Social Network Analysis in Predictive Policing (Record no. 54937)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03383nam a22005295i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-41492-8 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421111700.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 161011s2016 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319414928 |
-- | 978-3-319-41492-8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.312 |
100 1# - AUTHOR NAME | |
Author | Tayebi, Mohammad A. |
245 10 - TITLE STATEMENT | |
Title | Social Network Analysis in Predictive Policing |
Sub Title | Concepts, Models and Methods / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XI, 133 p. 43 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Social Networks, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Social Network Analysis in Predictive Policing -- Structure of Co-offending Networks -- Organized Crime Group Detection -- Suspect Investigation -- Co-offence Prediction -- Personalized Crime Location Prediction -- Concluding remarks -- References. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems. |
700 1# - AUTHOR 2 | |
Author 2 | Gl�asser, Uwe. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-41492-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2016. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data mining. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Police. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Mining and Knowledge Discovery. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Policing. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Applications of Graph Theory and Complex Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2190-5428 |
912 ## - | |
-- | ZDB-2-SCS |
No items available.