{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T05:21:12Z","timestamp":1769145672998,"version":"3.49.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,11,26]],"date-time":"2009-11-26T00:00:00Z","timestamp":1259193600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s10588-009-9060-8","type":"journal-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T23:54:15Z","timestamp":1259106855000},"page":"89-111","source":"Crossref","is-referenced-by-count":29,"title":["Hiding in plain sight: criminal network analysis"],"prefix":"10.1007","volume":"16","author":[{"given":"Christopher E.","family":"Hutchins","sequence":"first","affiliation":[]},{"given":"Marge","family":"Benham-Hutchins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,11,26]]},"reference":[{"key":"9060_CR1","volume-title":"Friends of friends: networks, manipulators and coalitions","author":"J Boissevain","year":"1974","unstructured":"Boissevain J (1974) Friends of friends: networks, manipulators and coalitions. Blackwell & Mott, Bristol"},{"key":"9060_CR2","doi-asserted-by":"crossref","DOI":"10.21236\/ADA460034","volume-title":"ORA: organization risk analyzer (Technical Report No. CMU-ISRI-04-106)","author":"K Carley","year":"2004","unstructured":"Carley K, Reminga J (2004) ORA: organization risk analyzer (Technical Report No. CMU-ISRI-04-106). Carnegie Mellon University, School of Computer Science, Pittsburgh"},{"issue":"4","key":"9060_CR3","doi-asserted-by":"crossref","first-page":"1324","DOI":"10.1016\/j.dss.2006.04.003","volume":"43","author":"KM Carley","year":"2007","unstructured":"Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43(4):1324\u20131347","journal-title":"Decis Support Syst"},{"issue":"4","key":"9060_CR4","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1093\/bjc\/41.4.580","volume":"41","author":"N Coles","year":"2001","unstructured":"Coles N (2001) It\u2019s not what you know it\u2019s who you know that counts. Analyzing serious crime groups as social networks. Br J Criminol 41(4):580","journal-title":"Br J Criminol"},{"key":"9060_CR5","volume-title":"AutoMap 1.2\u2014Extract, analyze, represent, and compare mental models from texts. (No. CMU-ISRI-04-100)","author":"J Diesner","year":"2004","unstructured":"Diesner J, Carley K (2004) AutoMap 1.2\u2014Extract, analyze, represent, and compare mental models from texts. (No. CMU-ISRI-04-100). Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Pittsburg"},{"key":"9060_CR6","first-page":"81","volume-title":"Causal semantic networking for information systems and technology research: approaches, advances, and illustrations","author":"J Diesner","year":"2005","unstructured":"Diesner J, Carley K (2005) Revealing social structure from text: meta-matrix text analysis as a novel method for network text analysis. In: Narayanan VK, Armstrong DJ (eds) Causal semantic networking for information systems and technology research: approaches, advances, and illustrations. Idea Group, Harrisburg, pp 81\u2013108"},{"key":"9060_CR7","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/s10588-008-9029-z","volume":"14","author":"J Diesner","year":"2008","unstructured":"Diesner J, Carley K (2008) Conditional random fields for entity extraction and ontological text coding. Comput Math Organ Theory 14:248\u2013262","journal-title":"Comput Math Organ Theory"},{"issue":"1","key":"9060_CR8","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1093\/bjc\/azh053","volume":"45","author":"M Innes","year":"2005","unstructured":"Innes M, Fielding N, Cope N (2005) \u201cThe appliance of science\u201d? The theory and practice of crime intelligence analysis. Br J Criminol 45(1):39\u201357","journal-title":"Br J Criminol"},{"issue":"3","key":"9060_CR9","first-page":"53","volume":"24","author":"P Klerks","year":"2001","unstructured":"Klerks P (2001) The network paradigm applied to criminal organizations: theoretical, nitpicking, or a relevant doctrine for investigators? Recent developments from the Netherlands. Connections 24(3):53\u201365","journal-title":"Connections"},{"key":"9060_CR10","doi-asserted-by":"crossref","DOI":"10.1037\/e501672006-001","volume-title":"Street gangs and interventions: innovative problem solving with network analysis","author":"J McGloin","year":"2005","unstructured":"McGloin J (2005) Street gangs and interventions: innovative problem solving with network analysis. Department of Justice, Office of Community Oriented Policing Services, Washington"},{"key":"9060_CR11","unstructured":"Ozgul F, Bondy J, Aksoy H (2007) Mining for offender group detection and story of a police operation. Paper presented at the Proceedings of the sixth Australasian conference on data mining and analytics - Vol 70. From http:\/\/portal.acm.org\/citation.cfm?id=1378245.1378270#"},{"issue":"2","key":"9060_CR12","first-page":"1","volume":"2","author":"S Ressler","year":"2006","unstructured":"Ressler S (2006) Social network analysis as an approach to combat terrorism: past, present, and future research. Homel Secur Aff 2(2):1\u201310","journal-title":"Homel Secur Aff"},{"issue":"10","key":"9060_CR13","first-page":"63","volume":"2","author":"TA Stewart","year":"2001","unstructured":"Stewart TA (2001) Six degrees of Mohamed Atta. Business 2.0 2(10):63","journal-title":"Business 2.0"},{"key":"9060_CR14","first-page":"61","volume-title":"Networks and netwars: the future of terror, crime, and militancy","author":"P Williams","year":"2001","unstructured":"Williams P (2001) Transnational criminal networks. In: Arquilla J, Ronfeldt D (eds) Networks and netwars: the future of terror, crime, and militancy. Rand, Santa Monica, pp 61\u201397"},{"issue":"6","key":"9060_CR15","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J Xu","year":"2005","unstructured":"Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100","journal-title":"Commun ACM"},{"issue":"2","key":"9060_CR16","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"JJ Xu","year":"2005","unstructured":"Xu JJ, Hsinchun C (2005) CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2):201","journal-title":"ACM Trans Inf Syst"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-009-9060-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-009-9060-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-009-9060-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:36:22Z","timestamp":1559302582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-009-9060-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,26]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["9060"],"URL":"https:\/\/doi.org\/10.1007\/s10588-009-9060-8","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11,26]]}}}