203,715 Hits in 6.5 sec

Geographic Information System Effects on Policing Efficacy

Yan Zhang, Larry Hoover, Jihong (Solomon) Zhao
2014 International Journal of Applied Geospatial Research  
GIS technology is credited with substantially improving police crime analysis and related resource allocation.  ...  The primary objective of this qualitative review is to identify the extent of empirical evaluations of the effectiveness of a GIS.  ...  A primary reason relates to the multiplicity of functions of a GIS.  ... 
doi:10.4018/ijagr.2014040103 fatcat:6pkqskqidngtllc4zj6cxspg7e

Visualization in law enforcement

Hsinchun Chen, Chuck Violette, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen
2005 CHI '05 extended abstracts on Human factors in computing systems - CHI '05  
To help identify crime patterns, a Spatial Temporal Visualization (STV) system was designed to integrate a synchronized view of three types of visualization techniques: a GIS view, a timeline view and  ...  Visualization techniques have proven to be critical in helping crime analysis.  ...  When a high profile crime or a serial crime happens, the CIOs perform deep analysis by collecting all the related police reports based on the type of crime, the time and location of the crime and manually  ... 
doi:10.1145/1056808.1056893 dblp:conf/chi/ChenATMKEGSPV05 fatcat:omch4myg2naarpnprpz2vpnisq

A Framework for Visual Representation of Crime Information

Samiullah Shah, Vijdan Khalique, Salahuddin Saddar, Naeem A. Mahoto
2017 Indian Journal of Science and Technology  
Objectives: This paper proposes a framework that transforms the structural crime related data into effective visual reports to strengthen the pro-active activities of law enforcement agencies.  ...  Application/Improvements: Law enforcement agencies can use the system to have comprehensive, consolidated and chronologically view of all types of reported criminal activities.  ...  Section 2 reports the related existing literature for crime analysis and visual representation of crime analysis. Section 3 presents visualization techniques that can be used for crime analysis.  ... 
doi:10.17485/ijst/2017/v10i40/120079 fatcat:s4ys6yctmfffribdy2abp3suym

Crime data mining: a general framework and some examples

H. Chen, W. Chung, J.J. Xu, G. Wang, Y. Qin, M. Chau
2004 Computer  
to identify similar transactions, the Financial Crimes Enforcement Network AI System 8 exploits Bank Secrecy Act data to support the detection and analysis of money laundering and other financial crimes  ...  To adopt the system for crime analysis applications, we modified it to identify five entity types: person names, addresses, vehicles, narcotic names, and physical characteristics. 5 Working from the  ... 
doi:10.1109/mc.2004.1297301 fatcat:fnotfa6dzzgp3hwlcx3u6yxg5q

Unstructured Malay Text Analytics Model in Crime

Rosmayati Mohemad, Nazratul Naziah Mohd Muhait, Noor Maizura Mohamad Noor, Zulaiha Ali Othman
2020 IOP Conference Series: Materials Science and Engineering  
The concern in crime prevention to realize a safe environment for public's welfare is one of the central agenda to government authorities.  ...  The increasing volume of crime reports with unstructured data that are heavily loaded with text presents the biggest challenge to human experts in analysing the data efficiently as it contains lots of  ...  Related work Crime analysis is implemented within law enforcement organizations that referring to a set of systematic and analytical processes for identifying and analyzing patterns and trends in crime  ... 
doi:10.1088/1757-899x/769/1/012015 fatcat:mmp355rb3nfkpail6y3juko55q

Semantic Crime Investigation System

Eman K. Elsayed
2018 Journal of Computers  
So, this paper proposed SCIS (Semantic Crime Investigation System), which supports investigator to take a certainty decision based on result of the fusion.  ...  Also SCIS applied sentiment analysis and image processing techniques. These concepts work together in SCIS in three phases to support the investigator by detailed collected report.  ...  It aims to identify the characteristics of the crime. Crime-solving processes includes analyzing and discovering crime and determine the relations [1] .  ... 
doi:10.17706/jcp.13.10.1216-1226 fatcat:3zz7zj5sonfqxoyvc3mdqe4rry

Correlation Clustering Model for Crime Pattern Detection

Bindiya M Varghese, Unnikrishnan A, Paulose Jacob, Justin Jacob
2010 International Journal of Advancements in Computing Technology  
Detecting crime from data analysis can be difficult because daily activities of criminal generate large amounts of data.  ...  This paper proposes a simple correlation clustering algorithm which aims at finding illegal activities of professional identity fraudsters based on knowledge discovered from their own histories.  ...  The police department use electronic systems for crime reporting that have replaced the traditional paper-based crime reports.  ... 
doi:10.4156/ijact.vol2.issue5.14 fatcat:oppmr5nesbhypfhkbs3mqmchw4

Crime Analysis and Intelligence System Model Design using Big Data

Abubakar Aliyu Machina, Li Songjiang
2020 International Journal of Computer Applications  
Manual crime related record management. 4. Traditional or conventional patrol system. 5. Lack of trending crime analytics tools such as big data, artificial intelligence and machine learning.  ...  As a result, this research is aimed at designing a crime analysis and intelligence model using big data.  ...  Document analysis involved reviewing various crime related document such as crime report, crime statistics, crime bulletin, security report, intelligence report and other important documents.  ... 
doi:10.5120/ijca2020920574 fatcat:vvjzqgbcg5gflnd54lufna446a


Jeffrey Ovre Agushaka, C. E. Chijioke, Yakmut I. Daniel
2022 FUDMA Journal of Sciences  
The system can utilize the crime data stored in the database to identify hotspots and clusters in the Lafia metropolis.  ...  This system is comprised of an android based mobile application for crime reporting and awareness, a geospatial database that houses both legacy and new crime data, and a web-based intelligent application  ...  Acknowledgments The authors would like to acknowledge the contributions of Kabiru Ishola, Mohammed Aliyu, and Chidiebere Joel during data collation and the research.  ... 
doi:10.33003/fjs-2022-0603-990 fatcat:ucktubx6uvc6bdhn6dc5rhwmeu

Modern indicators of financial crimes detection and their prevention in Ukraine

Sergey V. Slinko, Pylyp S. Yepryntsev, Artem O. Shapar, Dmytro B. Sanakoiev, Alina H. Harkusha
2021 Revista Amazonía investiga  
With the help of a systematic analysis of financial crime modern indicators, theoretical sources, prac-tical measures and international experience, the main indicators of financial crimes are identified  ...  Such indicators are the use of false documents and other people's accounts, international payment systems; frequent and complex financial transactions of a confusing nature; unusual for a client amounts  ...  Financial crime can be related to a country's economic development.  ... 
doi:10.34069/ai/2021.44.08.6 fatcat:4dfbeu7qy5cr3e553wueyqm4pq

Process-driven collaboration support for intra-agency crime analysis

J. Leon Zhao, Henry H. Bi, Hsinchun Chen, Daniel D. Zeng, Chienting Lin, Michael Chau
2006 Decision Support Systems  
Through a field study, we observe that crime analysis, a critical component of law enforcement operations, is knowledge intensive and often involves collaborative efforts from multiple law enforcement  ...  To better facilitate such knowledge intensive collaboration and thereby improve law enforcement agencies' crime-fighting capabilities, we propose a novel methodology based on modeling and implementation  ...  When a crime analyst completes the analysis in response to a request from a detective, he or she must prepare a report summarizing the results of the analysis.  ... 
doi:10.1016/j.dss.2004.06.014 fatcat:a53zfd4kffbxzmutcz2dqyu5ba

Highest Harm Crime "Recruiters" in a London Borough: a Case of Moving Targets

Benedict Linton, Barak Ariel
2020 Cambridge Journal of Evidence-Based Policing  
The data structure allowed identification of all suspects linked to the same crime report and all crime reports linked to the same suspects.  ...  Data This study deploys 5 years of Metropolitan Police Service crime data, relating to one of the 32 London boroughs in that time period.  ...  Examination of the relevant crime reports shows that these reports relate to the August 2011 riots in London.  ... 
doi:10.1007/s41887-020-00060-1 fatcat:cqgy375bszcwnlmutuzpwwkomi

Text analysis framework for understanding cyber-crimes

Clinton Cardoza, Rupali Wagh
2017 International Journal of Advanced and Applied Sciences  
Proposed system The objective of this work is to identify and extract cybercrime related information from news article corpus and perform preliminary statistical analysis to identify associations of terms  ...  Crime analysis is a law enforcement function that involves systematic analysis for identifying and analyzing patterns and trends in crime and disorder.  ... 
doi:10.21833/ijaas.2017.010.010 fatcat:ezefmreoxjgqjoaidvsyphvjca

Crime Data Forecasting using Exponential Smoothing

Everly Chua
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Results showed that such method used is significant in the monthly analysis of crime data. Each of the crime incident types indicate the need for a different alpha value to be used.  ...  Crime data analysis to predict the crime that is likely to happen in the future, can be established using mathematical models.  ...  reports from the six (6) Angeles City Police Stations and the Personnel and HR Development Branch unit for releasing the strength profile of each police station.  ... 
doi:10.30534/ijatcse/2020/1391.12020 fatcat:sgzhmcafgjb25eqizabzrrf4ua

Designing a Data Warehouse for Cyber Crimes

Il-Yeol Song, John Maguire, Ki Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
2006 Journal of Digital Forensics, Security and Law  
These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute.  ...  In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data.  ...  Acknowledgement: The authors would like to thank you our students -Jojo John, Shelly Gupta, and Keith Gerritsen who contributed to a survey of literature and model developments for this project.  ... 
doi:10.15394/jdfsl.2006.1007 fatcat:g6byxzimtnhz5gdov7qvf2tm6e
« Previous Showing results 1 — 15 out of 203,715 results