{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:22:17Z","timestamp":1770139337990,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Tech. Challenge for Future Program Policing funded by the Ministry of Science and Information and Communication Technology (MSIT), South Korea, and Korean National Police Agency (KNPA), South Korea"},{"name":"Development of Active Dark Web Information Collection, Analysis and Tracking Technology to Prevent Dark Web Crime\/Project","award":["RS-2023-00244362"],"award-info":[{"award-number":["RS-2023-00244362"]}]},{"name":"Daegu University Research Grant, in 2022"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3657961","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:59:23Z","timestamp":1769493563000},"page":"15044-15063","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid GNN-Based Link Prediction Model for Identifying Drug-Related Organized Crime Groups on Twitter"],"prefix":"10.1109","volume":"14","author":[{"given":"Eun-Young","family":"Park","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Daegu University, Gyeongsan, South Korea"}]},{"given":"Hyeon-Woo","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Daegu University, Gyeongsan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4697-8058","authenticated-orcid":false,"given":"Jiyeon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Daegu University, Gyeongsan, South Korea"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"LSD & MDMA: Laced By Dark Web Spaces, Grip of Synthetic Drugs Tightens on Youth","year":"2025"},{"key":"ref2","volume-title":"U.S. Drug Enforcement Administration (DEA), National Drug Threat Assessment 2024","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2024.105170"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00600-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i7.1349"},{"issue":"2","key":"ref6","first-page":"236","article-title":"Science communication on social media: Examining cross-platform behavioral engagement","volume":"11","author":"Coletti","year":"2022","journal-title":"J. Social Media Soc."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/app15020636"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/ISU-240006"},{"issue":"1","key":"ref9","first-page":"40","article-title":"The impact of social media on students\u2019 academic performance","volume":"60","author":"Samarasinghe","year":"2019","journal-title":"Am. Sci. Res. J. Eng. Technol. Sci."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.1010766"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-024-01328-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s44163-024-00193-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.54097\/farmdr42"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3443141"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2025.03.057"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2024.100221"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-025-01472-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-05586-w"},{"key":"ref19","article-title":"Social media and police investigations: Understanding the strategies that officers pursue when they encounter social media in their investigations","author":"Spyt","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13091671"},{"issue":"5","key":"ref21","first-page":"1","article-title":"Cybersecurity and ethical social media use: The role of guidance and counseling in Zambia","volume":"3","author":"Sinyangwe","year":"2023","journal-title":"Int. J. Future Multidisciplinary Res."},{"issue":"2","key":"ref22","first-page":"261","article-title":"Digital forensic analysis of social media platforms for enhanced investigation and evidence collection","volume":"43","author":"Maitra","year":"2024","journal-title":"Int. J. Innov. Appl. Stud."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.61137\/ijsret.vol.10.issue5.256"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CCICT62777.2024.00041"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.31449\/inf.v48i18.6272"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-025-09562-8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/imcom64595.2025.10857483"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2022.100235"},{"key":"ref29","volume-title":"Social Media Drug Trafficking Threat Overview","year":"2022"},{"key":"ref30","article-title":"CrimeGNN: Harnessing the power of graph neural networks for community detection in criminal networks","author":"Yang","year":"2023","journal-title":"arXiv:2311.17479"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pdig.0000842"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2196\/71703"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3454328"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121643"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2025.1566513"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2025.100668"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/app142411745"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-025-00429-0"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11363471.pdf?arnumber=11363471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T05:55:05Z","timestamp":1770098105000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11363471\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3657961","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}