{"id":"https://openalex.org/W2905000767","doi":"https://doi.org/10.1186/s13388-018-0032-8","title":"Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online","display_name":"Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2905000767","doi":"https://doi.org/10.1186/s13388-018-0032-8","mag":"2905000767"},"language":"en","primary_location":{"id":"doi:10.1186/s13388-018-0032-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-018-0032-8","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-018-0032-8","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-018-0032-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090158188","display_name":"Simon Andrews","orcid":"https://orcid.org/0000-0003-2094-7456"},"institutions":[{"id":"https://openalex.org/I71422933","display_name":"Sheffield Hallam University","ror":"https://ror.org/019wt1929","country_code":"GB","type":"education","lineage":["https://openalex.org/I71422933"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Simon Andrews","raw_affiliation_strings":["Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research, Sheffield Hallam University, Sheffield, UK","Conceptual Structures Research Group, Department of Computing, The Communication and Computing Research Centre, Sheffield Hallam University, Sheffield, UK"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research, Sheffield Hallam University, Sheffield, UK","institution_ids":["https://openalex.org/I71422933"]},{"raw_affiliation_string":"Conceptual Structures Research Group, Department of Computing, The Communication and Computing Research Centre, Sheffield Hallam University, Sheffield, UK","institution_ids":["https://openalex.org/I71422933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010159898","display_name":"Ben Brewster","orcid":"https://orcid.org/0000-0003-3536-5862"},"institutions":[{"id":"https://openalex.org/I71422933","display_name":"Sheffield Hallam University","ror":"https://ror.org/019wt1929","country_code":"GB","type":"education","lineage":["https://openalex.org/I71422933"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ben Brewster","raw_affiliation_strings":["Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research, Sheffield Hallam University, Sheffield, UK"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research, Sheffield Hallam University, Sheffield, UK","institution_ids":["https://openalex.org/I71422933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088046674","display_name":"Tony Day","orcid":"https://orcid.org/0000-0002-3214-6667"},"institutions":[{"id":"https://openalex.org/I71422933","display_name":"Sheffield Hallam University","ror":"https://ror.org/019wt1929","country_code":"GB","type":"education","lineage":["https://openalex.org/I71422933"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tony Day","raw_affiliation_strings":["Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research, Sheffield Hallam University, Sheffield, UK"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research, Sheffield Hallam University, Sheffield, UK","institution_ids":["https://openalex.org/I71422933"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090158188"],"corresponding_institution_ids":["https://openalex.org/I71422933"],"apc_list":null,"apc_paid":null,"fwci":2.8782,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.93123261,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7590292096138},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.7125930786132812},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.478943407535553},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.45099779963493347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44167041778564453},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.42241740226745605},{"id":"https://openalex.org/keywords/crime-scene","display_name":"Crime scene","score":0.4192308783531189},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.419163316488266},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4164934754371643},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.23550239205360413},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.20879647135734558},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.11909019947052002}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7590292096138},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.7125930786132812},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.478943407535553},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.45099779963493347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44167041778564453},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.42241740226745605},{"id":"https://openalex.org/C171906077","wikidata":"https://www.wikidata.org/wiki/Q1360677","display_name":"Crime scene","level":2,"score":0.4192308783531189},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.419163316488266},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4164934754371643},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23550239205360413},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.20879647135734558},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.11909019947052002},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s13388-018-0032-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-018-0032-8","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-018-0032-8","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},{"id":"pmh:oai:shura.shu.ac.uk:23431","is_oa":false,"landing_page_url":"http://orcid.org/0000-0003-2094-7456>,","pdf_url":null,"source":{"id":"https://openalex.org/S4306401600","display_name":"SHURA (Sheffield Hallam University Research Archive) (Sheffield Hallam University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71422933","host_organization_name":"Sheffield Hallam University","host_organization_lineage":["https://openalex.org/I71422933"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:755f8186456d4703881249999fd572ad","is_oa":true,"landing_page_url":"https://doaj.org/article/755f8186456d4703881249999fd572ad","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security Informatics, Vol 7, Iss 1, Pp 1-21 (2018)","raw_type":"article"},{"id":"pmh:oai:nottingham-repository.worktribe.com:3774106","is_oa":true,"landing_page_url":"https://nottingham-repository.worktribe.com/output/3774106","pdf_url":null,"source":{"id":"https://openalex.org/S4306402483","display_name":"Repository@Nottingham (University of Nottingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I142263535","host_organization_name":"University of Nottingham","host_organization_lineage":["https://openalex.org/I142263535"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"}],"best_oa_location":{"id":"doi:10.1186/s13388-018-0032-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-018-0032-8","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-018-0032-8","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","score":0.44999998807907104,"display_name":"Gender equality"}],"awards":[{"id":"https://openalex.org/G3781296669","display_name":null,"funder_award_id":"FP7-SEC-2012-312651","funder_id":"https://openalex.org/F4320338353","funder_display_name":"FP7 Security"},{"id":"https://openalex.org/G3829048491","display_name":null,"funder_award_id":"FP7/2007-2013","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3981126665","display_name":null,"funder_award_id":"Seventh Framework Programme","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5593277320","display_name":null,"funder_award_id":"2007-2013","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5702163051","display_name":null,"funder_award_id":"FP7/2007","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6254337214","display_name":"early Pursuit against Organized crime using envirOnmental scanning, the Law and IntelligenCE systems","funder_award_id":"312651","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338353","display_name":"FP7 Security","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2905000767.pdf","grobid_xml":"https://content.openalex.org/works/W2905000767.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W85774798","https://openalex.org/W157799815","https://openalex.org/W328835304","https://openalex.org/W371426616","https://openalex.org/W567980936","https://openalex.org/W1503729935","https://openalex.org/W1819161952","https://openalex.org/W1847618513","https://openalex.org/W1871142974","https://openalex.org/W1947406465","https://openalex.org/W1981840209","https://openalex.org/W1983849556","https://openalex.org/W1987052986","https://openalex.org/W2007072922","https://openalex.org/W2018016287","https://openalex.org/W2020278455","https://openalex.org/W2026770972","https://openalex.org/W2084591134","https://openalex.org/W2102449187","https://openalex.org/W2120523656","https://openalex.org/W2123661878","https://openalex.org/W2126844876","https://openalex.org/W2138016069","https://openalex.org/W2165316198","https://openalex.org/W2253392946","https://openalex.org/W2277420157","https://openalex.org/W2324299246","https://openalex.org/W2345274834","https://openalex.org/W2345784746","https://openalex.org/W2404821121","https://openalex.org/W2493522360","https://openalex.org/W2561555644","https://openalex.org/W2598262479","https://openalex.org/W2607476432","https://openalex.org/W2886668780","https://openalex.org/W3199333518"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2797856562","https://openalex.org/W2542924704","https://openalex.org/W4388003916","https://openalex.org/W801993795","https://openalex.org/W3173475034","https://openalex.org/W2516431499","https://openalex.org/W4386996458","https://openalex.org/W93745046","https://openalex.org/W2281942949"],"abstract_inverted_index":{"This":[0],"paper":[1,114],"describes":[2,115],"an":[3,98,151],"approach":[4,120,139],"for":[5],"detecting":[6],"the":[7,29,85,111,116,175],"presence":[8,87,177],"or":[9],"emergence":[10],"of":[11,28,41,70,88,101,118,165,178],"organised":[12],"crime":[13],"(OC)":[14],"signals":[15,40,164],"on":[16],"social":[17,32,129],"media.":[18],"It":[19],"shows":[20],"how":[21],"words":[22],"and":[23,64,72,133,140,147,170],"phrases,":[24],"used":[25,56,79,156],"by":[26],"members":[27],"public":[30],"in":[31],"media":[33,130],"posts,":[34],"can":[35,77],"be":[36,46,78,108],"treated":[37],"as":[38,150],"weak":[39,163],"OC,":[42],"enabling":[43],"information":[44,59,105],"to":[45,49,57,62,80,84,94,110,157,174],"classified":[47],"according":[48,61],"a":[50,68,122,128,134],"taxonomy.":[51],"Formal":[52],"concept":[53,100],"analysis":[54],"is":[55,92,155],"group":[58],"sources,":[60],"crime-type":[63],"location,":[65],"thus":[66,172],"providing":[67],"means":[69],"corroboration":[71],"creating":[73],"OC":[74,99,166],"concepts":[75],"that":[76,106,160,162],"alert":[81],"police":[82],"analysts":[83],"possible":[86,176],"OC.":[89,179],"The":[90,113,138],"analyst":[91],"able":[93],"\u2018drill":[95],"down\u2019":[96],"into":[97,121],"interest,":[102],"discovering":[103],"additional":[104],"may":[107],"pertinent":[109],"crime.":[112],"implementation":[117],"this":[119],"fully-functional":[123],"prototype":[124],"software":[125],"system,":[126],"incorporating":[127],"scanning":[131],"system":[132,141],"map-based":[135],"user":[136],"interface.":[137],"are":[142],"illustrated":[143],"using":[144],"human":[145],"trafficking":[146],"modern":[148],"slavery":[149],"example.":[152],"Real":[153],"data":[154],"obtain":[158],"results":[159],"show":[161],"have":[167],"been":[168],"detected":[169],"corroborated,":[171],"alerting":[173]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
