No Cover Image

Conference Paper/Proceeding/Abstract 736 views 168 downloads

Exploring UK crime networks

Giles Oatley, Tom Crick Orcid Logo

Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Pages: 675 - 678

Swansea University Author: Tom Crick Orcid Logo

DOI (Published version): 10.1109/ASONAM.2014.6921658

Abstract

This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the te...

Full description

Published in: Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
ISBN: 978-1-4799-5877-1
Published: IEEE 2014
Online Access: https://ieeexplore.ieee.org/document/6921658/
URI: https://cronfa.swan.ac.uk/Record/cronfa43389
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2018-08-14T15:01:05Z
last_indexed 2023-01-11T14:20:03Z
id cronfa43389
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-12-18T17:46:22.8469898</datestamp><bib-version>v2</bib-version><id>43389</id><entry>2018-08-14</entry><title>Exploring UK crime networks</title><swanseaauthors><author><sid>200c66ef0fc55391f736f6e926fb4b99</sid><ORCID>0000-0001-5196-9389</ORCID><firstname>Tom</firstname><surname>Crick</surname><name>Tom Crick</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2018-08-14</date><deptcode>EDUC</deptcode><abstract>This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking.</abstract><type>Conference Paper/Proceeding/Abstract</type><journal>Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</journal><volume/><journalNumber/><paginationStart>675</paginationStart><paginationEnd>678</paginationEnd><publisher>IEEE</publisher><placeOfPublication/><isbnPrint/><isbnElectronic>978-1-4799-5877-1</isbnElectronic><issnPrint/><issnElectronic/><keywords/><publishedDay>17</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-08-17</publishedDate><doi>10.1109/ASONAM.2014.6921658</doi><url>https://ieeexplore.ieee.org/document/6921658/</url><notes>2014 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014)</notes><college>COLLEGE NANME</college><department>Education</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>EDUC</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-12-18T17:46:22.8469898</lastEdited><Created>2018-08-14T15:45:04.1499184</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">School of Social Sciences - Education and Childhood Studies</level></path><authors><author><firstname>Giles</firstname><surname>Oatley</surname><order>1</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>2</order></author></authors><documents><document><filename>0043389-11092018010139.pdf</filename><originalFilename>fosint-si2014-short.pdf</originalFilename><uploaded>2018-09-11T01:01:39.7270000</uploaded><type>Output</type><contentLength>4064017</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2018-09-11T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807>
spelling 2022-12-18T17:46:22.8469898 v2 43389 2018-08-14 Exploring UK crime networks 200c66ef0fc55391f736f6e926fb4b99 0000-0001-5196-9389 Tom Crick Tom Crick true false 2018-08-14 EDUC This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking. Conference Paper/Proceeding/Abstract Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 675 678 IEEE 978-1-4799-5877-1 17 8 2014 2014-08-17 10.1109/ASONAM.2014.6921658 https://ieeexplore.ieee.org/document/6921658/ 2014 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014) COLLEGE NANME Education COLLEGE CODE EDUC Swansea University 2022-12-18T17:46:22.8469898 2018-08-14T15:45:04.1499184 Faculty of Humanities and Social Sciences School of Social Sciences - Education and Childhood Studies Giles Oatley 1 Tom Crick 0000-0001-5196-9389 2 0043389-11092018010139.pdf fosint-si2014-short.pdf 2018-09-11T01:01:39.7270000 Output 4064017 application/pdf Accepted Manuscript true 2018-09-11T00:00:00.0000000 true eng
title Exploring UK crime networks
spellingShingle Exploring UK crime networks
Tom Crick
title_short Exploring UK crime networks
title_full Exploring UK crime networks
title_fullStr Exploring UK crime networks
title_full_unstemmed Exploring UK crime networks
title_sort Exploring UK crime networks
author_id_str_mv 200c66ef0fc55391f736f6e926fb4b99
author_id_fullname_str_mv 200c66ef0fc55391f736f6e926fb4b99_***_Tom Crick
author Tom Crick
author2 Giles Oatley
Tom Crick
format Conference Paper/Proceeding/Abstract
container_title Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
container_start_page 675
publishDate 2014
institution Swansea University
isbn 978-1-4799-5877-1
doi_str_mv 10.1109/ASONAM.2014.6921658
publisher IEEE
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str School of Social Sciences - Education and Childhood Studies{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}School of Social Sciences - Education and Childhood Studies
url https://ieeexplore.ieee.org/document/6921658/
document_store_str 1
active_str 0
description This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking.
published_date 2014-08-17T03:54:38Z
_version_ 1763752729565462528
score 11.014067