000 | 03383nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-41492-8 | ||
003 | DE-He213 | ||
005 | 20200421111700.0 | ||
007 | cr nn 008mamaa | ||
008 | 161011s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319414928 _9978-3-319-41492-8 |
||
024 | 7 |
_a10.1007/978-3-319-41492-8 _2doi |
|
050 | 4 | _aQA76.9.D343 | |
072 | 7 |
_aUNF _2bicssc |
|
072 | 7 |
_aUYQE _2bicssc |
|
072 | 7 |
_aCOM021030 _2bisacsh |
|
082 | 0 | 4 |
_a006.312 _223 |
100 | 1 |
_aTayebi, Mohammad A. _eauthor. |
|
245 | 1 | 0 |
_aSocial Network Analysis in Predictive Policing _h[electronic resource] : _bConcepts, Models and Methods / _cby Mohammad A. Tayebi, Uwe Gl�asser. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXI, 133 p. 43 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Social Networks, _x2190-5428 |
|
505 | 0 | _aIntroduction -- Social Network Analysis in Predictive Policing -- Structure of Co-offending Networks -- Organized Crime Group Detection -- Suspect Investigation -- Co-offence Prediction -- Personalized Crime Location Prediction -- Concluding remarks -- References. | |
520 | _aThis book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData mining. | |
650 | 0 | _aPolice. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aPolicing. |
650 | 2 | 4 | _aApplications of Graph Theory and Complex Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
700 | 1 |
_aGl�asser, Uwe. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319414911 |
830 | 0 |
_aLecture Notes in Social Networks, _x2190-5428 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-41492-8 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c54937 _d54937 |