{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:48:25Z","timestamp":1773269305451,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540221258","type":"print"},{"value":"9783540259527","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_32","type":"book-chapter","created":{"date-parts":[[2010,8,8]],"date-time":"2010-08-08T20:17:37Z","timestamp":1281298657000},"page":"418-425","source":"Crossref","is-referenced-by-count":12,"title":["The Use of Data Mining Techniques in Operational Crime Fighting"],"prefix":"10.1007","author":[{"given":"Richard","family":"Adderley","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","volume-title":"International conference on computer, communication and control technologies and the 9th international conference on information systems analysis and synthesis","author":"R. Adderley","year":"2003","unstructured":"Adderley, R.: The use of data mining techniques in active crime fighting. In: International conference on computer, communication and control technologies and the 9th international conference on information systems analysis and synthesis, July 31- August 3, CCCT, Orlando (2003)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Adderley, R.: The use of data mining techniques in operational crime fighting. In: Zurada, J., Kantardzic, M. (eds.) New Generations of Data Mining Applications (2004) (Due to be published in April 2004)","DOI":"10.1007\/978-3-540-25952-7_32"},{"issue":"1","key":"32_CR3","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1108\/13639510110382287","volume":"24","author":"R. Adderley","year":"2001","unstructured":"Adderley, R., Musgrove, P.B.: General review of police crime recording and investigation systems. A user\u2019s view. Policing: An International Journal of Police Strategies and Management\u00a024(1), 100\u2013114 (2001)","journal-title":"Policing: An International Journal of Police Strategies and Management"},{"issue":"4","key":"32_CR4","first-page":"265","volume":"5","author":"R. Adderley","year":"2003","unstructured":"Adderley, R., Musgrove, P.B.: Modus operandi modelling of group offending; a data mining case study. Accepted by An International Journal of Police Science and Management\u00a05(4), 265\u2013276 (2003)","journal-title":"Accepted by An International Journal of Police Science and Management"},{"key":"32_CR5","volume-title":"Data Mining","author":"P. Adriaans","year":"1996","unstructured":"Adriaans, P., Zantige, D.: Data Mining. Addison-Wesley, Reading (1996)"},{"key":"32_CR6","volume-title":"Notes on the geometry of crime, in Environmental Criminology","author":"P.L. Brantingham","year":"1991","unstructured":"Brantingham, P.L., Brantingham, P.J.: Notes on the geometry of crime, in Environmental Criminology. Wavelend Press Inc., USA (1991)"},{"issue":"1","key":"32_CR7","first-page":"31","volume":"7","author":"P.J. Brantingham","year":"1998","unstructured":"Brantingham, P.J., Brantingham, P.L.: Environmental criminology: From theory to urban planning practice. Studies on Crime and Crime Prevention\u00a07(1), 31\u201360 (1998)","journal-title":"Studies on Crime and Crime Prevention"},{"key":"32_CR8","unstructured":"Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., Wirth, R.: CRISP-DM 1.0 Step-by-step data mining guide, USA: SPSS Inc. CRISPWP-0800 (2000)"},{"key":"32_CR9","volume-title":"Routine activity and rational choice: Advances in criminological theory","author":"R.V. Clarke","year":"1993","unstructured":"Clarke, R.V., Felson, M.: Introduction: Criminology, Routine activity, and rational choice. In: Clarke, R.V., Felson, M. (eds.) Routine activity and rational choice: Advances in criminological theory, vol.\u00a05, Transaction Publishers, New Jersey (1993)"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"L.E. Cohen","year":"1979","unstructured":"Cohen, L.E., Felson, M.: Social change and crime rate trends: A routine activity approach. American Sociological Review\u00a044, 588\u2013608 (1979)","journal-title":"American Sociological Review"},{"key":"32_CR11","first-page":"580","volume":"44","author":"N. Coles","year":"2001","unstructured":"Coles, N.: It\u2019s not what you know \u2013 it\u2019s who you know that counts. Analysing serious crime groups as social networks. British Journal of Criminology\u00a044, 580\u2013594 (2001)","journal-title":"Analysing serious crime groups as social networks. British Journal of Criminology"},{"key":"32_CR12","first-page":"67","volume":"4","author":"J.E. Eck","year":"1995","unstructured":"Eck, J.E.: A general model of the geography of illicit marketplaces. Crime Prevention Studies\u00a04, 67\u201394 (1995)","journal-title":"Crime Prevention Studies"},{"key":"32_CR13","first-page":"30","volume":"1","author":"M. Felson","year":"1992","unstructured":"Felson, M.: Routine activities and crime prevention: armchair concepts and practical action. Studies on Crime and Crime Prevention\u00a01, 30\u201334 (1992)","journal-title":"Studies on Crime and Crime Prevention"},{"issue":"1","key":"32_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF00337288","volume":"43","author":"T. Kohonen","year":"1982","unstructured":"Kohonen, T.: Self organising formation of topologically correct feature maps. Biological Cybernitics\u00a043(1), 59\u201369 (1982)","journal-title":"Biological Cybernitics"},{"key":"32_CR15","unstructured":"Policing and Reducing Crime Unit, Opportunity makes the thief: Practical theory for crime prevention. Police Research Paper 98, London; Home Office (1998)"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Reiss, A.J.: Co-offending and criminal careers. In: Tonry, M., Morris, N. (eds.) Crime and justice: A review of research, vol.\u00a010, pp. 117\u2013170 (1988)","DOI":"10.1086\/449145"},{"key":"32_CR17","volume-title":"Predictive data mining: a practical guide","author":"S.M. Weiss","year":"1998","unstructured":"Weiss, S.M., Indurkhya, N.: Predictive data mining: a practical guide. Morgan Kaufman Publishers Inc., San Francisco (1998)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:59:46Z","timestamp":1605743986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}