{"title":"恐怖分子和犯罪分子的社交网络数据共享和整合","authors":"Xuning Tang, Christopher C. Yang","doi":"10.1109/ISI.2009.5137312","DOIUrl":null,"url":null,"abstract":"Social networks are valuable resources for intelligence and law enforcement force in their investigations when they want to identify suspects, terrorist or criminal subgroups and their communication patterns. However, missing information in a terrorist or criminal social network always diminish the effectiveness of investigation. Sharing and integration of social networks from different agencies helps increasing its effectiveness; however, information sharing is usually forbidden due to the concern of privacy protection. In this paper, we introduce the subgraph generalization and mechanism to integrate generalized information to conduct social network analysis.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Terrorist and criminal social network data sharing and integration\",\"authors\":\"Xuning Tang, Christopher C. Yang\",\"doi\":\"10.1109/ISI.2009.5137312\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social networks are valuable resources for intelligence and law enforcement force in their investigations when they want to identify suspects, terrorist or criminal subgroups and their communication patterns. However, missing information in a terrorist or criminal social network always diminish the effectiveness of investigation. Sharing and integration of social networks from different agencies helps increasing its effectiveness; however, information sharing is usually forbidden due to the concern of privacy protection. In this paper, we introduce the subgraph generalization and mechanism to integrate generalized information to conduct social network analysis.\",\"PeriodicalId\":210911,\"journal\":{\"name\":\"2009 IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2009.5137312\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2009.5137312","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Terrorist and criminal social network data sharing and integration
Social networks are valuable resources for intelligence and law enforcement force in their investigations when they want to identify suspects, terrorist or criminal subgroups and their communication patterns. However, missing information in a terrorist or criminal social network always diminish the effectiveness of investigation. Sharing and integration of social networks from different agencies helps increasing its effectiveness; however, information sharing is usually forbidden due to the concern of privacy protection. In this paper, we introduce the subgraph generalization and mechanism to integrate generalized information to conduct social network analysis.