{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T07:08:51Z","timestamp":1671606531136},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T00:00:00Z","timestamp":1491782400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s00146-017-0722-7","type":"journal-article","created":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T08:28:17Z","timestamp":1491812897000},"page":"261-274","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["GDP growth vs. criminal phenomena: data mining of Japan 1926\u20132013"],"prefix":"10.1007","volume":"33","author":[{"given":"Xingan","family":"Li","sequence":"first","affiliation":[]},{"given":"Henry","family":"Joutsijoki","sequence":"additional","affiliation":[]},{"given":"Jorma","family":"Laurikkala","sequence":"additional","affiliation":[]},{"given":"Martti","family":"Juhola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,10]]},"reference":[{"key":"722_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-098-4","volume-title":"Support vector machines for pattern classification","author":"S Abe","year":"2010","unstructured":"Abe S (2010) Support vector machines for pattern classification, 2nd edn. Springer, London","edition":"2"},{"key":"722_CR2","doi-asserted-by":"crossref","unstructured":"Adderley R (2004) The use of data mining techniques in operational crime fighting. In: Proceedings of symposium on intelligence and security informatics, Tucson A.Z., ETATS-UNIS (10\/06\/2004), vol 3073 (2), pp 418\u2013425","DOI":"10.1007\/978-3-540-25952-7_32"},{"issue":"4","key":"722_CR3","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1350\/ijps.5.4.265.24933","volume":"5","author":"R Adderley","year":"2003","unstructured":"Adderley R, Musgrave P (2003) Modus operandi modelling of group offending: a data-mining case study. Int J Police Sci Manag 5(4):265\u2013276","journal-title":"Int J Police Sci Manag"},{"key":"722_CR4","unstructured":"Axelsson S (2005) Understanding intrusion detection through visualization. PhD thesis, Chalmers University of Technology, G\u00f6teborg, Sweden"},{"issue":"1","key":"722_CR5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"2","key":"722_CR6","doi-asserted-by":"crossref","first-page":"245","DOI":"10.2307\/253535","volume":"65","author":"PL Brockett","year":"1998","unstructured":"Brockett PL, Xia X, Derrig RA (1998) Using Kohonen\u2019s self-organizing feature map to uncover automobile bodily injury claims fraud. J Risk Insur 65(2):245\u2013274","journal-title":"J Risk Insur"},{"issue":"3","key":"722_CR7","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"722_CR8","unstructured":"Fei B, Eloff J, Venter H, Olivier (2005) Exploring data generated by computer forensic tools with self-organising maps. Proceedings of the IFIP working group 11.9 on digital forensics, pp 1\u201315"},{"issue":"1\u20133","key":"722_CR9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.forsciint.2006.06.046","volume":"162","author":"B Fei","year":"2006","unstructured":"Fei B, Eloff J, Olivier M, Venter H (2006) The use of self-organizing maps for anomalous behavior detection in a digital investigation. Forensic Sci Int 162(1\u20133):33\u201337","journal-title":"Forensic Sci Int"},{"key":"722_CR10","first-page":"613","volume-title":"Lecture notes in artificial intelligence","author":"H Grosser","year":"2005","unstructured":"Grosser H, Britos P, Garc\u00eda-Mart\u00ednez R (2005) Detecting fraud in mobile telephony using neural networks. In: Ali M, Esposito F (eds) Lecture notes in artificial intelligence, vol 3533. Springer, Berlin, pp 613\u2013615"},{"key":"722_CR11","unstructured":"Hollm\u00e9n J (2000) User profiling and classification for fraud detection in mobile communications networks. PhD thesis, Helsinki University of Technology, Finland"},{"key":"722_CR12","first-page":"946","volume":"470","author":"J Hollm\u00e9n","year":"1999","unstructured":"Hollm\u00e9n J, Tresp V, Simula O (1999) A self-organizing map for clustering probabilistic models. Artif Neural Netw 470:946\u2013951","journal-title":"Artif Neural Netw"},{"issue":"2","key":"722_CR13","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C-W Hsu","year":"2002","unstructured":"Hsu C-W, Lin C-J (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415\u2013425","journal-title":"IEEE Trans Neural Netw"},{"key":"722_CR14","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3233\/ICA-2011-0385","volume":"19","author":"M Juhola","year":"2012","unstructured":"Juhola M, Siermala M (2012) A scatter method for data and variable importance evaluation. Integr Comp Aided Eng 19:137\u2013149","journal-title":"Integr Comp Aided Eng"},{"key":"722_CR15","volume-title":"Artificial neural network system for classification of offenders in murder and rape cases","author":"LJ Kangas","year":"2001","unstructured":"Kangas LJ (2001) Artificial neural network system for classification of offenders in murder and rape cases. The National Institute of Justice, Finland"},{"key":"722_CR16","doi-asserted-by":"crossref","unstructured":"Kangas LJ, Terrones KM, Keppel RD, La Moria RD (1999) Computer-aided tracking and characterization of homicides and sexual assaults (CATCH). Proc. SPIE 3722, applications and science of computational intelligence II","DOI":"10.1117\/12.342880"},{"key":"722_CR17","volume-title":"Self-organizing maps","author":"T Kohonen","year":"1979","unstructured":"Kohonen T (1979) Self-organizing maps. Springer, New York"},{"key":"722_CR18","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/11011620_2","volume":"4","author":"T Lampinen","year":"2005","unstructured":"Lampinen T, Koivisto H, Honkanen T (2005) Profiling network applications with fuzzy C-means and self-organizing maps. Classif Clust Knowl Discov 4:15\u201327","journal-title":"Classif Clust Knowl Discov"},{"key":"722_CR19","doi-asserted-by":"crossref","unstructured":"Lei H, Govindaraju V (2005) Half-Against-Half multi-class support vector machines. In: Proceedings of the 6th international workshop on multiple classifier systems, Lecture Notes Comp Sci, vol 3541, pp 156\u2013164","DOI":"10.1007\/11494683_16"},{"key":"722_CR20","unstructured":"Leufven C (2006) Detecting SSH identity theft in HPC cluster environments using self-organizing maps. Master thesis, Link\u00f6ping University, Sweden"},{"key":"722_CR21","unstructured":"Li X (2014) Application of data mining methods in the study of crime based on international data sources. PhD thesis, University of Tampere, Tampere, Finland"},{"key":"722_CR22","doi-asserted-by":"crossref","unstructured":"Li X, Juhola M (2013) Crime and its social context: analysis using the self-organizing map. In: Intelligence and security informatics conference (EISIC), 2013 European, 12\u201314 Aug. 2013, Uppsala, Sweden, IEEE, pp 121\u2013124","DOI":"10.1109\/EISIC.2013.26"},{"issue":"1","key":"722_CR23","first-page":"53","volume":"29","author":"X Li","year":"2014","unstructured":"Li X, Juhola M (2014a) Country crime analysis using the self-organizing map, with special regard to demographic factors. Artif Intell Soc 29(1):53\u201368","journal-title":"Artif Intell Soc"},{"issue":"2","key":"722_CR24","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1504\/IJSSS.2014.062435","volume":"6","author":"X Li","year":"2014","unstructured":"Li X, Juhola M (2014b) Application of the self-organising map to visulisation of and exploration into historical development of criminal phenomena of the USA, 1960\u20132007. Int J Soc Syst Sci 6(2):120\u2013142","journal-title":"Int J Soc Syst Sci"},{"issue":"2","key":"722_CR25","first-page":"130","volume":"7","author":"X Li","year":"2015","unstructured":"Li X, Juhola M (2015) Country crime analysis using the self-organising map, with special regard to economic factors. Int J Data Mining Model Manag 7(2):130\u2013153","journal-title":"Int J Data Mining Model Manag"},{"key":"722_CR26","unstructured":"Li X, Joutsijoki H, Laurikkala J, Siermala M, Juhola M (2015a) Crime vs. demographic factors revisited: application of data mining methods. Webology 12(1), Article 132. Retrieved June 11, 2016, from http:\/\/www.webology.org\/2015\/v12n1\/a132.pdf"},{"issue":"4","key":"722_CR27","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1080\/08839514.2015.1016774","volume":"29","author":"X Li","year":"2015","unstructured":"Li X, Joutsijoki H, Laurikkala J, Siermala M, Juhola M (2015b) Homicide and its social context: analysis using the self-organizing map. Appl Artif Intell 29(4):382\u2013401","journal-title":"Appl Artif Intell"},{"key":"722_CR28","unstructured":"Memon QA, Mehboob S (2006) Crime investigation and analysis using neural nets. In: Proceedings of international joint conference on neural networks, Washington, D.C., pp 346\u2013350"},{"key":"722_CR29","first-page":"547","volume":"12","author":"JC Platt","year":"2000","unstructured":"Platt JC, Christiani N, Shawe-Taylor J (2000) Large margin DAGs for multiclass classification. Adv Neural Inform Process Syst 12:547\u2013553","journal-title":"Adv Neural Inform Process Syst"},{"key":"722_CR30","first-page":"101","volume":"5","author":"R Rifkin","year":"2004","unstructured":"Rifkin R, Klautau A (2004) In defense of one-vs-all classification. J Mach Learn Res 5:101\u2013141","journal-title":"J Mach Learn Res"},{"issue":"2","key":"722_CR31","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.cmpb.2005.09.008","volume":"81","author":"M Siermala","year":"2006","unstructured":"Siermala M, Juhola M (2006) Techniques for biased data distribution and variable classification with neural networks applied to otoneurological data. Comput Methods Progr Biomed 81(2):128\u2013136","journal-title":"Comput Methods Progr Biomed"},{"issue":"9","key":"722_CR32","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1016\/j.ins.2006.11.002","volume":"177","author":"M Siermala","year":"2007","unstructured":"Siermala M, Juhola M, Laurikkala J, Iltanen K, Kentala E, Pyykk\u00f6 I (2007) Evaluation and classification of otoneurological data with new data analysis methods based on machine learning. Inf Sci 177(9):1963\u20131976","journal-title":"Inf Sci"},{"issue":"3","key":"722_CR33","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JAK Suykens","year":"1999","unstructured":"Suykens JAK, Vandewalle J (1999a) Least squares support vector machines. Neural Process Lett 9(3):293\u2013300","journal-title":"Neural Process Lett"},{"key":"722_CR34","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/IJCNN.1999.831072","volume":"2","author":"JAK Suykens","year":"1999","unstructured":"Suykens JAK, Vandewalle J (1999b) Multiclass least squares support vector machines. Proc Int Joint Conf Neural Netw 2:900\u2013903","journal-title":"Proc Int Joint Conf Neural Netw"},{"key":"722_CR35","doi-asserted-by":"crossref","DOI":"10.1142\/5089","volume-title":"Least squares support vector machines","author":"JAK Suykens","year":"2002","unstructured":"Suykens JAK, van Gestel T, De Brabanter J, De Moor B, Vandewalle J (2002) Least squares support vector machines. World Scientific, Hackensack"},{"key":"722_CR36","doi-asserted-by":"crossref","unstructured":"Takahashi F, Abe S (2002) Decision-tree-based multiclass support vector machines. Proceedings of the 9th international conference on neural information processing, vol 3, pp 1418\u20131422","DOI":"10.1109\/ICONIP.2002.1202854"},{"key":"722_CR37","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3264-1","volume-title":"The nature of statistical learning theory","author":"VN Vapnik","year":"2000","unstructured":"Vapnik VN (2000) The nature of statistical learning theory, 2nd edn. Springer, New York","edition":"2"},{"key":"722_CR38","unstructured":"Viscovery Software GmbH (2015) Viscovery SOMine. http:\/\/www.viscovery.net\/somine\/"},{"key":"722_CR39","first-page":"48","volume":"18","author":"V Zaslavsky","year":"2006","unstructured":"Zaslavsky V, Strizhak A (2006) Credit card fraud detection using self-organizing maps. Inf Secur 18:48\u201363","journal-title":"Inf Secur"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00146-017-0722-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-017-0722-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-017-0722-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T21:13:23Z","timestamp":1569014003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00146-017-0722-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,10]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["722"],"URL":"https:\/\/doi.org\/10.1007\/s00146-017-0722-7","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,10]]}}}