| |
| |
Foreword | |
| |
| |
Preface | |
| |
| |
Introduction | |
| |
| |
Introductory Section | |
| |
| |
| |
Basics | |
| |
| |
| |
Basic Statistics | |
| |
| |
| |
Inferential versus Descriptive Statistics and Data Mining | |
| |
| |
| |
Population versus Samples | |
| |
| |
| |
Modeling | |
| |
| |
| |
Errors | |
| |
| |
| |
Overfitting the Model | |
| |
| |
| |
Generalizability versus Accuracy | |
| |
| |
| |
Input/Output | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Domain Expertise | |
| |
| |
| |
Domain Expertise | |
| |
| |
| |
Domain Expertise for Analysts | |
| |
| |
| |
Compromise | |
| |
| |
| |
Analyze Your Own Data | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Data Mining | |
| |
| |
| |
Discovery and Prediction | |
| |
| |
| |
Confirmation and Discovery | |
| |
| |
| |
Surprise | |
| |
| |
| |
Characterization | |
| |
| |
| |
"Volume Challenge" | |
| |
| |
| |
Exploratory Graphics and Data Exploration | |
| |
| |
| |
Link Analysis | |
| |
| |
| |
Nonobvious Relationship Analysis (NORA) | |
| |
| |
| |
Text Mining | |
| |
| |
| |
Future Trends | |
| |
| |
| |
Bibliography | |
| |
| |
Methods | |
| |
| |
| |
Process Models for Data Mining and Analysis | |
| |
| |
| |
CIA Intelligence Process | |
| |
| |
| |
CRISP-DM | |
| |
| |
| |
Actionable Mining and Predictive Analysis for Public Safety and Security | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Data | |
| |
| |
| |
Getting Started | |
| |
| |
| |
Types of Data | |
| |
| |
| |
Data | |
| |
| |
| |
Types of Data Resources | |
| |
| |
| |
Data Challenges | |
| |
| |
| |
How Do We Overcome These Potential Barriers? | |
| |
| |
| |
Duplication | |
| |
| |
| |
Merging Data Resources | |
| |
| |
| |
Public Health Data | |
| |
| |
| |
Weather and Crime Data | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Operationally Relevant Preprocessing | |
| |
| |
| |
Operationally Relevant Recoding | |
| |
| |
| |
Trinity Sight | |
| |
| |
| |
Duplication | |
| |
| |
| |
Data Imputation | |
| |
| |
| |
Telephone Data | |
| |
| |
| |
Conference Call Example | |
| |
| |
| |
Internet Data | |
| |
| |
| |
Operationally Relevant Variable Selection | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Predictive Analytics | |
| |
| |
| |
How to Select a Modeling Algorithm, Part I | |
| |
| |
| |
Generalizability versus Accuracy | |
| |
| |
| |
Link Analysis | |
| |
| |
| |
Supervised versus Unsupervised Learning Techniques | |
| |
| |
| |
Discriminant Analysis | |
| |
| |
| |
Unsupervised Learning Algorithms | |
| |
| |
| |
Neural Networks | |
| |
| |
| |
Kohonan Network Models | |
| |
| |
| |
How to Select a Modeling Algorithm, Part II | |
| |
| |
| |
Combining Algorithms | |
| |
| |
| |
Anomaly Detection | |
| |
| |
| |
Internal Norms | |
| |
| |
| |
Defining "Normal" | |
| |
| |
| |
Deviations from Normal Patterns | |
| |
| |
| |
Deviations from Normal Behavior | |
| |
| |
| |
Warning! Screening versus Diagnostic | |
| |
| |
| |
A Perfect World Scenario | |
| |
| |
| |
Tools of the Trade | |
| |
| |
| |
General Considerations and Some Expert Options | |
| |
| |
| |
Variable Entry | |
| |
| |
| |
Prior Probabilities | |
| |
| |
| |
Costs | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Public Safety-Specific Evaluation | |
| |
| |
| |
Outcome Measures | |
| |
| |
| |
Think Big | |
| |
| |
| |
Training and Test Samples | |
| |
| |
| |
Evaluating the Model | |
| |
| |
| |
Updating or Refreshing the Model | |
| |
| |
| |
Caveat Emptor | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Operationally Actionable Output | |
| |
| |
| |
Actionable Output | |
| |
| |
Applications | |
| |
| |
| |
Normal Crime | |
| |
| |
| |
Knowing Normal | |
| |
| |
| |
"Normal" Criminal Behavior | |
| |
| |
| |
Get to Know "Normal" Crime Trends and Patterns | |
| |
| |
| |
Staged Crime | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Behavioral Analysis of Violent Crime | |
| |
| |
| |
Case-Based Reasoning | |
| |
| |
| |
Homicide | |
| |
| |
| |
Strategic Characterization | |
| |
| |
| |
Automated Motive Determination | |
| |
| |
| |
Drug-Related Violence | |
| |
| |
| |
Aggravated Assault | |
| |
| |
| |
Sexual Assault | |
| |
| |
| |
Victimology | |
| |
| |
| |
Moving from Investigation to Prevention | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Risk and Threat Assessment | |
| |
| |
| |
Risk-Based Deployment | |
| |
| |
| |
Experts versus Expert Systems | |
| |
| |
| |
"Normal" Crime | |
| |
| |
| |
Surveillance Detection | |
| |
| |
| |
Strategic Characterization | |
| |
| |
| |
Vulnerable Locations | |
| |
| |
| |
Schools | |
| |
| |
| |
Data | |
| |
| |
| |
Accuracy versus Generalizability | |
| |
| |
| |
"Cost" Analysis | |
| |
| |
| |
Evaluation | |
| |
| |
| |
Output | |
| |
| |
| |
Novel Approaches to Risk and Threat Assessment | |
| |
| |
| |
Bibliography | |
| |
| |
Case Examples | |
| |
| |
| |
Deployment | |
| |
| |
| |
Patrol Services | |
| |
| |
| |
Structuring Patrol Deployment | |
| |
| |
| |
Data | |
| |
| |
| |
How To | |
| |
| |
| |
Tactical Deployment | |
| |
| |
| |
Risk-Based Deployment Overview | |
| |
| |
| |
Operationally Actionable Output | |
| |
| |
| |
Risk-Based Deployment Case Studies | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Surveillance Detection | |
| |
| |
| |
Surveillance Detection and Other Suspicious Situations | |
| |
| |
| |
Natural Surveillance | |
| |
| |
| |
Location, Location, Location | |
| |
| |
| |
More Complex Surveillance Detection | |
| |
| |
| |
Internet Surveillance Detection | |
| |
| |
| |
How To | |
| |
| |
| |
Summary | |
| |
| |
| |
Bibliography | |
| |
| |
Advanced Concepts and Future Trends | |
| |
| |
| |
Advanced Topics | |
| |
| |
| |
Intrusion Detection | |
| |
| |
| |
Identify Theft | |
| |
| |
| |
Syndromic Surveillance | |
| |
| |
| |
Data Collection, Fusion and Preprocessing | |
| |
| |
| |
Text Mining | |
| |
| |
| |
Fraud Detection | |
| |
| |
| |
Consensus Opinions | |
| |
| |
| |
Expert Options | |
| |
| |
| |
Bibliography | |
| |
| |
| |
Future Trends | |
| |
| |
| |
Text Mining | |
| |
| |
| |
Fusion Centers | |
| |
| |
| |
"Functional" Interoperability | |
| |
| |
| |
"Virtual" Warehouses | |
| |
| |
| |
Domain-Specific Tools | |
| |
| |
| |
Closing Thoughts | |
| |
| |
| |
Bibliography | |
| |
| |
Index | |