Research on Crime Prevention and Control Based on Big Data Method
Abstract
References
Index Terms
- Research on Crime Prevention and Control Based on Big Data Method
Recommendations
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review
Highlights- Evolution and developments of cybercrimes into cyber-focused and cyber-enabled crimes.
AbstractSituational Crime Prevention (SCP) is a criminological approach that is shown to reduce crime opportunities drawing from five different strategies comprising 25 techniques. With the global increase in cybercrime, practitioners and ...
Using artificial intelligence to prevent crime: implications for due process and criminal justice
AbstractTraditional notions of crime control often position the police against an individual, known or not yet known, who is responsible for the commission of a crime. However, with increasingly sophisticated technology, policing increasingly prioritizes ...
Mining Big Data
ICEIS 2015: Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 1Nowadays, the daily amount of generated data is measured in exabytes. Such huge data is now referred to as Big Data. Big data mining leads to the discovery of the useful information from huge data repositories. However, this huge amount of data hinders ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- Scientific Research Project of Hainan Provincial Higher Education
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 42Total Downloads
- Downloads (Last 12 months)32
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format