Social Network Analysis in Predictive Policing (Record no. 54937)

000 -LEADER
fixed length control field 03383nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-3-319-41492-8
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111700.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161011s2016 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319414928
-- 978-3-319-41492-8
082 04 - CLASSIFICATION NUMBER
Call Number 006.312
100 1# - AUTHOR NAME
Author Tayebi, Mohammad A.
245 10 - TITLE STATEMENT
Title Social Network Analysis in Predictive Policing
Sub Title Concepts, Models and Methods /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XI, 133 p. 43 illus. in color.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Social Networks,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Social Network Analysis in Predictive Policing -- Structure of Co-offending Networks -- Organized Crime Group Detection -- Suspect Investigation -- Co-offence Prediction -- Personalized Crime Location Prediction -- Concluding remarks -- References.
520 ## - SUMMARY, ETC.
Summary, etc This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
700 1# - AUTHOR 2
Author 2 Gl�asser, Uwe.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-41492-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data mining.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Police.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Mining and Knowledge Discovery.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Policing.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Applications of Graph Theory and Complex Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2190-5428
912 ## -
-- ZDB-2-SCS

No items available.