{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T07:52:12Z","timestamp":1769068332063,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T00:00:00Z","timestamp":1644969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T00:00:00Z","timestamp":1644969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2022,11]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Criminal investigation adopts Artificial Intelligence to enhance the volume of the facts that can be investigated and documented in trials. However, the abstract reasoning implied in legal justification and argumentation requests to adopt solutions providing high precision, low generalization error, and retrospective transparency. Three requirements that hardly coexist in today\u2019s Artificial Intelligence solutions. In a controlled experiment, we then investigated the use of graph embeddings procedures to retrieve potential criminal actions based on patterns defined in enquiry protocols. We observed that a significant level of accuracy can be achieved but different graph reformation procedures imply different levels of precision, generalization, and transparency.<\/jats:p>","DOI":"10.1007\/s11280-021-01001-2","type":"journal-article","created":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T07:02:39Z","timestamp":1644994959000},"page":"2379-2402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Graph embeddings in criminal investigation: towards combining precision, generalization and transparency"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4473-6258","authenticated-orcid":false,"given":"Valerio","family":"Bellandi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4519-0173","authenticated-orcid":false,"given":"Paolo","family":"Ceravolo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-2050","authenticated-orcid":false,"given":"Samira","family":"Maghool","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Siccardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,16]]},"reference":[{"issue":"11","key":"1001_CR1","doi-asserted-by":"publisher","first-page":"e00938","DOI":"10.1016\/j.heliyon.2018.e00938","volume":"4","author":"OI Abiodun","year":"2018","unstructured":"Abiodun, OI, Jantan, A, Abiodun, EO, Dada, KV, Nachaat, AM, Arshad, H: State-of-the-art in artificial neural network applications: A survey. Heliyon 4(11), e00938 (2018)","journal-title":"Heliyon"},{"key":"1001_CR2","doi-asserted-by":"crossref","unstructured":"Ashley, KD: Artificial intelligence and legal analytics: New tools for law practice in the digital age. Cambridge University Press (2017)","DOI":"10.1017\/9781316761380"},{"key":"1001_CR3","doi-asserted-by":"crossref","unstructured":"Bellandi, V, Ceravolo, P, Maghool, S, Siccardi, S: Graph embeddings in criminal investigation: Extending the scope of enquiry protocols. In: Proceedings of the 12th International Conference on Management of Digital EcoSystems, MEDES \u201920, pp 64\u201371. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3415958.3433102"},{"key":"1001_CR4","unstructured":"Benzi, KM: From recommender systems to spatio-temporal dynamics with network science. Technical report EPFL (2017)"},{"key":"1001_CR5","doi-asserted-by":"crossref","unstructured":"B\u00e9res, F, Kelen, D. M., P\u00e1lovics, R, Bencz\u00far, AA: Node embeddings in dynamic graphs. Applied Network Science (2019)","DOI":"10.1007\/s41109-019-0169-5"},{"key":"1001_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.3389\/fncom.2017.00043","volume":"11","author":"T Bertalan","year":"2017","unstructured":"Bertalan, T, Wu, Y, Laing, C, Gear, CW, Kevrekidis, IG: Coarse-grained descriptions of dynamics for networks with both intrinsic and structural heterogeneities. Front. Comput. Neurosci. 11, 43 (2017)","journal-title":"Front. Comput. Neurosci."},{"key":"1001_CR7","unstructured":"Bjelland, HF, Dahl, JY: Exploring criminal investigation practices: The benefits of analysing police-generated investigation data (2017)"},{"issue":"1","key":"1001_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888997000015","volume":"12","author":"LA Breslow","year":"1997","unstructured":"Breslow, LA, Aha, DW: Simplifying decision trees: A survey. Knowl. Eng. Rev. 12(1), 1\u201340 (1997)","journal-title":"Knowl. Eng. Rev."},{"key":"1001_CR9","doi-asserted-by":"crossref","unstructured":"Catanese, SA, Fiumara, G: A visual tool for forensic analysis of mobile phone traffic. In: MiFor \u201910: Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp. 71\u201376. ACM (2010)","DOI":"10.1145\/1877972.1877992"},{"key":"1001_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"AF Colladon","year":"2017","unstructured":"Colladon, AF, Remondi, E: Using social network analysis to prevent money laundering. Expert Syst. Appl. 67, 49\u201358 (2017)","journal-title":"Expert Syst. Appl."},{"key":"1001_CR11","unstructured":"Depeau, J: Announcing the neo4j crime investigation sandbox. Technical report, Neo4j. https:\/\/medium.com\/neo4j\/announcing-the-neo4j-crime-investigation-sandbox-c0c3bd9e71b1 (2018)"},{"key":"1001_CR12","doi-asserted-by":"crossref","unstructured":"Eriks\u00e9n, S: Designing for accountability. In: Proceedings of the Second Nordic Conference on Human-Computer Interaction, pp. 177\u2013186 (2002)","DOI":"10.1145\/572020.572041"},{"issue":"1","key":"1001_CR13","doi-asserted-by":"publisher","first-page":"205395171986054","DOI":"10.1177\/2053951719860542","volume":"6","author":"H Felzmann","year":"2019","unstructured":"Felzmann, H, Villaronga, EF, Lutz, C, Tam\u00f2-Larrieux, A: Transparency you can trust: Transparency requirements for artificial intelligence between legal norms and contextual concerns. Big Data & Society 6(1), 2053951719860542 (2019)","journal-title":"Big Data & Society"},{"key":"1001_CR14","unstructured":"Gehl, R, Plecas, D, et al: Introduction to criminal investigation: Processes, practices and thinking. Justice Institute of British Columbia. https:\/\/openlibrary-repo.ecampusontario.ca\/jspui\/handle\/123456789\/348 (2018)"},{"key":"1001_CR15","doi-asserted-by":"crossref","unstructured":"Goutte, C, Gaussier, E: A probabilistic interpretation of precision, recall and f-score, with implication for evaluation. In: European Conference on Information Retrieval, pp. 345\u2013359. Springer (2005)","DOI":"10.1007\/978-3-540-31865-1_25"},{"issue":"11","key":"1001_CR16","first-page":"31","volume":"112","author":"D Govende","year":"2019","unstructured":"Govende, D: The criminal investigation: principles and practices. Servamus Community-based Safety and Security Magazine 112(11), 31\u201333 (2019)","journal-title":"Servamus Community-based Safety and Security Magazine"},{"key":"1001_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.knosys.2018.03.022","volume":"151","author":"P Goyal","year":"2018","unstructured":"Goyal, P, Ferrara, E: Graph embedding techniques, applications, and performance: A survey. Knowl.-Based Syst. 151, 78\u201394 (2018)","journal-title":"Knowl.-Based Syst."},{"key":"1001_CR18","doi-asserted-by":"crossref","unstructured":"Grover, A, Leskovec, J: node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855\u2013864 (2016)","DOI":"10.1145\/2939672.2939754"},{"issue":"supplement 1","key":"1001_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3138\/utlj.2017-0044","volume":"68","author":"M Hildebrandt","year":"2018","unstructured":"Hildebrandt, M: Law as computation in the era of artificial legal intelligence: Speaking law to the power of statistics. University of Toronto Law Journal 68(supplement 1), 12\u201335 (2018)","journal-title":"University of Toronto Law Journal"},{"issue":"1","key":"1001_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jcss.2015.06.006","volume":"82","author":"F Holzschuher","year":"2016","unstructured":"Holzschuher, F, Peinl, R: Querying a graph database\u2013language selection and performance considerations. J. Comput. Syst. Sci. 82(1), 45\u201368 (2016)","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"1001_CR21","first-page":"584","volume":"6","author":"A Irons","year":"2014","unstructured":"Irons, A, Lallie, HS: Digital forensics to intelligent forensics. Fut Int 6(3), 584\u2013596 (2014)","journal-title":"Fut Int"},{"key":"1001_CR22","doi-asserted-by":"crossref","unstructured":"Junior, SB, Ceravolo, P, Damiani, E, Tavares, GM: Evaluating trace encoding methods in process mining. In: Bowles, J, Broccia, G, Nanni, M (eds.) From Data to Models and Back, pp 174\u2013189. Springer International Publishing, Cham (2021)","DOI":"10.1007\/978-3-030-70650-0_11"},{"key":"1001_CR23","doi-asserted-by":"crossref","unstructured":"Kumar, M, Hanumanthappa, M, Suresh Kumar, TV: Crime investigation and criminal network analysis using archive call detail records. In: 2016 Eighth International Conference on Advanced Computing (ICoAC), pp. 46\u201350. IEEE (2017)","DOI":"10.1109\/ICoAC.2017.7951743"},{"issue":"1","key":"1001_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1504\/IJKESDP.2010.030465","volume":"2","author":"M Leida","year":"2010","unstructured":"Leida, M, Ceravolo, P, Damiani, E, Cui, Z, Gusmini, A: Semantics-aware matching strategy (sams) for the ontology mediated data integration (oddi). International Journal of Knowledge Engineering and Soft Data Paradigms 2(1), 33\u201356 (2010)","journal-title":"International Journal of Knowledge Engineering and Soft Data Paradigms"},{"issue":"1","key":"1001_CR25","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1038\/s42256-019-0138-9","volume":"2","author":"SM Lundberg","year":"2020","unstructured":"Lundberg, SM, Erion, G, Chen, H, DeGrave, A, Prutkin, JM, Nair, B, Katz, R, Himmelfarb, J, Bansal, N, Lee, S -I: From local explanations to global understanding with explainable ai for trees. Nature Machine Intelligence 2(1), 56\u201367 (2020)","journal-title":"Nature Machine Intelligence"},{"issue":"2","key":"1001_CR26","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10506-019-09255-y","volume":"28","author":"M Medvedeva","year":"2020","unstructured":"Medvedeva, M, Vols, M, Wieling, M: Using machine learning to predict decisions of the european court of human rights. Artificial Intelligence and Law 28(2), 237\u2013266 (2020)","journal-title":"Artificial Intelligence and Law"},{"key":"1001_CR27","unstructured":"Mikolov, T, Chen, K, Corrado, G, Dean, J: Efficient estimation of word representations in vector space. arXiv:1301.3781 (2013)"},{"key":"1001_CR28","first-page":"11","volume":"566\u2013573","author":"G Nalbantov","year":"2005","unstructured":"Nalbantov, G, Bioch, J, Groenen, P: . Solving and interpreting binary classification problems in marketing with svms 566\u2013573, 11 (2005)","journal-title":"Solving and interpreting binary classification problems in marketing with svms"},{"key":"1001_CR29","unstructured":"Narayanan, A, Chandramohan, M, Venkatesan, R, Chen, L, Liu, Y, Jaiswal, S: graph2vec: Learning distributed representations of graphs. arXiv:1707.05005 (2017)"},{"issue":"3","key":"1001_CR30","doi-asserted-by":"publisher","first-page":"489","DOI":"10.3233\/SW-160218","volume":"8","author":"H Paulheim","year":"2017","unstructured":"Paulheim, H: Knowledge graph refinement: A survey of approaches and evaluation methods. Semantic Web 8(3), 489\u2013508 (2017)","journal-title":"Semantic Web"},{"key":"1001_CR31","doi-asserted-by":"crossref","unstructured":"Peroncini, R, Pizzi, R: Values for some: How does criminal network undermine the political system? a data mining perspective. In: Systemics of Incompleteness and Quasi-Systems), pp. 267\u2013282 (2019)","DOI":"10.1007\/978-3-030-15277-2_21"},{"key":"1001_CR32","doi-asserted-by":"crossref","unstructured":"Perozzi, B, Al-Rfou, R, Skiena, S: Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701\u2013710 (2014)","DOI":"10.1145\/2623330.2623732"},{"key":"1001_CR33","unstructured":"scikit-learn, machine learning in python"},{"key":"1001_CR34","unstructured":"Tensorflow"},{"key":"1001_CR35","doi-asserted-by":"crossref","unstructured":"Torricelli, M, Karsai, M, Gauvin, L: weg2vec: Event embedding for temporal networks. Scientific Reports (2020)","DOI":"10.1038\/s41598-020-63221-2"},{"key":"1001_CR36","doi-asserted-by":"crossref","unstructured":"Tsitsulin, A, Mottin, D, Karras, P, M\u00fcller, E: Verse: Versatile graph embeddings from similarity measures. In: Proceedings of the 2018 World Wide Web Conference, WWW \u201918. International World Wide Web Conferences Steering Committee, pp 539\u2013548. Republic and Canton of Geneva CHE (2018)","DOI":"10.1145\/3178876.3186120"},{"issue":"12","key":"1001_CR37","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1109\/TKDE.2017.2754499","volume":"29","author":"Q Wang","year":"2017","unstructured":"Wang, Q, Mao, Z, Wang, B, Guo, L: Knowledge graph embedding: A survey of approaches and applications. IEEE Trans. Knowl. Data Eng. 29(12), 2724\u20132743 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1001_CR38","doi-asserted-by":"crossref","unstructured":"Wischmeyer, T: Artificial intelligence and transparency: Opening the black box. In: Regulating Artificial Intelligence, pp. 75\u2013101. Springer (2020)","DOI":"10.1007\/978-3-030-32361-5_4"},{"key":"1001_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, J, Dong, Y, Wang, Y, Tang, J, Ding, M: Prone: Fast and scalable network representation learning. In: IJCAI, vol. 19, pp. 4278\u20134284 (2019)","DOI":"10.24963\/ijcai.2019\/594"},{"key":"1001_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, M, Wang, Q, Xu, W, Li, W, Sun, S: Discriminative path-based knowledge graph embedding for precise link prediction. In: European Conference on Information Retrieval, pp. 276\u2013288. Springer (2018)","DOI":"10.1007\/978-3-319-76941-7_21"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-021-01001-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-021-01001-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-021-01001-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T19:38:18Z","timestamp":1667590698000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-021-01001-2"}},"subtitle":["Special issue on computational aspects of network science"],"short-title":[],"issued":{"date-parts":[[2022,2,16]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["1001"],"URL":"https:\/\/doi.org\/10.1007\/s11280-021-01001-2","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,16]]},"assertion":[{"value":"1 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}