-
1
-
-
0033981965
-
Offender profiling and criminal differentiation
-
Canter D. Offender profiling and criminal differentiation. Legal Criminol Psychol 2000, 5:23-46.
-
(2000)
Legal Criminol Psychol
, vol.5
, pp. 23-46
-
-
Canter, D.1
-
2
-
-
0043024585
-
Crime analysis: principles for analysing everyday serial crime
-
ISBN: 1-84014-785-7
-
Merry S. Crime analysis: principles for analysing everyday serial crime. In: Canter D, Alison L, eds. Profiling Property Crimes. Ashgate; 2000, 297-318. ISBN: 1-84014-785-7.
-
(2000)
Canter D, Alison L, eds. Profiling Property Crimes. Ashgate
, pp. 297-318
-
-
Merry, S.1
-
3
-
-
33750306824
-
How efficiently can we target prolific offenders?
-
Townsley M, Pease K. How efficiently can we target prolific offendersr? Int J Police Sci Manage 2002, 4:323-331.
-
(2002)
Int J Police Sci Manage
, vol.4
, pp. 323-331
-
-
Townsley, M.1
Pease, K.2
-
4
-
-
38049126108
-
Mining the core member of terrorist crime group based on social network analysis. Intelligence and security informatics
-
ISBN: 978-3-540-71548-1
-
Liu Q, Tang C, Qiao S, Liu Q, Wen F. Mining the core member of terrorist crime group based on social network analysis. Intelligence and security informatics. Lect Notes Comput Sci 2007, 4430/2007:311-313. ISBN: 978-3-540-71548-1.
-
(2007)
Lect Notes Comput Sci
, vol.2007
, pp. 311-313
-
-
Liu, Q.1
Tang, C.2
Qiao, S.3
Liu, Q.4
Wen, F.5
-
5
-
-
77955381679
-
Using web mining and social network analysis to study the emergence of cyber communities in blogs
-
New York: Springer, ISBN: 978-0-387-71612-1
-
Chau M, Xu J. Using web mining and social network analysis to study the emergence of cyber communities in blogs. In: Chen H, Reid E, Sinai J, Silke A, Ganor B, eds. Terrorism Informatics, Integrated Series in Information Systems, New York: Springer; 2008, 473-494. ISBN: 978-0-387-71612-1.
-
(2008)
Chen H, Reid E, Sinai J, Silke A, Ganor B, eds. Terrorism Informatics, Integrated Series in Information Systems
, pp. 473-494
-
-
Chau, M.1
Xu, J.2
-
6
-
-
1942500388
-
Crime Data Mining: A General Framework and Some Examples
-
Chen H, Chung W, Xu JJ, Wang G, Qin Y, Cha M. Crime Data Mining: A General Framework and Some Examples. IEEE Computer 2004, 37:50-56.
-
(2004)
IEEE Computer
, vol.37
, pp. 50-56
-
-
Chen, H.1
Chung, W.2
Xu, J.J.3
Wang, G.4
Qin, Y.5
Cha, M.6
-
7
-
-
0036182954
-
Official crime statistics: their use and interpretation
-
MacDonald Z. Official crime statistics: their use and interpretation. Economic J 2002, 112:F85-F106.
-
(2002)
Economic J
, vol.112
-
-
MacDonald, Z.1
-
9
-
-
16244371213
-
The social psychology of robbery
-
Aldershot: Ashgate
-
McCluskey K, Wardle S. The social psychology of robbery. In: Canter D, Allison L,eds. The Social Psychology of Crime. Groups, Teams and Networks. Aldershot: Ashgate; 2000, 247-285.
-
(2000)
Canter D, Allison L,eds. The Social Psychology of Crime. Groups, Teams and Networks
, pp. 247-285
-
-
Mccluskey, K.1
Wardle, S.2
-
10
-
-
84873268187
-
Beyond the network: a crime science approach to organized crime
-
Stovin G, Davies C. Beyond the network: a crime science approach to organized crime. Policing 2008, 2:497-505.
-
(2008)
Policing
, vol.2
, pp. 497-505
-
-
Stovin, G.1
Davies, C.2
-
12
-
-
84873250800
-
Policing retail crime: from minor offending to organised criminal networks
-
New York: Nova Science
-
Ewart BW, Tate A. Policing retail crime: from minor offending to organised criminal networks. In: Froeling KT, ed. Criminology Research Focus. New York: Nova Science; 2007, 33-67.
-
(2007)
Froeling KT, ed. Criminology Research Focus
, pp. 33-67
-
-
Ewart, B.W.1
Tate, A.2
-
13
-
-
84873257504
-
-
HOCR, Available at, Accessed August 12, 2010
-
HOCR. 2010. Counting rules for recorded crime. Available at: http://www.homeoffice.gov.uk/rds/countrules.html. (Accessed August 12, 2010).
-
(2010)
Counting rules for recorded crime
-
-
-
14
-
-
43349106149
-
with the assistance of Kent Matthews
-
London: Association of Chief Police Officers. February 2007
-
Levi M, Burrows J, FlemingMH, Hopkins M, with the assistance of Kent Matthews. 2007. The Nature, Extent and Economic Impact of Fraud in the UK. Report for the Association of Chief Police Officers.' Economic Crime Portfolio; London: Association of Chief Police Officers. February 2007.
-
(2007)
The Nature, Extent and Economic Impact of Fraud in the UK. Report for the Association of Chief Police Officers.' Economic Crime Portfolio
-
-
Levi, M.1
Burrows, J.2
Fleming, M.H.3
Hopkins, M.4
-
15
-
-
33646724726
-
Towards a financial fraud ontology: a legal modelling approach
-
Kingston J, Schafer B, Vandenberghe W. Towards a financial fraud ontology: a legal modelling approach. Artif Intell Law 2004, 12:419-446.
-
(2004)
Artif Intell Law
, vol.12
, pp. 419-446
-
-
Kingston, J.1
Schafer, B.2
Vandenberghe, W.3
-
16
-
-
0042421807
-
Statistical fraud detection: a review
-
Bolton RJ, Hand DJ. Statistical fraud detection: a review. Statist Sci 2002, 17:235-255.
-
(2002)
Statist Sci
, vol.17
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
17
-
-
37149053967
-
-
Clayton, VIC: Clayton School of Information Technology, Monash University, Available at, Accessed August 12, 2010
-
Phua C, Lee V, Smith-Miles K, Gayler R. A comprehensive survey of datamining-based fraud detection research. Clayton, VIC: Clayton School of Information Technology, Monash University; 2005. Available at: http://clifton.phua.googlepages.com/. (Accessed August 12, 2010).
-
(2005)
A comprehensive survey of datamining-based fraud detection research
-
-
Phua, C.1
Lee, V.2
Smith-Miles, K.3
Gayler, R.4
-
18
-
-
2942674608
-
Sirwongwattana S, Huang YP. Survey of fraud detection techniques
-
Sensing, and Control. Taipei
-
Kou Y, Lu CT, Sirwongwattana S, Huang YP. Survey of fraud detection techniques. In: Proceedings of the 2004 International Conference on Networking, Sensing, and Control. Taipei; 2004, 749-754.
-
(2004)
Proceedings of the 2004 International Conference on Networking
, pp. 749-754
-
-
Kou, Y.1
Lu, C.T.2
-
20
-
-
84873254826
-
-
NIM, Available at, Accessed August 12, 2010
-
NIM. 2010. National Intelligence Model-analytical techniques and products. Available at: http://police. homeoffice.gov.uk/publications/operational-policing/ nim-analytical/. (Accessed August 12, 2010).
-
(2010)
National Intelligence Model-analytical techniques and products
-
-
-
21
-
-
0035618638
-
It's not what you know-it's who you know that counts
-
Coles N. It's not what you know-it's who you know that counts. Br J Criminol 2001, 41:580-594.
-
(2001)
Br J Criminol
, vol.41
, pp. 580-594
-
-
Coles, N.1
-
22
-
-
0242465495
-
The network paradigm applied to criminal organisations: theoretical nitpicking or a relevantdoctrine for investigators? Recent developments in the Netherlands
-
Klerks P. The network paradigm applied to criminal organisations: theoretical nitpicking or a relevantdoctrine for investigators? Recent developments in the Netherlands. Connections 2001, 24:5365
-
(2001)
Connections
, vol.24
, pp. 5365
-
-
Klerks, P.1
-
23
-
-
58149449547
-
Overconfidence in case study judgments
-
Oskamp S. Overconfidence in case study judgments. J Consult Psychol 1965, 29:261-265.
-
(1965)
J Consult Psychol
, vol.29
, pp. 261-265
-
-
Oskamp, S.1
-
24
-
-
0842346760
-
The stability of space-time clusters of burglary
-
Johnson SD, Bowers KJ. The stability of space-time clusters of burglary. Br J Criminol 2004, 44:55-65.
-
(2004)
Br J Criminol
, vol.44
, pp. 55-65
-
-
Johnson, S.D.1
Bowers, K.J.2
-
27
-
-
66949143083
-
Prioritizing burglars: comparing the effectiveness of geographical profiling methods
-
Canter D, Hammond L. Prioritizing burglars: comparing the effectiveness of geographical profiling methods. Police Prac Res 2007, 8:371-384.
-
(2007)
Police Prac Res
, vol.8
, pp. 371-384
-
-
Canter, D.1
Hammond, L.2
-
28
-
-
22944475311
-
False confidence in computerised gepgraphical profiling [shortcuts to geographic profiling success: a reply to Rossmo (2005)]
-
Snook B, Taylor PJ, Bennell C. False confidence in computerised gepgraphical profiling [shortcuts to geographic profiling success: a reply to Rossmo (2005)]. Appl Cognit Psychol 2005, 19:655-661.
-
(2005)
Appl Cognit Psychol
, vol.19
, pp. 655-661
-
-
Snook, B.1
Taylor, P.J.2
Bennell, C.3
-
29
-
-
12244274370
-
Testing hypotheses prediction and prejudice
-
Lipton P. Testing hypotheses prediction and prejudice. Science 2005, 207:219-221.
-
(2005)
Science
, vol.207
, pp. 219-221
-
-
Lipton, P.1
-
30
-
-
84873265875
-
Précis of Inference to the Best Explanation 2nd ed
-
Lipton P. Précis of Inference to the Best Explanation 2nd ed. Philosophy and Phenomenological Research 2007, 74:421-423.
-
(2007)
Philosophy and Phenomenological Research
, vol.74
, pp. 421-423
-
-
Lipton, P.1
-
32
-
-
84873253972
-
-
GJXDA, Available at, Accessed August 12, 2010
-
GJXDA. 2010. Global Justice XML Data Model. Available at: http://it.ojp.gov/jxdm/. (Accessed August 12, 2010).
-
(2010)
Global Justice XML Data Model
-
-
-
33
-
-
84873256120
-
-
CDM, Available at, Accessed August 12, 2010
-
CDM. NPIA Corporate Data Model2007. Available at: http://cordm.npia.police.uk/. (Accessed August 12, 2010).
-
NPIA Corporate Data Model2007
-
-
-
34
-
-
25644445045
-
Become a Problem Solving Crime Analyst-In 55 Small Steps
-
London: Jill Dando Institute of Crime Science, University College London, Available at, Accessed August 12, 2010
-
Clarke RV, Eck J. Become a Problem Solving Crime Analyst-In 55 Small Steps. London: Jill Dando Institute of Crime Science, University College London; 2003. Available at: http://www.jdi.ucl.ac.uk/ downloads/publications/otherpublications/55steps/Prelims.pdf. (Accessed August 12, 2010).
-
(2003)
-
-
Clarke, R.V.1
Eck, J.2
-
35
-
-
0032896151
-
Inference structures for crime analysis and intelligence: the example of burglary using forensic science data
-
Ribaux O, Margot P. Inference structures for crime analysis and intelligence: the example of burglary using forensic science data. Forensic Sci Int 1999, 100:193-210.
-
(1999)
Forensic Sci Int
, vol.100
, pp. 193-210
-
-
Ribaux, O.1
Margot, P.2
-
36
-
-
0035716678
-
The analysis of serial crime through the use of different sources of data
-
Ribaux O, Margot P. The analysis of serial crime through the use of different sources of data. Probl Forensic Sci 2001, 67:93-100
-
(2001)
Probl Forensic Sci
, vol.67
, pp. 93-100
-
-
Ribaux, O.1
Margot, P.2
-
37
-
-
0042839764
-
Case based reasoning in criminal intelligence using forensic case data
-
Ribaux O, Margot P. Case based reasoning in criminal intelligence using forensic case data. Sci Justice 2003, 43:135-143.
-
(2003)
Sci Justice
, vol.43
, pp. 135-143
-
-
Ribaux, O.1
Margot, P.2
|