clue  for  distinguishing  and  discovering  the  strong 
point of criminal gangs. Furthermore, education and 
work experience are powerful features to recognize a 
criminal gang. All these features could be added as an 
additive in practice to detect criminal gangs based on 
cliques or communities. 
On  the other hand,  both  telecom financial fraud 
and homicides are always well-focused, leading to the 
same  feature  of  victims  in  the  same  fraud  case. 
According to Ma (2018), the only way to prevent or 
reduce  this  kind  of  case  is to  first  combat from  the 
source  and then  carry  out  a  full chain  strike  on the 
upstream, midstream and downstream links.   
In  short,  first  of  all,  centrality  for  suspects  is  a 
critical  indicator  to  investigate  how  dangerous  a 
suspect is in a criminal case. Degree centrality is not 
the  only  way  to  detect  itself,  betweenness  and 
closeness centrality are too. A better approach should 
combine  all  three  so  that  the  system  can  issue  a 
certificate  to  monitor  a  suspect's  activities.  Then, 
clique and community detection are the two advanced 
methods in SNA to investigate criminal gangs. Some 
relevant attributes are also a kind of compelling proof 
to recognize targeted criminal gangs. 
Our research also has several limitations. First of 
all, the data we used is secondary data. It is difficult 
to  confirm  the  accuracy  and  integrity  of  the  data, 
which  may  lead  to  a  possible  bias  in  the  analysis 
results.  The  second  limitation  is  that  the  case  we 
analyzed  is  limited  to  homicides.  Thus  the 
effectiveness of this method in detecting other kinds 
of  crimes  may  vary.  In  our  future  work,  we  will 
collect more crime data on different kinds of crimes 
and  test  the  effectiveness  of  the  social  network 
analysis method. 
FUNDING 
This work is supported by VC Research (grant 
number VCR 0000094).   
REFERENCES 
Alexander Kouznetsov, Maksim Tsvetovat, 2019, Chapter 4. 
Cliques,  Clusters  and  Components.  [Online]  Available 
at:  https://www.oreilly.com/library/view/social-network-
analysis/9781449311377/ch04.html  [Accessed  26  12 
2019]. 
Alvarez-Hamelin,  J.  I.,  Dall'Asta,  L.,  Barrat,  A.,  & 
Vespignani, A., 2005. k-core decomposition: A tool for 
the visualization of largescale networks. arXiv preprint 
cs/0504107. 
Bhuyan,  H.  K.,  &  Pani,  S.  K.  (2021).  Crime  Predictive 
Model  Using  Big  Data  Analytics.  Intelligent  Data 
Analytics  for Terror  Threat  Prediction: Architectures, 
Methodologies, Techniques and Applications, 57-78. 
Bonacich, P., 1972. Factoring and weighting approaches to 
status  scores  and  clique  identification.  Journal  of 
mathematical sociology, 2(1), 113-120. 
Borgatti,  S.  P.,  1995.  Centrality  and  AIDS.  Connections, 
18(1), 112-114. 
Chinese Judicial Big Data Research Institute, 2019. China 
Justice Big Data Service Platform. [Online] Available 
at: http://data.court.gov.cn/pages/index.html [Accessed 
20 7 2019]. 
Colladon,  A.  F.,  &  Remondi,  E.  (2017).  Using  social 
network analysis to prevent money laundering. Expert 
Systems with Applications, 67, 49-58. 
Cox,  M.  J.,  DiBello,  A.  M.,  Meisel,  M.  K.,  Ott,  M.  Q., 
Kenney, S. R., Clark, M. A., & Barnett, N. P. (2019). 
Do misperceptions of peer drinking influence personal 
drinking  behavior?  Results  from  a  complete  social 
network  of  first-year  college  students.  Psychology  of 
addictive behaviors, 33(3), 297. 
Dharwadker, A., 2006. The clique algorithm. Proceedings 
of the Institute of Mathematics, 1-41. 
Freeman, L. C., 1980. The gatekeeper, pair-dependency and 
structural centrality. Quality and Quantity, 14(4), 585-
592. 
Kumar, R., & Nagpal, B. (2019). Analysis and prediction 
of crime patterns using big data. International Journal 
of Information Technology, 11(4), 799-805. 
Ma, Z., 2018. The Research of the Detection Difficulty and 
Solution  for  New  Internet  Crimes  Based  on  Telecom 
Fraud. Journal of People’s Public  Security  University 
of China (Social Sciences Edition), 3, pp. 78-86. 
Marin, A., & Wellman, B., 2011. Social network analysis: 
An  introduction.  The  SAGE  handbook  of  social 
network analysis, 11. 
Numbeo, 2021. Crime Index by Country 2021. Available 
at:  https://www.numbeo.com/crime/rankings_by_ 
country.jsp [Accessed 20 03 2021] 
Ozgul,  F.,  Bowerman,  C.,  Erdem,  Z.  &  Atzenbeck,  C., 
2010.  Comparison  of  feature-based  criminal  network 
detection  models  with  k-core  and  n-clique.  2010 
International  Conference  on  Advances  in  Social 
Networks Analysis and Mining, pp. 400-401. 
Scott,  J.,  1991.  Social  Network  Analysis:  A  Handbook 
SAGE Publications Ltd. London, UK. 
Statista,  2021.  Crime  and  punishment  around the  world  - 
Statistics  &  Facts.  Available  at: 
https://www.statista.com/topics/780/crime/#dossierSu
mmary__chapter1 [Accessed 20 03 2021]   
Stolz, S., &  Schlereth, C. (2021). Predicting Tie Strength 
with  Ego  Network  Structures.  Journal  of  Interactive 
Marketing, 54, 40-52. 
White,  N.  &  Rosenfeld,  R.,  2019.  KONET.  [Online] 
Available at:  http://moreno.ss.uci.edu/data.html#crime 
[Accessed 20 07 2019].