob. Health 14(1), 1\u201312 (2018)","journal-title":"Glob. Health"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Tong, E., Zadeh, A., Jones, C., Morency, L.P.: Combating human trafficking with deep multimodal models. arXiv preprint arXiv:1705.02735 (2017)","DOI":"10.18653\/v1\/P17-1142"},{"key":"5_CR36","unstructured":"United Nations: Global Report on Trafficking in Persons 2020. UN (2021). https:\/\/books.google.nl\/books?id=gGxczgEACAAJ"},{"key":"5_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101582","volume":"94","author":"I Vayansky","year":"2020","unstructured":"Vayansky, I., Kumar, S.A.: A review of topic modeling methods. Inf. Syst. 94, 101582 (2020)","journal-title":"Inf. Syst."},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Volodko, A., Cockbain, E., Kleinberg, B.: \u201cspotting the signs\u201d of trafficking recruitment online: exploring the characteristics of advertisements targeted at migrant job-seekers. Trends Organ. Crime 23(1), 7\u201335 (2020)","DOI":"10.1007\/s12117-019-09376-5"},{"key":"5_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-29047-3_28","volume-title":"Social Computing, Behavioral - Cultural Modeling and Prediction","author":"X Wang","year":"2012","unstructured":"Wang, X., Gerber, M.S., Brown, D.E.: Automatic crime prediction using events extracted from twitter posts. In: Yang, S.J., Greenberg, A.M., Endsley, M. (eds.) SBP 2012. LNCS, vol. 7227, pp. 231\u2013238. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29047-3_28"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, S.X., Cai, L.: Counting labour trafficking activities: an empirical attempt at standardized measurement. In: Forum on Crime and Society, vol. 8, pp. 37\u201361. United Nations (2015)","DOI":"10.18356\/d8237c59-en"},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Zhu, J., Li, L., Jones, C.: Identification and detection of human trafficking using language models. In: 2019 European Intelligence and Security Informatics Conference (EISIC), pp. 24\u201331. IEEE (2019)","DOI":"10.1109\/EISIC49498.2019.9108860"}],"container-title":["Communications in Computer and Information Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18304-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T03:39:46Z","timestamp":1664509186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18304-1_5"}},"subtitle":["A Case Study in the Netherlands"],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031183034","9783031183041"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18304-1_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SummerSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Symposium and Summer School on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hersonissos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"summersoc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.summersoc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}