Using Open Data to Detect Organized Crime Threats

Factors Driving Future Crime

Nonfiction, Computers, Database Management, Social & Cultural Studies, Social Science, Crimes & Criminals, Criminology
Cover of the book Using Open Data to Detect Organized Crime Threats by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319527031
Publisher: Springer International Publishing Publication: April 7, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319527031
Publisher: Springer International Publishing
Publication: April 7, 2017
Imprint: Springer
Language: English

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.

The emergence of these crime threats, such as communication between organized crime networks and radicalization towards terrorism, is driven by a combination of political, economic, social, technological, legal and environmental factors. The contributions to this volume represent a major step by researchers to systematically collect, filter, interpret, and use the information available. For the purposes of this book, the only data sources used are publicly available sources which can be accessed legally and ethically.

This work will be of interest to researchers in criminology and criminal justice, particularly in police science, organized crime, counter-terrorism and crime science. It will also be of interest to those in related fields such as applications of computer science and data mining, public policy, and business intelligence.

More books from Springer International Publishing

Cover of the book Geographic Information Science by
Cover of the book Placebos and Nocebos in Headaches by
Cover of the book Intelligent Routines II by
Cover of the book A Comprehensive Guide to Core Needle Biopsies of the Breast by
Cover of the book Networked Cancer by
Cover of the book Knowledge Creation in Community Development by
Cover of the book Handbook of Floating-Point Arithmetic by
Cover of the book Neighborhood Poverty and Segregation in the (Re-)Production of Disadvantage by
Cover of the book Unconventional Computation and Natural Computation by
Cover of the book Computational Kinematics by
Cover of the book Enforcing Privacy by
Cover of the book Managing Public Trust by
Cover of the book National Forest Inventories by
Cover of the book Educational Technologies in Medical and Health Sciences Education by
Cover of the book Medical Image Watermarking by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy