Skip to:Content
|
Bottom
Cover image for Data mining and predictive analysis : intelligence gathering and crime analysis
Title:
Data mining and predictive analysis : intelligence gathering and crime analysis
Personal Author:
Publication Information:
Amsterdam : Butterworth-Heinemann, 2007
ISBN:
9780750677967

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010124604 HV7936.C88 M38 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis , Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community hot-spots, and refined resource deployment decisions. In this book Dr. McCue describes her use of "off the shelf" software to graphically depict crime trends and to predict where future crimes are likely to occur. Armed with this data, law enforcement executives can develop "risk-based deployment strategies," that allow them to make informed and cost-efficient staffing decisions based on the likelihood of specific criminal activity.Knowledge of advanced statistics is not a prerequisite for using Data Mining and Predictive Analysis . The book is a starting point for those thinking about using data mining in a law enforcement setting. It provides terminology, concepts, practical application of these concepts, and examples to highlight specific techniques and approaches in crime and intelligence analysis, which law enforcement and intelligence professionals can tailor to their own unique situation and responsibilities.


Author Notes

Colleen "Kelly" McCue, PhD, is a Senior Research Scientist at RTI International


Table of Contents

Forewordp. xiii
Prefacep. xv
Introductionp. xxv
Introductory Sectionp. 1
1 Basicsp. 3
1.1 Basic Statisticsp. 3
1.2 Inferential versus Descriptive Statistics and Data Miningp. 4
1.3 Population versus Samplesp. 4
1.4 Modelingp. 6
1.5 Errorsp. 7
1.6 Overfitting the Modelp. 14
1.7 Generalizability versus Accuracyp. 14
1.8 Input/Outputp. 17
1.9 Bibliographyp. 18
2 Domain Expertisep. 1
2.1 Domain Expertisep. 19
2.2 Domain Expertise for Analystsp. 20
2.3 Compromisep. 22
2.4 Analyze Your Own Datap. 24
2.5 Bibliographyp. 24
3 Data Miningp. 25
3.1 Discovery and Predictionp. 27
3.2 Confirmation and Discoveryp. 28
3.3 Surprisep. 30
3.4 Characterizationp. 31
3.5 "Volume Challenge"p. 32
3.6 Exploratory Graphics and Data Explorationp. 33
3.7 Link Analysisp. 37
3.8 Nonobvious Relationship Analysis (NORA)p. 37
3.9 Text Miningp. 39
3.10 Future Trendsp. 40
3.11 Bibliographyp. 40
Methodsp. 43
4 Process Models for Data Mining and Analysisp. 45
4.1 CIA Intelligence Processp. 47
4.2 CRISP-DMp. 49
4.3 Actionable Mining and Predictive Analysis for Public Safety and Securityp. 53
4.4 Bibliographyp. 65
5 Datap. 67
5.1 Getting Startedp. 69
5.2 Types of Datap. 69
5.3 Datap. 70
5.4 Types of Data Resourcesp. 71
5.5 Data Challengesp. 82
5.6 How Do We Overcome These Potential Barriers?p. 87
5.7 Duplicationp. 88
5.8 Merging Data Resourcesp. 89
5.9 Public Health Datap. 90
5.10 Weather and Crime Datap. 90
5.11 Bibliographyp. 91
6 Operationally Relevant Preprocessingp. 93
6.1 Operationally Relevant Recodingp. 93
6.2 Trinity Sightp. 94
6.3 Duplicationp. 100
6.4 Data Imputationp. 100
6.5 Telephone Datap. 101
6.6 Conference Call Examplep. 103
6.7 Internet Datap. 110
6.8 Operationally Relevant Variable Selectionp. 111
6.9 Bibliographyp. 114
7 Predictive Analyticsp. 117
7.1 How to Select a Modeling Algorithm, Part Ip. 117
7.2 Generalizability versus Accuracyp. 118
7.3 Link Analysisp. 119
7.4 Supervised versus Unsupervised Learning Techniquesp. 119
7.5 Discriminant Analysisp. 121
7.6 Unsupervised Learning Algorithmsp. 122
7.7 Neural Networksp. 123
7.8 Kohonan Network Modelsp. 125
7.9 How to Select a Modeling Algorithm, Part IIp. 125
7.10 Combining Algorithmsp. 126
7.11 Anomaly Detectionp. 127
7.12 Internal Normsp. 127
7.13 Defining "Normal"p. 128
7.14 Deviations from Normal Patternsp. 130
7.15 Deviations from Normal Behaviorp. 130
7.16 Warning! Screening versus Diagnosticp. 132
7.17 A Perfect World Scenariop. 133
7.18 Tools of the Tradep. 135
7.19 General Considerations and Some Expert Optionsp. 137
7.20 Variable Entryp. 138
7.21 Prior Probabilitiesp. 138
7.22 Costsp. 139
7.23 Bibliographyp. 141
8 Public Safety-Specific Evaluationp. 143
8.1 Outcome Measuresp. 144
8.2 Think Bigp. 149
8.3 Training and Test Samplesp. 153
8.4 Evaluating the Modelp. 158
8.5 Updating or Refreshing the Modelp. 161
8.6 Caveat Emptorp. 162
8.7 Bibliographyp. 163
9 Operationally Actionable Outputp. 165
9.1 Actionable Outputp. 165
Applicationsp. 175
10 Normal Crimep. 177
10.1 Knowing Normalp. 178
10.2 "Normal" Criminal Behaviorp. 181
10.3 Get to Know "Normal" Crime Trends and Patternsp. 182
10.4 Staged Crimep. 183
10.5 Bibliographyp. 184
11 Behavioral Analysis of Violent Crimep. 187
11.1 Case-Based Reasoningp. 193
11.2 Homicidep. 196
11.3 Strategic Characterizationp. 199
11.4 Automated Motive Determinationp. 203
11.5 Drug-Related Violencep. 205
11.6 Aggravated Assaultp. 205
11.7 Sexual Assaultp. 206
11.8 Victimologyp. 208
11.9 Moving from Investigation to Preventionp. 211
11.10 Bibliographyp. 211
12 Risk and Threat Assessmentp. 215
12.1 Risk-Based Deploymentp. 217
12.2 Experts versus Expert Systemsp. 218
12.3 "Normal" Crimep. 219
12.4 Surveillance Detectionp. 219
12.5 Strategic Characterizationp. 220
12.6 Vulnerable Locationsp. 222
12.7 Schoolsp. 223
12.8 Datap. 227
12.9 Accuracy versus Generalizabilityp. 228
12.10 "Cost" Analysisp. 229
12.11 Evaluationp. 229
12.12 Outputp. 231
12.13 Novel Approaches to Risk and Threat Assessmentp. 232
12.14 Bibliographyp. 234
Case Examplesp. 237
13 Deploymentp. 239
13.1 Patrol Servicesp. 240
13.2 Structuring Patrol Deploymentp. 240
13.3 Datap. 241
13.4 How Top. 246
13.5 Tactical Deploymentp. 250
13.6 Risk-Based Deployment Overviewp. 251
13.7 Operationally Actionable Outputp. 252
13.8 Risk-Based Deployment Case Studiesp. 259
13.9 Bibliographyp. 265
14 Surveillance Detectionp. 267
14.1 Surveillance Detection and Other Suspicious Situationsp. 267
14.2 Natural Surveillancep. 270
14.3 Location, Location, Locationp. 275
14.4 More Complex Surveillance Detectionp. 282
14.5 Internet Surveillance Detectionp. 289
14.6 How Top. 294
14.7 Summaryp. 296
14.8 Bibliographyp. 297
Advanced Concepts and Future Trendsp. 299
15 Advanced Topicsp. 301
15.1 Intrusion Detectionp. 301
15.2 Identify Theftp. 302
15.3 Syndromic Surveillancep. 303
15.4 Data Collection, Fusion and Preprocessingp. 303
15.5 Text Miningp. 306
15.6 Fraud Detectionp. 308
15.7 Consensus Opinionsp. 310
15.8 Expert Optionsp. 311
15.9 Bibliographyp. 312
16 Future Trendsp. 315
16.1 Text Miningp. 315
16.2 Fusion Centersp. 317
16.3 "Functional" Interoperabilityp. 318
16.4 "Virtual" Warehousesp. 318
16.5 Domain-Specific Toolsp. 319
16.6 Closing Thoughtsp. 319
16.7 Bibliographyp. 321
Indexp. 323
Go to:Top of Page