|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn896850431 |
003 |
OCoLC |
005 |
20231120111913.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
141104s2015 ne a ob 001 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e rda
|e pn
|c UKMGB
|d OCLCO
|d N$T
|d OPELS
|d YDXCP
|d OCLCF
|d UIU
|d B24X7
|d EBLCP
|d DEBSZ
|d TEFOD
|d OCLCQ
|d ITD
|d OCLCQ
|d MERUC
|d OCLCQ
|d WRM
|d U3W
|d D6H
|d OCLCQ
|d UKMGB
|d OCLCQ
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB4C8034
|2 bnb
|
016 |
7 |
|
|a 016941142
|2 Uk
|
016 |
7 |
|
|a 016938664
|2 Uk
|
019 |
|
|
|a 899941963
|
020 |
|
|
|a 9780128004081
|q (electronic bk.)
|
020 |
|
|
|a 0128004088
|q (electronic bk.)
|
020 |
|
|
|z 9780128002292
|
020 |
|
|
|z 0128002298
|
035 |
|
|
|a (OCoLC)896850431
|z (OCoLC)899941963
|
050 |
|
4 |
|a HV7936.C88
|
072 |
|
7 |
|a BUS
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.256
|2 23
|
100 |
1 |
|
|a McCue, Colleen,
|e author.
|
245 |
1 |
0 |
|a Data mining and predictive analysis :
|b intelligence gathering and crime analysis /
|c Colleen McCue.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Amsterdam :
|b Butterworth-Heinemann,
|c 2015.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
336 |
|
|
|a still image
|b sti
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a CIP data; resource not viewed.
|
520 |
|
|
|a Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crime through the appropriate application of data mining and the use of standard computer programs. Data Mining and Predictive Analysis offers a clear, practical starting point for professionals who need to use data mining in homeland security, security analysis, and operational law enforcement settings. This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities. The use of predictive analytics in intelligence and security analysis enables the development of meaningful, information based tactics, strategy, and policy decisions in the operational public safety and security environment.
|
505 |
0 |
|
|a Cover; Title Page; Copyright Page; Dedication; Contents; Foreword; Preface; Digital Assets; For the instructor; Introduction; Skill set; How to use this book; Part 1 -- Introductory Section; Chapter 1 -- Basics; 1.1 -- Basic statistics; 1.2 -- Inferential versus Descriptive Statistics and Data Mining; 1.3 -- Population versus Samples; 1.4 -- Modeling; 1.5 -- Errors; 1.5.1 -- Infrequent Events; 1.5.2 -- "Black Swans"; 1.5.3 -- Identifying Appropriate Comparison Groups and Establishing the Denominator; 1.5.4 -- Remember the Baseline; 1.5.5 -- Where Did Your Data Come From?
|
505 |
8 |
|
|a 1.5.6 -- Magnified or Obscured Effects1.5.7 -- Outliers; 1.6 -- Overfitting the Model; 1.7 -- Generalizability versus Accuracy; 1.8 -- Input/Output; Chapter 2 -- Domain Expertise; 2.1 -- Domain expertise; 2.2 -- Domain Expertise for Analysts; 2.3 -- The Integrated Model; Chapter 3 -- Data Mining and Predictive Analytics; 3.1 -- Discovery and Prediction; 3.2 -- Confirmation and discovery; 3.3 -- Surprise; 3.4 -- Characterization; 3.5 -- "Volume Challenge"16; 3.6 -- Exploratory Graphics and Data Exploration; 3.7 -- Link Analysis21; 3.8 -- Non-Obvious Relationship Analysis (NORA)24; 3.9 -- Text Mining.
|
505 |
8 |
|
|a 3.10 -- Closing ThoughtsPart 2 -- Methods; Chapter 4 -- Process Models for Data Mining and Predictive Analysis; 4.1 -- CIA Intelligence Process7; 4.1.1 -- Requirements; 4.1.2 -- Collection; 4.1.3 -- Processing and Exploitation; 4.1.4 -- Analysis and Production; 4.1.5 -- Dissemination; 4.1.6 -- Feedback; 4.1.7 -- Summary; 4.2 -- Cross-industry Standard Process for Data Mining; 4.2.1 -- Business Understanding; 4.2.2 -- Data Understanding; 4.2.3 -- Data Preparation; 4.2.4 -- Modeling; 4.2.5 -- Evaluation; 4.2.6 -- Deployment; 4.7.1 -- Summary.
|
505 |
8 |
|
|a 4.8 -- Actionable Mining and Predictive Analysis for Public Safety and Security4.8.1 -- Question or Challenge; 4.8.2 -- Data Collection and Fusion; 4.8.3 -- Operationally Relevant Preprocessing; 4.8.3.1 -- Recoding; 4.8.3.2 -- Variable Selection; 4.8.3.3 -- Operational Value; 4.8.3.4 -- Availability and Timeliness; 4.8.4 -- Identification, Characterization, and Modeling; 4.8.5 -- Public Safety and Security-Specific Evaluation; 4.8.6 -- Operationally Actionable Output; 4.8.7 -- Additional Considerations; 4.8.7.1 -- Privacy; 4.8.7.2 -- Security; 4.8.7.3 -- Other Hazards; 4.8.8 -- Summary; Chapter 5 -- Data.
|
505 |
8 |
|
|a 5.1 -- Getting started5.2 -- Types of data; 5.3 -- Data5; 5.3.1 -- Big Data; 5.3.1.1 -- Volume; 5.3.1.2 -- Velocity; 5.3.1.3 -- Variety; 5.4 -- Types of Data Resources; 5.4.1 -- Data Sources; 5.4.1.1 -- Records Management Systems; 5.4.1.2 -- Calls for Service; 5.4.2 -- Relational Data; 5.4.3 -- Revisiting the INTs; 5.4.4 -- Geoint19; 5.4.4.1 -- Physical Geography; 5.4.4.2 -- Human Geography; 5.4.5 -- Ad Hoc, Self-Generated, and Other Specialized Databases22; 5.4.6 -- Nontraditional Sources (e.g., Weather); 5.5 -- Data Challenges; 5.5.1 -- Reliability and Validity; 5.5.2 -- Data Entry Errors.
|
505 |
8 |
|
|a 5.5.3 -- Misrepresentation, Fabrication, and Poor Recall.
|
650 |
|
0 |
|a Crime analysis.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Law enforcement
|x Data processing.
|
650 |
|
0 |
|a Criminal behavior, Prediction of.
|
650 |
|
2 |
|a Data Mining
|0 (DNLM)D057225
|
650 |
|
6 |
|a Criminalit�e
|x Analyse.
|0 (CaQQLa)201-0152459
|
650 |
|
6 |
|a Exploration de donn�ees (Informatique)
|0 (CaQQLa)201-0300292
|
650 |
|
6 |
|a Lois
|0 (CaQQLa)201-0043569
|x Application
|0 (CaQQLa)201-0043569
|x Informatique.
|0 (CaQQLa)201-0380011
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Infrastructure.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Crime analysis
|2 fast
|0 (OCoLC)fst00883022
|
650 |
|
7 |
|a Criminal behavior, Prediction of
|2 fast
|0 (OCoLC)fst00883179
|
650 |
|
7 |
|a Data mining
|2 fast
|0 (OCoLC)fst00887946
|
650 |
|
7 |
|a Law enforcement
|x Data processing
|2 fast
|0 (OCoLC)fst00993947
|
776 |
0 |
8 |
|i Print version:
|a McCue, Colleen.
|t Data Mining and Predictive Analysis : Intelligence Gathering and Crime Analysis.
|d Burlington : Elsevier Science, �2015
|z 9780128002292
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128002292
|z Texto completo
|