top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied research on policing for police : the case of Cyprus / / Angelo G. Constantinou
Applied research on policing for police : the case of Cyprus / / Angelo G. Constantinou
Autore Constantinou Angelo G.
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (131 pages)
Disciplina 363.20285
Collana SpringerBriefs in Criminology
Soggetto topico Law enforcement - Data processing
ISBN 3-030-76377-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Acknowledgments -- Contents -- About the Author -- Chapter 1: Introduction -- Chapter 2: ACAB "All Cops Are Beautiful" -- 2.1 Introduction -- 2.2 Procedure -- 2.3 Reasoning Derogatory Engagements -- 2.4 Dealing with Derogatory Engagements -- 2.5 Conclusion -- References -- Chapter 3: Echoes of Police Culture -- 3.1 Introduction -- 3.2 Police Culture -- 3.2.1 The Other Side of the Fence -- 3.2.2 Gendered Policing -- 3.3 Local Context -- 3.4 Methodology -- 3.5 Results and Explanation -- 3.5.1 Statistical Outcome -- 3.5.2 Further Description -- 3.6 Contextualization of Findings -- 3.7 Closing Remarks -- References -- Chapter 4: Coping with Police Corruption: A Cautionary Tale -- 4.1 Introduction -- 4.2 Police Corruption -- 4.2.1 Delineation -- 4.2.2 Explanation -- 4.2.3 Expression -- 4.3 Method -- 4.4 Outcomes -- 4.5 Coping Strategies -- 4.6 Concluding Remarks -- References -- Chapter 5: Discretion in Police Stops and Searches -- 5.1 Introduction -- 5.2 Discretion in Stop and Search -- 5.3 Method -- 5.4 Emergency Response Unit -- 5.5 The Legal Substance of Discretion -- 5.6 The Role of Suspicion -- 5.7 The Matrix of Discretion in Police Stop-and-Search Undertakings -- 5.7.1 Individual Factors -- 5.7.2 Organizational Factors -- 5.7.3 Situational Factors -- 5.7.4 Environmental Factors -- 5.8 Conclusion -- References -- Chapter 6: Police Crowd Control Operations and the Concealment of Police Identities -- 6.1 Introduction -- 6.2 Police and Crowd Control -- 6.3 Local Approaches to Crowd Control -- 6.4 The Triangle of Police Legitimacy, Scrutiny, and Occupational Culture -- 6.5 Methodology -- 6.6 Findings -- 6.6.1 Close-Ended Responses of Senior Police Officers -- 6.6.2 Open-Ended Responses of Senior Police Officers -- 6.6.3 Close-Ended Responses of Novice Police Officers -- 6.7 Discussion -- 6.8 Conclusion -- References.
Chapter 7: Rape Myths and Police Attitudes -- 7.1 Introduction -- 7.2 A Brief Note on the Myths of Rape -- 7.3 Police and Rape Myths -- 7.4 Methods -- 7.5 Findings -- 7.5.1 Distribution of Responses -- 7.6 Discussion -- 7.7 Conclusion -- References -- Chapter 8: What Do the Police Really Do? -- 8.1 Introduction -- 8.2 Method -- 8.3 The Police Role -- 8.4 The Cypriot Reality -- 8.5 Concluding Remarks -- References -- Chapter 9: The Bitter End of Politicized Promotions -- 9.1 Introduction -- 9.2 Current Situation -- 9.3 Procedure -- 9.4 Outcomes -- 9.4.1 Criteria That Matter the Most/Least for Promotion Purposes -- 9.4.2 (Di)satisfaction with the Current System of Promotions -- 9.4.3 Negative Consequences -- 9.4.4 Positive Development -- 9.4.5 Problematizing the Findings -- 9.5 Conclusion -- References -- Chapter 10: Conclusion -- Index.
Record Nr. UNINA-9910495159403321
Constantinou Angelo G.  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Autore McCue Colleen
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica XXVII, 393 p.; ; 24 cm
Disciplina 363.25/6
Soggetto topico Crime analysis
Data mining
Law enforcement - Data processing
Criminal behavior, Prediction of
Soggetto genere / forma Electronic books.
ISBN 1-280-63650-5
9786610636501
0-08-046462-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910457313803321
McCue Colleen  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Autore McCue Colleen
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica XXVII, 393 p.; ; 24 cm
Disciplina 363.25/6
Soggetto topico Crime analysis
Data mining
Law enforcement - Data processing
Criminal behavior, Prediction of
ISBN 1-280-63650-5
9786610636501
0-08-046462-9
Classificazione 54.64
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910784361803321
McCue Colleen  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Autore McCue Colleen
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica XXVII, 393 p.; ; 24 cm
Disciplina 363.25/6
Soggetto topico Crime analysis
Data mining
Law enforcement - Data processing
Criminal behavior, Prediction of
ISBN 1-280-63650-5
9786610636501
0-08-046462-9
Classificazione 54.64
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover -- Title page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Introduction -- How To Use This Book -- Bibliography -- Introductory Section -- 1 Basics -- 1.1 Basic Statistics -- 1.2 Inferential versus Descriptive Statistics and Data Mining -- 1.3 Population versus Samples -- 1.4 Modeling -- 1.5 Errors -- 1.6 Overfitting the Model -- 1.7 Generalizability versus Accuracy -- 1.8 Input/Output -- 1.9 Bibliography -- 2 Domain Expertise -- 2.1 Domain Expertise -- 2.2 Domain Expertise for Analysts -- 2.3 Compromise -- 2.4 Analyze Your Own Data -- 2.5 Bibliography -- 3 Data Mining -- 3.1 Discovery and Prediction -- 3.2 Confirmation and Discovery -- 3.3 Surprise -- 3.4 Characterization -- 3.5 "Volume Challenge" -- 3.6 Exploratory Graphics and Data Exploration -- 3.7 Link Analysis -- 3.8 Nonobvious Relationship Analysis (NORA) -- 3.9 Text Mining -- 3.10 Future Trends -- 3.11 Bibliography -- Methods -- 4 Process Models for Data Mining and Analysis -- 4.1 CIA Intelligence Process -- 4.2 CRISP-DM -- 4.3 Actionable Mining and Predictive Analysis for Public Safety and Security -- 4.4 Bibliography -- 5 Data -- 5.1 Getting Started -- 5.2 Types of Data -- 5.3 Data -- 5.4 Types of Data Resources -- 5.5 Data Challenges -- 5.6 How Do We Overcome These Potential Barriers? -- 5.7 Duplication -- 5.8 Merging Data Resources -- 5.9 Public Health Data -- 5.10 Weather and Crime Data -- 5.11 Bibliography -- 6 Operationally Relevant Preprocessing -- 6.1 Operationally Relevant Recoding -- 6.2 Trinity Sight -- 6.3 Duplication -- 6.4 Data Imputation -- 6.5 Telephone Data -- 6.6 Conference Call Example -- 6.7 Internet Data -- 6.8 Operationally Relevant Variable Selection -- 6.9 Bibliography -- 7 Predictive Analytics -- 7.1 How to Select a Modeling Algorithm, Part I -- 7.2 Generalizability versus Accuracy -- 7.3 Link Analysis.
7.4 Supervised versus Unsupervised Learning Techniques -- 7.5 Discriminant Analysis -- 7.6 Unsupervised Learning Algorithms -- 7.7 Neural Networks -- 7.8 Kohonan Network Models -- 7.9 How to Select a Modeling Algorithm, Part II -- 7.10 Combining Algorithms -- 7.11 Anomaly Detection -- 7.12 Internal Norms -- 7.13 Defining "Normal" -- 7.14 Deviations from Normal Patterns -- 7.15 Deviations from Normal Behavior -- 7.16 Warning! Screening versus Diagnostic -- 7.17 A Perfect World Scenario -- 7.18 Tools of the Trade -- 7.19 General Considerations and Some Expert Options -- 7.20 Variable Entry -- 7.21 Prior Probabilities -- 7.22 Costs -- 7.23 Bibliography -- 8 Public Safety-Specific Evaluation -- 8.1 Outcome Measures -- 8.2 Think Big -- 8.3 Training and Test Samples -- 8.4 Evaluating the Model -- 8.5 Updating or Refreshing the Model -- 8.6 Caveat Emptor -- 8.7 Bibliography -- 9 Operationally Actionable Output -- 9.1 Actionable Output -- Applications -- 10 Normal Crime -- 10.1 Knowing Normal -- 10.2 "Normal" Criminal Behavior -- 10.3 Get to Know "Normal" Crime Trends and Patterns -- 10.4 Staged Crime -- 10.5 Bibliography -- 11 Behavioral Analysis of Violent Crime -- 11.1 Case-Based Reasoning -- 11.2 Homicide -- 11.3 Strategic Characterization -- 11.4 Automated Motive Determination -- 11.5 Drug-Related Violence -- 11.6 Aggravated Assault -- 11.7 Sexual Assault -- 11.8 Victimology -- 11.9 Moving from Investigation to Prevention -- 11.10 Bibliography -- 12 Risk and Threat Assessment -- 12.1 Risk-Based Deployment -- 12.2 Experts versus Expert Systems -- 12.3 "Normal" Crime -- 12.4 Surveillance Detection -- 12.5 Strategic Characterization -- 12.6 Vulnerable Locations -- 12.7 Schools -- 12.8 Data -- 12.9 Accuracy versus Generalizability -- 12.10 "Cost" Analysis -- 12.11 Evaluation -- 12.12 Output -- 12.13 Novel Approaches to Risk and Threat Assessment.
12.14 Bibliography -- Case Examples -- 13 Deployment -- 13.1 Patrol Services -- 13.2 Structuring Patrol Deployment -- 13.3 Data -- 13.4 How To -- 13.5 Tactical Deployment -- 13.6 Risk-Based Deployment Overview -- 13.7 Operationally Actionable Output -- 13.8 Risk-Based Deployment Case Studies -- 13.9 Bibliography -- 14 Surveillance Detection -- 14.1 Surveillance Detection and Other Suspicious Situations -- 14.2 Natural Surveillance -- 14.3 Location, Location, Location -- 14.4 More Complex Surveillance Detection -- 14.5 Internet Surveillance Detection -- 14.6 How To -- 14.7 Summary -- 14.8 Bibliography -- Advanced Concepts and Future Trends -- 15 Advanced Topics -- 15.1 Intrusion Detection -- 15.2 Identify Theft -- 15.3 Syndromic Surveillance -- 15.4 Data Collection, Fusion and Preprocessing -- 15.5 Text Mining -- 15.6 Fraud Detection -- 15.7 Consensus Opinions -- 15.8 Expert Options -- 15.9 Bibliography -- 16 Future Trends -- 16.1 Text Mining -- 16.2 Fusion Centers -- 16.3 "Functional" Interoperability -- 16.4 "Virtual" Warehouses -- 16.5 Domain-Specific Tools -- 16.6 Closing Thoughts -- 16.7 Bibliography -- Index.
Record Nr. UNINA-9910825031203321
McCue Colleen  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internal investigations for law enforcement / / Rainer Kroll
Internal investigations for law enforcement / / Rainer Kroll
Autore Kroll Rainer
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (72 pages)
Disciplina 363.2
Collana SpringerBriefs in Criminology
Soggetto topico Law enforcement
Law enforcement - Data processing
ISBN 9783031215278
9783031215261
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Introduction -- Reference -- Internal Investigations Context -- References -- Politics Behind Internal Investigations -- References -- Supervisor's Role in Internal Investigations -- Problems with Internal Investigations -- Supervisory Challenges in Conducting Internal Investigations -- Good and Bad Investigations -- References -- Investigative Perspective -- Organizational, Cultural Behavior -- Underlying Theory of Police Misconduct/Corruption -- References -- A Continuum of Incident Classifications -- Types of Allegations -- Initial Investigations -- Case Assessment and Classification -- Typical Investigations and Suggested Investigative Steps-Introduction -- Common Investigative Steps -- Proactive Measures -- Administering an Integrity Test -- References -- Interviewing the Subject -- References -- Occupational Crimes Specific to the Role of Police Officers-Introduction -- Missing Property Allegations -- Fraud -- Association with Criminals -- Planting/Padding Evidence (Flaking) Allegations -- Narcotics Allegations -- Drug Use Allegations -- Drug Screening Failure -- Police Officer-Involved DWI Arrests -- Domestic Incidents Involving Police Officers -- Force Incidents -- False Statements/Perjury -- Quota Allegation -- Processing an Arrested Officer -- Changing an Officer's Duty Status -- Monitoring Court Proceedings -- Case Closing Reports -- Investigative Dispositions -- Completing Investigations. -- References -- Lessons Learned -- Proper Mindset -- Case Investigations -- Interviews -- Evidence -- Reliance on Others -- Timelines -- Dealing with Subjects -- Noncompliant Complainants -- Consequences of an Internal Investigation -- Concluding Remarks -- Types of Cases Chart -- References -- Additional Resources -- Index.
Record Nr. UNINA-9910635390903321
Kroll Rainer  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui