Using Open Data to Detect Organized Crime Threats

Factors Driving Future Crime

Nonfiction, Computers, Database Management, Social & Cultural Studies, Social Science, Crimes & Criminals, Criminology
Cover of the book Using Open Data to Detect Organized Crime Threats by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319527031
Publisher: Springer International Publishing Publication: April 7, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319527031
Publisher: Springer International Publishing
Publication: April 7, 2017
Imprint: Springer
Language: English

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

More books from Springer International Publishing

Cover of the book Recent Advances in Traffic Engineering for Transport Networks and Systems by
Cover of the book Palestine - Peace by Piece by
Cover of the book Human Resource Management Practices by
Cover of the book Differential Geometry by
Cover of the book Bin-Picking by
Cover of the book Entrepreneurial Ecosystems by
Cover of the book Reasoning Web. Web Logic Rules by
Cover of the book Influenza Pathogenesis and Control - Volume I by
Cover of the book Neuropsychological Assessments of Dementia in Down Syndrome and Intellectual Disabilities by
Cover of the book State, Memory, and Egypt’s Victory in the 1973 War by
Cover of the book Youth-Community Partnerships for Adolescent Alcohol Prevention by
Cover of the book Agricultural Biomass Based Potential Materials by
Cover of the book The Discourse of Business Meetings by
Cover of the book Information Technology and Systems by
Cover of the book Fuzzy Logic and Applications by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy