000 03383nam a22005295i 4500
001 978-3-319-41492-8
003 DE-He213
005 20200421111700.0
007 cr nn 008mamaa
008 161011s2016 gw | s |||| 0|eng d
020 _a9783319414928
_9978-3-319-41492-8
024 7 _a10.1007/978-3-319-41492-8
_2doi
050 4 _aQA76.9.D343
072 7 _aUNF
_2bicssc
072 7 _aUYQE
_2bicssc
072 7 _aCOM021030
_2bisacsh
082 0 4 _a006.312
_223
100 1 _aTayebi, Mohammad A.
_eauthor.
245 1 0 _aSocial Network Analysis in Predictive Policing
_h[electronic resource] :
_bConcepts, Models and Methods /
_cby Mohammad A. Tayebi, Uwe Gl�asser.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXI, 133 p. 43 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Social Networks,
_x2190-5428
505 0 _aIntroduction -- Social Network Analysis in Predictive Policing -- Structure of Co-offending Networks -- Organized Crime Group Detection -- Suspect Investigation -- Co-offence Prediction -- Personalized Crime Location Prediction -- Concluding remarks -- References.
520 _aThis book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData mining.
650 0 _aPolice.
650 1 4 _aComputer Science.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aPolicing.
650 2 4 _aApplications of Graph Theory and Complex Networks.
650 2 4 _aSystems and Data Security.
700 1 _aGl�asser, Uwe.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319414911
830 0 _aLecture Notes in Social Networks,
_x2190-5428
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-41492-8
912 _aZDB-2-SCS
942 _cEBK
999 _c54937
_d54937