Community-Oriented Policing and Technological Innovations.

By: Leventakis, GeorgiosContributor(s): Haberfeld, M. RMaterial type: TextTextSeries: SpringerBriefs in Criminology SeriesPublisher: Cham : Springer International Publishing AG, 2018Copyright date: �2018Edition: 1st edDescription: 1 online resource (140 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9783319892948Genre/Form: Electronic books.Additional physical formats: Print version:: Community-Oriented Policing and Technological InnovationsLOC classification: HV6001-7220.5Online resources: Click to View
Contents:
Intro -- Acknowledgment -- Contents -- About the Editors -- Contributors -- 1 Serious Games: An Attractive Approach to Improve Awareness -- Introduction -- The Future of Law Enforcement -- TRILLION's Serious Games -- Serious Games for Citizens -- Serious Games for LEAs -- Game Elements -- Results -- Conclusions -- References -- 2 Can Technology Build Trust? Community-Oriented Policing and ICT in Afghanistan -- Introduction: The Scene -- Scope of the Paper -- Research Methodology and Approach -- ICT and Policing -- Human Security and Trust -- Afghan Security Sector and ICT -- Civil Society, the Police and ICTs -- Police Engagement with Civil Society ICT Efforts -- Conclusions -- References -- 3 Community Outreach Using Incident Records and Visual Analytics -- Introduction -- Perceptions of Community Policing -- Problem Oriented Policing -- Hot Spot Policing -- Crime Mapping Technologies -- Community Outreach with VALET -- Real Time Data Analysis -- Discussion -- Insight into Crime Trends -- Community Perception -- Limitations -- Conclusion -- References -- 4 Robust End-User-Driven Social Media Monitoring for Law Enforcement and Emergency Monitoring -- Introduction -- Related Work -- System Overview -- End-User-Driven Topic Detection -- Experiments and Results -- Conclusions -- References -- 5 Architecting Next Generating Community Policing Solutions -- Emerging Trends for Next Generation Community Policing and INSPEC2T -- Architecture Work Package -- Risk and Cost Driven Architecture -- Goals, Challenges and Opportunities -- Development Approach -- Integration Guidelines -- Integration Plan -- Open, Modular and Loosely Coupled Architecture -- Architecture Validation Approach -- Designed for Integration and Evolution, More than a Set of Views -- References.
6 Developing and Assessing Next Generation Community Policing Social Networks with THOR Methodology -- Evolving Community Policing Models and the Impact of Social Network -- Next Generation Community Policing: The INSPEC2T Solution -- INSPEC2T Solution Modules -- Next Generation CP (NGCP) Functions Associated with Use Cases -- Interaction with NGCP-SN -- Communities -- Incident Reporting and Management -- Interaction with Other Social Networks -- Back End Intelligence -- Rules and Supporting Actions -- INSPEC2T Pilot Evaluation -- NGCP Evaluation Framework -- Technology -- Human -- Organisational -- Regulatory -- Interim Evaluation Findings -- Conclusions -- References -- 7 Next Generation of CP: The Unity IT Toolkit -- Introduction -- Unity IT Toolkit Architecture -- End User Assessment -- Conclusions -- References -- 8 A Descriptive, Practical, Hybrid Argumentation Model to Assist with the Formulation of Defensible Assessments in Uncertain Sense-Making Environments -- Introduction -- Method -- Literature Review and Results -- Schemas (Green Coding) -- Relations of Inference (Yellow Coding) -- Macro-Cognition (Blue, Pink and Purple Coding) -- Discussion and Conclusion -- References -- 9 Situating Fear of Crime: The Prospects for Criminological Research to Use Smartphone Applications to Gather Experience Sampling Data -- Introduction -- Fear of Crime, Situational Dynamics, and Lifestyle-Routine Activities -- Measuring Situational Dynamics and Lifestyle-Routine Activities Using Smartphones -- Locating Fear in Place, Time and Situation: The Prospects for Future Research -- References -- 10 Analytic Provenance as Constructs of Behavioural Markers for Externalizing Thinking Processes in Criminal Intelligence Analysis -- Introduction -- Related Works -- Development Approach of Behavioural Marker System -- Detection Method -- Action Sequences Computation.
Conclusion -- References -- 11 Analysis of Suspended Terrorism-Related Content on Social Media -- Introduction -- Related Work -- Data Collection and Analysis -- Methodology -- Data Collection -- Experimental Results -- User Account Lifetime -- Analysis of Mention Networks -- Friends and Followers -- Posts, Favorites, and Lists -- Spatial Distribution of Accounts -- Conclusions -- References -- 12 UAVs and Their Use in Servicing the Community -- Introduction -- Needs Assessment -- Civil Protection Operational Needs -- Community Policing Operational Needs -- UAS Capabilities and Operational Requirements -- UAS Component Categories and Types -- Operational Requirements -- Mission Planning -- Visual Data Gathering -- Path Planning -- Proof of Concept -- Conclusions -- References.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Acknowledgment -- Contents -- About the Editors -- Contributors -- 1 Serious Games: An Attractive Approach to Improve Awareness -- Introduction -- The Future of Law Enforcement -- TRILLION's Serious Games -- Serious Games for Citizens -- Serious Games for LEAs -- Game Elements -- Results -- Conclusions -- References -- 2 Can Technology Build Trust? Community-Oriented Policing and ICT in Afghanistan -- Introduction: The Scene -- Scope of the Paper -- Research Methodology and Approach -- ICT and Policing -- Human Security and Trust -- Afghan Security Sector and ICT -- Civil Society, the Police and ICTs -- Police Engagement with Civil Society ICT Efforts -- Conclusions -- References -- 3 Community Outreach Using Incident Records and Visual Analytics -- Introduction -- Perceptions of Community Policing -- Problem Oriented Policing -- Hot Spot Policing -- Crime Mapping Technologies -- Community Outreach with VALET -- Real Time Data Analysis -- Discussion -- Insight into Crime Trends -- Community Perception -- Limitations -- Conclusion -- References -- 4 Robust End-User-Driven Social Media Monitoring for Law Enforcement and Emergency Monitoring -- Introduction -- Related Work -- System Overview -- End-User-Driven Topic Detection -- Experiments and Results -- Conclusions -- References -- 5 Architecting Next Generating Community Policing Solutions -- Emerging Trends for Next Generation Community Policing and INSPEC2T -- Architecture Work Package -- Risk and Cost Driven Architecture -- Goals, Challenges and Opportunities -- Development Approach -- Integration Guidelines -- Integration Plan -- Open, Modular and Loosely Coupled Architecture -- Architecture Validation Approach -- Designed for Integration and Evolution, More than a Set of Views -- References.

6 Developing and Assessing Next Generation Community Policing Social Networks with THOR Methodology -- Evolving Community Policing Models and the Impact of Social Network -- Next Generation Community Policing: The INSPEC2T Solution -- INSPEC2T Solution Modules -- Next Generation CP (NGCP) Functions Associated with Use Cases -- Interaction with NGCP-SN -- Communities -- Incident Reporting and Management -- Interaction with Other Social Networks -- Back End Intelligence -- Rules and Supporting Actions -- INSPEC2T Pilot Evaluation -- NGCP Evaluation Framework -- Technology -- Human -- Organisational -- Regulatory -- Interim Evaluation Findings -- Conclusions -- References -- 7 Next Generation of CP: The Unity IT Toolkit -- Introduction -- Unity IT Toolkit Architecture -- End User Assessment -- Conclusions -- References -- 8 A Descriptive, Practical, Hybrid Argumentation Model to Assist with the Formulation of Defensible Assessments in Uncertain Sense-Making Environments -- Introduction -- Method -- Literature Review and Results -- Schemas (Green Coding) -- Relations of Inference (Yellow Coding) -- Macro-Cognition (Blue, Pink and Purple Coding) -- Discussion and Conclusion -- References -- 9 Situating Fear of Crime: The Prospects for Criminological Research to Use Smartphone Applications to Gather Experience Sampling Data -- Introduction -- Fear of Crime, Situational Dynamics, and Lifestyle-Routine Activities -- Measuring Situational Dynamics and Lifestyle-Routine Activities Using Smartphones -- Locating Fear in Place, Time and Situation: The Prospects for Future Research -- References -- 10 Analytic Provenance as Constructs of Behavioural Markers for Externalizing Thinking Processes in Criminal Intelligence Analysis -- Introduction -- Related Works -- Development Approach of Behavioural Marker System -- Detection Method -- Action Sequences Computation.

Conclusion -- References -- 11 Analysis of Suspended Terrorism-Related Content on Social Media -- Introduction -- Related Work -- Data Collection and Analysis -- Methodology -- Data Collection -- Experimental Results -- User Account Lifetime -- Analysis of Mention Networks -- Friends and Followers -- Posts, Favorites, and Lists -- Spatial Distribution of Accounts -- Conclusions -- References -- 12 UAVs and Their Use in Servicing the Community -- Introduction -- Needs Assessment -- Civil Protection Operational Needs -- Community Policing Operational Needs -- UAS Capabilities and Operational Requirements -- UAS Component Categories and Types -- Operational Requirements -- Mission Planning -- Visual Data Gathering -- Path Planning -- Proof of Concept -- Conclusions -- References.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.