Data mining and predictive analysis: intelligence gathering and crime analysis
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Butterworth-Heinemann
2015
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXVII, 393 S. Ill., graph. Darst., Kt. |
ISBN: | 9780128002292 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042577153 | ||
003 | DE-604 | ||
005 | 20190927 | ||
007 | t | ||
008 | 150522s2015 abd| |||| 00||| eng d | ||
020 | |a 9780128002292 |9 978-0-12-800229-2 | ||
035 | |a (OCoLC)910906066 | ||
035 | |a (DE-599)BVBBV042577153 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-739 |a DE-19 | ||
082 | 0 | |a 363.25/6 |2 22 | |
082 | 0 | |a 363.250285/6312 |2 23 | |
084 | |a ST 530 |0 (DE-625)143679: |2 rvk | ||
084 | |a PH 8240 |0 (DE-625)136495: |2 rvk | ||
100 | 1 | |a McCue, Colleen |e Verfasser |4 aut | |
245 | 1 | 0 | |a Data mining and predictive analysis |b intelligence gathering and crime analysis |c Colleen McCue |
250 | |a 2. ed. | ||
264 | 1 | |a Amsterdam [u.a.] |b Butterworth-Heinemann |c 2015 | |
300 | |a XXVII, 393 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Crime analysis |2 fast | |
650 | 7 | |a Criminal behavior, Prediction of |2 fast | |
650 | 7 | |a Data mining |2 fast | |
650 | 7 | |a Law enforcement / Data processing |2 fast | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Crime analysis | |
650 | 4 | |a Data mining | |
650 | 4 | |a Law enforcement |x Data processing | |
650 | 4 | |a Criminal behavior, Prediction of | |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kriminalprognose |0 (DE-588)4128163-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kriminalität |0 (DE-588)4033178-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 1 | |a Kriminalität |0 (DE-588)4033178-7 |D s |
689 | 0 | 2 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 1 | 1 | |a Kriminalität |0 (DE-588)4033178-7 |D s |
689 | 1 | 2 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 2 | 1 | |a Kriminalprognose |0 (DE-588)4128163-9 |D s |
689 | 2 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028010602&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
Datensatz im Suchindex
_version_ | 1805083205301174272 |
---|---|
adam_text |
Contents
FOREWORD .xi
PREFACE.,.xiii
DIGITAL ASSETS.xxi
INTRODUCTION.xxiii
Part 1 Introductory Section
CHAPTER 1 Basics. 3
1.1 Basic statistics. 3
1.2 inferential versus descriptive statistics
and data mining .4
1.3 Population versus samples. 4
1 .4 Modeling. 7
1.5 Errors. 8
1.6 Overfitting the model. 17
1.7 Generalizability versus accuracy. 18
1.8 Input/output. 20
CHAPTER 2 Domain expertise. 25
2.1 Domain expertise. 25
2.2 Domain expertise for analysts. 26
2.3 The integrated model. .28
CHAPTER 3 Data mining and predictive analytics. 31
3.1 Discovery and prediction. 33
3.2 Confirmation and discovery. 34
3.3 Surprise,. 35
3.4 Characterization.36
3.5 “Volume challenge”. 37
3.6 Exploratory graphics and data exploration .38
3.7 Link analysis. 43
3.8 Non-obvious relationship analysis (NORA) .45
3.9 Text mining. 45
3.10 Closing thoughts. 46
Part 2 Methods
CHAPTER 4 Process models for data mining and predictive
analysis.51
4.1 CIA intelligence process.53
4.2 Cross-industry standard process for
data mining. 55
4.3 Sample.58
4.4 Explore. 58
4.5 Modify. 58
4.6 Model. 58
4.7 Assess.58
4.8 Actionable mining and predictive analysis
for public safety and security.59
CHAPTERS Data. .75
5.1 Getting started. 77
5.2 Types of data. 77
5.3 Data. 77
5.4 Types of data resources. 81
5.5 Data challenges. .97
5.6 How do we overcome these potential
barriers?. 103
CHAPTER 6 Operationally relevant preprocessing. 107
6.1 Operationally relevant recoding.109
6.2 When, where, what?.110
6.3 Duplication.119
6.4 Data imputation. 120
6.5 Telephone data. 120
6.6 Conference call example. 122
6.7 Internet data.129
6.8 Operationally relevant variable selection.131
CHAPTER 7 Identification, characterization,
and modeling. 137
7.1 Predictive analytics .137
7.2 How to select a modeling algorithm, part I .139
7.3 Examples.142
7.4 How to select a modeling algorithm, part II. 145
7.5 General considerations and some
expert options. 149
CHAPTER 8 Public-safety-specific evaluation. 157
8.1 Outcome measures. 160
8.2 Think big.169
8.3 Training and test samples. 173
8.4 Evaluating the model.177
8.5 Updating or refreshing the model.181
8.6 There are no free lunches.181
CHAPTER 9 Operationally actionable output. 185
9.1 Actionable output.186
9.2 Geospatial capabilities and tools.193
9.3 Other approaches.198
Part 3 Applications
CHAPTER 10 Normal crime.211
10.1 Internal norms . 212
10.2 Knowing normal. 213
10.3 “Normal'' criminal behavior. 215
10.4 Get to know “normal” crime trends
and patterns. 216
10.5 Staged crime. 219
CHAPTER 11 Behavioral analysis of violent crime. 223
11.1 Behavior 101. 227
11.2 Motive determination. 232
11.3 Behavioral segmentation. 236
11.4 Victimology. 241
11.5 Violent crimes. .243
11.6 Challenges. 250
11.7 Moving from investigation to prevention.253
CHAPTER 12 Risk and threat assessment. 257
12.1 Basic concepts. 259
12.2 Vulnerable locations. 262
12.3 Process model considerations.266
12.4 Examples. .271
12.5 Novel approaches to risk and threat assessment.279
Part U Case Examples
CHAPTER 13 Deployment.285
13.1 Risk-based deployment. 286
13.2 General concepts. 286
13.3 Howto. 290
13.4 Risk-based deployment case studies. 295
CHAPTER 14 Surveillance detection. 313
14.1 Surveillance detection and other suspicious
situations. 314
14.2 General concepts . .315
14.3 Howto. 317
14.4 Surveillance detection case studies. 328
14.5 Summary. 343
Part 5 Advanced Concepts and Future Trends
CHAPTER 15 Advanced topics.349
15.1 Additional “expert options”. 349
15.2 Unstructured data. 350
15.3 Geospatial capabilities and tools. 351
15.4 Social media.353
15.5 Social network analysis.355
15.6 Fraud detection .356 !
15.7 Cyber. 358
15.8 Application to other/adjacent functional
domains. 360
15.9 Summary. 363
CHAPTER 16 Future trends. 367
16.1 [Really] big data. 367
16.2 Analysis. 369
16.3 Other uses. .371
16.4 Technology and tools.372
16.5 Potential challenges and constraints.373
16.6 Closing thoughts. 381
INDEX. 385 |
any_adam_object | 1 |
author | McCue, Colleen |
author_facet | McCue, Colleen |
author_role | aut |
author_sort | McCue, Colleen |
author_variant | c m cm |
building | Verbundindex |
bvnumber | BV042577153 |
classification_rvk | ST 530 PH 8240 |
ctrlnum | (OCoLC)910906066 (DE-599)BVBBV042577153 |
dewey-full | 363.25/6 363.250285/6312 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/6 363.250285/6312 |
dewey-search | 363.25/6 363.250285/6312 |
dewey-sort | 3363.25 16 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Informatik Soziologie |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV042577153</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190927</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150522s2015 abd| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128002292</subfield><subfield code="9">978-0-12-800229-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910906066</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042577153</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/6</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.250285/6312</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 530</subfield><subfield code="0">(DE-625)143679:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PH 8240</subfield><subfield code="0">(DE-625)136495:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McCue, Colleen</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data mining and predictive analysis</subfield><subfield code="b">intelligence gathering and crime analysis</subfield><subfield code="c">Colleen McCue</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVII, 393 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crime analysis</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal behavior, Prediction of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Law enforcement / Data processing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Law enforcement</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal behavior, Prediction of</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kriminalprognose</subfield><subfield code="0">(DE-588)4128163-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kriminalität</subfield><subfield code="0">(DE-588)4033178-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kriminalität</subfield><subfield code="0">(DE-588)4033178-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kriminalität</subfield><subfield code="0">(DE-588)4033178-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kriminalprognose</subfield><subfield code="0">(DE-588)4128163-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028010602&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield></record></collection> |
id | DE-604.BV042577153 |
illustrated | Illustrated |
indexdate | 2024-07-20T07:44:51Z |
institution | BVB |
isbn | 9780128002292 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028010602 |
oclc_num | 910906066 |
open_access_boolean | |
owner | DE-1050 DE-739 DE-19 DE-BY-UBM |
owner_facet | DE-1050 DE-739 DE-19 DE-BY-UBM |
physical | XXVII, 393 S. Ill., graph. Darst., Kt. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | McCue, Colleen Verfasser aut Data mining and predictive analysis intelligence gathering and crime analysis Colleen McCue 2. ed. Amsterdam [u.a.] Butterworth-Heinemann 2015 XXVII, 393 S. Ill., graph. Darst., Kt. txt rdacontent n rdamedia nc rdacarrier Crime analysis fast Criminal behavior, Prediction of fast Data mining fast Law enforcement / Data processing fast Datenverarbeitung Crime analysis Data mining Law enforcement Data processing Criminal behavior, Prediction of Bekämpfung (DE-588)4112701-8 gnd rswk-swf Prävention (DE-588)4076308-0 gnd rswk-swf Kriminalprognose (DE-588)4128163-9 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Kriminalität (DE-588)4033178-7 gnd rswk-swf Data Mining (DE-588)4428654-5 s Kriminalität (DE-588)4033178-7 s Prävention (DE-588)4076308-0 s DE-604 Bekämpfung (DE-588)4112701-8 s Kriminalprognose (DE-588)4128163-9 s Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028010602&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | McCue, Colleen Data mining and predictive analysis intelligence gathering and crime analysis Crime analysis fast Criminal behavior, Prediction of fast Data mining fast Law enforcement / Data processing fast Datenverarbeitung Crime analysis Data mining Law enforcement Data processing Criminal behavior, Prediction of Bekämpfung (DE-588)4112701-8 gnd Prävention (DE-588)4076308-0 gnd Kriminalprognose (DE-588)4128163-9 gnd Data Mining (DE-588)4428654-5 gnd Kriminalität (DE-588)4033178-7 gnd |
subject_GND | (DE-588)4112701-8 (DE-588)4076308-0 (DE-588)4128163-9 (DE-588)4428654-5 (DE-588)4033178-7 |
title | Data mining and predictive analysis intelligence gathering and crime analysis |
title_auth | Data mining and predictive analysis intelligence gathering and crime analysis |
title_exact_search | Data mining and predictive analysis intelligence gathering and crime analysis |
title_full | Data mining and predictive analysis intelligence gathering and crime analysis Colleen McCue |
title_fullStr | Data mining and predictive analysis intelligence gathering and crime analysis Colleen McCue |
title_full_unstemmed | Data mining and predictive analysis intelligence gathering and crime analysis Colleen McCue |
title_short | Data mining and predictive analysis |
title_sort | data mining and predictive analysis intelligence gathering and crime analysis |
title_sub | intelligence gathering and crime analysis |
topic | Crime analysis fast Criminal behavior, Prediction of fast Data mining fast Law enforcement / Data processing fast Datenverarbeitung Crime analysis Data mining Law enforcement Data processing Criminal behavior, Prediction of Bekämpfung (DE-588)4112701-8 gnd Prävention (DE-588)4076308-0 gnd Kriminalprognose (DE-588)4128163-9 gnd Data Mining (DE-588)4428654-5 gnd Kriminalität (DE-588)4033178-7 gnd |
topic_facet | Crime analysis Criminal behavior, Prediction of Data mining Law enforcement / Data processing Datenverarbeitung Law enforcement Data processing Bekämpfung Prävention Kriminalprognose Data Mining Kriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028010602&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT mccuecolleen dataminingandpredictiveanalysisintelligencegatheringandcrimeanalysis |