Cargando…

Data mining and predictive analysis : intelligence gathering and crime analysis /

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crim...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: McCue, Colleen (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Butterworth-Heinemann, 2015.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn896850431
003 OCoLC
005 20231120111913.0
006 m o d
007 cr |||||||||||
008 141104s2015 ne a ob 001 0 eng d
040 |a UKMGB  |b eng  |e rda  |e pn  |c UKMGB  |d OCLCO  |d N$T  |d OPELS  |d YDXCP  |d OCLCF  |d UIU  |d B24X7  |d EBLCP  |d DEBSZ  |d TEFOD  |d OCLCQ  |d ITD  |d OCLCQ  |d MERUC  |d OCLCQ  |d WRM  |d U3W  |d D6H  |d OCLCQ  |d UKMGB  |d OCLCQ  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB4C8034  |2 bnb 
016 7 |a 016941142  |2 Uk 
016 7 |a 016938664  |2 Uk 
019 |a 899941963 
020 |a 9780128004081  |q (electronic bk.) 
020 |a 0128004088  |q (electronic bk.) 
020 |z 9780128002292 
020 |z 0128002298 
035 |a (OCoLC)896850431  |z (OCoLC)899941963 
050 4 |a HV7936.C88 
072 7 |a BUS  |x 032000  |2 bisacsh 
072 7 |a SOC  |x 000000  |2 bisacsh 
082 0 4 |a 363.256  |2 23 
100 1 |a McCue, Colleen,  |e author. 
245 1 0 |a Data mining and predictive analysis :  |b intelligence gathering and crime analysis /  |c Colleen McCue. 
250 |a Second edition. 
264 1 |a Amsterdam :  |b Butterworth-Heinemann,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a CIP data; resource not viewed. 
520 |a Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crime through the appropriate application of data mining and the use of standard computer programs. Data Mining and Predictive Analysis offers a clear, practical starting point for professionals who need to use data mining in homeland security, security analysis, and operational law enforcement settings. This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities. The use of predictive analytics in intelligence and security analysis enables the development of meaningful, information based tactics, strategy, and policy decisions in the operational public safety and security environment. 
505 0 |a Cover; Title Page; Copyright Page; Dedication; Contents; Foreword; Preface; Digital Assets; For the instructor; Introduction; Skill set; How to use this book; Part 1 -- Introductory Section; Chapter 1 -- Basics; 1.1 -- Basic statistics; 1.2 -- Inferential versus Descriptive Statistics and Data Mining; 1.3 -- Population versus Samples; 1.4 -- Modeling; 1.5 -- Errors; 1.5.1 -- Infrequent Events; 1.5.2 -- "Black Swans"; 1.5.3 -- Identifying Appropriate Comparison Groups and Establishing the Denominator; 1.5.4 -- Remember the Baseline; 1.5.5 -- Where Did Your Data Come From? 
505 8 |a 1.5.6 -- Magnified or Obscured Effects1.5.7 -- Outliers; 1.6 -- Overfitting the Model; 1.7 -- Generalizability versus Accuracy; 1.8 -- Input/Output; Chapter 2 -- Domain Expertise; 2.1 -- Domain expertise; 2.2 -- Domain Expertise for Analysts; 2.3 -- The Integrated Model; Chapter 3 -- Data Mining and Predictive Analytics; 3.1 -- Discovery and Prediction; 3.2 -- Confirmation and discovery; 3.3 -- Surprise; 3.4 -- Characterization; 3.5 -- "Volume Challenge"16; 3.6 -- Exploratory Graphics and Data Exploration; 3.7 -- Link Analysis21; 3.8 -- Non-Obvious Relationship Analysis (NORA)24; 3.9 -- Text Mining. 
505 8 |a 3.10 -- Closing ThoughtsPart 2 -- Methods; Chapter 4 -- Process Models for Data Mining and Predictive Analysis; 4.1 -- CIA Intelligence Process7; 4.1.1 -- Requirements; 4.1.2 -- Collection; 4.1.3 -- Processing and Exploitation; 4.1.4 -- Analysis and Production; 4.1.5 -- Dissemination; 4.1.6 -- Feedback; 4.1.7 -- Summary; 4.2 -- Cross-industry Standard Process for Data Mining; 4.2.1 -- Business Understanding; 4.2.2 -- Data Understanding; 4.2.3 -- Data Preparation; 4.2.4 -- Modeling; 4.2.5 -- Evaluation; 4.2.6 -- Deployment; 4.7.1 -- Summary. 
505 8 |a 4.8 -- Actionable Mining and Predictive Analysis for Public Safety and Security4.8.1 -- Question or Challenge; 4.8.2 -- Data Collection and Fusion; 4.8.3 -- Operationally Relevant Preprocessing; 4.8.3.1 -- Recoding; 4.8.3.2 -- Variable Selection; 4.8.3.3 -- Operational Value; 4.8.3.4 -- Availability and Timeliness; 4.8.4 -- Identification, Characterization, and Modeling; 4.8.5 -- Public Safety and Security-Specific Evaluation; 4.8.6 -- Operationally Actionable Output; 4.8.7 -- Additional Considerations; 4.8.7.1 -- Privacy; 4.8.7.2 -- Security; 4.8.7.3 -- Other Hazards; 4.8.8 -- Summary; Chapter 5 -- Data. 
505 8 |a 5.1 -- Getting started5.2 -- Types of data; 5.3 -- Data5; 5.3.1 -- Big Data; 5.3.1.1 -- Volume; 5.3.1.2 -- Velocity; 5.3.1.3 -- Variety; 5.4 -- Types of Data Resources; 5.4.1 -- Data Sources; 5.4.1.1 -- Records Management Systems; 5.4.1.2 -- Calls for Service; 5.4.2 -- Relational Data; 5.4.3 -- Revisiting the INTs; 5.4.4 -- Geoint19; 5.4.4.1 -- Physical Geography; 5.4.4.2 -- Human Geography; 5.4.5 -- Ad Hoc, Self-Generated, and Other Specialized Databases22; 5.4.6 -- Nontraditional Sources (e.g., Weather); 5.5 -- Data Challenges; 5.5.1 -- Reliability and Validity; 5.5.2 -- Data Entry Errors. 
505 8 |a 5.5.3 -- Misrepresentation, Fabrication, and Poor Recall. 
650 0 |a Crime analysis. 
650 0 |a Data mining. 
650 0 |a Law enforcement  |x Data processing. 
650 0 |a Criminal behavior, Prediction of. 
650 2 |a Data Mining  |0 (DNLM)D057225 
650 6 |a Criminalit�e  |x Analyse.  |0 (CaQQLa)201-0152459 
650 6 |a Exploration de donn�ees (Informatique)  |0 (CaQQLa)201-0300292 
650 6 |a Lois  |0 (CaQQLa)201-0043569  |x Application  |0 (CaQQLa)201-0043569  |x Informatique.  |0 (CaQQLa)201-0380011 
650 7 |a BUSINESS & ECONOMICS  |x Infrastructure.  |2 bisacsh 
650 7 |a SOCIAL SCIENCE  |x General.  |2 bisacsh 
650 7 |a Crime analysis  |2 fast  |0 (OCoLC)fst00883022 
650 7 |a Criminal behavior, Prediction of  |2 fast  |0 (OCoLC)fst00883179 
650 7 |a Data mining  |2 fast  |0 (OCoLC)fst00887946 
650 7 |a Law enforcement  |x Data processing  |2 fast  |0 (OCoLC)fst00993947 
776 0 8 |i Print version:  |a McCue, Colleen.  |t Data Mining and Predictive Analysis : Intelligence Gathering and Crime Analysis.  |d Burlington : Elsevier Science, �2015  |z 9780128002292 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128002292  |z Texto completo