This paper describes an approach for detecting the presence or emergence of organised crime (OC) signals on social media. It shows how words and phrases, used by members of the public in social m...
https://security-informatics.springeropen.com/articles/10.1186/s13388-018-0032-8
Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is ...
https://security-informatics.springeropen.com/articles/10.1186/s13388-018-0031-9
This paper describes the use of machine learning techniques to implement a Bayesian approach to modelling the dependency between offence data and environmental factors such as demographic charact...
https://security-informatics.springeropen.com/articles/10.1186/s13388-018-0030-x
Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual dat...
https://security-informatics.springeropen.com/articles/10.1186/s13388-017-0029-8
Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, t...
https://security-informatics.springeropen.com/articles/10.1186/s13388-016-0028-1