{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:43:19Z","timestamp":1725550999006},"publisher-location":"London","reference-count":31,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781846286650"},{"type":"electronic","value":"9781846286667"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-1-84628-666-7_2","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T00:21:20Z","timestamp":1270599680000},"page":"19-32","source":"Crossref","is-referenced-by-count":3,"title":["Use of Data Mining Techniques to Model Crime Scene Investigator Performance"],"prefix":"10.1007","author":[{"given":"Richard","family":"Adderley","sequence":"first","affiliation":[]},{"given":"Michael","family":"Townsley","sequence":"additional","affiliation":[]},{"given":"John","family":"Bond","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"2_CR1","first-page":"165","volume":"5","author":"R. Adderley","year":"2002","unstructured":"Adderley, R. & Musgrove, P.B. (2002). Modus operandi modelling of group offending: a data mining case study. The International Journal of Police Science and Management 5 (4) (pp. 165\u2013176)","journal-title":"The International Journal of Police Science and Management"},{"key":"2_CR2","first-page":"156","volume-title":"The use of data mining techniques in active crime fighting","author":"R. Adderley","year":"2002","unstructured":"Adderley, R. (2002). The use of data mining techniques in active crime fighting, Proceedings: International conference on computer, communication and control technologies and the 9th international conference on information systems analysis and synthesis, 1001, 11 July\u20131 August 1001. (Orlando): CCCT and ISAS, (pp. 156\u2013161)."},{"key":"2_CR3","volume-title":"Data Mining","author":"P. Adriaans","year":"1996","unstructured":"Adriaans, P., & Zantinge, D. (1996). Data Mining, New York, Addison-Wesley."},{"key":"2_CR4","volume-title":"Using Forensic Science Effectively","author":"Association of Chief Police Officers &","year":"1996","unstructured":"Association of Chief Police Officers & Forensic Science Service. (1996) Using Forensic Science Effectively. London: ACPO."},{"key":"2_CR5","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"C. M. Bishop","year":"1995","unstructured":"Bishop, C. M., (1995). Neural Networks for Pattern Recognition, Oxford University Press, Oxford."},{"key":"2_CR6","volume-title":"Advances in Knowledge Discovery and Data Mining, Usarna M. Fayyad, et al., American Association for Artificial Intelligence","author":"R. Brachman","year":"1996","unstructured":"Brachman, R., J., Anand, T. (1996). \u2018The Process of Knowledge Discovery in Databases\u2019, In: Advances in Knowledge Discovery and Data Mining, Usarna M. Fayyad, et al., American Association for Artificial Intelligence, AAAI Press, California."},{"key":"2_CR7","volume-title":"CRISP-DM 1.0 Step-by-step data mining guide","author":"P. Chapman","year":"2000","unstructured":"Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinhertz, T., Shearer, C., Wirth, R. (2000). CRISP-DM 1.0 Step-by-step data mining guide, USA: SPSS Inc. CRISPWP-0800."},{"issue":"4","key":"2_CR8","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"17","author":"H. Chen","year":"1004","unstructured":"Chen, H., Chung, W., Xu, J.J., Qin, G. W. Y., Chau, M. (1004). Crime data mining: a general framework and some examples. COMPUTER, 17(4) (pp. 50\u201356).","journal-title":"COMPUTER"},{"key":"2_CR9","unstructured":"Computing (1996). Mine, all Mine, Computing 10th October 1996."},{"key":"2_CR10","volume-title":"Pattern Analysis and Scene Analysis","author":"R.O. Duda","year":"1971","unstructured":"Duda, R.O., Hart, P.E. (1971). Pattern Analysis and Scene Analysis, New York; John Wiley."},{"key":"2_CR11","unstructured":"Duda, R. O., Hart, P. E., Stork., D. G. (2000). Pattern Classification. John Wiley & Sons Inc, 1000."},{"issue":"1","key":"2_CR12","first-page":"181","volume":"7","author":"C. Giraud-Carrier","year":"2001","unstructured":"Giraud-Carrier, C., Povel, O. (2001). Characterising data mining software. Journal of Intelligent Data Analysis. 7(1) (pp. 181\u2013191).","journal-title":"Journal of Intelligent Data Analysis"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"100","DOI":"10.2307\/2346830","volume":"18","author":"J. A. Hartigan","year":"1979","unstructured":"Hartigan, J. A., Wong, M. A., (1979). A k-means clustering algorithm. Appl. Stat. 18, (pp. 100\u2013108).","journal-title":"Appl. Stat."},{"key":"2_CR14","unstructured":"Haughton, E., (1991). Digging for Gold. Computing, 10th January 1994 (pp. 10\u201311)."},{"key":"2_CR15","volume-title":"Under the Microscope","author":"Her Majestys Inspectorate of Constabulary.","year":"2000","unstructured":"Her Majesty\u2019s Inspectorate of Constabulary. (2000). Under the Microscope. London: ACPO."},{"key":"2_CR16","volume-title":"Under the Microscope Refocused","author":"Her Majestys Inspectorate of Constabulary.","year":"2002","unstructured":"Her Majesty\u2019s Inspectorate of Constabulary. (2002). Under the Microscope Refocused. London: ACPO."},{"key":"2_CR17","volume-title":"National Policing Plan 1005\u20131008","author":"Home Office","year":"2004","unstructured":"Home Office (2004). National Policing Plan 1005\u20131008, Home Office, UK."},{"key":"2_CR18","unstructured":"House, J. C. (1996). Towards a Practical Application of Offender Profiling: The RNC\u2019s Criminal Suspect Prioritization System, Investigative Psychology Conference, Liverpool University."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Langley, P., Sage, S. (1994). Induction of selective Bayesian classifiers, Proceedings 10 th Conference on Uncertainty in Artificial Intelligence, Seattle, WA; Morgan Kaufmann (pp. 119\u2013406).","DOI":"10.1016\/B978-1-55860-332-5.50055-9"},{"key":"2_CR20","unstructured":"McCue, C., Stone, E. S., Gooch, T. P. (2001). Data mining and value-added analysis: more science, less fiction. Submitted to FBI Law Enforcement Bulletin."},{"key":"2_CR21","unstructured":"Meltzer, M. (2004). Using data mining on the road to successful BI, Part I, Data Mining Direct Special Report [on line], 11st September 2004. Available from: http:\/\/www.dmreview.comleditoriaVnewsletter_ more.cfm?n1=bireport. [Accessed 1nd May 2005]."},{"key":"2_CR22","volume-title":"Investigative data mining for security and criminal detection","author":"J. Mena","year":"2002","unstructured":"Mena, J. (2002). Investigative data mining for security and criminal detection. Burlingto MA, Elsevier Science."},{"key":"2_CR23","volume-title":"Forensic Performance Monitors","author":"Police Standards Unit.","year":"2005","unstructured":"Police Standards Unit. (2005). Forensic Performance Monitors, London: Home Office."},{"key":"2_CR24","unstructured":"Quinlan J. R., (1996). Bagging, boosting, and C4.5 Proceedings 11 th National Conference on Artificial Intelligence, August 4\u20138. Portland USA."},{"key":"2_CR25","unstructured":"SAS (2000), Data Mining Home Page, \u2329http:\/\/www.sas.com!software\/data_mining.\u232a. (accessed on 5th June 2000)"},{"key":"2_CR26","unstructured":"Sherman, R. (2005). Data integration advisor: set the stage with data preparation, DM Review, February 1005."},{"key":"2_CR27","volume-title":"Applying Neuralblnetworks; A Practical Guide","author":"K. Swingler","year":"1996","unstructured":"Swingler, K. (1996). Applying Neuralblnetworks; A Practical Guide. San Francisco: Morgan Kaufman"},{"key":"2_CR28","unstructured":"Thomsen, E. (1998). Presentation: Very Large Data Bases\/Data Mining Summit, Beverly Hills, California."},{"key":"2_CR29","series-title":"Crime Detection and Prevention Paper","volume-title":"Forensic science and criminal investigation","author":"N. Tilley","year":"1996","unstructured":"Tilley N, Ford A. (1996). Forensic science and criminal investigation. Crime Detection and Prevention Paper 71, London: Home Office."},{"key":"2_CR30","volume-title":"The Management Of Crime Scene Examination In Relation To The Investigation Of Burglary And Vehicle Crime","author":"S. R. Williams","year":"2004","unstructured":"Williams, S. R. (2004). The Management Of Crime Scene Examination In Relation To The Investigation Of Burglary And Vehicle Crime. Home Office: London."},{"key":"2_CR31","unstructured":"Wikipedia (2006). Definition of unsupervised learning. http:\/\/en.wikipedia.org\/wiki\/Unsupervised_learning accessed 15th May 1006."}],"container-title":["Applications and Innovations in Intelligent Systems XIV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-84628-666-7_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T15:36:45Z","timestamp":1711381005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-84628-666-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9781846286650","9781846286667"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-1-84628-666-7_2","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}