{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:45:33Z","timestamp":1761597933790,"version":"3.40.5"},"reference-count":30,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>This article describes how serial crimes are very interesting for study in the absence of proper and solid evidence. From a high volume of criminal cases of similar types, it is difficult to detect the crimes that were committed by the same offender or not. The process of linking of crimes which were committed by the same offender or offenders is called Crime Linkage Analysis. In this article, a new hesitant fuzzy distance measure has been introduced and a fuzzy multicriteria decision-making approach has been proposed to help Crime Linkage Analysis, which enables us to find to what extent a pair of crime shares a common offender or offenders.<\/jats:p>","DOI":"10.4018\/ijitsa.2018070103","type":"journal-article","created":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T13:51:46Z","timestamp":1523886706000},"page":"31-50","source":"Crossref","is-referenced-by-count":10,"title":["A Fuzzy Multicriteria Decision-Making Approach to Crime Linkage"],"prefix":"10.4018","volume":"11","author":[{"given":"Soumendra","family":"Goala","sequence":"first","affiliation":[{"name":"Dibrugarh University, Didrugarh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1565-4889","authenticated-orcid":true,"given":"Palash","family":"Dutta","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Dibrugarh University, Dibrugarh, India"}]}],"member":"2432","reference":[{"issue":"4","key":"IJITSA.2018070103-0","first-page":"659","article-title":"A Review of Different Clustering Techniques in Criminal Profiling.","volume":"6","author":"J. A.Adeyiga","year":"2016","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"IJITSA.2018070103-1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2013.17"},{"key":"IJITSA.2018070103-2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.17.4.B141"},{"key":"IJITSA.2018070103-3","doi-asserted-by":"publisher","DOI":"10.1002\/jip.21"},{"key":"IJITSA.2018070103-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2012.04.031"},{"key":"IJITSA.2018070103-5","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(01)00258-5"},{"key":"IJITSA.2018070103-6","doi-asserted-by":"publisher","DOI":"10.1080\/10683160500056945"},{"key":"IJITSA.2018070103-7","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-005-9003-6"},{"key":"IJITSA.2018070103-8","doi-asserted-by":"crossref","unstructured":"Grubin, D., Kelly, P., & Brunsdon, C. (2001). Linking serious sexual assaults through behavior. Home Offence Research Study. Home Offence: Research, Development and Statistics Directorate.","DOI":"10.1037\/e649492007-001"},{"key":"IJITSA.2018070103-9","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015906065"},{"key":"IJITSA.2018070103-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48318-9"},{"journal-title":"Fuzzy Sets and Fuzzy Logic","year":"2009","author":"J.Klir","key":"IJITSA.2018070103-11"},{"key":"IJITSA.2018070103-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2006.01.014"},{"key":"IJITSA.2018070103-13","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00091-5"},{"journal-title":"Analytical Hierarchy Process","year":"1980","author":"T.Saaty","key":"IJITSA.2018070103-14"},{"issue":"1","key":"IJITSA.2018070103-15","first-page":"15","article-title":"Identification of Potential Crime Area Using Analytical Hierarchy Process (AHP) and Geographical Information System (GIS).","volume":"01","author":"N. H.Shamsuddin","year":"2012","journal-title":"International Journal of Innovative Computing"},{"key":"IJITSA.2018070103-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.03.004"},{"issue":"9","key":"IJITSA.2018070103-17","first-page":"415","article-title":"Applicability of soft Computing Technique for Crime Forecasting: A Preliminary Investigation.","volume":"3","author":"A.K.Shrivastav","year":"2012","journal-title":"International Journal of Computer Science & Engineering Technology"},{"key":"IJITSA.2018070103-18","first-page":"400","article-title":"Fuzzy Clustering based Methodology for Multidimensional Data Analysis in Computational Forensic Domain.","volume":"4","author":"K.Stofel","year":"2012","journal-title":"International Journal of Computer Information Systems and Industrial Management Applications"},{"issue":"5","key":"IJITSA.2018070103-19","first-page":"526","article-title":"A Survey of Fuzzy Based ARM Clustering on Crime Pattern Discovery.","volume":"5","author":"J. M.Sundaram","year":"2014","journal-title":"International Journal of Scientific & Engineering Research"},{"issue":"6","key":"IJITSA.2018070103-20","first-page":"529","article-title":"Hesitant Fuzzy Sets.","volume":"25","author":"V.Torra","year":"2010","journal-title":"International Journal of Intelligent Systems"},{"key":"IJITSA.2018070103-21","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2009.5276884"},{"key":"IJITSA.2018070103-22","doi-asserted-by":"crossref","unstructured":"Woodhams, J., Bull, R., Hollin, C. R., & Kocsis, R. N. (2007). Case linkage: Identifying crimes committed by the same offender in Criminal profiling.","DOI":"10.1007\/978-1-60327-146-2_6"},{"key":"IJITSA.2018070103-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.11.013"},{"key":"IJITSA.2018070103-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2010.09.002"},{"key":"IJITSA.2018070103-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.01.028"},{"key":"IJITSA.2018070103-26","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(78)90010-6"},{"key":"IJITSA.2018070103-27","doi-asserted-by":"crossref","unstructured":"Yoon, K.P., & Hawang, C. (1995). Multiple Attribute Decision Making: an introduction. The SAGE publication, 104.","DOI":"10.4135\/9781412985161"},{"key":"IJITSA.2018070103-28","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"IJITSA.2018070103-29","doi-asserted-by":"crossref","unstructured":"Zimmermann, H. (1985). Fuzzy Set Theory and Its Applications., Boston: Dordrecht.","DOI":"10.1007\/978-94-015-7153-1"}],"container-title":["International Journal of Information Technologies and Systems Approach"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=204602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T13:57:17Z","timestamp":1651845437000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITSA.2018070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":30,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijitsa.2018070103","relation":{},"ISSN":["1935-570X","1935-5718"],"issn-type":[{"type":"print","value":"1935-570X"},{"type":"electronic","value":"1935-5718"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}