Prevention of Becoming the Database to a Crime Scene
DOI:
https://doi.org/10.18662/po/21Keywords:
crime, databases, data mining, crime scene.Abstract
Crime prevention has been one of the most fundamental issues in our society that has historically been implemented in various ways. Along with the development of information and communication technologies, the aim is to launch a comprehensive system of information storage of criminals in police records. Through the use of data mining and knowledge discovery techniques, one can analyses the roots tracing offenses, including theft for Iranian Police for legal purposes.
References
Edwards, C., Harold, G., & Kilcommins, S. (2012). Access to Justice for People with Disabilities as Victims of Crime in Ireland. University of College Cork.
Fakoor, M., Kosari, A., Jafarzadeh, M. (2015). Revision on fuzzy artificial potential field for humanoid robot path planning in unknown environment. International Journal of Advanced Mechatronic Systems, 6(4), 174-183.
Fakoor, M., Kosari, A., Jafarzadeh, M., (2016). Humanoid robot path planning with fuzzy Markov decision processes. Journal of Applied Research and Technology, 14(5) 300-310.
Garmani, H., Amrani, M., Baslam, M., & Ayachi, R. (2017). Analysis of Competition Fronting the Popularity of Content in Social Networks. International Journal of Informatics and Communication Technology, 6(2), 86-94. http://doi.org/10.11591/ij-ict.v6i2.7906
Iduwo, K. (2016). Attack Detection in a Rule-Based System Using Fuzzy Spiking Neural P System. International Journal of Informatics and Communication Technology, 5(1), 11-20. http://doi.org/10.11591/ij-ict.v5i1.1107
Kansal, A., Singh, P. (2016). Performance Improvement of MU-MIMO System by Optimizing the K-Factor for the K-Mean User Grouping Algorithm. International Journal of Informatics and Communication Technology, 5(3), 89-93.
Khodayari A., Razavi, S., (2017). On the thermo-flow behavior in a rectangular channel with skewed circular ribs. Mechanics & Industry, 18(2), 225.
Pradhan, S., & Kumar, B. (2015). Improved Semantically Secured Variant of RSA Public Key Cryptosystem. International Journal of Informatics and Communication Technology, 4(3), 91-97. http://doi.org/10.11591/ij-ict.v4i3.1100
Smith, N.E., & Jones, C. (2008). Monitoring Trends in Re-offendingamong Offenders Released from Prison. Crime and Justice Bulletin, 117.
Spohn, C. (2007). The Deterrent Effect of Imprisonment and Offenders’ Stakes in Conformity. Criminal Justice Policy Review, 18(1), 31–50.
Tay, R. (2005). General and Specific Deterrent Effects of Traffic Enforcement: Do We Have to Catch Offenders to Reduce Crimes. Journal of Transport Economics and Policy, 39(2), 209–223.
Von Hirsch, A., & Ashworth, A. (eds). (1998). Principled Sentencing: Readings on Theory & Policy. 2nd ed., Oxford: Hart Publishing.
Weatherburn, D., Hua, J., & Moffatt, S. (2006). How Much Crime Does Prison Stop? The Incapacitation Effect of Prison on Burglary. Crime and Justice Bulletin, 93. Available online at: https://pdfs.semanticscholar.org/7027/0ef9e08f1f04695ec861e0636adda6a0549b.pdf
Wenzel, M. (2004). The Social Side of Sanctions: Personal and Social Norms as Moderators of Deterrence. Law and Human Behavior, 28(5), 547–567.
Williams, K.R., & Gibbs, J.P. (1981). Deterrence and Knowledge of Statutory Penalties. Sociological Quarterly, 22, 591–606.
Woodhouse, B. (2010). Sentencing for Armed Robbery: A Statistical Profile. Melbourne: Sentencing Advisory Council.
Zhang, J., & Webster, A. (2010). An Analysis of Repeat Imprisonment Trends in Australia using Prisoner Census Data from 1994 to 2007. Cat. No.1351.0.55.031. Canberra: Australian Bureau of Statistics.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant this journal right of first publication, with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work, with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g. post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g. in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as an earlier and greater citation of published work (See The Effect of Open Access).
Postmodern Openings Journal has an Attribution-NonCommercial-NoDerivs
CC BY-NC-ND