Journal of Information Resources Management ›› 2022, Vol. 12 ›› Issue (2): 65-75.doi: 10.13365/j.jirm.2022.02.065
Previous Articles Next Articles
Bai Yun1 Li Baiyang1,2 Wang Shiyun1
Online:
Published:
Abstract: With the emergence of the network and cross-border characteristics of organized crime, the use of open source intelligence to conduct cybercrime big data association analysis based on knowledge graphs and criminal identification based on social network analysis can effectively combat criminal acts and minimize the living space of criminals. Taking "Cross-border Telecom Fraud Criminal Governance" as an example, use open-source data to construct a knowledge graph of cross-border telecom fraud events and a network of stakeholders in each event to identify the core figures of criminal groups and potential criminals. Most cybercrimes commit crimes in the form of criminal gangs or groups. In order to avoid supervision and combat, criminals gradually transfer criminal dens and communication tools abroad, and purposefully implement cross-border networks against Chinese citizens crime. Graphing cases, incidents, etc., and building large-scale knowledge nodes and relationship links, can effectively discover hidden personnel, funds, technology, information flows, etc., and help the public security department to adopt precise combat methods to curb criminal behavior.
Key words: Open source intelligence, Cross-border crime governance, Cybercrime, Incident knowledge graph, Social network analysis
CLC Number:
G350.7
Bai Yun Li Baiyang Wang Shiyun. Open Source Intelligence Acquisition and Utilization Methods for New Types of Cross-border Organized Cybercrime[J]. Journal of Information Resources Management, 2022, 12(2): 65-75.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: http://jirm.whu.edu.cn/jwk3/xxzyglxb/EN/10.13365/j.jirm.2022.02.065
http://jirm.whu.edu.cn/jwk3/xxzyglxb/EN/Y2022/V12/I2/65