A platform for discovering and sharing confidential ballistic crime data

نویسندگان

  • Simeon J. Yates
  • Babak Akhgar
  • Christopher D. Bates
  • Lukasz Jopek
  • Richard Wilson
چکیده

Criminal investigations generate large volumes of complex data that detectives have to analyse and understand. This data tends to be "siloed" within individual jurisdictions and reusing it in other investigations can be difficult. Investigations into trans-national crimes are hampered by the problem of discovering relevant data held by agencies in other countries and of sharing those data. Gun-crimes are one major type of incident that showcases this: guns are easily moved across borders and used in multiple crimes but finding that a weapon was used elsewhere in Europe is difficult. In this paper we report on the Odyssey Project, an EU-funded initiative to mine, manipulate and share data about weapons and crimes. The project demonstrates the automatic combining of data from disparate repositories for cross-correlation and automated analysis. The data arrive from different cultural/domains with multiple reference models using real-time data feeds and historical databases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extraction of Drug Crime Patterns and Identifying People at Risk Using Data Mining Techniques

Introduction: In recent years, technology advancement and the growth of information technology in organizations have provided a huge source of data stored in the field of drug-related offenses. Analyzing these data and discovering hidden patterns in it can help detect and prevent the occurrence of crimes in this area. This paper aimed to identify the susceptible people to drug trafficking in Si...

متن کامل

Extraction of Drug Crime Patterns and Identifying People at Risk Using Data Mining Techniques

Introduction: In recent years, technology advancement and the growth of information technology in organizations have provided a huge source of data stored in the field of drug-related offenses. Analyzing these data and discovering hidden patterns in it can help detect and prevent the occurrence of crimes in this area. This paper aimed to identify the susceptible people to drug trafficking in Si...

متن کامل

Discovering the Underlying Components Affecting the Usability of IoT in Iranian Libraries: A Theory Based on Context

Objective: The aim is to discover the underlying context components of IOT usability in Iranian libraries: A qualitative approach consistent with grounded theory. Method: This qualitative study was conducted based on grounded theory. Data were collected through semi-structured interviews with 13 faculty members of knowledge and information science based on purposeful and chain methods. Responsi...

متن کامل

Some Forensic Aspects of Ballistic Imaging

Analysis of ballistics evidence (spent cartridge casings and bullets) has been a staple of forensic criminal investigation for almost a century. Computer-assisted databases of images of ballistics evidence have been used since the mid-1980s to help search for potential matches between pieces of evidence. In this article, we draw on the 2008 National Research Council Report Ballistic Imaging to ...

متن کامل

اندازه‌گیری میزان صرفه‌جویی‌های زمانی حاصل از مشترک‌سازی مولفه‌ها در زنجیره‌های تأمین

  Sharing common resources is amongst critical factors creating competitive advantages in business and manufacturing. In today’s competitive and dynamic environment, application of the resource sharing approach has become the focal point of attention for business managers. By resource sharing and through common platform guidelines, the possibility of producing an extended variety of products us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Knowledge and Web Intelligence

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011