Using Open Data to Detect Organized Crime Threats

Factors Driving Future Crime

Nonfiction, Computers, Database Management, Social & Cultural Studies, Social Science, Crimes & Criminals, Criminology
Cover of the book Using Open Data to Detect Organized Crime Threats by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319527031
Publisher: Springer International Publishing Publication: April 7, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319527031
Publisher: Springer International Publishing
Publication: April 7, 2017
Imprint: Springer
Language: English

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

More books from Springer International Publishing

Cover of the book Formalizing Data-Centric Web Services by
Cover of the book Dynamic Sharing of Wireless Spectrum by
Cover of the book Data Center Networks by
Cover of the book Damage Tolerance of Metallic Aircraft Structures by
Cover of the book Capitalism, Hegemony and Violence in the Age of Drones by
Cover of the book Complex Magnetic Nanostructures by
Cover of the book Fleets Go Green by
Cover of the book Mathematical Theory of Compressible Viscous Fluids by
Cover of the book Nutrition, Exercise and Epigenetics: Ageing Interventions by
Cover of the book Semantics of Complex Words by
Cover of the book Estimation and Testing Under Sparsity by
Cover of the book Dissipative Systems Analysis and Control by
Cover of the book Business Information Systems Workshops by
Cover of the book Thermal Contact Conductance by
Cover of the book Tectonic Inheritance in Continental Rifts and Passive Margins by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy