List of Tables


Chapter 1: Precrime Data Mining

Table 1.1: Illustrative Examples of the Modus Operandi Free-Text Field.

Chapter 2: Investigative Data Warehousing

Table 2.1: Acxiom Infobase Basic Data Profile
Table 2.2: Partial List of Type of Information or Companies Provided by Acxiom
Table 2.3: Type of Information Provided by Data Quick
Table 2.4: Criminalfiles.info available jurisdictions.
Table 2.5: Anatomy of a Cookie

Chapter 5: Text Mining: Clustering Concepts

Table 5.1: LIWC 2001 Dimensions and Sample Words

Chapter 6: Neural Networks: Classifying Patterns

Table 6.1: Model with Three Inputs, a Set of Formula Weights, and One Output
Table 6.2: Classification of Burglary Offense
Table 6.3: Modus Operandi Text

Chapter 8: NetFraud: A Case Study

Table 8.1: On-Line Auction Fraud Statistics
Table 8.2: Top Three Payment Methods
Table 8.3: Fraud Statistics Reported by fraud.org
Table 8.4: Transactional Data Variables

Chapter 9: Criminal Patterns: Detection Techniques

Table 9.1: Methods of Insurance Fraud Detection

Chapter 12: Mapping Crime: Clustering Case Work

Table 12.1: Classification of Sexual Crimes
Table 12.2: Number of Crimes Attributed to Known Offenders
Table 12.3: Data Encoding Examples (3 Yes and 3 No)
Table 12.4: Cluster Comparison




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net