Conference Paper/Proceeding/Abstract 1124 views 316 downloads
Exploring UK crime networks
Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Pages: 675 - 678
Swansea University Author:
Tom Crick
-
PDF | Accepted Manuscript
Download (3.91MB)
DOI (Published version): 10.1109/ASONAM.2014.6921658
Abstract
This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the te...
| Published in: | Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining |
|---|---|
| ISBN: | 978-1-4799-5877-1 |
| Published: |
IEEE
2014
|
| Online Access: |
https://ieeexplore.ieee.org/document/6921658/ |
| URI: | https://cronfa.swan.ac.uk/Record/cronfa43389 |
| first_indexed |
2018-08-14T15:01:05Z |
|---|---|
| last_indexed |
2023-01-11T14:20:03Z |
| id |
cronfa43389 |
| recordtype |
SURis |
| fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2022-12-18T17:46:22.8469898</datestamp><bib-version>v2</bib-version><id>43389</id><entry>2018-08-14</entry><title>Exploring UK crime networks</title><swanseaauthors><author><sid>200c66ef0fc55391f736f6e926fb4b99</sid><ORCID>0000-0001-5196-9389</ORCID><firstname>Tom</firstname><surname>Crick</surname><name>Tom Crick</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2018-08-14</date><deptcode>SOSS</deptcode><abstract>This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking.</abstract><type>Conference Paper/Proceeding/Abstract</type><journal>Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</journal><volume/><journalNumber/><paginationStart>675</paginationStart><paginationEnd>678</paginationEnd><publisher>IEEE</publisher><placeOfPublication/><isbnPrint/><isbnElectronic>978-1-4799-5877-1</isbnElectronic><issnPrint/><issnElectronic/><keywords/><publishedDay>17</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-08-17</publishedDate><doi>10.1109/ASONAM.2014.6921658</doi><url>https://ieeexplore.ieee.org/document/6921658/</url><notes>2014 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014)</notes><college>COLLEGE NANME</college><department>Social Sciences School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SOSS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-12-18T17:46:22.8469898</lastEdited><Created>2018-08-14T15:45:04.1499184</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">School of Social Sciences - Education and Childhood Studies</level></path><authors><author><firstname>Giles</firstname><surname>Oatley</surname><order>1</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>2</order></author></authors><documents><document><filename>0043389-11092018010139.pdf</filename><originalFilename>fosint-si2014-short.pdf</originalFilename><uploaded>2018-09-11T01:01:39.7270000</uploaded><type>Output</type><contentLength>4064017</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2018-09-11T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
| spelling |
2022-12-18T17:46:22.8469898 v2 43389 2018-08-14 Exploring UK crime networks 200c66ef0fc55391f736f6e926fb4b99 0000-0001-5196-9389 Tom Crick Tom Crick true false 2018-08-14 SOSS This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking. Conference Paper/Proceeding/Abstract Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 675 678 IEEE 978-1-4799-5877-1 17 8 2014 2014-08-17 10.1109/ASONAM.2014.6921658 https://ieeexplore.ieee.org/document/6921658/ 2014 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014) COLLEGE NANME Social Sciences School COLLEGE CODE SOSS Swansea University 2022-12-18T17:46:22.8469898 2018-08-14T15:45:04.1499184 Faculty of Humanities and Social Sciences School of Social Sciences - Education and Childhood Studies Giles Oatley 1 Tom Crick 0000-0001-5196-9389 2 0043389-11092018010139.pdf fosint-si2014-short.pdf 2018-09-11T01:01:39.7270000 Output 4064017 application/pdf Accepted Manuscript true 2018-09-11T00:00:00.0000000 true eng |
| title |
Exploring UK crime networks |
| spellingShingle |
Exploring UK crime networks Tom Crick |
| title_short |
Exploring UK crime networks |
| title_full |
Exploring UK crime networks |
| title_fullStr |
Exploring UK crime networks |
| title_full_unstemmed |
Exploring UK crime networks |
| title_sort |
Exploring UK crime networks |
| author_id_str_mv |
200c66ef0fc55391f736f6e926fb4b99 |
| author_id_fullname_str_mv |
200c66ef0fc55391f736f6e926fb4b99_***_Tom Crick |
| author |
Tom Crick |
| author2 |
Giles Oatley Tom Crick |
| format |
Conference Paper/Proceeding/Abstract |
| container_title |
Proceedings of 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining |
| container_start_page |
675 |
| publishDate |
2014 |
| institution |
Swansea University |
| isbn |
978-1-4799-5877-1 |
| doi_str_mv |
10.1109/ASONAM.2014.6921658 |
| publisher |
IEEE |
| college_str |
Faculty of Humanities and Social Sciences |
| hierarchytype |
|
| hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
| hierarchy_top_title |
Faculty of Humanities and Social Sciences |
| hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
| hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
| department_str |
School of Social Sciences - Education and Childhood Studies{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}School of Social Sciences - Education and Childhood Studies |
| url |
https://ieeexplore.ieee.org/document/6921658/ |
| document_store_str |
1 |
| active_str |
0 |
| description |
This paper describes our experiences with three different crime networks in the UK: burglary, 'gun' gangs and retail theft. We present an introduction into each of these problems, and highlight some of the issues related to over-simplification of the network analysis. We also review the term `third-generation' analysis, and provide some insights into achieving this, but also conclude that it can be an extremely computationally expensive undertaking. |
| published_date |
2014-08-17T05:48:26Z |
| _version_ |
1851280333986594816 |
| score |
11.090362 |

