Most Recent Articles: Security Informaticshttps://security-informatics.springeropen.comMost Recent Articles: Security InformaticsOrganised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime onlinehttps://security-informatics.springeropen.com/articles/10.1186/s13388-018-0032-8This paper describes an approach for detecting the presence or emergence of organised crime (OC) signals on social media. It shows how words and phrases, used by members of the public in social media posts, ca...ResearchThu, 13 Dec 2018 00:00:00 GMThttps://security-informatics.springeropen.com/articles/10.1186/s13388-018-0032-8Simon Andrews, Ben Brewster and Tony Day2018-12-13T00:00:00ZThe detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract”https://security-informatics.springeropen.com/articles/10.1186/s13388-018-0031-9Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is now possible t...ResearchFri, 17 Aug 2018 00:00:00 GMThttps://security-informatics.springeropen.com/articles/10.1186/s13388-018-0031-9David Robinson and Chris Scogings2018-08-17T00:00:00ZApplying machine learning to criminology: semi-parametric spatial-demographic Bayesian regressionhttps://security-informatics.springeropen.com/articles/10.1186/s13388-018-0030-xThis paper describes the use of machine learning techniques to implement a Bayesian approach to modelling the dependency between offence data and environmental factors such as demographic characteristics and s...ResearchTue, 19 Jun 2018 00:00:00 GMThttps://security-informatics.springeropen.com/articles/10.1186/s13388-018-0030-xRoman Marchant, Sebastian Haan, Garner Clancey and Sally Cripps2018-06-19T00:00:00ZSemi-supervised learning for detecting human traffickinghttps://security-informatics.springeropen.com/articles/10.1186/s13388-017-0029-8Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual data from the we...ResearchThu, 11 May 2017 00:00:00 GMThttps://security-informatics.springeropen.com/articles/10.1186/s13388-017-0029-8Hamidreza Alvari, Paulo Shakarian and J. E. Kelly Snyder2017-05-11T00:00:00ZAnalytics for characterising and measuring the naturalness of online personaehttps://security-informatics.springeropen.com/articles/10.1186/s13388-016-0028-1Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is n...Case studyThu, 08 Sep 2016 00:00:00 GMThttps://security-informatics.springeropen.com/articles/10.1186/s13388-016-0028-1Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith and Sadie Creese2016-09-08T00:00:00Z