메뉴 건너뛰기




Volumn 1, Issue 2, 2011, Pages 147-153

Data mining and crime analysis

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN NETWORKS; COMPUTATION THEORY; CRIME; DECISION MAKING; DECISION SUPPORT SYSTEMS; DIGITAL FORENSICS; SOCIAL NETWORKING (ONLINE); SOCIAL SCIENCES COMPUTING;

EID: 84873252956     PISSN: 19424787     EISSN: 19424795     Source Type: Journal    
DOI: 10.1002/widm.6     Document Type: Article
Times cited : (18)

References (37)
  • 1
    • 0033981965 scopus 로고    scopus 로고
    • Offender profiling and criminal differentiation
    • Canter D. Offender profiling and criminal differentiation. Legal Criminol Psychol 2000, 5:23-46.
    • (2000) Legal Criminol Psychol , vol.5 , pp. 23-46
    • Canter, D.1
  • 2
    • 0043024585 scopus 로고    scopus 로고
    • Crime analysis: principles for analysing everyday serial crime
    • ISBN: 1-84014-785-7
    • Merry S. Crime analysis: principles for analysing everyday serial crime. In: Canter D, Alison L, eds. Profiling Property Crimes. Ashgate; 2000, 297-318. ISBN: 1-84014-785-7.
    • (2000) Canter D, Alison L, eds. Profiling Property Crimes. Ashgate , pp. 297-318
    • Merry, S.1
  • 3
    • 33750306824 scopus 로고    scopus 로고
    • How efficiently can we target prolific offenders?
    • Townsley M, Pease K. How efficiently can we target prolific offendersr? Int J Police Sci Manage 2002, 4:323-331.
    • (2002) Int J Police Sci Manage , vol.4 , pp. 323-331
    • Townsley, M.1    Pease, K.2
  • 4
    • 38049126108 scopus 로고    scopus 로고
    • Mining the core member of terrorist crime group based on social network analysis. Intelligence and security informatics
    • ISBN: 978-3-540-71548-1
    • Liu Q, Tang C, Qiao S, Liu Q, Wen F. Mining the core member of terrorist crime group based on social network analysis. Intelligence and security informatics. Lect Notes Comput Sci 2007, 4430/2007:311-313. ISBN: 978-3-540-71548-1.
    • (2007) Lect Notes Comput Sci , vol.2007 , pp. 311-313
    • Liu, Q.1    Tang, C.2    Qiao, S.3    Liu, Q.4    Wen, F.5
  • 7
    • 0036182954 scopus 로고    scopus 로고
    • Official crime statistics: their use and interpretation
    • MacDonald Z. Official crime statistics: their use and interpretation. Economic J 2002, 112:F85-F106.
    • (2002) Economic J , vol.112
    • MacDonald, Z.1
  • 10
    • 84873268187 scopus 로고    scopus 로고
    • Beyond the network: a crime science approach to organized crime
    • Stovin G, Davies C. Beyond the network: a crime science approach to organized crime. Policing 2008, 2:497-505.
    • (2008) Policing , vol.2 , pp. 497-505
    • Stovin, G.1    Davies, C.2
  • 12
    • 84873250800 scopus 로고    scopus 로고
    • Policing retail crime: from minor offending to organised criminal networks
    • New York: Nova Science
    • Ewart BW, Tate A. Policing retail crime: from minor offending to organised criminal networks. In: Froeling KT, ed. Criminology Research Focus. New York: Nova Science; 2007, 33-67.
    • (2007) Froeling KT, ed. Criminology Research Focus , pp. 33-67
    • Ewart, B.W.1    Tate, A.2
  • 13
    • 84873257504 scopus 로고    scopus 로고
    • HOCR, Available at, Accessed August 12, 2010
    • HOCR. 2010. Counting rules for recorded crime. Available at: http://www.homeoffice.gov.uk/rds/countrules.html. (Accessed August 12, 2010).
    • (2010) Counting rules for recorded crime
  • 15
    • 33646724726 scopus 로고    scopus 로고
    • Towards a financial fraud ontology: a legal modelling approach
    • Kingston J, Schafer B, Vandenberghe W. Towards a financial fraud ontology: a legal modelling approach. Artif Intell Law 2004, 12:419-446.
    • (2004) Artif Intell Law , vol.12 , pp. 419-446
    • Kingston, J.1    Schafer, B.2    Vandenberghe, W.3
  • 16
    • 0042421807 scopus 로고    scopus 로고
    • Statistical fraud detection: a review
    • Bolton RJ, Hand DJ. Statistical fraud detection: a review. Statist Sci 2002, 17:235-255.
    • (2002) Statist Sci , vol.17 , pp. 235-255
    • Bolton, R.J.1    Hand, D.J.2
  • 18
    • 2942674608 scopus 로고    scopus 로고
    • Sirwongwattana S, Huang YP. Survey of fraud detection techniques
    • Sensing, and Control. Taipei
    • Kou Y, Lu CT, Sirwongwattana S, Huang YP. Survey of fraud detection techniques. In: Proceedings of the 2004 International Conference on Networking, Sensing, and Control. Taipei; 2004, 749-754.
    • (2004) Proceedings of the 2004 International Conference on Networking , pp. 749-754
    • Kou, Y.1    Lu, C.T.2
  • 20
    • 84873254826 scopus 로고    scopus 로고
    • NIM, Available at, Accessed August 12, 2010
    • NIM. 2010. National Intelligence Model-analytical techniques and products. Available at: http://police. homeoffice.gov.uk/publications/operational-policing/ nim-analytical/. (Accessed August 12, 2010).
    • (2010) National Intelligence Model-analytical techniques and products
  • 21
    • 0035618638 scopus 로고    scopus 로고
    • It's not what you know-it's who you know that counts
    • Coles N. It's not what you know-it's who you know that counts. Br J Criminol 2001, 41:580-594.
    • (2001) Br J Criminol , vol.41 , pp. 580-594
    • Coles, N.1
  • 22
    • 0242465495 scopus 로고    scopus 로고
    • The network paradigm applied to criminal organisations: theoretical nitpicking or a relevantdoctrine for investigators? Recent developments in the Netherlands
    • Klerks P. The network paradigm applied to criminal organisations: theoretical nitpicking or a relevantdoctrine for investigators? Recent developments in the Netherlands. Connections 2001, 24:5365
    • (2001) Connections , vol.24 , pp. 5365
    • Klerks, P.1
  • 23
    • 58149449547 scopus 로고
    • Overconfidence in case study judgments
    • Oskamp S. Overconfidence in case study judgments. J Consult Psychol 1965, 29:261-265.
    • (1965) J Consult Psychol , vol.29 , pp. 261-265
    • Oskamp, S.1
  • 24
    • 0842346760 scopus 로고    scopus 로고
    • The stability of space-time clusters of burglary
    • Johnson SD, Bowers KJ. The stability of space-time clusters of burglary. Br J Criminol 2004, 44:55-65.
    • (2004) Br J Criminol , vol.44 , pp. 55-65
    • Johnson, S.D.1    Bowers, K.J.2
  • 27
    • 66949143083 scopus 로고    scopus 로고
    • Prioritizing burglars: comparing the effectiveness of geographical profiling methods
    • Canter D, Hammond L. Prioritizing burglars: comparing the effectiveness of geographical profiling methods. Police Prac Res 2007, 8:371-384.
    • (2007) Police Prac Res , vol.8 , pp. 371-384
    • Canter, D.1    Hammond, L.2
  • 28
    • 22944475311 scopus 로고    scopus 로고
    • False confidence in computerised gepgraphical profiling [shortcuts to geographic profiling success: a reply to Rossmo (2005)]
    • Snook B, Taylor PJ, Bennell C. False confidence in computerised gepgraphical profiling [shortcuts to geographic profiling success: a reply to Rossmo (2005)]. Appl Cognit Psychol 2005, 19:655-661.
    • (2005) Appl Cognit Psychol , vol.19 , pp. 655-661
    • Snook, B.1    Taylor, P.J.2    Bennell, C.3
  • 29
    • 12244274370 scopus 로고    scopus 로고
    • Testing hypotheses prediction and prejudice
    • Lipton P. Testing hypotheses prediction and prejudice. Science 2005, 207:219-221.
    • (2005) Science , vol.207 , pp. 219-221
    • Lipton, P.1
  • 30
    • 84873265875 scopus 로고    scopus 로고
    • Précis of Inference to the Best Explanation 2nd ed
    • Lipton P. Précis of Inference to the Best Explanation 2nd ed. Philosophy and Phenomenological Research 2007, 74:421-423.
    • (2007) Philosophy and Phenomenological Research , vol.74 , pp. 421-423
    • Lipton, P.1
  • 32
    • 84873253972 scopus 로고    scopus 로고
    • GJXDA, Available at, Accessed August 12, 2010
    • GJXDA. 2010. Global Justice XML Data Model. Available at: http://it.ojp.gov/jxdm/. (Accessed August 12, 2010).
    • (2010) Global Justice XML Data Model
  • 33
    • 84873256120 scopus 로고    scopus 로고
    • CDM, Available at, Accessed August 12, 2010
    • CDM. NPIA Corporate Data Model2007. Available at: http://cordm.npia.police.uk/. (Accessed August 12, 2010).
    • NPIA Corporate Data Model2007
  • 34
    • 25644445045 scopus 로고    scopus 로고
    • Become a Problem Solving Crime Analyst-In 55 Small Steps
    • London: Jill Dando Institute of Crime Science, University College London, Available at, Accessed August 12, 2010
    • Clarke RV, Eck J. Become a Problem Solving Crime Analyst-In 55 Small Steps. London: Jill Dando Institute of Crime Science, University College London; 2003. Available at: http://www.jdi.ucl.ac.uk/ downloads/publications/otherpublications/55steps/Prelims.pdf. (Accessed August 12, 2010).
    • (2003)
    • Clarke, R.V.1    Eck, J.2
  • 35
    • 0032896151 scopus 로고    scopus 로고
    • Inference structures for crime analysis and intelligence: the example of burglary using forensic science data
    • Ribaux O, Margot P. Inference structures for crime analysis and intelligence: the example of burglary using forensic science data. Forensic Sci Int 1999, 100:193-210.
    • (1999) Forensic Sci Int , vol.100 , pp. 193-210
    • Ribaux, O.1    Margot, P.2
  • 36
    • 0035716678 scopus 로고    scopus 로고
    • The analysis of serial crime through the use of different sources of data
    • Ribaux O, Margot P. The analysis of serial crime through the use of different sources of data. Probl Forensic Sci 2001, 67:93-100
    • (2001) Probl Forensic Sci , vol.67 , pp. 93-100
    • Ribaux, O.1    Margot, P.2
  • 37
    • 0042839764 scopus 로고    scopus 로고
    • Case based reasoning in criminal intelligence using forensic case data
    • Ribaux O, Margot P. Case based reasoning in criminal intelligence using forensic case data. Sci Justice 2003, 43:135-143.
    • (2003) Sci Justice , vol.43 , pp. 135-143
    • Ribaux, O.1    Margot, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.