{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:21Z","timestamp":1742913681250,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672557"},{"type":"electronic","value":"9783319672564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67256-4_36","type":"book-chapter","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T14:45:33Z","timestamp":1504277133000},"page":"458-465","source":"Crossref","is-referenced-by-count":1,"title":["Towards Simulating Criminal Offender Movement Based on Insights from Human Dynamics and Location-Based Social Networks"],"prefix":"10.1007","author":[{"given":"Raquel","family":"Ros\u00e9s Br\u00fcngger","sequence":"first","affiliation":[]},{"given":"Robin","family":"Bader","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Kadar","sequence":"additional","affiliation":[]},{"given":"Irena","family":"Pletikosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,2]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Gerritsen, C., Elffers, H.: Investigating prevention by simulation methods. In: LeClerc, B., Savona, E.U. (eds.) Crime Prevention in the 21st Century. Insightful Approaches for Crime Prevention Initiatives. Springer, Cham, Switzerland (2017)","DOI":"10.1007\/978-3-319-27793-6_15"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Brantingham, P.J., Tita, G.: Offender mobility and crime pattern formation from first principles. In: Liu, L., Eck, J. (eds.) Artificial Crime Analysis Systems. Using Computer Simulations and Geographic Information Systems, Information Science Reference, Hershey, N.Y., London (2008)","DOI":"10.4018\/978-1-59904-591-7.ch010"},{"issue":"1","key":"36_CR3","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1177\/0022427813487353","volume":"51","author":"DJ Birks","year":"2014","unstructured":"Birks, D.J., Townsley, M., Stewart, A.: Emergent regularities of interpersonal victimization. an agent-based investigation. J. Res. Crime Delinquency 51(1), 119\u2013140 (2014)","journal-title":"J. Res. Crime Delinquency"},{"issue":"3","key":"36_CR4","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s11292-008-9057-1","volume":"4","author":"A Dray","year":"2008","unstructured":"Dray, A., Mazerolle, L., Perez, P., Ritter, A.: Policing Australia\u2019s \u2018heroin drought\u2019. using an agent-based model to simulate alternative outcomes. J. Experimental Criminol. 4(3), 267\u2013287 (2008)","journal-title":"J. Experimental Criminol."},{"key":"36_CR5","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.compenvurbsys.2013.09.001","volume":"42","author":"N Devia","year":"2013","unstructured":"Devia, N., Weber, R.: Generating crime data using agent-based simulation. Comput. Environ. Urban Syst. 42, 26\u201341 (2013)","journal-title":"Comput. Environ. Urban Syst."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Hayslett-McCall, K.L., Qiu, F., Curtin, K.M., Chastain, B., Schubert, J., Carver, V.: The simulation of the journey to residential burglary. In: Liu, L., Eck, J. (eds.) Artificial Crime Analysis Systems. Using Computer Simulations and Geographic Information Systems. Information Science Reference, Hershey, N.Y., London, pp. 281\u2013299 (2008)","DOI":"10.4018\/978-1-59904-591-7.ch014"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Gunderson, L., Brown, D.: Using a multi-agent model to predict both physical and cyber criminal activity. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions, vol. 4, Piscataway, pp. 2338\u20132343 (2000)","DOI":"10.1109\/ICSMC.2000.884340"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Peng, C., Kurland, J.: The agent-based spatial simulation to the burglary in Beijing. In: Hutchison, D. et al. (eds.) Computational Science and Its Applications \u2013 ICCSA 2014. Lecture Notes in Computer Science, LNCS. Springer, Cham, pp. 31\u201343 (2014)","DOI":"10.1007\/978-3-319-09147-1_3"},{"issue":"6","key":"36_CR9","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1068\/b35071","volume":"36","author":"N Malleson","year":"2009","unstructured":"Malleson, N., Evans, A., Jenkins, T.: An agent-based model of burglary. Environ. Planning B Planning Des. 36(6), 1103\u20131123 (2009)","journal-title":"Environ. Planning B Planning Des."},{"issue":"1","key":"36_CR10","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1177\/0037549710384124","volume":"88","author":"N Malleson","year":"2012","unstructured":"Malleson, N., See, L., Evans, A., Heppenstall, A.: Implementing comprehensive offender behaviour in a realistic agent-based model of burglary. Simulation 88(1), 50\u201371 (2012)","journal-title":"Simulation"},{"issue":"4","key":"36_CR11","doi-asserted-by":"crossref","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"LE Cohen","year":"1979","unstructured":"Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44(4), 588\u2013608 (1979)","journal-title":"Am. Sociol. Rev."},{"issue":"2","key":"36_CR12","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1177\/0022427813483753","volume":"51","author":"AA Reid","year":"2014","unstructured":"Reid, A.A., Frank, R., Iwanski, N., Dabbaghian, V., Brantingham, P.: Uncovering the spatial patterning of crimes. a criminal movement model (CriMM). J. Res. Crime Delinquency 51(2), 230\u2013255 (2014)","journal-title":"J. Res. Crime Delinquency"},{"issue":"7075","key":"36_CR13","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1038\/nature04292","volume":"439","author":"D Brockmann","year":"2006","unstructured":"Brockmann, D., Hufnagel, L., Geisel, T.: The scaling laws of human travel. Nature 439(7075), 462\u2013465 (2006)","journal-title":"Nature"},{"issue":"7196","key":"36_CR14","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1038\/nature06958","volume":"453","author":"MC Gonzalez","year":"2008","unstructured":"Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.-L.: Understanding individual human mobility patterns. Nature 453(7196), 779\u2013782 (2008)","journal-title":"Nature"},{"issue":"5968","key":"36_CR15","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1126\/science.1177170","volume":"327","author":"C Song","year":"2010","unstructured":"Song, C., Qu, Z., Blumm, N., Barabasi, A.-L.: Limits of predictability in human mobility. Science (New York, N.Y.) 327(5968), 1018\u20131021 (2010)","journal-title":"Science (New York, N.Y.)"},{"issue":"7","key":"36_CR16","doi-asserted-by":"crossref","first-page":"e0131469","DOI":"10.1371\/journal.pone.0131469","volume":"10","author":"R Jurdak","year":"2015","unstructured":"Jurdak, R., Zhao, K., Liu, J., AbouJaoude, M., Cameron, M., Newth, D.: Understanding human mobility from Twitter. PLoS ONE 10(7), e0131469 (2015)","journal-title":"PLoS ONE"},{"issue":"5","key":"36_CR17","doi-asserted-by":"crossref","first-page":"e37027","DOI":"10.1371\/journal.pone.0037027","volume":"7","author":"A Noulas","year":"2012","unstructured":"Noulas, A., Scellato, S., Lambiotte, R., Pontil, M., Mascolo, C.: A tale of many cities: universal patterns in human urban mobility. PLoS ONE 7(5), e37027 (2012)","journal-title":"PLoS ONE"},{"issue":"1","key":"36_CR18","doi-asserted-by":"crossref","first-page":"96","DOI":"10.2307\/2086496","volume":"12","author":"PW Tappan","year":"1947","unstructured":"Tappan, P.W.: Who is the Criminal? Am. Sociol. Rev. 12(1), 96\u2013102 (1947)","journal-title":"Am. Sociol. Rev."},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Calabrese, F., Di Lorenzo, G., Ratti, C.: Human mobility prediction based on individual and collective geographical preferences. In: 2010 13th International IEEE Conference on Intelligent Transportation Systems - (ITSC 2010), pp. 312\u2013317 (2010)","DOI":"10.1109\/ITSC.2010.5625119"},{"key":"36_CR20","unstructured":"Kadar, C., Iria, J., Pletikosa Cvijikj, I.: Exploring Foursquare-derived features for crime prediction in New York City (2016)"},{"issue":"1\u20132","key":"36_CR21","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1057\/palgrave.sj.8350066","volume":"21","author":"S Chainey","year":"2008","unstructured":"Chainey, S., Tompson, L., Uhlig, S.: The utility of hotspot mapping for predicting spatial patterns of crime. Secur. J. 21(1\u20132), 4\u201328 (2008)","journal-title":"Secur. J."},{"key":"36_CR22","unstructured":"New York State Department of Transportation. A Transportation Profile Of New York State (2012)"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67256-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T05:59:44Z","timestamp":1517205584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67256-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672557","9783319672564"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67256-4_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}