{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:29:35Z","timestamp":1760707775787},"reference-count":49,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2007,2,21]],"date-time":"2007-02-21T00:00:00Z","timestamp":1172016000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[2007,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Link (association) analysis has been used in the criminal justice domain to search large datasets for associations between crime entities in order to facilitate crime investigations. However, link analysis still faces many challenging problems, such as information overload, high search complexity, and heavy reliance on domain knowledge. To address these challenges, this article proposes several techniques for automated, effective, and efficient link analysis. These techniques include the co\u2010occurrence analysis, the shortest path algorithm, and a heuristic approach to identifying associations and determining their importance. We developed a prototype system called CrimeLink Explorer based on the proposed techniques. Results of a user study with 10 crime investigators from the Tucson Police Department showed that our system could help subjects conduct link analysis more efficiently than traditional single\u2010level link analysis tools. Moreover, subjects believed that association paths found based on the heuristic approach were more accurate than those found based solely on the co\u2010occurrence analysis and that the automated link analysis system would be of great help in crime investigations.<\/jats:p>","DOI":"10.1002\/asi.20552","type":"journal-article","created":{"date-parts":[[2007,2,21]],"date-time":"2007-02-21T17:43:33Z","timestamp":1172079813000},"page":"842-855","source":"Crossref","is-referenced-by-count":29,"title":["Automated criminal link analysis based on domain knowledge"],"prefix":"10.1002","volume":"58","author":[{"given":"Jennifer","family":"Schroeder","sequence":"first","affiliation":[]},{"given":"Jennifer","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Chau","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,2,21]]},"reference":[{"issue":"17","key":"e_1_2_9_2_1","first-page":"17","article-title":"Security works","volume":"38","author":"Anderson T.","year":"1994","journal-title":"Security Management"},{"volume-title":"Fuzzy engineering expert systems with neural network applications","year":"2002","author":"Badiru A.B.","key":"e_1_2_9_3_1"},{"key":"e_1_2_9_4_1","first-page":"8","volume-title":"Artificial Intelligence and Link Analysis: Papers from the 1998 Fall Symposium","author":"Baldwin B.","year":"1998"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3166.3197"},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","unstructured":"Brin S. &Page L.(1998 April).The anatomy of a large\u2010scale hypertextual Web search engine. Paper presented at the 7th International Conference on the World Wide Web Brisbane Australia.","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00064-7"},{"key":"e_1_2_9_8_1","unstructured":"Chau M. Xu J. &Chen H.(2002 May). Extracting meaningful entities from police narrative reports. Paper presented at the 2002 Annual National Conference on Digital Government Research Los Angeles CA."},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20116"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297301"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.179830"},{"key":"e_1_2_9_12_1","doi-asserted-by":"crossref","unstructured":"Das\u2010Veves F. Fox E.A. &Yu X.(2005 October).Connecting topics in document collections with stepping stones and pathways. Paper presented at the 14th ACM International Conference on Information and Knowledge Management Bremen Germany.","DOI":"10.1145\/1099554.1099573"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"volume-title":"Optimization algorithms for networks and graphs","year":"1992","author":"Evans J.","key":"e_1_2_9_14_1"},{"key":"e_1_2_9_15_1","unstructured":"Federal Bureau of Investigation(1992).Uniform crime reporting handbook: National incident\u2010based reporting system (NIBRS)."},{"key":"e_1_2_9_15_2","unstructured":"Retrieved January 23 2007 fromhttp:\/\/www.fbi.gov\/ucr\/nibrs\/manuals\/v2all.pdf"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.1984.tb00424.x"},{"key":"e_1_2_9_17_1","first-page":"47","volume-title":"Artificial Intelligence and Link Analysis: Papers from the 1998 Fall Symposium","author":"Goldberg H.G.","year":"1998"},{"key":"e_1_2_9_18_1","first-page":"38","volume-title":"Artificial Intelligence and Link Analysis: Papers from the 1998 Fall Symposium","author":"Goldberg H.G.","year":"1998"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/604596.604597"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.1985.tb00461.x"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872087501700206"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.989927"},{"key":"e_1_2_9_23_1","first-page":"301","volume-title":"Learning in graphical models","author":"Heckerman D.","year":"1995"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01299142"},{"key":"e_1_2_9_25_1","unstructured":"Horn R.D. Birdwell J.D. &Leedy L.W.(1997).Link discovery tool. Paper presented at the Counterdrug Technology Assessment Center and Counterdrug Technology Assessment Center's ONDCP\/CTAC International Symposium Chicago IL."},{"key":"e_1_2_9_26_1","first-page":"59","volume-title":"Artificial Intelligence and Link Analysis: Papers from the 1998 Fall Symposium","author":"Jensen D.","year":"1998"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_9_28_1","doi-asserted-by":"crossref","unstructured":"Langley P. &Sage S.(1994 July).Induction of selective Bayesian classifiers. Paper presented at the 10th Conference of Uncertainty Artificial Intelligence Seattle WA.","DOI":"10.1016\/B978-1-55860-332-5.50055-9"},{"key":"e_1_2_9_29_1","first-page":"63","volume-title":"Artificial Intelligence and Link Analysis: Papers from the 1998 Fall Symposium (pp","author":"Lee R.","year":"1998"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20118"},{"key":"e_1_2_9_31_1","doi-asserted-by":"crossref","unstructured":"Lin S. &Brown D.E.(2003 June).Criminal incident data association using the OLAP technology. Paper presented at the 1st NSF\/NIJ Symposium on Intelligence and Security Informatics (ISI 03) Tucson AZ.","DOI":"10.1007\/3-540-44853-5_2"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1999)50:7<574::AID-ASI3>3.0.CO;2-Q"},{"volume-title":"Building expert systems: A tutorial","year":"1988","author":"Martin J.","key":"e_1_2_9_33_1"},{"key":"e_1_2_9_34_1","first-page":"53","volume-title":"The social psychology of crime: Groups, teams, and networks, offender profiling series, III","author":"McAndrew D.","year":"1999"},{"volume-title":"Investigative data mining for security and criminal detection","year":"2003","author":"Mena J.","key":"e_1_2_9_35_1"},{"key":"e_1_2_9_36_1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/BF00116251","article-title":"Introduction of decision trees","volume":"1","author":"Quinlan J.R.","year":"1986","journal-title":"Machine Learning"},{"volume-title":"C4.5: Programs for machine learning","year":"1993","author":"Quinlan J.R.","key":"e_1_2_9_37_1"},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.11.1457.10253"},{"volume-title":"Computer\u2010based medical consultations: MYCIN","year":"1976","author":"Shortliffe E.H.","key":"e_1_2_9_39_1"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90008-H"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20122"},{"key":"e_1_2_9_42_1","doi-asserted-by":"publisher","DOI":"10.1353\/pbm.1986.0087"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00008-8"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10392"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10367"},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)90024-8"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20119"},{"key":"e_1_2_9_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2004.02.006"},{"key":"e_1_2_9_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(03)00117-9"}],"container-title":["Journal of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.20552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.20552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:57:24Z","timestamp":1696985844000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/asi.20552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2,21]]},"references-count":49,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2007,4]]}},"alternative-id":["10.1002\/asi.20552"],"URL":"https:\/\/doi.org\/10.1002\/asi.20552","archive":["Portico"],"relation":{},"ISSN":["1532-2882","1532-2890"],"issn-type":[{"type":"print","value":"1532-2882"},{"type":"electronic","value":"1532-2890"}],"subject":[],"published":{"date-parts":[[2007,2,21]]}}}