EconPapers    
Economics at your fingertips  
 

Using importance flooding to identify interesting networks of criminal activity

Byron Marshall, Hsinchun Chen and Siddharth Kaza

Journal of the American Society for Information Science and Technology, 2008, vol. 59, issue 13, 2099-2114

Abstract: Effectively harnessing available data to support homeland‐security‐related applications is a major focus in the emerging science of intelligence and security informatics (ISI). Many studies have focused on criminal‐network analysis as a major challenge within the ISI domain. Though various methodologies have been proposed, none have been tested for usefulness in creating link charts. This study compares manually created link charts to suggestions made by the proposed importance‐flooding algorithm. Mirroring manual investigational processes, our iterative computation employs association‐strength metrics, incorporates path‐based node importance heuristics, allows for case‐specific notions of importance, and adjusts based on the accuracy of previous suggestions. Interesting items are identified by leveraging both node attributes and network structure in a single computation. Our data set was systematically constructed from heterogeneous sources and omits many privacy‐sensitive data elements such as case narratives and phone numbers. The flooding algorithm improved on both manual and link‐weight‐only computations, and our results suggest that the approach is robust across different interpretations of the user‐provided heuristics. This study demonstrates an interesting methodology for including user‐provided heuristics in network‐based analysis, and can help guide the development of ISI‐related analysis tools.

Date: 2008
References: Add references at CitEc
Citations:

Downloads: (external link)
https://doi.org/10.1002/asi.20924

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bla:jamist:v:59:y:2008:i:13:p:2099-2114

Ordering information: This journal article can be ordered from
https://doi.org/10.1002/(ISSN)1532-2890

Access Statistics for this article

More articles in Journal of the American Society for Information Science and Technology from Association for Information Science & Technology
Bibliographic data for series maintained by Wiley Content Delivery ().

 
Page updated 2025-03-19
Handle: RePEc:bla:jamist:v:59:y:2008:i:13:p:2099-2114