{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T12:24:25Z","timestamp":1753359865322,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083889"},{"type":"electronic","value":"9783319083896"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08389-6_10","type":"book-chapter","created":{"date-parts":[[2014,7,17]],"date-time":"2014-07-17T10:43:39Z","timestamp":1405593819000},"page":"104-117","source":"Crossref","is-referenced-by-count":7,"title":["Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime"],"prefix":"10.1007","author":[{"given":"Ben","family":"Brewster","sequence":"first","affiliation":[]},{"given":"Simon","family":"Polovina","sequence":"additional","affiliation":[]},{"given":"Glynn","family":"Rankin","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Andrews","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Elliott, A., Urry, J.: Mobile lives. Routledge (2010)","DOI":"10.4324\/9780203887042"},{"key":"10_CR2","unstructured":"Krikorian, R.: Twitter Engineering Blog: New Tweets per Second Records, and How! https:\/\/blog.twitter.com\/2013\/new-tweets-per-second-record-and-how"},{"key":"10_CR3","unstructured":"ePOOLICE. ePOOLICE - About, https:\/\/www.epoolice.eu\/EPOOLICE\/about.jsp"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Gottschalk, P.: Knowledge management technology for organized crime risk assessment. Inf. Syst. Front.\u00a012(3), 267\u2013275 (2010), http:\/\/dx.doi.org\/10.1007\/s10796-009-9178-8","DOI":"10.1007\/s10796-009-9178-8"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Rankin, G., Kinsella, N.: Human trafficking\u2013The importance of knowledge information exchange. In: Intelligence Management, pp. 159\u2013180. Springer (2011)","DOI":"10.1007\/978-1-4471-2140-4_11"},{"key":"10_CR6","unstructured":"United Nations Office on Drugs and Crime (UNODC), United Nations Convention Against Transnational Organised Crime and the Protocols Thereto (2004)"},{"key":"10_CR7","unstructured":"Serious Organised Crime Agency (SOCA), UKHTC: A Strategic Assessment on the Nature and Scale of Human Trafficking in 2012 (2013)"},{"key":"10_CR8","unstructured":"Europol. Organised Crime Threat Assessment, https:\/\/www.europol.europa.eu\/sites\/default\/files\/publications\/octa2011.pdf"},{"key":"10_CR9","unstructured":"United Nations Office on Drugs and Crime (UNODC), Global Report on Trafficking in Persons (2012)"},{"key":"10_CR10","unstructured":"United Nations Office on Drugs and Crime (UNODC), Anti-Human Trafficking Manual for Criminal Justice Practitioners (2009)"},{"issue":"1","key":"10_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1177\/1524838008327262","volume":"10","author":"T.K. Logan","year":"2009","unstructured":"Logan, T.K., Walker, R., Hunt, G.: Understanding human trafficking in the united states. Trauma. Violence Abuse\u00a010(1), 3\u201330 (2009)","journal-title":"Trauma. Violence Abuse"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Laczko, F.: Enhancing Data Collection and Research on Trafficking in Persons. In: Measuring Human Trafficking, pp. 37\u201344. Springer (2007)","DOI":"10.1007\/0-387-68044-6_5"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Tyldum, G., Brunovskis, A.: Describing the Unobserved: Methodological Challenges in Empirical Studies on Human Trafficking. In: Laczko, F., Godziak, E. (eds.) Data and Research on Human Trafficking: A Global Survey. IOM International Organisation for Migration, Geneva (2005)","DOI":"10.1111\/j.0020-7985.2005.00310.x"},{"key":"10_CR14","unstructured":"United Nations Office on Drugs and Crime (UNODC), Global Report on Trafficking in Persons (2009)"},{"key":"10_CR15","unstructured":"EUROPOL. EU Serious and Organised Crime Threat Assessment, https:\/\/www.europol.europa.eu\/sites\/default\/files\/publications\/socta2013.pdf"},{"key":"10_CR16","unstructured":"Human Trafficking Foundation. Modern Day Slavery in British Nail Bars, http:\/\/www.humantraffickingfoundation.org\/news\/2013\/modern-day-slavery-british-nail-bars"},{"key":"10_CR17","unstructured":"Martin, P.: Nail Salons and Human Trafficking, http:\/\/www.huffingtonpost.com\/phillip-martin\/nail-salons-and-human-tra_b_669076.html"},{"key":"10_CR18","unstructured":"Siskin, A., Wyler, L.S.: Trafficking in persons: US policy and issues for congress. Springer (2012)"},{"key":"10_CR19","unstructured":"Arbuthnott, D.: Beauty and the beasts: Slaves in Britain. The Sunday Times Magazine (2013) (August 18, 2010)"},{"key":"10_CR20","unstructured":"Criminal Intelligence Service Canada (CISC). Strategic Early Warning for Criminal Intelligence, http:\/\/www.cisc.gc.ca\/products_services\/sentinel\/document\/early_warning_methodology_e.pdf"},{"key":"10_CR21","unstructured":"Chaves, T.D., Pendleton, M.R., Bueerman, C.J.: Knowledge management in policing. Community Oriented Policing Services (COPS) US Department of Justice (2005)"},{"issue":"5","key":"10_CR22","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1080\/02684527.2012.708518","volume":"27","author":"R.G. Hughes","year":"2012","unstructured":"Hughes, R.G., Stoddart, K.: Hope and fear: Intelligence and the future of global security a decade after 9\/11. Intelligence and National Security\u00a027(5), 625\u2013652 (2012), http:\/\/dx.doi.org.lcproxy.shu.ac.uk\/10.1080\/02684527.2012.708518","journal-title":"Intelligence and National Security"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Akhgar, B., Yates, S.: Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. Springer (2011)","DOI":"10.1007\/978-1-4471-2140-4"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Wiig, K.M.: Knowledge management: An emerging discipline rooted in a long history. In: Knowledge Horizons: The Present and the Promise of Knowledge Management, pp. 3\u201326 (2000)","DOI":"10.1016\/B978-0-7506-7247-4.50004-5"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Dalkir, K.: Knowledge management in theory and practice. Routledge (2013)","DOI":"10.4324\/9780080547367"},{"key":"10_CR26","unstructured":"United Nations Office on Drugs and Crime (UNODC). Voluntary Reporting System on Migrant Smuggling and Related Conduct (VRS-MSRC), https:\/\/www.unodc.org\/southeastasiaandpacific\/en\/vrs-msrc.html"},{"issue":"4","key":"10_CR27","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1287\/orsc.10.4.381","volume":"10","author":"S.D. Cook","year":"1999","unstructured":"Cook, S.D., Brown, J.S.: Bridging epistemologies: The generative dance between organizational knowledge and organizational knowing. Organization Science\u00a010(4), 381\u2013400 (1999)","journal-title":"Organization Science"},{"issue":"1","key":"10_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0024-6301(99)00115-6","volume":"33","author":"I. Nonaka","year":"2000","unstructured":"Nonaka, I., Toyama, R., Konno, N.: SECI, ba and leadership: A unified model of dynamic knowledge creation. Long Range Plann.\u00a033(1), 5\u201334 (2000)","journal-title":"Long Range Plann."},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Boisot, M.: Knowledge assets: Securing competitive advantage in the knowledge economy (1998)","DOI":"10.1093\/acprof:oso\/9780198296072.001.0001"},{"issue":"3","key":"10_CR30","first-page":"43","volume":"37","author":"M. Meyer","year":"1996","unstructured":"Meyer, M., Zack, M.: The design and implementation of information products. Sloan Management Review\u00a037(3), 43\u201359 (1996)","journal-title":"Sloan Management Review"},{"key":"10_CR31","unstructured":"Wiig, K.: Knowledge management foundations. In: Thinking about Thinking. How People and Organizations Create, Represent, and Use Knowledge, Arlington, TX, USA (1993)"},{"key":"10_CR32","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195092691.001.0001","volume-title":"The knowledge-creating company: How Japanese companies create the dynamics of innovation","author":"I. Nonaka","year":"1995","unstructured":"Nonaka, I., Takeuchi, H.: The knowledge-creating company: How Japanese companies create the dynamics of innovation. Oxford University Press, New York (1995)"},{"key":"10_CR33","unstructured":"Sowa, J.F.: The challenge of knowledge soup. In: Research Trends in Science, Technology and Mathematics Education, pp. 55\u201390 (2006)"},{"issue":"1","key":"10_CR34","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/602421.602441","volume":"46","author":"H. Chen","year":"2003","unstructured":"Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK: Managing law enforcement data and knowledge. Communications of the ACM\u00a046(1), 28\u201334 (2003)","journal-title":"Communications of the ACM"},{"key":"10_CR35","unstructured":"IBM. IBM i2 COPLINK: Accelerating Law Enforcement, http:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?subtype=BR&infotype=PM&appname=SWGE_ZZ_ZZ_USEN&htmlfid=ZZB03016USEN&attachment=ZZB03016USEN.PDF"},{"key":"10_CR36","series-title":"Lecture Notes in Artificial Intelligence","first-page":"1","volume-title":"Conceptual Structures: Knowledge Architectures for Smart Applications","author":"S. Polovina","year":"2007","unstructured":"Polovina, S.: An introduction to conceptual graphs. In: Priss, U., Polovina, S., Hill, R. (eds.) ICCS 2007. LNCS (LNAI), vol.\u00a04604, pp. 1\u201314. Springer, Heidelberg (2007)"},{"key":"10_CR37","unstructured":"Sowa, J.F.: Conceptual structures: information processing in mind and machine. Addison-Wesley Longman Publishing Co., Inc. (1984)"},{"key":"10_CR38","unstructured":"ILO (International Labour Office), Operational Indicators of Traffcking in Human Beings (2009)"},{"key":"10_CR39","unstructured":"CoGui. CoGui in a Nutshell, http:\/\/www.lirmm.fr\/cogui\/nutshell.php"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Feldman, R., Sanger, J.: The text mining handbook: advanced approaches in analyzing unstructured data. Cambridge University Press (2007)","DOI":"10.1017\/CBO9780511546914"},{"key":"10_CR41","unstructured":"Reamy, T.: Enterprise content categorization - how to sucessfully choose, develop and implement a semantic strategy. Knowledge Architecture Professional Services, KAPS Group (2010)"},{"key":"10_CR42","unstructured":"Chau, M., Xu, J.J., Chen, H.: Extracting meaningful entities from police narrative reports. In: Proceedings of the 2002 Annual National Conference on Digital Government Research, pp. 1\u20135 (2002)"},{"issue":"4","key":"10_CR43","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H. Chen","year":"2004","unstructured":"Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: A general framework and some examples. Computer\u00a037(4), 50\u201356 (2004)","journal-title":"Computer"},{"key":"10_CR44","unstructured":"Reamy, T.: Enterprise content categorization - the business strategy for a semantic infrastructure. Knowledge Architecture Professional Services, KAPS Group (2010)"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Hu, X., Liu, H.: Text analytics in social media. In: Aggarwal, C.C., Zhai, C. (eds.) Mining Text Data, pp. 385\u2013414. Springer (2012)","DOI":"10.1007\/978-1-4614-3223-4_12"},{"key":"10_CR46","unstructured":"SAS Institute Inc. SAS Content Categorization Studio 12.1: User\u2019s Guide, http:\/\/support.sas.com\/documentation\/onlinedoc\/ccs\/12.1\/ccsug.pdf"},{"key":"10_CR47","unstructured":"MaxMind. Free World Cities Database, http:\/\/www.maxmind.com\/en\/worldcities"}],"container-title":["Lecture Notes in Computer Science","Graph-Based Representation and Reasoning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08389-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T16:04:41Z","timestamp":1717085081000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08389-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083889","9783319083896"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08389-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}