Investigative Data Mining for Security and Criminal Detection
Chapter 1: Precrime Data Mining
- Table 1.1: Illustrative Examples of the Modus Operandi Free-Text Field.
Chapter 2: Investigative Data Warehousing
- Table 2.1: Acxiom Infobase Basic Data Profile
- Table 2.2: Partial List of Type of Information or Companies Provided by Acxiom
- Table 2.3: Type of Information Provided by Data Quick
- Table 2.4: Criminalfiles.info available jurisdictions.
- Table 2.5: Anatomy of a Cookie
Chapter 5: Text Mining: Clustering Concepts
- Table 5.1: LIWC 2001 Dimensions and Sample Words
Chapter 6: Neural Networks: Classifying Patterns
- Table 6.1: Model with Three Inputs, a Set of Formula Weights, and One Output
- Table 6.2: Classification of Burglary Offense
- Table 6.3: Modus Operandi Text
Chapter 8: NetFraud: A Case Study
- Table 8.1: On-Line Auction Fraud Statistics
- Table 8.2: Top Three Payment Methods
- Table 8.3: Fraud Statistics Reported by fraud.org
- Table 8.4: Transactional Data Variables
Chapter 9: Criminal Patterns: Detection Techniques
- Table 9.1: Methods of Insurance Fraud Detection
Chapter 12: Mapping Crime: Clustering Case Work
- Table 12.1: Classification of Sexual Crimes
- Table 12.2: Number of Crimes Attributed to Known Offenders
- Table 12.3: Data Encoding Examples (3 Yes and 3 No)
- Table 12.4: Cluster Comparison
Категории