{"id":"https://openalex.org/W2523401822","doi":"https://doi.org/10.2312/cgvc.20161290","title":"Towards analytical provenance visualization for criminal intelligence analysis","display_name":"Towards analytical provenance visualization for criminal intelligence analysis","publication_year":2016,"publication_date":"2016-09-15","ids":{"openalex":"https://openalex.org/W2523401822","doi":"https://doi.org/10.2312/cgvc.20161290","mag":"2523401822"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.2312/cgvc.20161290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":[],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038294683","display_name":"Junayed Islam","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Junayed Islam","raw_affiliation_strings":["Middlesex University, London."],"affiliations":[{"raw_affiliation_string":"Middlesex University, London.","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049285663","display_name":"Craig Anslow","orcid":"https://orcid.org/0000-0001-8064-6300"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Craig Anslow","raw_affiliation_strings":["Middlesex University, London."],"affiliations":[{"raw_affiliation_string":"Middlesex University, London.","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068805525","display_name":"Kai Xu","orcid":"https://orcid.org/0000-0003-2242-5440"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kai Xu","raw_affiliation_strings":["Middlesex University, London."],"affiliations":[{"raw_affiliation_string":"Middlesex University, London.","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033649476","display_name":"William Wong","orcid":"https://orcid.org/0000-0003-2424-1311"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"William Wong","raw_affiliation_strings":["Middlesex University, London."],"affiliations":[{"raw_affiliation_string":"Middlesex University, London.","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034040010","display_name":"Leishi Zhang","orcid":"https://orcid.org/0000-0002-3158-2328"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Leishi Zhang","raw_affiliation_strings":["Middlesex University, London."],"affiliations":[{"raw_affiliation_string":"Middlesex University, London.","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.906,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.855637,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"24"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9789,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intelligence-analysis","display_name":"Intelligence analysis","score":0.8586958},{"id":"https://openalex.org/keywords/analytic-reasoning","display_name":"Analytic reasoning","score":0.6493074},{"id":"https://openalex.org/keywords/sensemaking","display_name":"Sensemaking","score":0.63819695},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.4941962},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.47796035},{"id":"https://openalex.org/keywords/crime-analysis","display_name":"Crime analysis","score":0.46311226},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.4111776}],"concepts":[{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.8586958},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.7785617},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7106124},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6604973},{"id":"https://openalex.org/C103057564","wikidata":"https://www.wikidata.org/wiki/Q4751139","display_name":"Analytic reasoning","level":3,"score":0.6493074},{"id":"https://openalex.org/C2780554381","wikidata":"https://www.wikidata.org/wiki/Q2063340","display_name":"Sensemaking","level":2,"score":0.63819695},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.4941962},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4808096},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.47796035},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.47777045},{"id":"https://openalex.org/C2776876444","wikidata":"https://www.wikidata.org/wiki/Q2845200","display_name":"Crime analysis","level":2,"score":0.46311226},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.42055893},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.41262725},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.41147688},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.4111776},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35072818},{"id":"https://openalex.org/C89288958","wikidata":"https://www.wikidata.org/wiki/Q7301504","display_name":"Reasoning system","level":2,"score":0.24749973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1563049},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11186597},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.2312/cgvc.20161290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.72,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1607219703","https://openalex.org/W1924369998","https://openalex.org/W1939378211","https://openalex.org/W1955833269","https://openalex.org/W1983704199","https://openalex.org/W206724255","https://openalex.org/W2084776154","https://openalex.org/W2091236139","https://openalex.org/W2097284091","https://openalex.org/W2114265882","https://openalex.org/W2131340804","https://openalex.org/W2142495500","https://openalex.org/W2156186295","https://openalex.org/W2171826173","https://openalex.org/W2470432365","https://openalex.org/W3150015706"],"related_works":["https://openalex.org/W5933537","https://openalex.org/W46845171","https://openalex.org/W404856347","https://openalex.org/W3022092363","https://openalex.org/W2966562834","https://openalex.org/W2791415949","https://openalex.org/W2788927700","https://openalex.org/W2776412827","https://openalex.org/W2733204601","https://openalex.org/W2592177946","https://openalex.org/W2486648592","https://openalex.org/W2395046016","https://openalex.org/W2243254447","https://openalex.org/W2198273893","https://openalex.org/W2189401668","https://openalex.org/W2131340804","https://openalex.org/W2122632680","https://openalex.org/W2053900997","https://openalex.org/W1711968637","https://openalex.org/W118961843"],"abstract_inverted_index":{"In":[0],"criminal":[1,49,115,230],"intelligence":[2,50,182,205,231],"analysis":[3],"to":[4,10,69],"complement":[5],"the":[6,14,20,120,167,180,200],"information":[7,37,57,94],"entailed":[8],"and":[9,30,64,87,104,122,142,177,189,207],"enhance":[11],"transparency":[12],"of":[13,19,32,55,82,84,125,135,166,202],"operations,":[15],"it":[16],"demands":[17],"logs":[18],"individual":[21],"processing":[22,27],"activities":[23],"within":[24],"an":[25,107],"automated":[26],"system.":[28],"Management":[29],"tracing":[31],"such":[33,126],"security":[34],"sensitive":[35],"analytical":[36,56,140],"flow":[38],"originated":[39],"from":[40],"tightly":[41],"coupled":[42],"visualizations":[43],"into":[44,154,222],"visual":[45,109,139,159,186,219],"analytic":[46,108,146,160],"system":[47,127,228],"for":[48,78,114,172,218,229],"that":[51],"triggers":[52],"huge":[53],"amount":[54],"on":[58],"a":[59,70,132,155,215,223],"single":[60],"click,":[61],"involves":[62],"design":[63],"development":[65,123],"challenges.":[66],"To":[67],"lead":[68],"believable":[71],"story":[72],"by":[73,95,179],"using":[74,96],"scientific":[75],"methods,":[76,106],"reasoning":[77,100],"getting":[79],"explicit":[80],"knowledge":[81],"series":[83],"events,":[85],"sequences":[86],"time":[88],"surrounding":[89],"interrelationships":[90],"with":[91,101,199],"available":[92],"relevant":[93],"human":[97],"perception,":[98],"cognition,":[99],"database":[102],"operations":[103],"computational":[105],"judgmental":[110,220],"support":[111,217],"is":[112],"obvious":[113],"intelligence.":[116],"Our":[117,212],"research":[118],"outlines":[119],"requirements":[121],"challenges":[124],"as":[128,130,145],"well":[129],"proposes":[131],"generic":[133,216],"way":[134],"capturing":[136,188],"different":[137],"complex":[138,225],"states":[141],"processes":[143],"known":[144],"provenance.":[147],"The":[148],"proposed":[149],"technique":[150],"has":[151],"been":[152],"tested":[153],"large":[156,224],"heterogeneous":[157],"event-driven":[158,226],"modular":[161],"analyst's":[162],"user":[163],"interface":[164],"(AUI)":[165],"project":[168],"VALCRI":[169],"(Visual":[170],"Analytics":[171],"Sensemaking":[173],"in":[174],"Criminal":[175],"Intelligence)":[176],"evaluated":[178],"police":[181],"analysts":[183],"through":[184],"it's":[185],"state":[187],"retracing":[190],"interfaces.":[191],"We":[192],"have":[193],"conducted":[194],"several":[195],"prototype":[196],"evaluation":[197],"sessions":[198],"groups":[201],"end-users":[203],"(police":[204],"analysts)":[206],"found":[208],"very":[209],"positive":[210],"feedback.":[211],"approach":[213],"provides":[214],"process":[221],"AUI":[227],"analysis.":[232]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2523401822","counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2024-12-15T01:58:39.802416","created_date":"2016-09-30"}