{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:10:22Z","timestamp":1730319022559,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T00:00:00Z","timestamp":1501459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,31]]},"DOI":"10.1145\/3110025.3119396","type":"proceedings-article","created":{"date-parts":[[2017,11,14]],"date-time":"2017-11-14T14:40:22Z","timestamp":1510670422000},"page":"1128-1131","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Mining the Networks of Telecommunication Fraud Groups using Social Network Analysis"],"prefix":"10.1145","author":[{"given":"Yi-Chun","family":"Chang","sequence":"first","affiliation":[{"name":"Criminal Investigation Bureau, Department of Information Management, National Taiwan University, Taipei, Taiwan"}]},{"given":"Kuan-Ting","family":"Lai","sequence":"additional","affiliation":[{"name":"Research Center for Information Technology, Academia Sinica, Taipei, Taiwan"}]},{"given":"Seng-Cho T.","family":"Chou","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Taiwan University, Taipei, Taiwan"}]},{"given":"Ming-Syan","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2017,7,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Communications Fraud Control Association \"CFCA 2015 Global fraud loss survey \" September 2015. Communications Fraud Control Association \"CFCA 2015 Global fraud loss survey \" September 2015."},{"key":"e_1_3_2_1_2_1","unstructured":"S. H. Li etal \"Identifying the signs of fraudulent accounts using data mining techniques \" Computers in Human Behavior 2012. S. H. Li et al. \"Identifying the signs of fraudulent accounts using data mining techniques \" Computers in Human Behavior 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/016555150202800601"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1059981.1059984"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2808827"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"F. Ozgul and Z. Erdem \"Which crime features are important for criminal network members \" ASONAM 2013. F. Ozgul and Z. Erdem \"Which crime features are important for criminal network members \" ASONAM 2013.","DOI":"10.1145\/2492517.2500319"},{"volume-title":"ACM","year":"2003","author":"Chen H.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2014.156"},{"key":"e_1_3_2_1_10_1","unstructured":"S. Ressler \"Social network analysis as an approach to combat terrorism: Past present and future research \" Homeland Security Affairs 2006. S. Ressler \"Social network analysis as an approach to combat terrorism: Past present and future research \" Homeland Security Affairs 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.23.3.3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"M. Aston etal \"A preliminary profiling of Internet money mules: An Australian perspective \" UIC-ATC 2009. M. Aston et al. \"A preliminary profiling of Internet money mules: An Australian perspective \" UIC-ATC 2009.","DOI":"10.1109\/UIC-ATC.2009.63"},{"issue":"3","key":"e_1_3_2_1_13_1","first-page":"53","article-title":"The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands","volume":"24","author":"Klerks P.","year":"2001","journal-title":"Connections"},{"key":"e_1_3_2_1_14_1","unstructured":"IBM \"i2 Analyst's Notebook\" May 2015. IBM \"i2 Analyst's Notebook\" May 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Duijn Paul AC Victor Kashirin and Peter MA Sloot. \"The relative ineffectiveness of criminal network disruption.\" Scientific reports 2014. Duijn Paul AC Victor Kashirin and Peter MA Sloot. \"The relative ineffectiveness of criminal network disruption.\" Scientific reports 2014.","DOI":"10.1038\/srep04238"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J. Xu etal \" Analyzing and visualizing criminal network dynamics: a case study \" Intelligence and Security Informatics (ISI) 2004. J. Xu et al. \" Analyzing and visualizing criminal network dynamics: a case study \" Intelligence and Security Informatics (ISI) 2004.","DOI":"10.1007\/978-3-540-25952-7_27"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.06.014"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Liu Xiaodong etal \"Criminal networks: Who is the key player? \" 2012. Liu Xiaodong et al. \"Criminal networks: Who is the key player? \" 2012.","DOI":"10.2139\/ssrn.2089267"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.120"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500319"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.01.002"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752336"},{"key":"e_1_3_2_1_24_1","unstructured":"R. S. Burt \"Structural holes: The social structure of competition \" Harvard university press 2009. R. S. Burt \"Structural holes: The social structure of competition \" Harvard university press 2009."},{"volume-title":"MA: Analytic Technologies","year":"2002","author":"Borgatti S. P.","key":"e_1_3_2_1_25_1"}],"event":{"name":"ASONAM '17: Advances in Social Networks Analysis and Mining 2017","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Sydney Australia","acronym":"ASONAM '17"},"container-title":["Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3110025.3119396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T06:02:58Z","timestamp":1673244178000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3110025.3119396"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,31]]},"references-count":25,"alternative-id":["10.1145\/3110025.3119396","10.1145\/3110025"],"URL":"https:\/\/doi.org\/10.1145\/3110025.3119396","relation":{},"subject":[],"published":{"date-parts":[[2017,7,31]]},"assertion":[{"value":"2017-07-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}