Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.
Social Networks with Rich Edge Semantics introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the book shows how to model the social network using spectral embedding. It also shows how to compose the techniques so that multiple edge semantics can be modeled together, and the modeling techniques are then applied to a range of datasets. Features Introduces the reader to difficulties with current social network analysis, and the need for richer representations of relationships among nodes, including accounting for intensity, direction, type, positive/negative, and changing intensities over time Presents a novel mechanism to allow social networks with qualitatively different kinds of relationships to be described and analyzed Includes extensions to the important technique of spectral embedding, shows that they are mathematically well motivated and proves that their results are appropriate Shows how to exploit embeddings to understand structures within social networks, including subgroups, positional significance, link or edge prediction, consistency of role in different contexts, and net flow of properties through a node Illustrates the use of the approach for real-world problems for online social networks, criminal and drug smuggling networks, and networks where the nodes are themselves groups Suitable for researchers and students in social network research, data science, statistical learning, and related areas, this book will help to provide a deeper understanding of real-world social networks.
Making obscure knowledge about matrix decompositions widely available, Understanding Complex Datasets: Data Mining with Matrix Decompositions discusses the most common matrix decompositions and shows how they can be used to analyze large datasets in a broad range of application areas. Without having to understand every mathematical detail, the book helps you determine which matrix is appropriate for your dataset and what the results mean. Explaining the effectiveness of matrices as data analysis tools, the book illustrates the ability of matrix decompositions to provide more powerful analyses and to produce cleaner data than more mainstream techniques. The author explores the deep connections between matrix decompositions and structures within graphs, relating the PageRank algorithm of Google's search engine to singular value decomposition. He also covers dimensionality reduction, collaborative filtering, clustering, and spectral analysis. With numerous figures and examples, the book shows how matrix decompositions can be used to find documents on the Internet, look for deeply buried mineral deposits without drilling, explore the structure of proteins, detect suspicious emails or cell phone calls, and more. Concentrating on data mining mechanics and applications, this resource helps you model large, complex datasets and investigate connections between standard data mining techniques and matrix decompositions.
Social Networks with Rich Edge Semantics introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the book shows how to model the social network using spectral embedding. It also shows how to compose the techniques so that multiple edge semantics can be modeled together, and the modeling techniques are then applied to a range of datasets. Features Introduces the reader to difficulties with current social network analysis, and the need for richer representations of relationships among nodes, including accounting for intensity, direction, type, positive/negative, and changing intensities over time Presents a novel mechanism to allow social networks with qualitatively different kinds of relationships to be described and analyzed Includes extensions to the important technique of spectral embedding, shows that they are mathematically well motivated and proves that their results are appropriate Shows how to exploit embeddings to understand structures within social networks, including subgroups, positional significance, link or edge prediction, consistency of role in different contexts, and net flow of properties through a node Illustrates the use of the approach for real-world problems for online social networks, criminal and drug smuggling networks, and networks where the nodes are themselves groups Suitable for researchers and students in social network research, data science, statistical learning, and related areas, this book will help to provide a deeper understanding of real-world social networks.
Most of the research aimed at counterterrorism, fraud detection, or other forensic applications assumes that this is a specialized application domain for mainstream knowledge discovery. Unfortunately, knowledge discovery changes completely when the datasets being used have been manipulated in order to conceal some underlying activity. Knowledge Discovery for Counterterrorism and Law Enforcement operates from the premise that detection algorithms must be rethought to be effective in this domain, and presents a new approach based on cutting-edge analysis for use in adversarial settings. Reveals How Criminals Conceal Information This volume focuses on four main forms of knowledge discovery: prediction, clustering, relationship discovery, and textual analysis. For each of these application areas, the author discusses opportunities for concealment that are available to criminals and reveals some of the tactics that can aid in detecting them. He reviews what is known about the different technologies for each area and evaluates their effectiveness. The book also supplies a preview of technologies currently under development and describes how they will fit in to existing approaches to knowledge discovery. Provides Proactive Formulas for Staying One Step Ahead of Adversaries While all knowledge-discovery systems are susceptible to manipulation, designers and users of algorithmic systems who are armed with the knowledge of these subversive tactics are better able to create systems to avoid these vulnerabilities. This book delineates an effective process for integrating knowledge-discovery tools, provides a unique understanding of the limits of the technology, and contains a clear presentation of the upsides and pitfalls of data collection. It is a powerful weapon in the arsenal of anyone confronting the increasingly sophisticated tactics employed by lawbreakers and other unsavory individuals.
|
You may like...
Dynamic Games in Economics
Josef Haunschmied, Vladimir M. Veliov, …
Hardcover
The Future of Economic Design - The…
Jean-Francois Laslier, Herve Moulin, …
Hardcover
R4,405
Discovery Miles 44 050
Advances in Dynamic and Evolutionary…
Frank Thuijsman, Florian Wagener
Hardcover
R4,154
Discovery Miles 41 540
Modelling and Simulation in Management…
Ioan Constantin Dima, Mariana Man
Hardcover
The Pre-Kernel as a Tractable Solution…
Holger Ingmar Meinhardt
Hardcover
Equilibrium Theory for Cournot…
Pierre von Mouche, Federico Quartieri
Hardcover
Economic Dynamics of All Members of the…
Ethelbert Nwakuche Chukwu
Hardcover
R3,353
Discovery Miles 33 530
Inequality and Finance in Macrodynamics
Bettina Boekemeier, Alfred Greiner
Hardcover
R4,419
Discovery Miles 44 190
The History and Allure of Interactive…
Mark Kretzschmar, Sara Raffel
Hardcover
R3,044
Discovery Miles 30 440
Theory and Applications of Dynamic Games…
Elena Parilina, Puduru Viswanadha Reddy, …
Hardcover
R1,854
Discovery Miles 18 540
|