Using Open Data to Detect Organized Crime Threats

Factors Driving Future Crime

Nonfiction, Computers, Database Management, Social & Cultural Studies, Social Science, Crimes & Criminals, Criminology
Cover of the book Using Open Data to Detect Organized Crime Threats by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319527031
Publisher: Springer International Publishing Publication: April 7, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319527031
Publisher: Springer International Publishing
Publication: April 7, 2017
Imprint: Springer
Language: English

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

More books from Springer International Publishing

Cover of the book Institutions, Governance and the Control of Corruption by
Cover of the book Medical Computer Vision: Algorithms for Big Data by
Cover of the book Information Filtering and Retrieval by
Cover of the book IIW Guidelines on Weld Quality in Relationship to Fatigue Strength by
Cover of the book Hybrid Intelligence for Social Networks by
Cover of the book Athletic Footwear and Orthoses in Sports Medicine by
Cover of the book The Northern Sea Route as a Shipping Lane by
Cover of the book Group 2 Mediated Dehydrocoupling by
Cover of the book Correlated Functional Oxides by
Cover of the book Probability with Applications in Engineering, Science, and Technology by
Cover of the book Near Threshold Computing by
Cover of the book Self-healing Materials by
Cover of the book Reframing Critical, Literary, and Cultural Theories by
Cover of the book Advances in Web-Based Learning -- ICWL 2015 by
Cover of the book New Advances on Chaotic Intermittency and its Applications by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy