By Topic

Information sharing and privacy protection of terrorist or criminal social networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Yang, C.C. ; Coll. of Inf. Sci. & Technol., Drexel Univ., Philadelphia, PA

Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete terrorist or criminal social network and therefore some crucial knowledge is not able to be extracted. Sharing information between different agencies will make such social network analysis more effective; unfortunately, it may violate the privacy of some sensitive information. There is always a tradeoff between the degree of privacy and the degree of utility in information sharing. Several approaches have been proposed to resolve such dilemma in sharing data from different relational tables. There is not any work on sharing social networks from different sources and yet try to minimize the reduction on the degree of privacy. In this paper, we propose a subgraph generalization approach for information sharing and privacy protection of terrorist or criminal social networks. Our experiment shows that such approach is promising.

Published in:

Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on

Date of Conference:

17-20 June 2008