{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T22:26:35Z","timestamp":1775514395233,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100011200","name":"FP7 Security","doi-asserted-by":"publisher","award":["FP7-SEC-2012-312651"],"award-info":[{"award-number":["FP7-SEC-2012-312651"]}],"id":[{"id":"10.13039\/100011200","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13388-018-0032-8","type":"journal-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T06:58:03Z","timestamp":1544684283000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online"],"prefix":"10.1186","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2094-7456","authenticated-orcid":false,"given":"Simon","family":"Andrews","sequence":"first","affiliation":[]},{"given":"Ben","family":"Brewster","sequence":"additional","affiliation":[]},{"given":"Tony","family":"Day","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,13]]},"reference":[{"key":"32_CR1","unstructured":"Perrin A (2015) Social media usage: 2005\u20132015. Pew Research Center. \n                    http:\/\/www.pewinternet.org\/files\/2015\/10\/PI_2015-10-08_Social-Networking-Usage-2005-2015_FINAL.pdf"},{"key":"32_CR2","first-page":"47","volume-title":"Larsen H, Blanco J, Pastor Pastor R","author":"RP Pastor","year":"2017","unstructured":"Pastor RP, Larsen HL (2017) Scanning of open data for detection of emerging organized crime threats\u2014the ePOOLICE project. In: Larsen H, Blanco J, Pastor Pastor R, Yager R (eds) Using open data to detect organized crime threats. Springer, Berlin, pp 47\u201371"},{"key":"32_CR3","unstructured":"CISC Strategic Criminal Analytical Services (2007) Strategic early warning for criminal intelligence. Criminal Intelligence Service Canada (CISC). \n                    http:\/\/publications.gc.ca\/collections\/collection_2013\/sp-ps\/PS64-107-2007-eng.pdf"},{"key":"32_CR4","unstructured":"College of Policing (2014) Authorised professional practice investigation guidelines. \n                    https:\/\/www.app.college.police.uk\/app-content\/investigations\/introduction\/"},{"key":"32_CR5","unstructured":"Her Majesty\u2019s Inspectorate of Constabulary (2011) The rules of engagement: a review of the august 2011 disorders. \n                    https:\/\/www.justiceinspectorates.gov.uk\/hmic\/media\/a-review-of-the-august-2011-disorders-20111220.pdf"},{"issue":"6","key":"32_CR6","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1080\/02684527.2012.716965","volume":"27","author":"D Omand","year":"2012","unstructured":"Omand D, Bartlett J, Miller C (2012) Introducing social media intelligence (SOCMINT). Intell Natl Sec 27(6):801\u2013823","journal-title":"Intell Natl Sec"},{"key":"32_CR7","unstructured":"Gilgoff D Lee JJ (2013) Social media shapes Boston bombings response. Natl Geogr 7"},{"key":"32_CR8","unstructured":"United Nations (2000) United Nations convention against transnational organized crime and the protocols thereto. \n                    http:\/\/www.osce.org\/odihr\/19223?download=true"},{"key":"32_CR9","unstructured":"The Home Office (2015) The strategic policing requirement. \n                    https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/417116\/The_Strategic_Policing_Requirement.pdf"},{"key":"32_CR10","unstructured":"Europol (2011) EU organised crime threat assessment: OCTA 2011. File no. 2530-274. Europol, O2\u2014Analysis & Knowledge, The Hague"},{"issue":"2","key":"32_CR11","doi-asserted-by":"publisher","first-page":"205395171454186","DOI":"10.1177\/2053951714541861","volume":"1","author":"D Lyon","year":"2014","unstructured":"Lyon D (2014) Surveillance, snowden, and big data: capacities, consequences, critique. Big Data Soc 1(2):2053951714541861","journal-title":"Big Data Soc"},{"key":"32_CR12","unstructured":"Babuta A (2017) Big data and policing: an assessment of law enforcement requirements, expectations and priorities. \n                    https:\/\/rusi.org\/sites\/default\/files\/201709_rusi_big_data_and_policing_babuta_web.pdf"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Brewster B, Ingle T, Rankin G (2014) Crawling open-source data for indicators of human trafficking. In: Proceedings of the 7th IEEE\/ACM international conference on utility and cloud computing. IEEE Computer Society, pp 714\u2013719","DOI":"10.1109\/UCC.2014.116"},{"key":"32_CR14","first-page":"511","volume":"12","author":"J Mahmud","year":"2012","unstructured":"Mahmud J, Nichols J, Drews C (2012) Where is this tweet from? inferring home locations of Twitter users. ICWSM 12:511\u2013514","journal-title":"ICWSM"},{"issue":"4","key":"32_CR15","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1023\/A:1016095317864","volume":"37","author":"P Williams","year":"2002","unstructured":"Williams P, Godson R (2002) Anticipating organized and transnational crime. Crime Law Soc Change 37(4):311\u2013355","journal-title":"Crime Law Soc Change"},{"key":"32_CR16","unstructured":"UNODC (2009) Global report on trafficking in persons. \n                    https:\/\/www.unodc.org\/documents\/Global_Report_on_TIP.pdf"},{"issue":"1","key":"32_CR17","first-page":"179","volume":"10","author":"F Laczko","year":"2003","unstructured":"Laczko F, Gramegna MA (2003) Developing better indicators of human trafficking. Brown J World Aff 10(1):179\u2013194","journal-title":"Brown J World Aff"},{"key":"32_CR18","unstructured":"UNODC (2009) Anti-human trafficking manual for criminal justice practitioners. \n                    https:\/\/www.unodc.org\/documents\/human-trafficking\/TIP_module2_Ebook.pdf"},{"key":"32_CR19","unstructured":"Chakraborty G, Pagolu M, Garla S (2014) Text mining and analysis: practical methods, examples, and case studies using SAS. SAS Institute"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Ritter A, Etzioni O, Clark S et al (2012) Open domain event extraction from twitter. In: Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 1104\u20131112","DOI":"10.1145\/2339530.2339704"},{"key":"32_CR21","unstructured":"Owoputi O, O\u2019Connor B, Dyer C, Gimpel K, Schneider N, Smith NA (2013) Improved part-of-speech tagging for online conversational text with word clusters. In: Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies. Association for Computational Linguistics, pp 380\u2013390"},{"key":"32_CR22","unstructured":"Twitter Inc. (2015) Twitter search API. \n                    https:\/\/dev.twitter.com\/rest\/public\/search"},{"key":"32_CR23","volume-title":"Formal concept analysis: mathematical foundations","author":"B Ganter","year":"1998","unstructured":"Ganter B, Wille R (1998) Formal concept analysis: mathematical foundations. Springer, Berlin"},{"key":"32_CR24","first-page":"429","volume":"4","author":"KE Wolff","year":"1993","unstructured":"Wolff KE (1993) A first course in formal concept analysis: how to understand line diagrams. Adv Stat Softw 4:429\u2013438","journal-title":"Adv Stat Softw"},{"key":"32_CR25","unstructured":"Andrews S (2009) Data conversion and interoperability for FCA. In: Croitoru M, Fortin J, J\u00e4schke R (eds) Proceedings of the 4th conceptual structures tools interoperability workshop at the 17th international conference on conceptual structures. University Higher School of Economics, Moscow, pp 42\u201349"},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Andrews S (2011) In-Close2, a high performance formal concept miner. In: Andrews S, Polovina S, Hill R, Akhgar B (eds) Conceptual structures for discovering knowledge\u2014proceedings of the 19th international conference on conceptual structures (ICCS). Springer, Berlin, pp 50\u201362","DOI":"10.1007\/978-3-642-22688-5_4"},{"issue":"1","key":"32_CR27","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1075\/li.30.1.03nad","volume":"30","author":"D Nadeau","year":"2007","unstructured":"Nadeau D, Sekine S (2007) A survey of named entity recognition and classification. Lingvist Investig 30(1):3\u201326","journal-title":"Lingvist Investig"},{"key":"32_CR28","unstructured":"SAS (2013) SAS\u00ae sentiment analysis: fact sheet. \n                    https:\/\/www.sas.com\/content\/dam\/SAS\/en_us\/doc\/factsheet\/sas-sentiment-analysis-104357.pdf"},{"key":"32_CR29","first-page":"2015","volume":"27","author":"A Mateescu","year":"2015","unstructured":"Mateescu A, Brunton D, Rosenblat A, Patton D, Gold Z, Boyd D (2015) Social media surveillance and law enforcement. Data Civ Rights 27:2015\u20132027","journal-title":"Data Civ Rights"},{"key":"32_CR30","unstructured":"BlueJay (2015) What you can do with BlueJay. \n                    http:\/\/brightplanet.com\/bluejay\/\n                    \n                  . Accessed 7 Oct"},{"key":"32_CR31","unstructured":"OpenMIND (2018) OpenMIND. \n                    http:\/\/www.3i-mind.com\/solutions\/openmind\/\n                    \n                  . Accessed 3rd Mar"},{"key":"32_CR32","unstructured":"Murgia M (2018) US police to scan social media for violence alerts. \n                    https:\/\/www.ft.com\/content\/e2c850be-80c8-11e6-bc52-0c7211ef3198\n                    \n                  . Accessed 3rd Mar"},{"issue":"2","key":"32_CR33","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/poi3.85","volume":"7","author":"P Burnap","year":"2015","unstructured":"Burnap P, Williams ML (2015) Cyber hate speech on twitter: an application of machine classification and statistical modeling for policy and decision making. Policy Internet 7(2):223\u2013242","journal-title":"Policy Internet"},{"key":"32_CR34","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/B978-0-12-407191-9.00014-4","volume-title":"Strategic intelligence management","author":"S Andrews","year":"2013","unstructured":"Andrews S, Yates S, Akhgar B, Fortune D (2013) The ATHENA project: using formal concept analysis to facilitate the actions of responders in a crisis situation. In: Akhgar B, Yates S (eds) Strategic intelligence management. Elsevier, Amsterdam, pp 167\u2013180"},{"key":"32_CR35","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-52419-1_6","volume-title":"Application of social media in crisis management","author":"S Andrews","year":"2017","unstructured":"Andrews S, Day T, Domdouzis K, Hirsch L, Lefticaru R, Orphanides C (2017) Analyzing crowd-sourced information and social media for crisis management. In: Akhgar B, Staniforth A, Waddington D (eds) Application of social media in crisis management. Springer, Berlin, pp 77\u201396"},{"key":"32_CR36","unstructured":"Wall DS (2005) The Internet as a conduit for criminal activity (October 21, 2015). In: Pattavina A (ed) Information technology and the criminal justice system. Sage, Beverley Hills, pp 77\u201398. \n                    https:\/\/ssrn.com\/abstract=740626\n                    \n                  . Revised 2010\u20132015"},{"key":"32_CR37","doi-asserted-by":"crossref","unstructured":"Latonero M (2011) Human trafficking online: the role of social networking sites and online classifieds. SSRN. \n                    http:\/\/dx.doi.org\/10.2139\/ssrn.2045851","DOI":"10.2139\/ssrn.2045851"},{"key":"32_CR38","doi-asserted-by":"crossref","unstructured":"Wang H, Cai C, Philpot A, Latonero M, Hovy EH, Metzler D (2012) Data integration from open internet sources to combat sex trafficking of minors. In: Proceedings of the 13th annual international conference on digital government research. ACM, New York, pp 246\u2013252","DOI":"10.1145\/2307729.2307769"},{"key":"32_CR39","first-page":"241","volume":"10","author":"EI Kunze","year":"2009","unstructured":"Kunze EI (2009) Sex trafficking via the internet: how international agreements address the problem and fail to go far enough. J High Tech Law 10:241","journal-title":"J High Tech Law"},{"key":"32_CR40","unstructured":"Carback J (2018) Cybersex trafficking: toward a more effective prosecutorial response (updated) (May 19, 2018). Criminal Law Bulletin, 54. \n                    https:\/\/ssrn.com\/abstract=3181311"},{"key":"32_CR41","doi-asserted-by":"crossref","unstructured":"Ibanez M, Suthers DD (2014) Detection of domestic human trafficking indicators and movement trends using content available on open internet sources. In: 2014 47th Hawaii international conference on system sciences (HICSS). IEEE, pp 1556\u20131565","DOI":"10.1109\/HICSS.2014.200"},{"key":"32_CR42","doi-asserted-by":"crossref","unstructured":"Poelmans J, Elzinga P, Viaene S, Dedene G (2010) A method based on temporal concept analysis for detecting and profiling human trafficking suspects. In: Artificial intelligence and applications. Acta Press, Calgary, pp 1\u20139","DOI":"10.2316\/P.2010.674-024"},{"key":"32_CR43","doi-asserted-by":"crossref","unstructured":"Agarwal S, Sureka A, Goyal V (2015) Open source social media analytics for intelligence and security informatics applications. In: Proceedings of the 4th international conference on big data analytics. Springer, Berlin, pp 21\u201337","DOI":"10.1007\/978-3-319-27057-9_2"},{"key":"32_CR44","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-47671-1_15","volume-title":"Open source intelligence investigation","author":"E Charalambous","year":"2016","unstructured":"Charalambous E, Kavallieros D, Brewster B, Leventakis G, Koutras N, Papalexandratos G (2016) Combatting cybercrime and sexual exploitation of children: an open source toolkit. In: Akhgar B, Bayerl P, Sampson F (eds) Open source intelligence investigation. Springer, Berlin, pp 233\u2013249"},{"key":"32_CR45","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2013.442","volume":"12","author":"T Hua","year":"2013","unstructured":"Hua T, Lu CT, Ramakrishnan N, Chen F, Arredondo J, Mares D et al (2013) Analyzing civil unrest through social media. Computer 12:80\u201384","journal-title":"Computer"},{"key":"32_CR46","doi-asserted-by":"crossref","unstructured":"Compton R, Lee C, Lu TC, De Silva L, Macy M (2013) Detecting future social unrest in unprocessed twitter data: \u201cemerging phenomena and big data\u201d. In: Proceedings of the 2013 IEEE international conference on intelligence and security informatics. IEEE, pp 56\u201360","DOI":"10.1109\/ISI.2013.6578786"},{"key":"32_CR47","doi-asserted-by":"crossref","unstructured":"Fu T, Huang CN, Chen H (2009) Identification of extremist videos in online video sharing sites. In: Proceedings of the 2009 IEEE international conference on intelligence and security informatics. IEEE, pp 179\u2013181","DOI":"10.1109\/ISI.2009.5137295"},{"key":"32_CR48","doi-asserted-by":"crossref","unstructured":"Agarwal S, Sureka A (2014) A focused crawler for mining hate and extremism promoting videos on YouTube. In: Proceedings of the 25th ACM conference on hypertext and social media, ACM, New York, pp 294\u2013296","DOI":"10.1145\/2631775.2631776"},{"key":"32_CR49","unstructured":"Bendler J, Ratku A, Neumann D (2014) Crime mapping through geo-spatial social media activity. In: Proceedings of the 2014 international conference on information systems. \n                    https:\/\/aisel.aisnet.org\/icis2014\/proceedings\/ConferenceTheme\/12\/"},{"key":"32_CR50","unstructured":"Gupta A, Kumaraguru P, Castillo C, Meier P (2014) TweetCred: a real-time web-based system for assessing credibility of content on Twitter. In: Proceedings of the 6th international conference on social informatics (SocInfo)"},{"key":"32_CR51","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan J, Kang B, Meyer G, H\u00f6llerer T, Adali S (2012) Credibility in context: an analysis of feature distributions in Twitter. In: Proceedings of the 2012 international conference on privacy, security, risk and trust, at the 2012 international conference on social computing, Amsterdam, September 3\u20135, 2012, pp 293\u2013301","DOI":"10.1109\/SocialCom-PASSAT.2012.128"},{"key":"32_CR52","doi-asserted-by":"crossref","unstructured":"Castillo C, Mendoza M, Poblete B (2011) Information credibility on Twitter. In: Proceedings of the 20th international conference on the world wide web, WWW 2011, Hyderabad, March 28\u2013April 1, 2011, pp 675\u2013684","DOI":"10.1145\/1963405.1963500"},{"issue":"2","key":"32_CR53","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10844-016-0404-9","volume":"47","author":"S Andrews","year":"2016","unstructured":"Andrews S, Gibson H, Domdouzis K, Akhgar B (2016) Creating corroborated crisis reports from social media data through formal concept analysis. J Intell Inf Syst 47(2):287\u2013312","journal-title":"J Intell Inf Syst"},{"key":"32_CR54","unstructured":"Andrews S, Brewster B, Day T (2016) Organised crime and social media; identifying and corroborating weak signals of human trafficking online. In: Proceedings of the 22nd international conference on conceptual structures. vol 9717 of Lecture notes in computer science (Lecture notes in artificial intelligence). Springer, Berlin, pp 137\u2013150"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-018-0032-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-018-0032-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-018-0032-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T19:04:44Z","timestamp":1576177484000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-018-0032-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1186\/s13388-018-0032-8","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"25 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}