{"id":"https://openalex.org/W2097579905","doi":"https://doi.org/10.1186/2190-8532-3-1","title":"Criminal network investigation","display_name":"Criminal network investigation","publication_year":2014,"publication_date":"2014-04-11","ids":{"openalex":"https://openalex.org/W2097579905","doi":"https://doi.org/10.1186/2190-8532-3-1","mag":"2097579905"},"language":"en","primary_location":{"id":"doi:10.1186/2190-8532-3-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2190-8532-3-1","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/2190-8532-3-1","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/2190-8532-3-1","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089302640","display_name":"Uffe Kock Wiil","orcid":"https://orcid.org/0000-0001-6898-4083"},"institutions":[{"id":"https://openalex.org/I177969490","display_name":"University of Southern Denmark","ror":"https://ror.org/03yrrjy16","country_code":"DK","type":"education","lineage":["https://openalex.org/I177969490"]},{"id":"https://openalex.org/I184886455","display_name":"Maersk (Denmark)","ror":"https://ror.org/046gbzb64","country_code":"DK","type":"company","lineage":["https://openalex.org/I184886455"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Uffe Kock Wiil","raw_affiliation_strings":["The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, Odense, Denmark","The M\u00e6rsk Mc-Kinney M\u00f8ller Institute, University of Southern Denmark, Odense, Denmark"],"affiliations":[{"raw_affiliation_string":"The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, Odense, Denmark","institution_ids":["https://openalex.org/I184886455","https://openalex.org/I177969490"]},{"raw_affiliation_string":"The M\u00e6rsk Mc-Kinney M\u00f8ller Institute, University of Southern Denmark, Odense, Denmark","institution_ids":["https://openalex.org/I184886455","https://openalex.org/I177969490"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5089302640"],"corresponding_institution_ids":["https://openalex.org/I177969490","https://openalex.org/I184886455"],"apc_list":null,"apc_paid":null,"fwci":20.8749,"has_fulltext":true,"cited_by_count":36,"citation_normalized_percentile":{"value":0.99139231,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"3","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.7695595026016235},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6875557899475098},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6724720001220703},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.621458113193512},{"id":"https://openalex.org/keywords/radicalization","display_name":"Radicalization","score":0.537943959236145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5279290676116943},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.5136734843254089},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.506070077419281},{"id":"https://openalex.org/keywords/intelligence-analysis","display_name":"Intelligence analysis","score":0.48288726806640625},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.4422377347946167},{"id":"https://openalex.org/keywords/organised-crime","display_name":"Organised crime","score":0.43635720014572144},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34974896907806396},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.288727730512619},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.28541433811187744},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14985716342926025}],"concepts":[{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.7695595026016235},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6875557899475098},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6724720001220703},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.621458113193512},{"id":"https://openalex.org/C2777113924","wikidata":"https://www.wikidata.org/wiki/Q3416483","display_name":"Radicalization","level":3,"score":0.537943959236145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5279290676116943},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.5136734843254089},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.506070077419281},{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.48288726806640625},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.4422377347946167},{"id":"https://openalex.org/C27219730","wikidata":"https://www.wikidata.org/wiki/Q46952","display_name":"Organised crime","level":2,"score":0.43635720014572144},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34974896907806396},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.288727730512619},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.28541433811187744},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14985716342926025},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/2190-8532-3-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2190-8532-3-1","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/2190-8532-3-1","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},{"id":"pmh:oai:sdu.dk:publications/c6bf40e6-4bdf-4fdf-be9d-59855d9c8e83","is_oa":false,"landing_page_url":"https://portal.findresearcher.sdu.dk/da/publications/c6bf40e6-4bdf-4fdf-be9d-59855d9c8e83","pdf_url":null,"source":{"id":"https://openalex.org/S4306400423","display_name":"University of Southern Denmark Research Portal (University of Southern Denmark)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177969490","host_organization_name":"University of Southern Denmark","host_organization_lineage":["https://openalex.org/I177969490"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wiil, U K 2014, 'Criminal Network Investigation', Security Informatics, vol. 3, no. 1. https://doi.org/10.1186/2190-8532-3-1","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1186/2190-8532-3-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2190-8532-3-1","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/2190-8532-3-1","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2097579905.pdf","grobid_xml":"https://content.openalex.org/works/W2097579905.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W2034152681"],"related_works":["https://openalex.org/W2946271828","https://openalex.org/W4390114589","https://openalex.org/W2169368313","https://openalex.org/W2063717240","https://openalex.org/W4220869003","https://openalex.org/W2573033159","https://openalex.org/W1898775589","https://openalex.org/W2944582158","https://openalex.org/W2594831086","https://openalex.org/W2084319103"],"abstract_inverted_index":{"Editorial":[0],"Criminal":[1],"networks":[2,9,22,70],"such":[3,21,41,47,53,59,69,89,268,370],"as":[4,90,136,138,269,312,323],"terrorist":[5,121,178,208,308,330,351],"and":[6,16,26,32,39,45,51,57,61,65,99,114,120,131,143,153,180,200,203,249,258,272,277,331,364,381,395,406,426,449,458,464],"organized":[7],"crime":[8],"pose":[10],"a":[11,30,103,112,157,184,252,313,324,390,397,471],"threat":[12],"to":[13,37,43,49,55,62,127,195,221,362,401,476],"both":[14],"national":[15],"international":[17],"security.":[18],"Investigation":[19],"of":[20,166,174,187,198,205,213,224,246,265,320,369,387,408,430],"by":[23,177,237,286,299,329,379,456],"law":[24],"enforcement":[25],"intelligence":[27],"agencies":[28],"is":[29,78,84,164,281,360],"complex":[31,432],"time-consuming":[33],"task.":[34],"The":[35,92,109,147,230,279,292,372,447],"ability":[36],"understand":[38,363],"model":[40,242,253,280],"networks,":[42,48,54,60],"analyze":[44],"visualize":[46],"mine":[50],"forecast":[52],"predict":[56,365,402],"simulate":[58],"effectively":[63],"collaborate":[64],"share":[66],"information":[67,206],"about":[68],"are":[71,353],"key":[72],"factors":[73,169],"in":[74,105,159,233,295,347,355,375,416,437,452],"defeating":[75],"them.":[76],"It":[77],"well":[79,137],"known":[80],"that":[81,107,123,161,261],"the":[82,167,171,175,201,222,225,244,256,263,318,339,341,345,366,384,403,431],"Internet":[83,110,176,226,266,346],"used":[85,328],"for":[86,94,117,139,183,207,227,243,254,274,315,326,466],"criminal":[87,228,417,438,467,478],"activities":[88],"terrorism.":[91,278,409],"Center":[93],"Terror":[95],"Analysis,":[96],"Danish":[97],"Security":[98],"Intelligence":[100],"Service":[101],"wrote":[102,156],"report":[104,158],"2008":[106],"states:":[108,162],"plays":[111],"significant":[113],"increasing":[115,172,414],"role":[116,319,415],"militant":[118],"extremists":[119],"groups":[122],"use":[124,173,223,264],"this":[125,214,234,296,376,453],"media":[126],"spread":[128],"messages,":[129],"communicate":[130],"carry":[132],"out":[133],"virtual":[134,305,321],"training":[135],"recruitment,":[140,190],"logistic":[141],"support":[142,425,477],"operational":[144],"preparations":[145],"[1].":[146],"United":[148],"Nations":[149],"Office":[150],"on":[151,218,283,288,304],"Drugs":[152],"Crime":[154],"(UNODC)":[155],"2012":[160],"Technology":[163],"one":[165],"strategic":[168],"driving":[170],"organizations":[179,352],"their":[181,348],"supporters":[182],"wide":[185],"range":[186],"purposes,":[188],"including":[189],"financing,":[191],"propaganda,":[192],"training,":[193],"incitement":[194],"commit":[196],"acts":[197],"terrorism,":[199],"gathering":[202],"dissemination":[204],"purposes":[209],"[2].":[210,357],"Two":[211],"papers":[212],"special":[215,235,297,377,454],"issue":[216,236,298,378,455],"focus":[217],"matters":[219],"related":[220],"activities.":[229,349],"first":[231],"paper":[232,294,374,451],"Torok":[238],"(Developing":[239],"an":[240,413],"explanatory":[241],"process":[245],"online":[247,275],"radicalization":[248,276],"terrorism)":[250],"proposes":[251,394],"understanding":[255],"mechanisms":[257],"power":[259,290],"relations":[260],"underlie":[262],"services":[267],"Facebook,":[270],"YouTube,":[271],"Twitter":[273],"based":[282],"previous":[284],"work":[285],"Foucault":[287],"psychiatric":[289],"[3].":[291],"second":[293],"BowmanGrieve":[300],"(A":[301],"psychological":[302],"perspective":[303],"communities":[306,322],"supporting":[307],"&":[309],"extremist":[310,332],"ideologies":[311],"tool":[314,325,474],"recruitment)":[316],"examines":[317],"recruitment":[327],"organizations.":[333,371],"A":[334],"case":[335],"study":[336],"looks":[337],"at":[338],"how":[340],"Radical":[342],"Right":[343],"uses":[344],"Many":[350],"transnational":[354,388],"nature":[356],"Hence,":[358],"it":[359],"important":[361],"locational":[367,385],"dynamics":[368,386],"third":[373],"Desmarais":[380],"Cranmer":[382],"(Forecasting":[383],"terrorism:":[389],"network":[391,398,418,439,468,479],"analytic":[392,399],"approach)":[393],"evaluates":[396],"approach":[400],"geopolitical":[404],"sources":[405],"targets":[407],"Software":[410,421],"tools":[411,422],"play":[412],"investigation":[419,440],"[4].":[420],"can":[423],"help":[424],"(semi)":[427],"automate":[428],"some":[429],"knowledge":[433],"management":[434],"processes":[435],"involved":[436],"(collection,":[441],"processing,":[442],"synthesis,":[443],"sense-making,":[444],"dissemination,":[445],"etc.).":[446],"fourth":[448],"final":[450],"Petersen":[457],"Wiil":[459],"(CrimeFighter":[460],"Investigator:":[461],"Integrating":[462],"synthesis":[463],"sense-making":[465],"investigation)":[469],"presents":[470],"new":[472],"software":[473],"dedicated":[475],"investigation.":[480]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
