{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:45:50Z","timestamp":1771922750215,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/snams67467.2025.11391118","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:45:45Z","timestamp":1771879545000},"page":"524-531","source":"Crossref","is-referenced-by-count":0,"title":["The Scope of Artificial Intelligence Applications in Predicting Criminal Behaviour"],"prefix":"10.1109","author":[{"given":"Fatima Musallem","family":"Alderei","sequence":"first","affiliation":[{"name":"Al Ain University,College of Law,Al Ain,UAE"}]},{"given":"Mohammad Amin","family":"Alkrisheh","sequence":"additional","affiliation":[{"name":"Al Ain University,College of Law,Al Ain,UAE"}]},{"given":"Ranya Shaban","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Al Ain University,College of Law,Al Ain,UAE"}]},{"given":"Muna","family":"Alameri","sequence":"additional","affiliation":[{"name":"Al Ain University,College of Law,Al Ain,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.33327\/ajee-18-8.2-r000110"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssaho.2022.100342"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s12103-022-09715-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.22495\/jgrv11i4siart3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/acit57182.2022.9994099"},{"key":"ref6","article-title":"Forecasting and Its Role in Decision Making","author":"Karamallah","year":"1982","journal-title":"Al-Idarah al-\u2018Aammah (Journal of Public Administration), no. 32, Institute of Public Administration, Saudi Arabia"},{"key":"ref7","article-title":"The extent of using forecasting methods in estimating the demand for industrial products in Jeddah","author":"Al-Shoaibi","year":"1995","journal-title":"Journal of Public Administration, no. 2, Institute of Public Administration, Saudi Arabia"},{"key":"ref8","first-page":"1","article-title":"Towards hour-level crime prediction: A neural attentive hierarchical crime prediction framework (NAHC)","volume":"496","author":"Liang","year":"2022","journal-title":"Neurocomputing"},{"issue":"47","key":"ref9","article-title":"Evaluation of scientific heritage and the development of an expert system for portfolio management","author":"Al-Jaziri","year":"1994","journal-title":"Journal of Accounting and Management"},{"key":"ref10","article-title":"Teaching seismic-resistant structural analysis and design using artificial intelligence techniques","volume-title":"Proc. Saudi Engineering Conf., King Fahd Univ. of Petroleum and Minerals","author":"Barais"},{"issue":"110","key":"ref11","article-title":"The role of artificial intelligence systems in crime prediction","volume":"28","author":"Al-Babli","year":"2019","journal-title":"Police Thought Journal"},{"issue":"47","key":"ref12","article-title":"Evaluation of scientific heritage and the development of an expert system for portfolio management","author":"Al-Jaziri","year":"1994","journal-title":"Journal of Accounting and Management"},{"issue":"2","key":"ref13","article-title":"Expert systems technology: Concepts and applications","author":"Bamflah","year":"2000","journal-title":"King Fahd National Library Journal"},{"key":"ref14","article-title":"DNA fingerprinting and its probative value in evidence: A comparative analytical study","volume-title":"the Conf. on the Development of Litigation Systems and the Modernisation of Rules of Evidence, College of Law, Sultan Qaboos Univ.","author":"Al-Hajjar"},{"issue":"3","key":"ref15","article-title":"The legal limits of using DNA fingerprinting in criminal evidence","author":"Mahmoudi","year":"2020","journal-title":"Al-Bahith Journal of Academic Studies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.33327\/ajee-18-7.3-a000302"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2022.101789"},{"key":"ref18","article-title":"The use of artificial intelligence techniques and data analytics in crime detection","author":"Ali","year":"2023","journal-title":"Journal of Legal and Economic Studies"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-022-00366-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-criminol-051520-012342"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.22495\/jgrv11i3art12"},{"issue":"307","key":"ref22","article-title":"Information Technologies and Terrorism in the Light of Modern Technological Development","author":"Al-Qahtani","year":"2017","journal-title":"Security and Life Journal"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/acit57182.2022.9994174"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101904"},{"key":"ref25","volume-title":"The Electronic Forensic Evidence: A Comparative Study","author":"Shams El-Din","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.62271\/pjc.16.2.47.60"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/acit57182.2022.9994108"},{"issue":"4","key":"ref28","article-title":"Guarantees to the use of telecommunication technology in criminal proceedings in the United Arab Emirates legislation","volume":"10","author":"Alkrisheh","year":"2020","journal-title":"The Lawyer Quarterly"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/acit57182.2022.9994165"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2021.3096024"}],"event":{"name":"2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Vienna, Austria","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11390733\/11390881\/11391118.pdf?arnumber=11391118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:40:38Z","timestamp":1771918838000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/snams67467.2025.11391118","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}