Analysis of exchange market disruptors using graph-based social network analysis

Document Type : Original Article

Author

Assistant Professor, FATA Department, Amin University of Police Sciences, Tehran, Iran

Abstract

Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture and geography of each country. Accordingly, dealing with these physical crimes interacts with cyberspace. Therefore, detecting crimes and identifying criminals using old methods is almost impossible. Therefore, databases and their processing can play an essential role in detecting crime patterns for police-security organizations. The highly effective methods and tools of social network analysis can discover the pattern and extract knowledge from the database to prevent and control crime. This article explores crime rules using social network analysis methods and offers suggestions for preventing crimes and identifying perpetrators. The analysis of social networks has great importance, and the results obtained from these analyzes can be used in similar applications. In this article, the first has been collected the data related to currency disruptors in recent years, then analyzed this data with social network techniques and identified compelling features for identifying virtual nodes. The results show that social network analysis methods have simulated a model with acceptable accuracy and introduced destructive nodes by analyzing features. However, identifying destructive nodes and crime prevention can be considered, thoroughly describing how to do this in the paper.

Keywords


Smiley face

[1]     I. Arjmandi and S. Salavatian, "Foresight of the evolution of media, audience and society," 3rd national conference on futures studies, 2015. (In Persian)
[2]    J. Farahany, A. H. Bagheri Asl, "Social prevention of cybercrime and diversions," vol. 55, pp.133–162, 2008. (In Persian)
[3]    H. Sahlani, "Introduction to Cyber Security Threats," Amin University of Law Enforcement Sciences, Islamic Republic of Iran, 2018. (In Persian)
[4]    F. Tavakoli, G.R. ShahMohammadi, "The Impact of Information Technology Management on Cybercrime Prosecution," Intelligence and criminal investigations, vol. 50, No.13, pp. 129-148,  2018. (In Persian)
[5]    I. Hassan Beigi and A. Hindiani, "Recognize the threats posed by organized crime against the public security of the Islamic Republic of Iran," Journal of Disciplinary Management Research, vol. 42, pp. 133–162, 2005. (In Persian)
[6]    M. Khalili, H. Nourmohammadi, N. Naghshineh, "Provide a framework for analyzing network data in the fight against social anomalies," Journal of Scientometrics, Shahed University, Islamic Republic of Iran, vol. 9. No.14 , pp. 35–52, 2023. (In Persian)
[7]    G.R. ShahMohammadi and S. Abbasi, "Determining the effective factors in urban accidents using data mining methods (Case study: Isfahan)," Journal of Disciplinary Geography, vol. 21, pp. 135–162, 2018. (In Persian)
[8]    G.R. ShahMohammadi, M. Rajabi, "An Analysis of the Ethical Crimes of Cyberspace Using the Data Mining Approach," Police knowledge research, vol. 20, No.4, pp. 63-91, 2018. (In Persian)
[9]    P. Campana, F. Varese, "The determinants of group membership in organized crime in the UK: A network study," Global Crime, vol. 23, No.1, pp. 5-22, 2022.
[10]  T. Fu-Ching, H. Ming-Chun, C. Chien-Ta, and K. Da-Yu, "Exploring drug-related crimes with social network analysis," Procedia Computer Science vol. 159, pp. 1907-1917, 2019.
[11]  M. Hosseini, A. Mahabadi, "A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation," Journal of Electronical & Cyber Defence, Vol. 8, No. 4, 2021. (In Persian)
[12]  H. Sahlani, R. Sadeghi Rashed, "Digital Forescics Evidence," Amin University of Law Enforcement Sciences, Islamic Republic of Iran, 2017. (In Persian)
[13]  F. Vashghani Farahani, L. Ismaili, S.A. Hashemi Golpayegani and Z. Ebadi Abuzar, "A Framework for Network Extraction and Social Network Analysis," 8th International Conference on Information and Knowledge, Hamedan, 2016. (In Persian)
[14]  J. Bruggeman, "Introduction to social networks," (Mirzaei, Khalil, translator) Sociologists Publishing, 2013. (In Persian).
[15]  A.A Akbari Tabar, "A Study on Online Social Networks; Case Study of Doreh and U24," Tarbiat Modares University (TMU), Faculty of Humanities, A Thesis Presented for the Degree of Master Of Art in Sociology, July 2011. (In Persian)
[16]  R. S. Burt, "Brokerage and Closure: An Introduction to Social Capital," Oxford University Press, 2005.
[17]  M. Ghayoori Sales, Gh. R. Bazdar, A. Sarkardei, "Introduction of the Entropy-Based Method for Finding Influential, Nodes in Information Dissemination on Online Social Networks," Journal of Electronical & Cyber Defence, Vol. 6, No. 2, 2018. (In Persian)
[18] F. Golshahi, A. Torghi Haghighat, "An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm,"  Journal of Electronical & Cyber Defence, Vol. 8, No. 2, 2020. (In Persian) 
Volume 11, Issue 1 - Serial Number 41
No. 41, Spring
May 2023
Pages 107-116
  • Receive Date: 07 May 2022
  • Revise Date: 14 July 2022
  • Accept Date: 24 December 2022
  • Publish Date: 22 May 2023