Social network analysis in predictive policing : concepts, models and methods /: concepts, models and methods. (2016)
- Record Type:
- Book
- Title:
- Social network analysis in predictive policing : concepts, models and methods /: concepts, models and methods. (2016)
- Main Title:
- Social network analysis in predictive policing : concepts, models and methods
- Further Information:
- Note: Mohammad A. Tayebi, Uwe Glässer.
- Other Names:
- Tayebi, Mohammad Ali
Glässer, Uwe, 1959- - Contents:
- Foreword; Preface; Contents; 1 Introduction; References; 2 Social Network Analysis in Predictive Policing; 2.1 Conventional Crime Analysis; 2.2 Predictive Policing; 2.3 Social Network Analysis; 2.4 Co-offending Networks; 2.5 Co-offending Network Analysis in Practice; References; 3 Structure of Co-offending Networks; 3.1 Crime Data; 3.1.1 Crime Data Model; 3.1.2 Co-offending Network Model; 3.1.3 BC Crime Dataset; 3.2 Co-offending Network Structural Properties; 3.2.1 Degree Distribution; 3.2.2 Co-offending Strength Distribution; 3.2.3 Connecting Paths; 3.2.4 Clustering Coefficient. 3.2.5 Connected Components Analysis3.2.6 Network Evolution Analysis; 3.3 Key Players in Co-offending Networks; 3.3.1 Centrality Measures; 3.3.2 Key Players Removal Effects; 3.3.3 Experiments and Results; 3.4 Conclusions; References; 4 Organized Crime Group Detection; 4.1 Background; 4.1.1 Community Detection in Social Networks; 4.2 Concepts and Definitions; 4.2.1 Problem Definition; 4.3 Proposed Approach; 4.3.1 Organized Crime Group Detection; 4.3.2 Organized Crime Group Evolution Model; 4.4 Experiments and Results; 4.4.1 Offender Groups Characteristics; 4.4.2 Organized Crime Groups. 4.5 ConclusionsReferences; 5 Suspects Investigation; 5.1 Background; 5.2 Problem Definition; 5.3 CrimeWalker; 5.3.1 A Single Random Walk in CrimeWalker; 5.3.2 CrimeWalker for a Set of Offenders; 5.3.3 Similarity Measure for Offenders; 5.3.4 Feature Weights Computation; 5.4 Experiments and Results; 5.4.1 ExperimentalForeword; Preface; Contents; 1 Introduction; References; 2 Social Network Analysis in Predictive Policing; 2.1 Conventional Crime Analysis; 2.2 Predictive Policing; 2.3 Social Network Analysis; 2.4 Co-offending Networks; 2.5 Co-offending Network Analysis in Practice; References; 3 Structure of Co-offending Networks; 3.1 Crime Data; 3.1.1 Crime Data Model; 3.1.2 Co-offending Network Model; 3.1.3 BC Crime Dataset; 3.2 Co-offending Network Structural Properties; 3.2.1 Degree Distribution; 3.2.2 Co-offending Strength Distribution; 3.2.3 Connecting Paths; 3.2.4 Clustering Coefficient. 3.2.5 Connected Components Analysis3.2.6 Network Evolution Analysis; 3.3 Key Players in Co-offending Networks; 3.3.1 Centrality Measures; 3.3.2 Key Players Removal Effects; 3.3.3 Experiments and Results; 3.4 Conclusions; References; 4 Organized Crime Group Detection; 4.1 Background; 4.1.1 Community Detection in Social Networks; 4.2 Concepts and Definitions; 4.2.1 Problem Definition; 4.3 Proposed Approach; 4.3.1 Organized Crime Group Detection; 4.3.2 Organized Crime Group Evolution Model; 4.4 Experiments and Results; 4.4.1 Offender Groups Characteristics; 4.4.2 Organized Crime Groups. 4.5 ConclusionsReferences; 5 Suspects Investigation; 5.1 Background; 5.2 Problem Definition; 5.3 CrimeWalker; 5.3.1 A Single Random Walk in CrimeWalker; 5.3.2 CrimeWalker for a Set of Offenders; 5.3.3 Similarity Measure for Offenders; 5.3.4 Feature Weights Computation; 5.4 Experiments and Results; 5.4.1 Experimental Design; 5.4.2 Comparison Partners; 5.4.3 Experiments and Results; 5.5 Conclusions; References; 6 Co-offence Prediction; 6.1 Background; 6.1.1 Crime Prediction; 6.1.2 Link Prediction; 6.2 Concepts and Definitions; 6.2.1 Notations; 6.2.2 Offenders' Activity Space. 6.2.3 Geographic and Network Proximity6.2.4 Problem Definition; 6.3 Supervised Learning for Co-Offence Prediction; 6.3.1 Criminal Cooperation Opportunities; 6.3.2 Reducing Class Imbalance Ratio; 6.4 Prediction Features; 6.4.1 Social Features; 6.4.2 Geographic Features; 6.4.3 Geo-Social Features; 6.4.4 Similarity Features; 6.5 Experiments and Results; 6.5.1 Experimental Design; 6.5.2 Single Features Significance; 6.5.3 Prediction Evaluation; 6.5.4 Criminological Implications; 6.6 Conclusions; References; 7 Personalized Crime Location Prediction; 7.1 Background; 7.1.1 Spatial Pattern of Crime. 7.1.2 Crime Pattern Theory7.1.3 Activity Space; 7.1.4 Directionality; 7.1.5 Crime Location Prediction; 7.1.6 Urban Environment; 7.1.7 Problem Definition; 7.2 CrimeTracer Model; 7.2.1 Model Description; 7.2.2 Random Walk Process; 7.2.3 Starting Probabilities; 7.2.4 Movement Directionality; 7.2.5 Stopping Criteria; 7.3 Experiments and Results; 7.3.1 Data Characteristics; 7.3.2 Experimental Design; 7.3.3 Comparison Partners; 7.3.4 Experiments and Results; 7.4 Conclusions; References; 8 Concluding Remarks; References; Index. … (more)
- Publisher Details:
- Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource
- Subjects:
- 363.20285
Computer science
Police -- Data processing
BUSINESS & ECONOMICS -- Infrastructure
SOCIAL SCIENCE -- General
Police -- Data processing
Social Science -- Criminology
Science -- System Theory
Computers -- Security -- General
Crime & criminology
Mathematical physics
Computer security
Data mining
Police
Computer security
Computers -- Database Management -- Data Mining
Data mining
Electronic books - Languages:
- English
- ISBNs:
- 9783319414928
3319414925 - Related ISBNs:
- 9783319414911
3319414917 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.374177
- Ingest File:
- 02_353.xml