{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T22:31:31Z","timestamp":1777933891993,"version":"3.51.4"},"reference-count":50,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"First Class Discipline Construction Fund Project","award":["2023SYL07"],"award-info":[{"award-number":["2023SYL07"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this research. The Bayesian network-based fraud risk warning and intervention model was designed by taking into account existing data accumulation, the related literature, and expert knowledge. The initial structure of the model was improved by utilizing City S as an application example, and a telecom-fraud analysis and warning framework was proposed by incorporating telecom-fraud mapping. After the evaluation in this paper, the model shows that age has a maximum sensitivity of 13.5% to telecom-fraud losses; anti-fraud propaganda can reduce the probability of losses above 300,000 yuan by 2%; and the overall telecom-fraud losses show that more occur in the summer and less occur in the autumn, and that the Double 11 period and other special time points are prominent. The model in this paper has good application value in the real-world field, and the analysis of the early warning framework can provide decision support for the police and the community to identify the groups, locations, and spatial and temporal environments prone to fraud, to combat propaganda and provide a timely warning to stop losses.<\/jats:p>","DOI":"10.3390\/e25060892","type":"journal-article","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T03:25:54Z","timestamp":1685676354000},"page":"892","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network"],"prefix":"10.3390","volume":"25","author":[{"given":"Mianning","family":"Hu","sequence":"first","affiliation":[{"name":"School of Information and Network Security, People\u2019s Public Security University of China, Beijing 100038, China"}]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Network Security, People\u2019s Public Security University of China, Beijing 100038, China"}]},{"given":"Mingfeng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Network Security, People\u2019s Public Security University of China, Beijing 100038, China"}]},{"given":"Rongchen","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Information and Network Security, People\u2019s Public Security University of China, Beijing 100038, China"}]},{"given":"Binzhou","family":"Si","sequence":"additional","affiliation":[{"name":"School of Information and Network Security, People\u2019s Public Security University of China, Beijing 100038, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,2]]},"reference":[{"key":"ref_1","first-page":"71","article-title":"Research on Cross-Straits Cooperation in Combating Cross-border Telecommunication Fraud Crimes","volume":"37","author":"Wang","year":"2021","journal-title":"J. Chin. People\u2019s Public Secur. Univ. (Soc. Sci. Ed.)"},{"key":"ref_2","unstructured":"Liu, S., Xiong, F., and Qi, Q. (Xinhua Daily Telegraph, 2022). This year, how effective is the crackdown on combating and managing telecommunication network fraud crimes?, Xinhua Daily Telegraph, p. 004."},{"key":"ref_3","first-page":"73","article-title":"The connotation and rule of law realization of \u201ccounter technical measures\u201d\u2014The Anti-Telecommunication Network Fraud Law as an example","volume":"420","author":"Wang","year":"2022","journal-title":"Nanjing Soc. Sci."},{"key":"ref_4","unstructured":"Jiang, N. (2013). Securing Large Cellular Networks via A Data Oriented Approach: Applications to SMS Spam and Voice Fraud Defenses, University of Minnesota."},{"key":"ref_5","first-page":"1136","article-title":"Research on SMS fraud user identification based on SPARK and random forest","volume":"41","author":"Yang","year":"2019","journal-title":"Comput. Eng. Sci."},{"key":"ref_6","first-page":"121","article-title":"Research on fused multi-strategy data enhancement techniques for fraudulent short message identification","volume":"22","author":"Hu","year":"2022","journal-title":"Inf. Netw. Secur."},{"key":"ref_7","first-page":"40","article-title":"Research on countermeasures against telecommunication fraud based on social network analysis method","volume":"24","author":"Jiang","year":"2022","journal-title":"J. Liaodong Coll. (Soc. Sci. Ed.)"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"7937355","DOI":"10.1155\/2022\/7937355","article-title":"A Victim-Based Framework for Telecom Fraud Analysis: A Bayesian Network Model","volume":"2022","author":"Ni","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"11559","DOI":"10.1016\/j.eswa.2009.03.031","article-title":"Designing an Expert System for Fraud Detection in Private Telecommunications Networks","volume":"36","author":"Hilas","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Chen, F., Yin, G., Dong, Y., Li, G., and Zhang, W. (2023). KHGCN: Knowledge-Enhanced Recommendation with Hierarchical Graph Capsule Network. Entropy, 25.","DOI":"10.3390\/e25040697"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/3241036","article-title":"The seven tools of causal inference, with reflections on machine learning","volume":"62","author":"Pearl","year":"2019","journal-title":"Commun. ACM"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Darwiche, A. (2009). Modeling and Reasoning with Bayesian Networks, Cambridge University. [1st ed.].","DOI":"10.1017\/CBO9780511811357"},{"key":"ref_13","unstructured":"Pearl, J., and Mackenzie, D. (2018). The Book of Why: The New Science of Cause and Effect, Basic Books. [1st ed.]."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Han, H., Liang, Y., Bella, G., Giunchiglia, F., and Li, D. (2023). LFDNN: A Novel Hybrid Recommendation Model Based on DeepFM and LightGBM. Entropy, 25.","DOI":"10.3390\/e25040638"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"7114","DOI":"10.1109\/TII.2020.3038780","article-title":"Toward secure data fusion in industrial IoT using transfer learning","volume":"17","author":"Lin","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Andresen, M.A. (2010). Classics in Environmental Criminology, Taylor & Francis.","DOI":"10.4324\/9781439817803"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"108087","DOI":"10.1016\/j.oceaneng.2020.108087","article-title":"Analysis of walking rate for subsea pipelines neighbouring the pipeline end terminations\/pipeline end manifolds","volume":"218","author":"Hong","year":"2020","journal-title":"Ocean Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1177\/1079063216630983","article-title":"The Relationships Between Victim Age, Gender, and Relationship Polymorphism and Sexual Recidivism","volume":"30","author":"Stephens","year":"2018","journal-title":"Sex. Abus. A. J. Res. Treat."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.euroecorev.2018.01.001","article-title":"Gender crime convergence over twenty years: Evidence from Australia","volume":"109","author":"Beatton","year":"2018","journal-title":"Eur. Econ. Rev."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"100255","DOI":"10.1016\/j.jort.2019.100255","article-title":"Research note: How old are the people who die in avalanches? A look into the ages of avalanche victims in the United States (1950\u20132018)","volume":"29","author":"Peitzsch","year":"2020","journal-title":"J. Outdoor Recreat. Tour."},{"key":"ref_21","first-page":"140","article-title":"Characteristics analysis and prevention strategies of victims of telecommunication fraud","volume":"2021","author":"Liu","year":"2021","journal-title":"Law Soc."},{"key":"ref_22","unstructured":"Liang, G.L. (2022). Cognitive Ability, Emotional Intelligence and Personality Traits of Victims of Telecommunication Fraud, Jiangxi University of Traditional Chinese Medicine."},{"key":"ref_23","first-page":"118","article-title":"The Effect of Income on Delinquency","volume":"56","author":"Belton","year":"1966","journal-title":"Am. Econ. Rev."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1111\/j.0020-6598.2004.00284.x","article-title":"What Accounts for the Decline in Crime?","volume":"45","author":"Ayse","year":"2004","journal-title":"Int. Econ. Rev."},{"key":"ref_25","first-page":"82","article-title":"Study on the classification criteria of POI","volume":"2012","author":"Zhang","year":"2012","journal-title":"Mapp. Bull."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Woniak, S., and Szyma\u0144ski, P. (2021, January 2\u20135). Hex2vec: Context-Aware Embedding H3 Hexagons with OpenStreetMap Tags. Proceedings of the 4th ACM SIGSPATIAL International Workshop on AI for Geographic Knowledge Discovery, Beijing, China.","DOI":"10.1145\/3486635.3491076"},{"key":"ref_27","first-page":"66","article-title":"Research on urban functional zoning based on nuclear density and fused data","volume":"35","author":"Wang","year":"2019","journal-title":"Geogr. Geogr. Inf. Sci."},{"key":"ref_28","first-page":"93","article-title":"Study on the improvement of fire station dispatch efficiency and spatial countermeasures under public safety objectives","volume":"620","author":"Chu","year":"2020","journal-title":"J. Archit."},{"key":"ref_29","first-page":"174","article-title":"The association between the spatial distribution of theft crimes and geographical factors","volume":"50","author":"Yan","year":"2010","journal-title":"J. Tsinghua Univ. (Nat. Sci. Ed.)"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Lokanan, M., and Liu, S. (2021). Predicting Fraud Victimization Using Classical Machine Learning. Entropy, 23.","DOI":"10.3390\/e23030300"},{"key":"ref_31","unstructured":"Yang, H.L. (2022). Research on the Construction of Early Warning Model for Fraud Crimes against Elderly Groups, Chinese People\u2019s Public Security University."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"75013","DOI":"10.1007\/s11356-022-20440-6","article-title":"A tested method for assessing and predicting weather-crime associations","volume":"29","author":"Algahtany","year":"2022","journal-title":"Environ. Sci. Pollut. Res. Int."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"138190","DOI":"10.1016\/j.scitotenv.2020.138190","article-title":"Impacts of climate variations on crime rates in Beijing, China","volume":"725","author":"Shen","year":"2020","journal-title":"Sci. Total Environ."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"106984","DOI":"10.1016\/j.chb.2021.106984","article-title":"Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective","volume":"126","author":"Moneva","year":"2022","journal-title":"Comput. Hum. Behav."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.jcrimjus.2010.04.007","article-title":"An investigation of reporting violence to the police: A focus on Hispanic victims","volume":"38","author":"Rennison","year":"2010","journal-title":"J. Crim. Justice"},{"key":"ref_36","first-page":"10","article-title":"The psychic status and work capacity of the victims of the accident at the Chernobyl Nuclear Power Station in the period of recovery from and near-term consequences of acute radiation sickness","volume":"36","author":"Torubarov","year":"1991","journal-title":"Med. Radiol. Radiat. Saf."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1002\/aorn.12285","article-title":"Understanding the second victim recovery process","volume":"107","author":"Hauk","year":"2018","journal-title":"AORN J."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"55","DOI":"10.33972\/jhs.147","article-title":"The Historical Facts about Hate Crime in America: The Social Worker\u2019s Role in Victim Recovery and Community Restoration","volume":"16","author":"Kaplan","year":"2020","journal-title":"J. Hate Stud."},{"key":"ref_39","first-page":"25","article-title":"A review of research on user portrait construction methods","volume":"3","author":"Gao","year":"2019","journal-title":"Data Anal. Knowl. Discov."},{"key":"ref_40","first-page":"892","article-title":"Review and outlook on the progress of crime geography research in China and abroad since 2000","volume":"41","author":"Zhou","year":"2021","journal-title":"Trop. Geogr."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.habitatint.2018.04.010","article-title":"Theft from the person in urban China: Assessing the diurnal effects of opportunity and social ecology","volume":"78","author":"Song","year":"2018","journal-title":"Habitat Int."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.jue.2017.05.006","article-title":"Danger zone: Land use and the geography of neighborhood crime","volume":"100","author":"Tate","year":"2017","journal-title":"J. Urban Econ."},{"key":"ref_43","first-page":"391","article-title":"Application of spatial statistical analysis and GIS in regional economic analysis","volume":"2002","author":"Chen","year":"2002","journal-title":"J. Wuhan Univ. (Inf. Sci. Ed.)"},{"key":"ref_44","unstructured":"Horn\u00fd, M. (2014). Bayesian Networks, Boston University School of Public Health."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"13674","DOI":"10.1016\/j.heliyon.2023.e13674","article-title":"Quantitative risk assessment of college campus considering risk interactions","volume":"9","author":"Xi","year":"2023","journal-title":"Heliyon"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.ress.2009.10.007","article-title":"The use of Bayesian network modelling for maintenance planning in a manufacturing industry","volume":"95","author":"Jones","year":"2010","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_47","unstructured":"Ormsby, T., Napoleon, E., Burke, R., and Napoleon, E.J. (2004). Getting to Know ArcGIS Desktop: Basics of ArcView, ArcEditor, and ArcInfo, ESRI Press. [1st ed.]."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1093\/bioinformatics\/btaa834","article-title":"COVID-19 Knowledge Graph: A computable, multi-modal, cause-and-effect knowledge model of COVID-19 pathophysiology","volume":"37","author":"Baksi","year":"2021","journal-title":"Bioinformatics"},{"key":"ref_49","unstructured":"Narendra, T., Agarwal, P., Gupta, M., and Dechu, S. (2019). Proceedings of the Business Process Management Forum: BPM Forum 2019, Vienna, Austria, 1\u20136 September 2019, Proceedings 17, Springer International Publishing."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"7345","DOI":"10.1073\/pnas.1510507113","article-title":"Causal inference and the data-fusion problem","volume":"113","author":"Bareinboim","year":"2016","journal-title":"Proc. Natl. Acad. Sci. USA"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/6\/892\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:47:41Z","timestamp":1760125661000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/6\/892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,2]]},"references-count":50,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["e25060892"],"URL":"https:\/\/doi.org\/10.3390\/e25060892","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,2]]}}}