[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Criminal network investigation is all about hypertext

Published: 01 September 2013 Publication History

Abstract

Criminal network investigations in policing, intelligence, and journalism face a number of challenges that can impact their success or failure. Some challenges, like political decisions to increase or reduce investigation resources, or amendments to criminal law that provide investigators with more wide reaching options for survaillence and interrogation are primarily in uenced by jurisprudence researchers and social scientists. Other challenges, such as those related to information about a criminal network, network investigation processes, and human factors during investigations can be supported by software tools to assist criminal network investigators. Based on the information, process, and human factors challenges, we formulated a hypothesis for useful tool support, and analyzed problems related to each challenge. Our response to these problems was a list of requirements that guided the development of new processes, tools, and techniques with the aim of reducing the impact of the challenges and support the hypothesis. We propose hypertext as the key technology to bridge investigators and tools, to provide integrated support of information synhesis and sense-making, and to increase the capabilities of investigators by leveraging man-machine synergies.

References

[1]
BUSH, V. 1945. As we may think. Atlantic Monthly 176, 1, 101--108.
[2]
ENGELBART, D. C. 1962. Augmenting human intellect: a conceptual framework. In Summary Report. Stanford Research Institute, 1--135.
[3]
HANSEN, P. G. AND HENDRICKS, V. F. 2011. Oplysningens blinde vinkler. Samfundsliteratur.
[4]
HARRIS, S. 2012. Killer app. Washintonian 176, 1, 101--108.
[5]
LANIER, J. 2013. Who Owns the Future? Penguin Books.
[6]
LICKLIDER, J. 1960. Man-computer symbiosis. IRE transactions on human factors in electronics, 4--11.
[7]
NELSON, T. 1965. A file structure for the complex, the changing and the indeterminate. Proceedings of ACM 20th National Conference, 4--11.
[8]
PETERSEN, R. R. 2012. Criminal network investigation: processes, tools, and techniques.
[9]
SIEGEL, E. 2013. Predictive Analytics: The Power to Predict Who will Click, Buy, Lie, or Die.
[10]
TURING, A. M. 1950. Computing machinery and intelligence. Mind, 433--460.

Cited By

View all
  • (2019)Limits in the data for detecting criminals on social mediaProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3341483(1-8)Online publication date: 26-Aug-2019

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGWEB Newsletter
ACM SIGWEB Newsletter  Volume 2013, Issue Autumn
Autumn 2013
34 pages
ISSN:1931-1745
EISSN:1931-1435
DOI:10.1145/2528272
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2013
Published in SIGWEB Volume 2013, Issue Autumn

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Limits in the data for detecting criminals on social mediaProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3341483(1-8)Online publication date: 26-Aug-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media