{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:25:16Z","timestamp":1740108316916,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:00:00Z","timestamp":1580428800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:00:00Z","timestamp":1580428800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100011818","name":"Data to Decisions Cooperative Research Centres","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011818","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s00607-020-00791-z","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T15:02:31Z","timestamp":1580482951000},"page":"1627-1651","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic event type recognition and tagging for data-driven insights in law-enforcement"],"prefix":"10.1007","volume":"102","author":[{"given":"Shayan","family":"Zamanirad","sequence":"first","affiliation":[]},{"given":"Boualem","family":"Benatallah","sequence":"additional","affiliation":[]},{"given":"Moshe Chai","family":"Barukh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7263-821X","authenticated-orcid":false,"given":"Carlos","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Nouri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,31]]},"reference":[{"key":"791_CR1","doi-asserted-by":"publisher","first-page":"S24","DOI":"10.1016\/j.diin.2012.05.007","volume":"9","author":"N Al\u00a0Mutawa","year":"2012","unstructured":"Al\u00a0Mutawa N, Baggili I, Marrington A (2012) Forensic analysis of social networking applications on mobile devices. Digit Invest 9:S24\u2013S33","journal-title":"Digit Invest"},{"key":"791_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/9780429258589","volume-title":"Practical statistics for medical research","author":"DG Altman","year":"1990","unstructured":"Altman DG (1990) Practical statistics for medical research. CRC Press, Boca Raton"},{"key":"791_CR3","doi-asserted-by":"crossref","unstructured":"Angeli G, Premkumar MJJ, Manning CD (2015) Leveraging linguistic structure for open domain information extraction. In: Proceedings of the 53rd annual meeting of the association for computational linguistics and the 7th international joint conference on natural language processing (vol 1: Long Papers), vol\u00a01, pp 344\u2013354","DOI":"10.3115\/v1\/P15-1034"},{"issue":"2","key":"791_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1075\/pc.14.2.14bab","volume":"14","author":"C Baber","year":"2006","unstructured":"Baber C, Smith P, Cross J, Hunter JE, McMaster R (2006) Crime scene investigation as distributed cognition. Pragmat Cognit 14(2):357\u2013385","journal-title":"Pragmat Cognit"},{"issue":"2","key":"791_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10115-013-0617-y","volume":"39","author":"ARM Basher","year":"2014","unstructured":"Basher ARM, Fung BC (2014) Analyzing topics and authors in chat logs for crime investigation. Knowl Inf Syst 39(2):351\u2013381","journal-title":"Knowl Inf Syst"},{"key":"791_CR6","unstructured":"Bojanowski P, Grave E, Joulin A, Mikolov T (2016) Enriching word vectors with subword information. arXiv preprint arXiv:1607.04606"},{"key":"791_CR7","unstructured":"Bolukbasi T, Chang K, Zou JY, Saligrama V, Kalai A (2016) Man is to computer programmer as woman is to homemaker? debiasing word embeddings. CoRR. arXiv:1607.06520"},{"key":"791_CR8","unstructured":"Chau M, Xu JJ, Chen H (2002) Extracting meaningful entities from police narrative reports. In: Proceedings of the 2002 annual national conference on Digital government research, pp 1\u20135. Digital Government Society of North America"},{"issue":"1","key":"791_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Meas 20(1):37\u201346","journal-title":"Educ Psychol Meas"},{"key":"791_CR10","doi-asserted-by":"crossref","unstructured":"Decherchi S, Tacconi S, Redi J, Leoncini A, Sangiacomo F, Zunino R (2009) Text clustering for digital forensics analysis. In: Herrero \u00c1, Gastaldo P, Zunino R, Corchado E (eds) Computational intelligence in security for information systems, Springer, Berlin, pp 29\u201336","DOI":"10.1007\/978-3-642-04091-7_4"},{"key":"791_CR11","unstructured":"Dheeru D, Karra\u00a0TE (2017) UCI machine learning repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/Legal+Case+Reports. Accessed 26 Mar 2019"},{"issue":"3","key":"791_CR12","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1093\/oxfordjournals.bjc.a047453","volume":"24","author":"RE Dobash","year":"1984","unstructured":"Dobash RE, Dobash RP (1984) The nature and antecedents of violent events. Br J Criminol 24(3):269\u2013288","journal-title":"Br J Criminol"},{"key":"791_CR13","doi-asserted-by":"crossref","unstructured":"Fast E, McGrath W, Rajpurkar P, Bernstein MS (2016) Augur: Mining human behaviors from fiction to power interactive systems. In: Proceedings of the 2016 CHI conference on human factors in computing systems. ACM, pp 237\u2013247","DOI":"10.1145\/2858036.2858528"},{"key":"791_CR14","doi-asserted-by":"crossref","unstructured":"Galgani F, Compton P, Hoffmann A (2012) Citation based summarisation of legal texts. In: Pacific rim international conference on artificial intelligence. Springer, Berlin, pp 40\u201352","DOI":"10.1007\/978-3-642-32695-0_6"},{"issue":"4","key":"791_CR15","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1080\/15230406.2013.779780","volume":"40","author":"M Helbich","year":"2013","unstructured":"Helbich M, Hagenauer J, Leitner M, Edwards R (2013) Exploration of unstructured narrative crime reports: an unsupervised neural network and point pattern analysis approach. Cartogr Geogr Inf Sci 40(4):326\u2013336","journal-title":"Cartogr Geogr Inf Sci"},{"key":"791_CR16","unstructured":"Insititute ALI (2018) Austlii: Free, comprehensive and independent access to australasian law. www.austlii.edu.au. Accessed 7 May 2018"},{"key":"791_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling LP, Littman ML, Moore AW (1996) Reinforcement learning: a survey. J Artif Intell Res 4:237\u2013285","journal-title":"J Artif Intell Res"},{"key":"791_CR18","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1016\/j.procs.2010.12.143","volume":"3","author":"MR Keyvanpour","year":"2011","unstructured":"Keyvanpour MR, Javideh M, Ebrahimi MR (2011) Detecting and investigating crime by means of data mining: a general crime matching framework. Proc Comput Sci 3:872\u2013880","journal-title":"Proc Comput Sci"},{"issue":"9","key":"791_CR19","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T Kohonen","year":"1990","unstructured":"Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464\u20131480","journal-title":"Proc IEEE"},{"key":"791_CR20","unstructured":"Ku CH, Iriberri A, Leroy G (2008) Natural language processing and e-government: crime information extraction from heterogeneous data sources. In: Proceedings of the 2008 international conference on Digital government research, pp 162\u2013170. Digital Government Society of North America"},{"key":"791_CR21","first-page":"114","volume":"3","author":"R Kumar","year":"2012","unstructured":"Kumar R, Raghuveer K (2012) Legal document summarization using latent dirichlet allocation. Int J Comput Sci Telecommun 3:114\u2013117","journal-title":"Int J Comput Sci Telecommun"},{"issue":"1","key":"791_CR22","first-page":"1","volume":"20","author":"A Lenci","year":"2008","unstructured":"Lenci A (2008) Distributional semantics in linguistic and cognitive research. Ital J Linguist 20(1):1\u201331","journal-title":"Ital J Linguist"},{"key":"791_CR23","doi-asserted-by":"crossref","unstructured":"Liu CL, Liao TM (2005) Classifying criminal charges in Chinese for web-based legal services. In: Asia-pacific web conference, pp 64\u201375. Springer, Berlin","DOI":"10.1007\/978-3-540-31849-1_8"},{"issue":"3","key":"791_CR24","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1109\/TII.2013.2255616","volume":"9","author":"H Liu","year":"2013","unstructured":"Liu H, Chen S, Kubota N (2013) Intelligent video systems and analytics: a survey. IEEE Trans Ind Inf 9(3):1222\u20131233","journal-title":"IEEE Trans Ind Inf"},{"key":"791_CR25","doi-asserted-by":"crossref","unstructured":"Liu X, Jian C, Lu CT (2010) A spatio-temporal-textual crime search engine. In: Proceedings of the 18th SIGSPATIAL International conference on advances in geographic information systems, pp 528\u2013529. ACM","DOI":"10.1145\/1869790.1869881"},{"key":"791_CR26","doi-asserted-by":"crossref","unstructured":"Lu Q, Conrad JG, Al-Kofahi K, Keenan W (2011) Legal document clustering with built-in topic segmentation. In: Proceedings of the 20th ACM international conference on Information and knowledge management. ACM","DOI":"10.1145\/2063576.2063636"},{"key":"791_CR27","doi-asserted-by":"crossref","unstructured":"Luo B, Feng Y, Xu J, Zhang X, Zhao D (2017) Learning to predict charges for criminal cases with legal basis. arXiv preprint arXiv:1707.09168","DOI":"10.18653\/v1\/D17-1289"},{"key":"791_CR28","volume-title":"Evidence, argument, and persuasion in the policy process","author":"G Majone","year":"1989","unstructured":"Majone G (1989) Evidence, argument, and persuasion in the policy process. Yale University Press, London"},{"key":"791_CR29","doi-asserted-by":"crossref","unstructured":"Manning C, Surdeanu M, Bauer J, Finkel J, Bethard S, McClosky D (2014) The stanford corenlp natural language processing toolkit. In: Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations, pp 55\u201360","DOI":"10.3115\/v1\/P14-5010"},{"key":"791_CR30","volume-title":"Foundations of statistical natural language processing","author":"CD Manning","year":"1999","unstructured":"Manning CD, Sch\u00fctze H (1999) Foundations of statistical natural language processing. MIT Press, Cambridge"},{"key":"791_CR31","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Burges CJC, Bottou L, Welling M, Ghahramani Z, Weinberger KQ (eds) Advances in neural information processing systems. Curran Associates Inc., pp. 3111\u20133119"},{"issue":"1","key":"791_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1075\/li.30.1.03nad","volume":"30","author":"D Nadeau","year":"2007","unstructured":"Nadeau D, Sekine S (2007) A survey of named entity recognition and classification. Lingvist Invest 30(1):3\u201326","journal-title":"Lingvist Invest"},{"key":"791_CR33","doi-asserted-by":"crossref","unstructured":"Pandita R, Xiao X, Zhong H, Xie T, Oney S, Paradkar A (2012) Inferring method specifications from natural language API descriptions. In: 2012 34th international conference on software engineering (ICSE), pp 815\u2013825. IEEE","DOI":"10.1109\/ICSE.2012.6227137"},{"key":"791_CR34","unstructured":"Polsley S, Jhunjhunwala P, Huang R (2016) Casesummarizer: A system for automated summarization of legal texts. In: Proceedings of COLING 2016, the 26th international conference on computational linguistics: system demonstrations, pp 258\u2013262"},{"issue":"1","key":"791_CR35","first-page":"34","volume":"2","author":"K Raghuveer","year":"2012","unstructured":"Raghuveer K (2012) Legal documents clustering using latent dirichlet allocation. IAES Int J Artif Intell 2(1):34\u201337","journal-title":"IAES Int J Artif Intell"},{"issue":"1","key":"791_CR36","first-page":"38","volume":"1","author":"T Richard","year":"2009","unstructured":"Richard T (2009) Qualitative versus quantitative methods: understanding why qualitative methods are superior for criminology and criminal justice. J Theor Philos Criminol 1(1):38\u201358","journal-title":"J Theor Philos Criminol"},{"issue":"5","key":"791_CR37","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/0098-3004(93)90099-Q","volume":"19","author":"BS Rowlingson","year":"1993","unstructured":"Rowlingson BS, Diggle PJ (1993) Splancs: spatial point pattern analysis code in s-plus. Comput Geosci 19(5):627\u2013655","journal-title":"Comput Geosci"},{"key":"791_CR38","unstructured":"Soria C, Bartolini R, Lenci A, Montemagni S, Pirrelli V (2007) Automatic extraction of semantics in law documents. In: Proceedings of the V legislative XML workshop, pp 253\u2013266"},{"key":"791_CR39","unstructured":"Speer R, Chin J, Havasi C (2017) Conceptnet 5.5: An open multilingual graph of general knowledge. In: Proceedings of the thirty-first AAAI conference on artificial intelligence (AAAI-17). AAAI Press, pp 4444\u20134451"},{"issue":"1","key":"791_CR40","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/08964289.1989.9935146","volume":"15","author":"E Stotland","year":"1989","unstructured":"Stotland E, Pendleton M (1989) Workload, stress, and strain among police officers. Behav Med 15(1):5\u201317","journal-title":"Behav Med"},{"key":"791_CR41","unstructured":"Sulea OM, Zampieri M, Vela M, van Genabith J (2017) Predicting the law area and decisions of French supreme court cases. arXiv preprint arXiv:1708.01681"},{"key":"791_CR42","doi-asserted-by":"crossref","unstructured":"Sun Z, Lim EP, Chang K, Ong TK, Gunaratna RK (2005) Event-driven document selection for terrorism information extraction. In: International conference on intelligence and security informatics, pp. 37\u201348. Springer","DOI":"10.1007\/11427995_4"},{"key":"791_CR43","unstructured":"Tao Y, Papadias D (2001) Efficient historical r-trees. In: Thirteenth international conference on scientific and statistical database management, 2001. SSDBM 2001. Proceedings, pp 223\u2013232. IEEE"},{"issue":"3","key":"791_CR44","first-page":"13","volume":"2","author":"J Vig","year":"2012","unstructured":"Vig J, Sen S, Riedl J (2012) The tag genome: Encoding community knowledge to support novel interaction. ACM Trans Interact Intell Syst (TIIS) 2(3):13","journal-title":"ACM Trans Interact Intell Syst (TIIS)"},{"key":"791_CR45","doi-asserted-by":"crossref","unstructured":"Wallach HM (2006) Topic modeling: beyond bag-of-words. In: Proceedings of the 23rd international conference on machine learning, pp. 977\u2013984. ACM","DOI":"10.1145\/1143844.1143967"},{"key":"791_CR46","volume-title":"Data mining: practical machine learning tools and techniques","author":"IH Witten","year":"2016","unstructured":"Witten IH, Frank E, Hall MA, Pal CJ (2016) Data mining: practical machine learning tools and techniques. Morgan Kaufmann, Burlington"},{"key":"791_CR47","doi-asserted-by":"crossref","unstructured":"Zheng R, Qin Y, Huang Z, Chen H (2003) Authorship analysis in cybercrime investigation. In: International conference on intelligence and security informatics, pp. 59\u201373. Springer, Berlin","DOI":"10.1007\/3-540-44853-5_5"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00791-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-020-00791-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00791-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:44:06Z","timestamp":1611967446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-020-00791-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,31]]},"references-count":47,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["791"],"URL":"https:\/\/doi.org\/10.1007\/s00607-020-00791-z","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2020,1,31]]},"assertion":[{"value":"1 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}