No Cover Image

Conference contribution 56 views 15 downloads

Exploring UK crime networks / Giles Oatley; Tom Crick

Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Pages: 675 - 678

Swansea University Author: Crick, Tom

DOI (Published version): 10.1109/ASONAM.2014.6921658

Abstract

This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the te...

Full description

Published in: Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
ISBN: 978-1-4799-5877-1
Published: IEEE 2014
Online Access: https://ieeexplore.ieee.org/document/6921658/
URI: https://cronfa.swan.ac.uk/Record/cronfa43389
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2018-08-14T15:01:05Z
last_indexed 2018-10-15T19:17:23Z
id cronfa43389
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2018-10-15T14:52:55Z</datestamp><bib-version>v2</bib-version><id>43389</id><entry>2018-08-14</entry><title>Exploring UK crime networks</title><alternativeTitle></alternativeTitle><author>Tom Crick</author><firstname>Tom</firstname><surname>Crick</surname><active>true</active><ORCID>0000-0001-5196-9389</ORCID><ethesisStudent>false</ethesisStudent><sid>200c66ef0fc55391f736f6e926fb4b99</sid><email>9971fd6d74987b78a0d7fce128f8c721</email><emailaddr>z93Ri4T5hwMLTfh+6XG11n2HZhUyFASdV1DFdgIIhKs=</emailaddr><date>2018-08-14</date><deptcode>EDUC</deptcode><abstract>This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking.</abstract><type>Conference contribution</type><journal>Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</journal><volume/><journalNumber/><paginationStart>675</paginationStart><paginationEnd>678</paginationEnd><publisher>IEEE</publisher><placeOfPublication/><isbnPrint/><isbnElectronic>978-1-4799-5877-1</isbnElectronic><issnPrint/><issnElectronic/><keywords></keywords><publishedDay>17</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-08-17</publishedDate><doi>10.1109/ASONAM.2014.6921658</doi><url>https://ieeexplore.ieee.org/document/6921658/</url><notes>2014 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014)</notes><college>College of Arts and Humanities</college><department>School of Education</department><CollegeCode>CAAH</CollegeCode><DepartmentCode>EDUC</DepartmentCode><institution/><researchGroup>None</researchGroup><supervisor/><sponsorsfunders/><grantnumber/><degreelevel/><degreename></degreename><lastEdited>2018-10-15T14:52:55Z</lastEdited><Created>2018-08-14T15:45:04Z</Created><path><level id="1">College of Science</level><level id="2">Computer Science</level></path><authors><author><firstname>Giles</firstname><surname>Oatley</surname><orcid/><order>1</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>2</order></author></authors><documents><document><filename>0043389-11092018010139.pdf</filename><originalFilename>fosint-si2014-short.pdf</originalFilename><uploaded>2018-09-11T01:01:39Z</uploaded><type>Output</type><contentLength>4064017</contentLength><contentType>application/pdf</contentType><version>AM</version><cronfaStatus>true</cronfaStatus><action>Updated Copyright</action><actionDate>15/10/2018</actionDate><embargoDate>2018-09-11T00:00:00</embargoDate><documentNotes/><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents></rfc1807>
spelling 2018-10-15T14:52:55Z v2 43389 2018-08-14 Exploring UK crime networks Tom Crick Tom Crick true 0000-0001-5196-9389 false 200c66ef0fc55391f736f6e926fb4b99 9971fd6d74987b78a0d7fce128f8c721 z93Ri4T5hwMLTfh+6XG11n2HZhUyFASdV1DFdgIIhKs= 2018-08-14 EDUC This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking. Conference contribution Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 675 678 IEEE 978-1-4799-5877-1 17 8 2014 2014-08-17 10.1109/ASONAM.2014.6921658 https://ieeexplore.ieee.org/document/6921658/ 2014 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014) College of Arts and Humanities School of Education CAAH EDUC None 2018-10-15T14:52:55Z 2018-08-14T15:45:04Z College of Science Computer Science Giles Oatley 1 Tom Crick 0000-0001-5196-9389 2 0043389-11092018010139.pdf fosint-si2014-short.pdf 2018-09-11T01:01:39Z Output 4064017 application/pdf AM true Updated Copyright 15/10/2018 2018-09-11T00:00:00 true eng
title Exploring UK crime networks
spellingShingle Exploring UK crime networks
Crick, Tom
title_short Exploring UK crime networks
title_full Exploring UK crime networks
title_fullStr Exploring UK crime networks
title_full_unstemmed Exploring UK crime networks
title_sort Exploring UK crime networks
author_id_str_mv 200c66ef0fc55391f736f6e926fb4b99
author_id_fullname_str_mv 200c66ef0fc55391f736f6e926fb4b99_***_Crick, Tom
author Crick, Tom
author2 Giles Oatley
Tom Crick
format Conference contribution
container_title Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
container_start_page 675
publishDate 2014
institution Swansea University
isbn 978-1-4799-5877-1
doi_str_mv 10.1109/ASONAM.2014.6921658
publisher IEEE
college_str College of Science
hierarchytype
hierarchy_top_id collegeofscience
hierarchy_top_title College of Science
hierarchy_parent_id collegeofscience
hierarchy_parent_title College of Science
department_str Computer Science{{{_:::_}}}College of Science{{{_:::_}}}Computer Science
url https://ieeexplore.ieee.org/document/6921658/
document_store_str 1
active_str 1
description This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking.
published_date 2014-08-17T06:09:18Z
_version_ 1642723655166197760
score 10.837401