{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:25:35Z","timestamp":1758875135717},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_27","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"359-377","source":"Crossref","is-referenced-by-count":27,"title":["Analyzing and Visualizing Criminal Network Dynamics: A Case Study"],"prefix":"10.1007","author":[{"given":"Jennifer","family":"Xu","sequence":"first","affiliation":[]},{"given":"Byron","family":"Marshall","sequence":"additional","affiliation":[]},{"given":"Siddharth","family":"Kaza","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"27_CR1","doi-asserted-by":"publisher","first-page":"837","DOI":"10.2307\/2095954","volume":"58","author":"W.E. Baker","year":"1993","unstructured":"Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review\u00a058(12), 837\u2013860 (1993)","journal-title":"American Sociological Review"},{"issue":"4","key":"27_CR2","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1002\/(SICI)1097-4571(199105)42:4<252::AID-ASI2>3.0.CO;2-G","volume":"42","author":"R.R. Braam","year":"1991","unstructured":"Braam, R.R., Moed, H.F., van Raan, A.F.J.: Mapping of science by combined cocitation and word analysis ii: Dynamical aspects. Journal of American Society of Information Science\u00a042(4), 252\u2013266 (1991)","journal-title":"Journal of American Society of Information Science"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"104","DOI":"10.2307\/2393552","volume":"35","author":"M.E. Burkhardt","year":"1990","unstructured":"Burkhardt, M.E., Brass, D.J.: Changing patterns or patterns of change: The effects of a change in technology on social network structure and power. Administrative Science Quarterly\u00a035, 104\u2013127 (1990)","journal-title":"Administrative Science Quarterly"},{"key":"27_CR4","unstructured":"Carley, K.M., et al.: Destabilizing dynamic covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium, Washington DC., VA (2003)"},{"issue":"3","key":"27_CR5","first-page":"79","volume":"24","author":"K.M. Carley","year":"2002","unstructured":"Carley, K.M., Lee, J., Krackhardt, D.: Destabilizing networks. Connections\u00a024(3), 79\u201392 (2002)","journal-title":"Connections"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Chen, C., Carr, L.: Trailblazing the literature of hypertext: Author co-citation analysis (1989-1998). In: Proceedings of the 10th ACM Conference on Hypertext and Hypermedia (1999)","DOI":"10.1145\/294469.294486"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Chen, C., Carr, L.: Visualizing the evolution of a subject domain: A case study. In: Proceedings of IEEE Symposium on Information Visualization, INFOVIS 1999 (1999)","DOI":"10.1109\/VISUAL.1999.809927"},{"issue":"8","key":"27_CR8","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1002\/asi.10075","volume":"53","author":"C. Chen","year":"2002","unstructured":"Chen, C., et al.: Visualizing and tracking the growth of competing paradigms: Two case studies. Journal of American Society of Information Science and Technology\u00a053(8), 678\u2013689 (2002)","journal-title":"Journal of American Society of Information Science and Technology"},{"issue":"4","key":"27_CR9","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/5326.983935","volume":"31","author":"C. Chen","year":"2001","unstructured":"Chen, C., Kuljis, J., Raul, R.J.: Visualizing latent domain knowledge. IEEE Transactions on Systems, Man, and Cybernetics\u2013Part C: Applications and Reviews\u00a031(4), 518\u2013529 (2001)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics\u2013Part C: Applications and Reviews"},{"issue":"3","key":"27_CR10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/2.910895","volume":"34","author":"C. Chen","year":"2001","unstructured":"Chen, C., Paul, R.J.: Visualizing a knowledge domain\u2019s intellectual structure. IEEE Computer\u00a034(3), 65\u201371 (2001)","journal-title":"IEEE Computer"},{"issue":"4","key":"27_CR11","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1002\/1532-2890(2000)9999:9999<::AID-ASI1074>3.0.CO;2-2","volume":"52","author":"C. Chen","year":"2001","unstructured":"Chen, C., Paul, R.J., O\u2019Keefe, B.: Fitting the jigsaw of citation: Information visualization in domain analysis. Journal of American Society of Information Science and Technology\u00a052(4), 315\u2013330 (2001)","journal-title":"Journal of American Society of Information Science and Technology"},{"issue":"2","key":"27_CR12","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1287\/mnsc.32.2.156","volume":"32","author":"M.J. Culnan","year":"1986","unstructured":"Culnan, M.J.: The intellectual development of management information systems, 1972-1982: A co-citation analysis. Management Science\u00a032(2), 156\u2013172 (1986)","journal-title":"Management Science"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1020723730930","volume":"8","author":"M.J. Dombroski","year":"2002","unstructured":"Dombroski, M.J., Carley, K.M.: Netest: Estimating a terrorist network\u2019s structure. Computational & Mathematical Organization Theory\u00a08, 235\u2013241 (2002)","journal-title":"Computational & Mathematical Organization Theory"},{"key":"27_CR14","first-page":"129","volume-title":"Evolution of social networks","author":"P. Doreian","year":"1997","unstructured":"Doreian, P., et al.: A brief history of balance through time. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, pp. 129\u2013147. Gordon and Breach, Australia (1997)"},{"key":"27_CR15","first-page":"1","volume-title":"Evolution of social networks","author":"P. Doreian","year":"1997","unstructured":"Doreian, P., Stokman, F.N.: The dynamics and evolution of social networks. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, pp. 1\u201317. Gordon and Breach, Australia (1997)"},{"key":"27_CR16","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/0378-8733(78)90002-3","volume":"1","author":"M. Fennema","year":"1978","unstructured":"Fennema, M., Schijf, H.: Analyzing interlocking directories: Theory and methods. Social Networks\u00a01, 297\u2013332 (1978\/1979)","journal-title":"Social Networks"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L.C. Freeman","year":"1979","unstructured":"Freeman, L.C.: Centrality in social networks: Conceptual clarification. Social Networks\u00a01, 215\u2013240 (1979)","journal-title":"Social Networks"},{"issue":"11","key":"27_CR18","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1002\/spe.4380211102","volume":"21","author":"T.M.J. Fruchterman","year":"1991","unstructured":"Fruchterman, T.M.J., Reingold, E.M.: Graph drawing by force-directed placement. Software\u2013Practice & Experience\u00a021(11), 1129\u20131164 (1991)","journal-title":"Software\u2013Practice & Experience"},{"key":"27_CR19","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/0378-8733(78)90019-9","volume":"1","author":"M.T. Hallinan","year":"1978","unstructured":"Hallinan, M.T.: The process of friendship formation. Social Networks\u00a01, 193\u2013210 (1978\/1979)","journal-title":"Social Networks"},{"key":"27_CR20","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0378-8733(00)00024-1","volume":"22","author":"N.P. Hummon","year":"2000","unstructured":"Hummon, N.P.: Utility and dynamic social networks. Social Networks\u00a022, 221\u2013249 (2000)","journal-title":"Social Networks"},{"issue":"1","key":"27_CR21","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/0020-0190(89)90102-6","volume":"31","author":"T. Kamada","year":"1989","unstructured":"Kamada, T., Kawai, S.: An algorithm for drawing general undirected graphs. Information Processing Letters\u00a031(1), 7\u201315 (1989)","journal-title":"Information Processing Letters"},{"issue":"3","key":"27_CR22","first-page":"53","volume":"24","author":"P. Klerks","year":"2001","unstructured":"Klerks, P.: The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the netherlands. Connections\u00a024(3), 53\u201365 (2001)","journal-title":"Connections"},{"issue":"3","key":"27_CR23","first-page":"43","volume":"24","author":"V.E. Krebs","year":"2001","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections\u00a024(3), 43\u201352 (2001)","journal-title":"Connections"},{"key":"27_CR24","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/TC.1977.1674822","volume":"26","author":"R.C.T. Lee","year":"1977","unstructured":"Lee, R.C.T., Slagle, J.R., Blum, H.: A triangulation method for the sequential mapping of points from n-space to two-space. IEEE Transactions on Computers\u00a026, 288\u2013292 (1977)","journal-title":"IEEE Transactions on Computers"},{"key":"27_CR25","volume-title":"Evolution of social networks","author":"R. Leenders","year":"1997","unstructured":"Leenders, R.: Evolution of friendship and best friendship choices. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, Gordon and Breach, Australia (1997)"},{"key":"27_CR26","series-title":"offender profiling series","volume-title":"The social psychology of crime: Groups, teams, and networks","author":"D. McAndrew","year":"1999","unstructured":"McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The social psychology of crime: Groups, teams, and networks. offender profiling series, vol.\u00a0iii, Dartmouth, Aldershot (1999)"},{"key":"27_CR27","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0378-8733(93)90001-2","volume":"15","author":"K. Nakao","year":"1993","unstructured":"Nakao, K., Romney, A.K.: Longitudinal approach to subgroup formation: Reanalysis of newcomb\u2019s fraternity data. Social Networks\u00a015, 109\u2013131 (1993)","journal-title":"Social Networks"},{"key":"27_CR28","series-title":"Series","doi-asserted-by":"crossref","DOI":"10.1037\/13156-000","volume-title":"The acquaintance process","author":"T.M. Newcomb","year":"1961","unstructured":"Newcomb, T.M.: The acquaintance process. Series. Holt, Rinehart, & Winston, New York (1961)"},{"issue":"1","key":"27_CR29","first-page":"68","volume":"49","author":"E.C.M. Noyons","year":"1998","unstructured":"Noyons, E.C.M., Raan, A.F.J.v.: Monitoring scientific developments from a dynamic perspective: Self-organized structuring to map neural network research. Journal of American Society of Information Science\u00a049(1), 68\u201381 (1998)","journal-title":"Journal of American Society of Information Science"},{"key":"27_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0378-8733(82)90011-9","volume":"4","author":"M.D. Ornstein","year":"1982","unstructured":"Ornstein, M.D.: Interlocking directorates in canada: Evidence from replacement patterns. Social Networks\u00a04, 3\u201325 (1982)","journal-title":"Social Networks"},{"issue":"9","key":"27_CR31","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1002\/(SICI)1097-4571(1999)50:9<799::AID-ASI9>3.0.CO;2-G","volume":"50","author":"H. Small","year":"1999","unstructured":"Small, H.: Visualizing science by citation mapping. Journal of American Society of Information Science\u00a050(9), 799\u2013813 (1999)","journal-title":"Journal of American Society of Information Science"},{"key":"27_CR32","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1177\/030631277700700202","volume":"7","author":"H.G. Small","year":"1977","unstructured":"Small, H.G.: A co-citation model of a scientific specialty: A longitudinal study of collagen research. Social Studies of Science\u00a07, 139\u2013166 (1977)","journal-title":"Social Studies of Science"},{"key":"27_CR33","volume-title":"Evolution of social networks","author":"T.A.B. Snijders","year":"1997","unstructured":"Snijders, T.A.B.: Stochastic actor-oriented models for network change. In: Doreian, P., Stokman, F.N. (eds.) Evolution of social networks, Gordon and Breach, Australia (1997)"},{"key":"27_CR34","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1111\/0081-1750.00099","volume":"31","author":"T.A.B. Snijders","year":"2001","unstructured":"Snijders, T.A.B.: The statistical evaluation of social network dynamics. Sociological Methodology\u00a031, 361\u2013395 (2001)","journal-title":"Sociological Methodology"},{"key":"27_CR35","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"M.K. Sparrow","year":"1991","unstructured":"Sparrow, M.K.: The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks\u00a013, 251\u2013274 (1991)","journal-title":"Social Networks"},{"key":"27_CR36","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1177\/030631277700700205","volume":"7","author":"D. Sullivan","year":"1997","unstructured":"Sullivan, D., White, D.H., Barboni, E.J.: Co-citation analyses of science: An evaluation. Social Studies of Science\u00a07, 223\u2013240 (1997)","journal-title":"Social Studies of Science"},{"issue":"6","key":"27_CR37","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1002\/(SICI)1097-4571(199606)47:6<415::AID-ASI3>3.0.CO;2-Y","volume":"47","author":"P. Besselaar van den","year":"1996","unstructured":"van den Besselaar, P., Leydesdorff, L.: Mapping change in scientific specialties: A scientometric reconstruction of the development of artificial intelligence. Journal of American Society of Information Science\u00a047(6), 415\u2013436 (1996)","journal-title":"Journal of American Society of Information Science"},{"key":"27_CR38","series-title":"Series","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: Methods and applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social network analysis: Methods and applications. Series. Cambridge University Press, Cambridge (1994)"},{"key":"27_CR39","volume-title":"Social structures: A network approach","author":"B. Wellman","year":"1988","unstructured":"Wellman, B.: Structural analysis: From method and metaphor to theory and substance. In: Wellman, B., Berkowitz, S.D. (eds.) Social structures: A network approach, Cambridge University Press, Cambridge (1988)"},{"issue":"4","key":"27_CR40","first-page":"327","volume":"49","author":"H.D. White","year":"1998","unstructured":"White, H.D., McCain, K.W.: Visualizing a discipline: An author co-citation analysis of information science, 1972-1995. Journal of American Society of Information Science and Technology\u00a049(4), 327\u2013355 (1998)","journal-title":"Journal of American Society of Information Science and Technology"},{"key":"27_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-44853-5_18","volume-title":"Intelligence and Security Informatics","author":"J. Xu","year":"2003","unstructured":"Xu, J., Chen, H.: Untangling criminal networks: A case study. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 232\u2013248. Springer, Heidelberg (2003)"},{"key":"27_CR42","doi-asserted-by":"crossref","unstructured":"Xu, J., Chen, H.: Fighting organized crime: Using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems (forthcoming)","DOI":"10.1016\/S0167-9236(03)00117-9"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:35Z","timestamp":1620011915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}