{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:13:15Z","timestamp":1775898795998,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T00:00:00Z","timestamp":1593993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ESRC","award":["ES\/R003254\/1"],"award-info":[{"award-number":["ES\/R003254\/1"]}]},{"name":"DSTL","award":["ACC2005442"],"award-info":[{"award-number":["ACC2005442"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,6]]},"DOI":"10.1145\/3394332.3402838","type":"proceedings-article","created":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T17:21:20Z","timestamp":1593969680000},"page":"82-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Information Extraction from the Long Tail"],"prefix":"10.1145","author":[{"given":"Stuart","family":"E. Middleton","sequence":"first","affiliation":[{"name":"University of Southampton, United Kingdom"}]},{"given":"Anita","family":"Lavorgna","sequence":"additional","affiliation":[{"name":"University of Southampton, UK"}]},{"given":"Geoff","family":"Neumann","sequence":"additional","affiliation":[{"name":"University of Southampton, UK"}]},{"given":"David","family":"Whitehead","sequence":"additional","affiliation":[{"name":"Royal Botanic Gardens Kew, UK"}]}],"member":"320","published-online":{"date-parts":[[2020,7,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297301"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929597"},{"issue":"2","key":"e_1_3_2_1_3_1","first-page":"122","article-title":"Sifting through the net: monitoring of online offenders by researchers","volume":"2","author":"D\u00e9cary-H\u00e9tu David","year":"2015","unstructured":"David D\u00e9cary-H\u00e9tu and Judith Aldridge, 2015. Sifting through the net: monitoring of online offenders by researchers. The European Review of Organised Crime, 2(2):122-141.","journal-title":"The European Review of Organised Crime"},{"key":"e_1_3_2_1_4_1","volume-title":"Jean-ian Boutin and Jos\u00e9 Fernandez","author":"Dupont Benoit","year":"2017","unstructured":"Benoit Dupont, Anne-Marie C\u00f4t\u00e9, Jean-ian Boutin and Jos\u00e9 Fernandez, 2017. Darkode: recruitment patterns and transactional features of \u2018the most dangerous cybercrime forum in the world\u2019. American Behavioral Scientist, 61(11)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/13880292.2016.1131516"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Bandara, 2017. INSiGHT: A system for detecting radicalization trajectories in large heterogeneous graphs. In IEEE International Symposium on Technologies for Homeland Security (HST)","author":"Hung Benjamin W.K.","unstructured":"Benjamin W.K. Hung, Anura P. Jayasumana and Vidarshana W. Bandara, 2017. INSiGHT: A system for detecting radicalization trajectories in large heterogeneous graphs. In IEEE International Symposium on Technologies for Homeland Security (HST), Waltham, MA, pp. 1-7."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2816564"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891694"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986220910297"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748895813505234"},{"key":"e_1_3_2_1_11_1","first-page":"14","volume-title":"Crowd Sourced Crime Hawkes Processes. In International Workshop on Social Sensing (SocialSens)","author":"Mohler George","unstructured":"George Mohler and P.J. Brantingham, 2018. Privacy Preserving, Crowd Sourced Crime Hawkes Processes. In International Workshop on Social Sensing (SocialSens), Orlando, FL, pp. 14-19."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2014.7042564"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.04.021"},{"key":"e_1_3_2_1_14_1","volume-title":"Elizabeth Mrema and Sam Barrat","author":"Nellemann Christian","year":"2016","unstructured":"Christian Nellemann, Rune Henriksen, Arnold Kreilhuber, Davyth Stewart, Maria Kotsovou, Patricia Raxter, Elizabeth Mrema and Sam Barrat, 2016. The Rise of Environmental Crime \u2013 A Growing Threat To Natural Resources Peace, Development And Security. UNEPINTERPOL Rapid Response Assessment, United Nations Environment Programme and RHIPTO Rapid Response\u2013Norwegian Center for Global Analyses."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2019 Workshop on Usable Security (USEC) at the Network and Distributed System Security Symposium (NDSS)","author":"Nouh Mariam","year":"2019","unstructured":"Mariam Nouh, Jason R.C. Nurse, Helena Webb and Michael Goldsmith, 2019. Cybercrime Investigators are Users Too! Understanding the SocioTehnical Challenges Faced by Law Enforcement, In Proceedings of the 2019 Workshop on Usable Security (USEC) at the Network and Distributed System Security Symposium (NDSS), 24-27 February 2019, San Diego, CA, USA."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Meltem Odaba\u015f Thomas J. Holt Ronald L. Breiger 2017. Markets as governance environments for organizations at the edge of illegality: insights from social network analysis. American Behavioural Scientist 61(11).","DOI":"10.1177\/0002764217734266"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"David Robinson and Chris Scogings 2018. The detection of criminal groups in real-world fused data: using the graph-mining algorithm \u201cGraphExtract\u201d. Security Informatics 7 (2).","DOI":"10.1186\/s13388-018-0031-9"},{"key":"e_1_3_2_1_18_1","unstructured":"Anita Lavorgna Stuart E. Middleton David Whitehead Carly Cowell 2020. FloraGuard Tackling the illegal trade in endangered plants Project report. Royal Botanic Gardens Kew."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"e_1_3_2_1_20_1","first-page":"55","volume-title":"Ng","author":"Yang Christopher C.","year":"2007","unstructured":"Christopher C. Yang and Tobun D. Ng, 2007. Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. IEEE Intelligence and Security Informatics, New Brunswick, NJ, pp. 55-58."}],"event":{"name":"WebSci '20: 12th ACM Conference on Web Science","location":"Southampton United Kingdom","acronym":"WebSci '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["12th ACM Conference on Web Science Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394332.3402838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394332.3402838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:06:42Z","timestamp":1775851602000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394332.3402838"}},"subtitle":["A Socio-Technical AI Approach for Criminology Investigations into the Online Illegal Plant Trade"],"short-title":[],"issued":{"date-parts":[[2020,7,6]]},"references-count":20,"alternative-id":["10.1145\/3394332.3402838","10.1145\/3394332"],"URL":"https:\/\/doi.org\/10.1145\/3394332.3402838","relation":{},"subject":[],"published":{"date-parts":[[2020,7,6]]},"assertion":[{"value":"2020-07-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}