clue for distinguishing and discovering the strong
point of criminal gangs. Furthermore, education and
work experience are powerful features to recognize a
criminal gang. All these features could be added as an
additive in practice to detect criminal gangs based on
cliques or communities.
On the other hand, both telecom financial fraud
and homicides are always well-focused, leading to the
same feature of victims in the same fraud case.
According to Ma (2018), the only way to prevent or
reduce this kind of case is to first combat from the
source and then carry out a full chain strike on the
upstream, midstream and downstream links.
In short, first of all, centrality for suspects is a
critical indicator to investigate how dangerous a
suspect is in a criminal case. Degree centrality is not
the only way to detect itself, betweenness and
closeness centrality are too. A better approach should
combine all three so that the system can issue a
certificate to monitor a suspect's activities. Then,
clique and community detection are the two advanced
methods in SNA to investigate criminal gangs. Some
relevant attributes are also a kind of compelling proof
to recognize targeted criminal gangs.
Our research also has several limitations. First of
all, the data we used is secondary data. It is difficult
to confirm the accuracy and integrity of the data,
which may lead to a possible bias in the analysis
results. The second limitation is that the case we
analyzed is limited to homicides. Thus the
effectiveness of this method in detecting other kinds
of crimes may vary. In our future work, we will
collect more crime data on different kinds of crimes
and test the effectiveness of the social network
analysis method.
FUNDING
This work is supported by VC Research (grant
number VCR 0000094).
REFERENCES
Alexander Kouznetsov, Maksim Tsvetovat, 2019, Chapter 4.
Cliques, Clusters and Components. [Online] Available
at: https://www.oreilly.com/library/view/social-network-
analysis/9781449311377/ch04.html [Accessed 26 12
2019].
Alvarez-Hamelin, J. I., Dall'Asta, L., Barrat, A., &
Vespignani, A., 2005. k-core decomposition: A tool for
the visualization of largescale networks. arXiv preprint
cs/0504107.
Bhuyan, H. K., & Pani, S. K. (2021). Crime Predictive
Model Using Big Data Analytics. Intelligent Data
Analytics for Terror Threat Prediction: Architectures,
Methodologies, Techniques and Applications, 57-78.
Bonacich, P., 1972. Factoring and weighting approaches to
status scores and clique identification. Journal of
mathematical sociology, 2(1), 113-120.
Borgatti, S. P., 1995. Centrality and AIDS. Connections,
18(1), 112-114.
Chinese Judicial Big Data Research Institute, 2019. China
Justice Big Data Service Platform. [Online] Available
at: http://data.court.gov.cn/pages/index.html [Accessed
20 7 2019].
Colladon, A. F., & Remondi, E. (2017). Using social
network analysis to prevent money laundering. Expert
Systems with Applications, 67, 49-58.
Cox, M. J., DiBello, A. M., Meisel, M. K., Ott, M. Q.,
Kenney, S. R., Clark, M. A., & Barnett, N. P. (2019).
Do misperceptions of peer drinking influence personal
drinking behavior? Results from a complete social
network of first-year college students. Psychology of
addictive behaviors, 33(3), 297.
Dharwadker, A., 2006. The clique algorithm. Proceedings
of the Institute of Mathematics, 1-41.
Freeman, L. C., 1980. The gatekeeper, pair-dependency and
structural centrality. Quality and Quantity, 14(4), 585-
592.
Kumar, R., & Nagpal, B. (2019). Analysis and prediction
of crime patterns using big data. International Journal
of Information Technology, 11(4), 799-805.
Ma, Z., 2018. The Research of the Detection Difficulty and
Solution for New Internet Crimes Based on Telecom
Fraud. Journal of People’s Public Security University
of China (Social Sciences Edition), 3, pp. 78-86.
Marin, A., & Wellman, B., 2011. Social network analysis:
An introduction. The SAGE handbook of social
network analysis, 11.
Numbeo, 2021. Crime Index by Country 2021. Available
at: https://www.numbeo.com/crime/rankings_by_
country.jsp [Accessed 20 03 2021]
Ozgul, F., Bowerman, C., Erdem, Z. & Atzenbeck, C.,
2010. Comparison of feature-based criminal network
detection models with k-core and n-clique. 2010
International Conference on Advances in Social
Networks Analysis and Mining, pp. 400-401.
Scott, J., 1991. Social Network Analysis: A Handbook
SAGE Publications Ltd. London, UK.
Statista, 2021. Crime and punishment around the world -
Statistics & Facts. Available at:
https://www.statista.com/topics/780/crime/#dossierSu
mmary__chapter1 [Accessed 20 03 2021]
Stolz, S., & Schlereth, C. (2021). Predicting Tie Strength
with Ego Network Structures. Journal of Interactive
Marketing, 54, 40-52.
White, N. & Rosenfeld, R., 2019. KONET. [Online]
Available at: http://moreno.ss.uci.edu/data.html#crime
[Accessed 20 07 2019].