{"id":"https://openalex.org/W2030670010","doi":"https://doi.org/10.7148/2014-0765","title":"Modelling The Collapse Of A Criminal Network","display_name":"Modelling The Collapse Of A Criminal Network","publication_year":2014,"publication_date":"2014-05-27","ids":{"openalex":"https://openalex.org/W2030670010","doi":"https://doi.org/10.7148/2014-0765","mag":"2030670010"},"language":"en","primary_location":{"id":"doi:10.7148/2014-0765","is_oa":false,"landing_page_url":"https://doi.org/10.7148/2014-0765","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ECMS 2014 Proceedings edited by: Flaminio Squazzoni, Fabio Baronio, Claudia Archetti, Marco Castellani","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029609160","display_name":"Mart\u00edn Neumann","orcid":"https://orcid.org/0000-0002-0319-6091"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Martin Neumann","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5025797320","display_name":"Ulf Lotzmann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ulf Lotzmann","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029609160"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.9918,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.90076083,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"765","last_page":"771"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9388999938964844,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9388999938964844,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9319000244140625,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9235000014305115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/normative","display_name":"Normative","score":0.6767938733100891},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6115575432777405},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5807665586471558},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.5331567525863647},{"id":"https://openalex.org/keywords/extortion","display_name":"Extortion","score":0.5156563520431519},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.41525450348854065},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37394505739212036},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.37141603231430054},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21568432450294495},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.21013608574867249},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.20712214708328247},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.16644197702407837}],"concepts":[{"id":"https://openalex.org/C44725695","wikidata":"https://www.wikidata.org/wiki/Q288156","display_name":"Normative","level":2,"score":0.6767938733100891},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6115575432777405},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5807665586471558},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.5331567525863647},{"id":"https://openalex.org/C2779066997","wikidata":"https://www.wikidata.org/wiki/Q6452087","display_name":"Extortion","level":2,"score":0.5156563520431519},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.41525450348854065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37394505739212036},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.37141603231430054},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21568432450294495},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.21013608574867249},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.20712214708328247},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.16644197702407837},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.7148/2014-0765","is_oa":false,"landing_page_url":"https://doi.org/10.7148/2014-0765","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ECMS 2014 Proceedings edited by: Flaminio Squazzoni, Fabio Baronio, Claudia Archetti, Marco Castellani","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1556726625","https://openalex.org/W1896830896","https://openalex.org/W1977295940","https://openalex.org/W2055324442","https://openalex.org/W2058143359","https://openalex.org/W2062356009","https://openalex.org/W2070504353","https://openalex.org/W2078761429","https://openalex.org/W2091082166","https://openalex.org/W2150434437","https://openalex.org/W2169044255","https://openalex.org/W2405971896","https://openalex.org/W2502888552","https://openalex.org/W3022607203"],"related_works":["https://openalex.org/W2043609208","https://openalex.org/W2563210773","https://openalex.org/W2618548395","https://openalex.org/W2921473786","https://openalex.org/W3083305970","https://openalex.org/W4380886524","https://openalex.org/W2900686135","https://openalex.org/W3121853229","https://openalex.org/W2364889369","https://openalex.org/W2781180098"],"abstract_inverted_index":{"Research":[0],"activities":[1],"aimed":[2],"to":[3,44,46],"understand":[4],"the":[5,68,95,98,103,109,113],"dynamics":[6,96],"of":[7,19,71,86,90,94,105],"criminal":[8,73,100],"networks":[9],"or":[10],"organisations":[11],"\u2013":[12,17],"like":[13],"extortion":[14],"racket":[15],"systems":[16],"are":[18],"interest":[20],"for":[21,28,37,108],"criminologists":[22],"and":[23,32,58,102],"scientists":[24],"in":[25,112],"related":[26],"fields,":[27],"practitioners":[29],"from":[30],"police":[31,87],"judiciary,":[33],"as":[34,36],"well":[35],"political":[38],"decision":[39],"makers.":[40],"This":[41],"paper":[42],"aims":[43],"contribute":[45],"this":[47],"area":[48],"by":[49],"bringing":[50],"together":[51],"data":[52,84],"analysis":[53,85],"methods":[54],"with":[55],"conceptual":[56,92],"modelling":[57],"simulation":[59,114],"techniques":[60],"employing":[61],"normative":[62],"agents.":[63],"As":[64],"an":[65],"exemplary":[66],"case":[67],"internal":[69],"collapse":[70],"a":[72,91],"network":[74],"is":[75],"investigated.":[76],"The":[77],"outlined":[78],"model":[79,93],"development":[80],"process":[81],"involves":[82],"qualitative":[83],"files,":[88],"specification":[89],"within":[97],"regarded":[99],"network,":[101],"definition":[104],"intraagent":[106],"processes":[107],"agents":[110],"used":[111],"model.":[115]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
