Academic literature on the topic 'Detection of crimes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Detection of crimes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Detection of crimes"

1

Slinko, Sergey V., Pylyp S. Yepryntsev, Artem O. Shapar, Dmytro B. Sanakoiev, and Alina H. Harkusha. "Modern indicators of financial crimes detection and their prevention in Ukraine." Revista Amazonia Investiga 10, no. 44 (2021): 61–72. http://dx.doi.org/10.34069/ai/2021.44.08.6.

Full text
Abstract:
The increase in the level of financial crime is caused by the technological development, weak moni-toring of financial institutions, low level of international cooperation in terms of combating these types of crimes. The paper aims to develop effective ways to combat financial crimes in Ukraine. With the help of a systematic analysis of financial crime modern indicators, theoretical sources, prac-tical measures and international experience, the main indicators of financial crimes are identified. Such indicators are the use of false documents and other people's accounts, international payment s
APA, Harvard, Vancouver, ISO, and other styles
2

Slinko, Sergey V., Pylyp S. Yepryntsev, Artem O. Shapar, Dmytro B. Sanakoiev, and Alina H. Harkusha. "Modern indicators of financial crimes detection and their prevention in Ukraine." Revista Amazonia Investiga 10, no. 44 (2021): 61–72. http://dx.doi.org/10.34069/ai/2021.44.08.6.

Full text
Abstract:
The increase in the level of financial crime is caused by the technological development, weak moni-toring of financial institutions, low level of international cooperation in terms of combating these types of crimes. The paper aims to develop effective ways to combat financial crimes in Ukraine. With the help of a systematic analysis of financial crime modern indicators, theoretical sources, prac-tical measures and international experience, the main indicators of financial crimes are identified. Such indicators are the use of false documents and other people's accounts, international payment s
APA, Harvard, Vancouver, ISO, and other styles
3

Junoh, Ahmad Kadri, Muhammad Naufal Mansor, Alezar Mat Ya'acob, Farah Adibah Adnan, Syafawati Ab Saad, and Nornadia Mohd Yazid. "Crime Detection with ICA and Artificial Intelligent Approach." Advanced Materials Research 816-817 (September 2013): 616–22. http://dx.doi.org/10.4028/www.scientific.net/amr.816-817.616.

Full text
Abstract:
The Rise of Crime in Malaysia reported that violent crimes comprised only 10% of reported crimes each year and the majority of crimes, 90%, were classified as property crimes. However, the ratio of police to population is 3.6 officers to 1,000 citizens in Malaysia. This lack of manpower sources ratios alone are not a comprehensive afford of crime fighting capabilities. Thus, we proposed an Artificial Intelligent Techniques to determine the behaviour of the burglar with Independent Component Analysis (ICA), Linear Discriminant Analysis (LDA) and k Nearest Neighbor (k-NN) Classifier. This system
APA, Harvard, Vancouver, ISO, and other styles
4

Prof., Suman Acharya. "Crime Analytics using Machine Learning." International Journal of Inventive Engineering and Sciences (IJIES) 10, no. 3 (2023): 1–5. https://doi.org/10.35940/ijies.F7444.0310323.

Full text
Abstract:
<strong>Abstract: </strong>Crime is one of the most significant and pervasive problems in our society, and preventing it is a crucial duty. A large number of crimes are perpetrated each day. Maintaining and analyzing crime data to forecast and solve crimes is the current issue. This project analyzes a large dataset of crimes and predicts future crimes based on conditions. This project uses data science and machine learning for India&#39;s crime data prediction. Thus, Decision Tree, Logistic Regression, Multi-Regression, k-NN, Lasso &amp; Ridge, and Random Forest are all involved in the supervi
APA, Harvard, Vancouver, ISO, and other styles
5

Khyioon Abdalrdha, Zainab, Abbas Mohsin Al-Bakry, and Alaa K. Farhan. "A Survey on Cybercrime Using Social Media." Iraqi Journal for Computers and Informatics 49, no. 1 (2023): 52–65. http://dx.doi.org/10.25195/ijci.v49i1.404.

Full text
Abstract:
There is growing interest in automating crime detection and prevention for large populations as a result of the increased usage of social media for victimization and criminal activities. This area is frequently researched due to its potential for enabling criminals to reach a large audience. While several studies have investigated specific crimes on social media, a comprehensive review paper that examines all types of social media crimes, their similarities, and detection methods is still lacking. The identification of similarities among crimes and detection methods can facilitate knowledge an
APA, Harvard, Vancouver, ISO, and other styles
6

Pertsev, R. "RESEARCH ON MODERN FORENSIC METHODS OF DETECTION, RECORD, SEIZURE OF SHOEPRINTS AND THEIR FURTHER ACCOUNTING FOR CRIME DETECTION." Theory and Practice of Forensic Science and Criminalistics 21, no. 1 (2020): 106–19. http://dx.doi.org/10.32353/khrife.1.2020_07.

Full text
Abstract:
Shoe prints that have been traced by crime scene investigators at the crime scene can provide information relating to a criminal or a group of criminals that have committed it, and serve as evidence while pre-trial investigation. Furthermore, shoe prints provide information on the possible participation of the same person in different types of crimes (to integrate crimes).&#x0D; At present, the number of crimes related to stealing civilian properties, including robbery, has significantly increased as a result of economic crisis in many countries around the world.&#x0D; As the studies and the p
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Gabriel, Matthew Manning, T. Wing Lo, and Shane D. Johnson. "Triad influence on the detection of crime in Hong Kong." PLOS ONE 19, no. 2 (2024): e0297145. http://dx.doi.org/10.1371/journal.pone.0297145.

Full text
Abstract:
We use bootstrap data envelopment analysis, adjusting for endogeneity, to examine police efficiency in detecting crime in Hong Kong. We address the following: (i) is there a correlation between the detection of crime and triad influence? (ii) does the level of triad influence affect the efficiency in translating inputs (police strength) into outputs (crime detection)? and (iii) how can the allocation of policing resources be adjusted to improve crime detection? We find that nighty-eight percent of Hong Kong police districts in our sample were found to be inefficient in the detection of crime.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xinyu. "General Perception: Multiple Influential Factors of Violent Crimes." Lecture Notes in Education Psychology and Public Media 5, no. 1 (2023): 645–50. http://dx.doi.org/10.54254/2753-7048/5/20220740.

Full text
Abstract:
This paper provides a general view of factors contributing to violent crimes and possible detection and prevention measures. Based on the published papers, the significant number of crimes and extraordinarily negative social impacts worldwide make the potential reasons worthwhile and necessary to explore. In this paper, four main aspects biological factors (genes, etc.), personality disorders, parenting styles (permissive parenting styles, etc.), and social or environmental influences (income level, etc.) are summarized and discussed respectively. Although factors are discussed separately, a c
APA, Harvard, Vancouver, ISO, and other styles
9

Acharya, Prof Suman. "Crime Analytics using Machine Learning." International Journal of Inventive Engineering and Sciences 10, no. 3 (2023): 1–5. http://dx.doi.org/10.35940/ijies.f7444.0310323.

Full text
Abstract:
Crime is one of the most significant and pervasive problems in our society, and preventing it is a crucial duty. A large number of crimes are perpetrated each day. Maintaining and analyzing crime data to forecast and solve crimes is the current issue. This project analyzes a large dataset of crimes and predicts future crimes based on conditions. This project uses data science and machine learning for India's crime data prediction. Thus, Decision Tree, Logistic Regression, Multi-Regression, k-NN, Lasso &amp; Ridge, and Random Forest are all involved in the supervised classification problem. Pre
APA, Harvard, Vancouver, ISO, and other styles
10

Dr., S. S. Sreeja Mole, K. Sujatha Dr., Devi Kala Rathinam D., Santhiya Grace A., and K. Bhuvana M. "THE CRIME DETECTION SYSTEM FOR WOMEN." International Journal of Computational Research and Development 3, no. 1 (2018): 39–43. https://doi.org/10.5281/zenodo.1165250.

Full text
Abstract:
India is most traditional country throughout the world. In India they give more respect for the women. Nowadays there are many crimes occur in our major cities like Delhi, Mumbai etc. In India, for every one hour 26 crimes occurs against women and recent survey says that for every two minutes the occurrence of crime is one. In last decades the women&rsquo;s are uneducated and they completely depend on men&rsquo;s. But now days the women&rsquo;s are educated and there are travelling throughout the world. Our government proposed the act Dowry Prohibition Act, 1961. Using this act the dowry has b
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Detection of crimes"

1

Hendry, Gilbert R. "Applicability of clustering to cyber intrusion detection /." Online version of thesis, 2007. http://hdl.handle.net/1850/4777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Foster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tsudama, Brett. "A novel distributed denial-of-service detection algorithm." DigitalCommons@CalPoly, 2004. https://digitalcommons.calpoly.edu/theses/1650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gu, Guofei. "Correlation-based Botnet Detection in Enterprise Networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24634.

Full text
Abstract:
Most of the attacks and fraudulent activities on the Internet are carried out by malware. In particular, botnets, as state-of-the-art malware, are now considered as the largest threat to Internet security. In this thesis, we focus on addressing the botnet detection problem in an enterprise-like network environment. We present a comprehensive correlation-based framework for multi-perspective botnet detection consisting of detection technologies demonstrated in four complementary systems: BotHunter, BotSniffer, BotMiner, and BotProbe. The common thread of these systems is correlation analysis,
APA, Harvard, Vancouver, ISO, and other styles
5

Hashem, Yassir. "Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc1248460/.

Full text
Abstract:
Insider threat is one of the greatest concerns for information security that could cause more significant financial losses and damages than any other attack. However, implementing an efficient detection system is a very challenging task. It has long been recognized that solutions to insider threats are mainly user-centric and several psychological and psychosocial models have been proposed. A user's psychophysiological behavior measures can provide an excellent source of information for detecting user's malicious behaviors and mitigating insider threats. In this dissertation, we propose a mult
APA, Harvard, Vancouver, ISO, and other styles
6

Hashem, Yassir. "A Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1248460/.

Full text
Abstract:
Insider threat is one of the greatest concerns for information security that could cause more significant financial losses and damages than any other attack. However, implementing an efficient detection system is a very challenging task. It has long been recognized that solutions to insider threats are mainly user-centric and several psychological and psychosocial models have been proposed. A user's psychophysiological behavior measures can provide an excellent source of information for detecting user's malicious behaviors and mitigating insider threats. In this dissertation, we propose a mult
APA, Harvard, Vancouver, ISO, and other styles
7

Do, Van Long. "Sequential detection and isolation of cyber-physical attacks on SCADA systems." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0032/document.

Full text
Abstract:
Cette thèse s’inscrit dans le cadre du projet « SCALA » financé par l’ANR à travers le programme ANR-11-SECU-0005. Son objectif consiste à surveiller des systèmes de contrôle et d’acquisition de données (SCADA) contre des attaques cyber-physiques. Il s'agit de résoudre un problème de détection-localisation séquentielle de signaux transitoires dans des systèmes stochastiques et dynamiques en présence d'états inconnus et de bruits aléatoires. La solution proposée s'appuie sur une approche par redondance analytique composée de deux étapes : la génération de résidus, puis leur évaluation. Les rési
APA, Harvard, Vancouver, ISO, and other styles
8

Shbair, Mohammed K. S. "Contribution of mass spectrometry for the detection of xenobiotics implicated in cases of drug-facilitated crimes and the quantitation of urinary metabolites of polycyclic aromatic hydrocarbons." Phd thesis, Université du Droit et de la Santé - Lille II, 2011. http://tel.archives-ouvertes.fr/tel-00647316.

Full text
Abstract:
Les méthodes actuelles d'analyse pour rechercher des xénobiotiques et/ou leurs métabolites dans les liquides biologiques peuvent dans certaines occasions manquer de sensibilité. Ainsi, il est souvent difficile de mettre en évidence les substances utilisées par des agresseurs pour commettre des actes délictuels sur leurs victimes (vols ou encore viols), parce que ces substances administrées en très faibles quantités ont généralement des demi-vies courtes, ou que les recherches de ces substances se font plusieurs jours après l'agression. De même dans le cadre de l'exposition aux polluants de l'e
APA, Harvard, Vancouver, ISO, and other styles
9

Grover, Vikas. "Crime prediction and detection with data mining." Thesis, University of Portsmouth, 2009. https://researchportal.port.ac.uk/portal/en/theses/crime-prediction-and-detection-with-data-mining(51a8e1ce-3841-4288-adb2-a4e9bc6748e3).html.

Full text
Abstract:
Data mining technologies have been used by marketers to provide personalisation. In other words, the exact placement of the right offer to the right person at the right time. The police can apply this technique for providing the right inquiry to the right perpetrators at the right time, before or after person has committed a crime. The aim of this Thesis is to use data mining in operational policing for crime prediction and detection. Crime data contains rich information. However, it is inconsistent, incomplete and noisy thus making it difficult to get any useful information from it. The goal
APA, Harvard, Vancouver, ISO, and other styles
10

O'Toole, Dennis Michael. "Crime under the influence : the effects of alcohol intoxication during a crime on subsequent physiological detection of deception." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/29043.

Full text
Abstract:
Eighty male undergraduate students were randomly assigned to one of five groups in an analogue investigation of crime-intoxication on the physiological detection of deception. Sixty-four of the subjects committed a mock crime and half of these were legally intoxicated during the crime. Sixteen subjects committed no crime and served as innocent controls. Results only partially replicated those of Bradley and Ainsworth (1984). Whereas they found crime-intoxication diminished the effectiveness of both the control question test (CQT) and the guilty knowledge test (GKT), the present study found cri
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Detection of crimes"

1

Nossen, Richard A. The detection, investigation, and prosecution of financial crimes. 2nd ed. Thoth Books, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thomas, Hoobler, ed. The crimes of Paris: A true story of murder, theft, and detection. Little, Brown and Co., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haining, Peter. Great tales of crime and detection: The world's most famous detectives and the crimes they have solved. Smithbooks, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, Massachusetts Attorney General's. Fraud detection and prosecution: Combatting the "fraud tax". Attorney General, Commonwealth of Massachusetts, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

New York (State). Dept. of Audit and Control. Division of Management Audit. Non-profit health insurance companies, fraud prevention and detection activities. The Division, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ghana National Chamber of Commerce. Business fraud in a free market environment: Detection & prevention : a seminar. The Chamber?, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Club, The Detection. The anatomy of murder: Famous crimes critically considered by members of the Detection Club. HarperCollinsPublishers, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gottschalk, Petter. White-Collar Crime in the Shadow Economy: Lack of Detection, Investigation and Conviction Compared to Social Security Fraud. Springer Nature, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International, Symposium on Explosive Detection Technology (1st 1991 Atlantic City N. J. ). Proceedings of the First International Symposium on Explosive Detection Technology: November 13-15, 1991. FAA Technical Center, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Detection of crimes"

1

Suzumura, Toyotaro, Yi Zhou, Ryo Kawahara, Nathalie Baracaldo, and Heiko Ludwig. "Federated Learning for Collaborative Financial Crimes Detection." In Federated Learning. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96896-0_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jabir, Raja, and Omar Alfandi. "Cloud Digital Forensics Evaluation and Crimes Detection." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67837-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Ran, and Junhao Bao. "Research on Financial Crimes Detection based on Big Data Technology." In Atlantis Highlights in Social Sciences, Education and Humanities. Atlantis Press International BV, 2023. http://dx.doi.org/10.2991/978-94-6463-276-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patra, Manas Ranjan, and Bipin Bihari Jayasingh. "A Software Agent Based Approach for Fraud Detection in Network Crimes." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30176-9_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abdalrdha, Zainab Khyioon, Abbas Mohsin Al-Bakry, and Alaa K. Farhan. "Crimes Tweet Detection Based on CNN Hyperparameter Optimization Using Snake Optimizer." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62814-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Villamor Medina, Eduardo, Theodora Tsikrika, Piero Fraternali, et al. "PERIVALLON: Improved Intelligence Picture and Operational Capacities to Combat Organised Environmental Crime." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_16.

Full text
Abstract:
AbstractPERIVALLON is a Horizon Europe co-funded Innovation Action project, entitled ‘Protecting the European territory from organised environmental crime through intelligent threat detection tools’ that started in December 2022 and focuses on combatting organised environmental crime by: (1) delivering an environmental crime observatory aiming to provide an improved and comprehensive intelligence picture of organised environmental crime, (2) developing an environmental crime detection and investigation platform at the forefront of technological innovation and (3) improving capacity building an
APA, Harvard, Vancouver, ISO, and other styles
7

Mylonas, Nikolaos, Nikolaos Stylianou, Despoina Chatzakou, et al. "Online Child Grooming Detection: Challenges and Future Directions." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_19.

Full text
Abstract:
AbstractIn the era of ever-growing online social networking communities, reports of online crimes of various forms and targeting are growing exponentially, highlighting the imperative need for the development and enforcement of solutions and measures aimed at early detection and prevention. Specifically, in today’s landscape, child sexual abuse (CSA) and especially online grooming activities are even more prominent given the more intense involvement of young people in these communities. Grooming detection techniques, designed using machine learning, have been at the forefront of prevention and
APA, Harvard, Vancouver, ISO, and other styles
8

Kamchatov, Kirill V. "Social Engineering as a Way of Committing Computer Crimes: Detection, Suppression, and Prevention." In Complex Social Systems in Dynamic Environments. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23856-7_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jain, Vanshika, Suhana Khandelwal, Surbhi Sharma, Ritu Rani, Poonam Bansal, and Amita Dev. "Mitigating Weapon-Related Crimes: A Comparative Analysis of YOLO Models for Automated Detection." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3355-5_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Chen, Yu-Lai Zheng, Qiang Wang, Yong Li, and Zi-Han Li. "Monte Carlo Simulation and Analysis of Specified Element Samples by Nuclear Resonance Fluorescence Detection." In Springer Proceedings in Physics. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1023-6_83.

Full text
Abstract:
AbstractThe detection of explosives and drugs in large cargo distribution centers such as customs and logistics stations has a great effect on preventing smuggling crimes and terrorist incidents. However, the relatively thick shielding of container cargo makes the material composition information obtained by conventional detection methods such as X-ray transmission detection and imaging technology very limited. Nuclear Resonance Fluorescence (NRF) is an emerging nondestructive assay technology that uses the specific resonance energy of nuclides to identify unknown nuclides, which can be used t
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Detection of crimes"

1

Naeem, Md Niamatullah, Ongsaiu Marma, Mohammad Hasan, and Sujit Roy. "An Intelligent CCTV based Surveillance System for Realtime crimes or life threat detection." In 2025 International Conference on Electrical, Computer and Communication Engineering (ECCE). IEEE, 2025. https://doi.org/10.1109/ecce64574.2025.11013224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Srijan, Vandit Singh, and Aditi Arora. "Crime Pulse: Crime hot-spot detection using Machine Learning and Gen-AI*." In 2025 2nd International Conference on Computational Intelligence, Communication Technology and Networking (CICTN). IEEE, 2025. https://doi.org/10.1109/cictn64563.2025.10932386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Budnik, Lyudmila Yurievna, Elizaveta Vladimirovna Karelina, Lianeta Sergeevna Milyukova, and Ekaterina Anatolievna Popkova. "THE PROBLEM OF SOLVING CRIMES AGAINST THE PERSON IN THE EXAMPLE OF RAPE IN RUSSIA, NORWAY AND INDIA." In Themed collection of papers from Foreign international scientific conference «Joint innovation - joint development». by HNRI «National development» in cooperation with PS of UA. December 2024. Crossref, 2025. https://doi.org/10.37539/241226.2024.15.20.010.

Full text
Abstract:
The article is devoted to the problem of crime detection using the example of rape in Russia, Norway and India. Despite differences in legal systems and cultural contexts, the low detection rate of such crimes is a common problem for all three countries. In this paper, we will compare the detection rate of rape among selected countries, as well as consider the statistics of registered crimes in this category.
APA, Harvard, Vancouver, ISO, and other styles
4

Nikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.

Full text
Abstract:
Computer forensics is increasingly finding its place in the criminal investigation of criminal offenses in order to shed light on and provide the evidence necessary to initiate criminal proceedings against the perpetrators of crimes that have misused computer technology in criminal activities. Criminal investigation is a procedure of using tactics, techniques and methods aimed at detecting, clarifying and providing evidence through legally prescribed operational-tactical measures and actions, investigative actions and special investigative measures. The Macedonian legislator in the criminal pr
APA, Harvard, Vancouver, ISO, and other styles
5

Nikoloska, Svetlana. "TACTICS OF APPLICATION OF MEASURES AND ACTIONS IN THE CRIMINAL INVESTIGATION OF ECONOMIC - FINANCIAL CRIME." In SECURITY HORIZONS. Faculty of Security- Skopje, 2022. http://dx.doi.org/10.20544/icp.3.7.22.p02.

Full text
Abstract:
Economic-financial crime is a special group of crimes for which legal measures and actions are applied for detection, clarification and provision of evidence, but in order to achieve appropriate results for provision of relevant evidentiary material, appropriate tactics are needed in the criminal investigation. The detection of this crime is related to obtaining information of a certain category of perpetrators who commit crimes related to their jobs, performing certain functions or duties; the crime is related to abusement in the performance of the crime, and the motives are abuse of powers a
APA, Harvard, Vancouver, ISO, and other styles
6

Kurshan, Eren, Dhagash Mehta, and Tucker Balch. "AI versus AI in Financial Crimes & Detection: GenAI Crime Waves to Co-Evolutionary AI." In ICAIF '24: 5th ACM International Conference on AI in Finance. ACM, 2024. http://dx.doi.org/10.1145/3677052.3698655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Elrefaei, Lamiaa A., Alaa Alharthi, Huda Alamoudi, Shatha Almutairi, and Fatima Al-rammah. "Real-time face detection and tracking on mobile phones for criminal detection." In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). IEEE, 2017. http://dx.doi.org/10.1109/anti-cybercrime.2017.7905267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kortli, Yassin, Mehrez Marzougui, Belgacem Bouallegue, J. Subash Chandra Bose, Paul Rodrigues, and Mohamed Atri. "A novel illumination-invariant lane detection system." In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). IEEE, 2017. http://dx.doi.org/10.1109/anti-cybercrime.2017.7905284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baili, Jamel, Mehrez Marzougui, Ameur Sboui, et al. "Lane Departure detection using image processing techniques." In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). IEEE, 2017. http://dx.doi.org/10.1109/anti-cybercrime.2017.7905298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dimitriou, Nikolaos, George Kioumourtzis, Anargyros Sideris, et al. "An Integrated Framework for the Timely Detection of Petty Crimes." In 2017 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2017. http://dx.doi.org/10.1109/eisic.2017.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Detection of crimes"

1

Hannum, David W., and Gary W. Shannon. Trace Contraband Detection Field-Test by the South Texas Specialized Crimes and Narcotics Task Force. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/1323946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hannum, David W., and Gary W. Shannon. Trace Contraband Detection Field-Test by the South Texas Specialized Crimes and Narcotics Task Force. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/1324460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., 2023. http://dx.doi.org/10.52824/vzrb5079.

Full text
Abstract:
Terrorist attacks using explosives and CBRN (Chemical, Biological, Radiological and Nuclear) materials have been present throughout history. While the frequency of CBRN terrorist attacks is relatively low compared to those with explosives and other types of weapons, it is crucial to treat the efforts of both terrorist organizations and individuals with appropriate gravity in order to avert catastrophic consequences. Identifying warning signs that indicate criminal behaviour is crucial for preventing planned crimes or terrorist attacks, and there is a need for more precise coverage of potential
APA, Harvard, Vancouver, ISO, and other styles
4

Jorge, Guillermo. Identification and Exchange of Information on Politically Exposed Persons in Central American Countries. Inter-American Development Bank, 2018. http://dx.doi.org/10.18235/0010714.

Full text
Abstract:
In the fight against money laundering, information on politically exposed persons (PEPs) is highly relevant for financial institutions as it is about customers deemed to be high-risk due to their public functions and the degree of influence they can exert. This document reviews the regulatory and operational frameworks to access and exchange of information on PEPs in Central American countries, as well as the enhanced due diligence measures under implementation in these countries. The main findings indicate that there are legal constraints in relation to the definition of PEPs and the obligati
APA, Harvard, Vancouver, ISO, and other styles
5

Malik, Arun, Andrea López, and Paul E. Carrillo. Pollution or Crime: The Effect of Driving Restrictions on Criminal Activity. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0011747.

Full text
Abstract:
Driving restriction programs have been implemented in many cities around the world to alleviate pollution and congestion problems. Enforcement of such programs is costly and can potentially displace policing resources used for crime prevention and crime detection. Hence, driving restrictions may increase crime. To test this hypothesis, this paper exploits both temporal and spatial variation in the implementation of Quito, Ecuador's Pico y Placa program and evaluates its effect on crime. Both difference-in-difference and spatial regression discontinuity estimates provide credible evidence that
APA, Harvard, Vancouver, ISO, and other styles
6

Campi, Mercedes, and Marco Dueñas. Clusters and Resilience during the COVID–19 Crisis: Evidence from Colombian Exporting Firms. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004474.

Full text
Abstract:
In this paper, we characterize the geography of Colombian exporting clusters and analyze how the COVID-19 crisis has affected Colombian exporters. We contribute to the industrial clusters literature by defining exporting clusters with bipartite network analysis and community detection tools. The methodology allows us to empirically detect product clusters, which are compared with an alternative definition of industrial clusters, and to consider the centrality of firms within clusters. Then, we analyze the firms trade margins during the COVID-19 crisis to evaluate whether belonging to an export
APA, Harvard, Vancouver, ISO, and other styles
7

Bielinskyi, Andrii, Vladimir Soloviev, Serhiy Semerikov, and Viktoria Solovieva. Detecting Stock Crashes Using Levy Distribution. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3210.

Full text
Abstract:
In this paper we study the possibility of construction indicators-precursors relying on one of the most power-law tailed distributions – Levy’s stable distribution. Here, we apply Levy’s parameters for 29 stock indices for the period from 1 March 2000 to 28 March 2019 daily values and show their effectiveness as indicators of crisis states on the example of Dow Jones Industrial Average index for the period from 2 January 1920 to 2019. In spite of popularity of the Gaussian distribution in financial modeling, we demonstrated that Levy’s stable distribution is more suitable due to its theoretica
APA, Harvard, Vancouver, ISO, and other styles
8

Martovskaya, Viktoria. #89: Political Rhetoric and the Challenges to Diversity in Russia. European Centre for Minority Issues, 2015. https://doi.org/10.53779/scpl1144.

Full text
Abstract:
The author of this publication argues that negative societal trends - namely, raising the levels of inter-ethnic tensions, intolerance to diversity and hostility to the ‘others’ – can be predicted through the analysis of political rhetoric. The method of reconstruction of society through the analysis of rhetoric can serve as an early-warning system detecting the approach of an ethnic crisis.
APA, Harvard, Vancouver, ISO, and other styles
9

Polakowski, Michał, and Emma Quinn. Responses to irregularly staying migrants in Ireland. ESRI, 2022. http://dx.doi.org/10.26504/rs140.

Full text
Abstract:
Irregularly staying migrants are more likely to face material deprivation, instability and are more vulnerable to exploitation and crime than legal residents (FRA, 2011). Ultimately, they may face deportation to their country of origin. The fear of detection and deportation can lead to underutilisation of public services (Vintila and Lafleur, 2020). The recent introduction of the Regularisation of Long-Term Undocumented Migrants Scheme (discussed below) is a major policy development that should improve the situation of many people living in Ireland. However, it is likely that irregular migrati
APA, Harvard, Vancouver, ISO, and other styles
10

Improving the management of STIs among MCH/FP clients at the Nakuru Municipal Council health clinics. Population Council, 1999. http://dx.doi.org/10.31899/rh1999.1001.

Full text
Abstract:
In an effort to address the global crisis of HIV/AIDS and to reduce the spread of other sexually transmitted infections (STIs), maternal and child health/family planning (MCH/FP) programs have attempted to integrate the management of STIs into their services. This integration was endorsed at the 1994 International Conference on Population and Development in Cairo. However, as noted in this report, programs have encountered a number of difficulties as they try to effectively manage STIs in an MCH/FP setting. In particular, the effective detection and treatment of STIs has proven difficult among
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!