To see the other types of publications on this topic, follow the link: Mobile crime.

Journal articles on the topic 'Mobile crime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile crime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
<p>Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic D
APA, Harvard, Vancouver, ISO, and other styles
2

Tole, Sutikno. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology 13, no. 2 (2024): 321–32. https://doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic Detective,
APA, Harvard, Vancouver, ISO, and other styles
3

Fadess, Gongolo, Medi Chipatso, and Mkandawire Mtende. "Development of mobile-based application of crime reporting and handling in Malawi police service." i-manager's Journal on Mobile Applications and Technologies 11, no. 1 (2024): 22. http://dx.doi.org/10.26634/jmt.11.1.20690.

Full text
Abstract:
Crime is increasing worldwide, and quick reporting of crimes is a very important aspect of anti-crime efforts. This problem is noticeable in Malawi, as people often refrain from reporting or sharing information due to the perceived lack of professionalism among some police officers within the security system, despite the presence of professional officers in the Malawi Police Service. With the increase in smartphone usage in Malawi, an opportunity arises to address this issue by tapping into the gap in incident reporting. Developing a mobile-based application is the proposed solution that can f
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Ayush. "Critical Analysis of the Law Relating to Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 2081–82. http://dx.doi.org/10.22214/ijraset.2022.47771.

Full text
Abstract:
Abstract: The Cyber Crime is most popular Crime in the world the Cyber Criminals Crimes are the Committed day by day .This Crime commit the Computer and Internet in this Crime Criminals are hacking the Computer system, Mobile like that Hacking virus ,Worm attacks, DOS attack etc. The personal data are Theft Like that Bank account detail, e-mail, Mobile messages .The computer as a weapon using the computer system to commit real world Crimes like Cyber terrorism, IPR(Intellectual property infringing) contravention, credit card frauds, EFT (Electronic fund transfer) Frauds, Pornography etc. The C
APA, Harvard, Vancouver, ISO, and other styles
5

Gombiro, Cross, Mmaki Jantjies, and Nehemiah Mavetera. "A conceptual framework for detecting financial crime in mobile money transactions." Journal of Governance and Regulation 4, no. 4 (2015): 727–34. http://dx.doi.org/10.22495/jgr_v4_i4_c6_p8.

Full text
Abstract:
Mobile money has made it possible for the unbanked to access financial service to areas previous not accessibly to traditional banking systems. Africa in particular, has indeed seen a growth in use of such services owing to the high penetration of mobile phones. While traditional banking services have been well regulated and secured, mobile money services are still new and vulnerable. Also, attacks and crimes targeting the internet, new technologies and new methods of payments have become sophisticated. This scenario requires novel proactive, real time techniques and solutions to detect financ
APA, Harvard, Vancouver, ISO, and other styles
6

Dimovski, Darko. "Crime prevention through digitalization." Zbornik radova Pravnog fakulteta Nis 60, no. 91 (2021): 227–42. http://dx.doi.org/10.5937/zrpfn0-32144.

Full text
Abstract:
Common crime prevention measures have not yielded the expected results. It is important to examine the possibilities of using the latest achievements in crime prevention. One of the available options is digitalization. Starting from the definition of digitalization as the use of digital technologies to change the business model and provide new opportunities for generating income and value, the author emphasizes that digitalization can be used as a measure to prevent crime. In this regard, some solutions for preventing crime through digitalization are embodied in the use of digital currencies,
APA, Harvard, Vancouver, ISO, and other styles
7

Feng, Jiaxin, Lin Liu, Dongping Long, and Weiwei Liao. "An Examination of Spatial Differences between Migrant and Native Offenders in Committing Violent Crimes in a Large Chinese City." ISPRS International Journal of Geo-Information 8, no. 3 (2019): 119. http://dx.doi.org/10.3390/ijgi8030119.

Full text
Abstract:
Immigrants and natives are generally comparable in committing violent crimes in many Western cities. However, little is known about spatial differences between internal migrant offenders and native offenders in committing violence in contemporary urban China. To address this gap, this research aims to explore spatial variation in violent crimes committed by migrant and native offenders, and examine different effects of ambient population, crime attractors, crime generators, and offender anchor points on these crimes. Offender data, mobile phone data, and points-of-interest (POI) data are combi
APA, Harvard, Vancouver, ISO, and other styles
8

Alameri, Thamer, Ahmed Hazim Alhilali, Nabeel Salih Ali, and Jawad Kadhim Mezaal. "Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq." Journal of Intelligent Systems 31, no. 1 (2022): 726–38. http://dx.doi.org/10.1515/jisys-2022-0034.

Full text
Abstract:
Abstract Crimes are increasing in our society as a serious worldwide issue. Fast reporting of crimes is a significantly important area in anticrime. This problem is visible in Iraq as people avoid information-sharing due to the lack of trust in the security system despite some contact lines between citizens and police in Iraq. Furthermore, there has been a little empirical study in this field. We proposed a multi-approach for crime reporting and police control to address these issues. First, this study has two goals: (1) investigating the adopted method in reporting crimes to police sectors to
APA, Harvard, Vancouver, ISO, and other styles
9

신재헌 and 김상운. "A Study on Mobile Crime Prevention." Police Science Journal 9, no. 1 (2014): 123–44. http://dx.doi.org/10.16961/polips.2014.9.1.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baber, Chris, Paul Smith, Mark Butler, James Cross, and John Hunter. "Mobile technology for crime scene examination." International Journal of Human-Computer Studies 67, no. 5 (2009): 464–74. http://dx.doi.org/10.1016/j.ijhcs.2008.12.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Septihadi, I. Wayan Gede, Deli Bunga Saravistha, and I. Wayan Darmika Suputra. "Analisis Yuridis Keberadaan Tim Anti Anarkis Satuan Brimob Polda Bali dalam Mengantisipasi Maraknya Aksi Penjambretan." Jurnal Indragiri Penelitian Multidisiplin 3, no. 2 (2023): 27–32. http://dx.doi.org/10.58707/jipm.v3i2.441.

Full text
Abstract:
In the presence of developments and economic crises in society, it has implications for an increase in crime, one of which is the act of mugging. In an effort to anticipate street crimes, especially acts of mugging that occur within the jurisdiction of the Bali Police, the Police, especially the Brimob Corps, formed a special unit known as the anti-anarchist team, the Bali Police Mobile Brigade Unit, which has the task of anticipating and dealing with mugging crimes that occur in the jurisdiction of the Bali Police. This study aims to understand the role and function of the anti-anarchist team
APA, Harvard, Vancouver, ISO, and other styles
12

E. K. ADETIFA, O. O. OGUNKORODE, and VINCENT O. ADEDARA. "LEGAL REFLECTIONS ON THE DOWNSIDES OF GLOBAL SYSTEM FOR MOBILE COMMUNICATION AS A BOOST TO CRIME OF KIDNAPPING FOR RANSOM IN NIGERIA." INTERNATIONAL JOURNAL OF RESEARCH IN EDUCATION HUMANITIES AND COMMERCE 04, no. 03 (2023): 32–41. http://dx.doi.org/10.37602/ijrehc.2023.4303.

Full text
Abstract:
The advent of global system for mobile communication otherwise called GSM is no doubt a mixed blessing to humanity. Just as the relevant security agencies are appropriating the benefits offered by the global system for mobile communication in the policing, detecting and preventing acts of criminality in the society, so also the criminal elements are beneficially misusing the communication device for criminal purposes. It is a known fact that crime is continually evolving and adapting. Kidnapping as a form of crime in Nigeria is not novel as there were reported cases of kidnapping even before t
APA, Harvard, Vancouver, ISO, and other styles
13

Barrionuevo, Elvis, and Wilfredo Ticona. "Integration of Mobile and Web Applications to Prevent Crime." International Journal of Interactive Mobile Technologies (iJIM) 19, no. 02 (2025): 111–25. https://doi.org/10.3991/ijim.v19i02.52839.

Full text
Abstract:
Citizen insecurity and crime represent one of the greatest challenges, as they affect people’s peace of mind and perception of security. Crime prevention and emergency management face challenges due to the lack of effective mechanisms for collecting and managing information, which hinder decision-making and affect the effectiveness of measures to combat crime. Therefore, the implementation of mobile and web applications is intended to reduce the risk of crime by supporting daily data collection, strategy planning, crime monitoring, diagnosis of the current situation, and coordination and evalu
APA, Harvard, Vancouver, ISO, and other styles
14

BRADSHAW, MELISSA. "Mobile comms for cops." Engineer 301, no. 7924 (2021): 50–51. http://dx.doi.org/10.12968/s0013-7758(22)90439-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sade, Esther Addana, and Edwin Abiodun. "Use of Mobile Phones in Nigeria to Prevent Crime." American Journal of Technology 1, no. 1 (2022): 50–61. http://dx.doi.org/10.58425/ajt.v1i1.68.

Full text
Abstract:
Purpose: The purpose of this study was to investigate the use of mobile phones by police officers in crime prevention in Lagos city.
 Methodology: This study employed random stratified sampling procedure. Questionnaires were used for data collection for both qualitative and quantitative data. Qualitative data was coded and analyzed thematically after interpretation of theme while descriptive data was analyzed using descriptive statistics by use of Statistical Package for Social Sciences (SPSS version 20.0).
 Findings: Mobile phone was found to be an effective tool in prevention of cr
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Tongxin, Kate Bowers, and Tao Cheng. "Applying Dynamic Human Activity to Disentangle Property Crime Patterns in London during the Pandemic: An Empirical Analysis Using Geo-Tagged Big Data." ISPRS International Journal of Geo-Information 12, no. 12 (2023): 488. http://dx.doi.org/10.3390/ijgi12120488.

Full text
Abstract:
This study aimed to evaluate the relationships between different groups of explanatory variables (i.e., dynamic human activity variables, static variables of social disorganisation and crime generators, and combinations of both sets of variables) and property crime patterns across neighbourhood areas of London during the pandemic (from 2020 to 2021). Using the dynamic human activity variables sensed from mobile phone GPS big data sets, three types of ‘Least Absolute Shrinkage and Selection Operator’ (LASSO) regression models (i.e., static, dynamic, and static and dynamic) differentiated into e
APA, Harvard, Vancouver, ISO, and other styles
17

Kar, Sujita Kumar, SM Yasir Arafat, and Vikas Menon. "Mobile games, behavioral addiction, crime, and crime reporting: Fault is everywhere!" Indian Journal of Psychiatry 65, no. 11 (2023): 1195–96. http://dx.doi.org/10.4103/indianjpsychiatry.indianjpsychiatry_572_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Late, Prachi. "Context Aware Application for Crime Prevention." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46937.

Full text
Abstract:
Abstract: Crime prevention in urban areas remains a challenge due to delayed response times, limited resources, and insufficient public awareness. This paper introduces a Context-Aware Application for Crime Prevention, designed to provide users with real-time, location-based crime alerts, leveraging mobile technologies, geographic information systems (GIS), and public crime datasets. The application processes historical crime data and integrates user-reported incidents to visualize crime-prone areas on maps using a traffic light system (red for high-risk, yellow for medium-risk, and green for
APA, Harvard, Vancouver, ISO, and other styles
19

Mata, Félix, Miguel Torres-Ruiz, Giovanni Guzmán, et al. "A Mobile Information System Based on Crowd-Sensed and Official Crime Data for Finding Safe Routes: A Case Study of Mexico City." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/8068209.

Full text
Abstract:
Mobile information systems agendas are increasingly becoming an essential part of human life and they play an important role in several daily activities. These have been developed for different contexts such as public facilities in smart cities, health care, traffic congestions, e-commerce, financial security, user-generated content, and crowdsourcing. In GIScience, problems related to routing systems have been deeply explored by using several techniques, but they are not focused on security or crime rates. In this paper, an approach to provide estimations defined by crime rates for generating
APA, Harvard, Vancouver, ISO, and other styles
20

Hikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.

Full text
Abstract:
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and cr
APA, Harvard, Vancouver, ISO, and other styles
21

Jimoh, Afeez, Munir Ibrahim, Rasheedat Adeniran, Temilorun Olawale, Adegboye Yusuf, and Monsuru Folorunso. "Campus Crime Reporting Software Framework Using Short Message Services (SMS)." International Journal of Innovative Research in Education, Technology and Social Strategies 10, no. 2 (2023): 16–30. http://dx.doi.org/10.48028/iiprds/ijiretss.v10.i2.02.

Full text
Abstract:
Many reports have indicated that nefarious students in many of tertiary institutions of higher learning in Nigeria engage in different forms of crimes, such as cultism, homicide, property theft/robbery, sexual harassment, to mention but a few, whereas curbing these immoral acts are the responsibilities of the established security outfit of the institution. The perpetrators of such evil acts go scot-free as a result of inappropriate system of apprehension. This study proposed a software framework of campus crime reporting through the use of short message services using hand-held devices, such a
APA, Harvard, Vancouver, ISO, and other styles
22

P., K. Paul, and S. Aithal P. "CYBER CRIME: CHALLENGES, ISSUES, RECOMMENDATION AND SUGGESTION IN INDIAN CONTEXT." International Journal of Advanced Trends in Engineering and Technology 3, no. 1 (2018): 59–62. https://doi.org/10.5281/zenodo.1171079.

Full text
Abstract:
Information Technology is one of the important general purpose Technologies in today’s age for several reasons. Today it is used in almost all the organizations, institutions, and people. The advancement of IT brings so many facilities to us; but also brings so many problems and challenges too and out of which Cyber Crime is a kind of offence which deals with the cyber world which includes computer security, information security, and mobile security too. The increasing number of crimes in the field of Information Technology brings a big attraction to Cyber Crime to everyone. Cyber Crime
APA, Harvard, Vancouver, ISO, and other styles
23

Hidayat, Ghofur, Triono Eddy, and Alpi Sahari. "Peran Detasemen Gegana Satuan Brimob Polda Sumatera Utara Dalam Penanggulangan Tindak Pidana Terorisme." Journal of Education, Humaniora and Social Sciences (JEHSS) 3, no. 1 (2020): 44–51. http://dx.doi.org/10.34007/jehss.v3i1.191.

Full text
Abstract:
The eradication of criminal acts of terrorism in Indonesia is very intensively carried out due to the threat of terror, causing many casualties and public unrest at the strata of society. Therefore the government issued various regulations to overcome the criminal acts of terrorism. The eradication of the crime of terrorism certainly requires facilities and infrastructure, one of which is the bomb disposal unit. A detachment of the Gegana Brimob Bomb disposal unit is tasked with defusing bombs which are usually used by terrorists in carrying out their actions. This paper aims to analyze or exa
APA, Harvard, Vancouver, ISO, and other styles
24

Fadaei, H., and M. Bayazidi. "A COMPARATIVE STUDY OF UTILIZING MOBILE-GIS TECHNOLOGY TO COLLECT ONLINE CRIME." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4/W18 (October 17, 2019): 355–61. http://dx.doi.org/10.5194/isprs-archives-xlii-4-w18-355-2019.

Full text
Abstract:
Abstract. Mobile-Geographic Information System (GIS) is one of the dimensions of these enhancements, which, due to its flexibility, its simplicity with traditional GIS systems, the need for less expertise and low cost, has brought this technology into a variety of areas. Mobile technologies using mobile devices is proving to be a more effective implementation for crime detection and monitoring. Mobile-GIS are operating within a wider range of GIS technologies, wireless technologies, and global positioning technology. The ability to use this system to report crime and control crime in cities ha
APA, Harvard, Vancouver, ISO, and other styles
25

Zhao, Fugang. "Naive Bayes Algorithm Mining Mobile Phone Trojan Crime Clues." Mobile Information Systems 2022 (August 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/6262147.

Full text
Abstract:
After the mobile phone virus infects the mobile phone, it can transmit the real-time information of the user to the designated place set by the virus through the built-in recorder and camera on the mobile phone, thereby causing information leakage. With the rapid development of the Internet, the penetration rate of mobile terminals is also increasing day by day. As an emerging mobile terminal, smart phones have now fully occupied the market. With this trend, the importance of mobile phone information security is also increasing day by day. How to prevent mobile phone virus has gradually become
APA, Harvard, Vancouver, ISO, and other styles
26

Yadav, Kajal. "Crime Mapping and Forecasting Using Geospatial Techniques: A Case of Ajmer." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 1323–38. http://dx.doi.org/10.22214/ijraset.2023.56178.

Full text
Abstract:
Abstract: Advances in computer technology, the development of GIS application software, and the ability to access various geographic data through open-source data sources have allowed police and law enforcement agencies to use it effectively. Crime mapping and spatial analysis using GIS tools such as hotspot generation, zoning, crime navigation and profiling, mobile location recognition, and various web applications are clearly recognized and can be scientifically applied to improve citizenship while being effectively used to predict and control crime. The present study analyzed the trends and
APA, Harvard, Vancouver, ISO, and other styles
27

M, Ayesha. "ATM CRIME PREVENTION USING WIRELESS SENSORS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30460.

Full text
Abstract:
Security and safety are a necessity for automated teller machines (ATM). The ATM security system is implemented using the Internet of things (IoT) and GPS (global positioning system). The main idea of this project is to develop an ATM surveillance and security system. In this project, when any physical attack against the ATM takes place, then information about the attack is sent using IoT and also alerts the surrounding area using a buzzer, at the same time the entire data from the sensors is sent to the developed mobile application and puts alert message to the bank officials. The officials w
APA, Harvard, Vancouver, ISO, and other styles
28

Farnam, H. "Mobile phone social harms (mobile phone, communicative device or crime tool)." Journal of Fundamental and Applied Sciences 8, no. 2 (2016): 1196. http://dx.doi.org/10.4314/jfas.v8i2s.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Felka, Patrick, Cristina Mihale-Wilson, and Oliver Hinz. "Mobile Phones and Crime: The Protective Effect of Mobile Network Infrastructures." Journal of Quantitative Criminology 36, no. 4 (2019): 933–56. http://dx.doi.org/10.1007/s10940-019-09437-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Fleming, Nic. "Mobile gadgets sweep crime off the streets." New Scientist 211, no. 2823 (2011): 42–45. http://dx.doi.org/10.1016/s0262-4079(11)61841-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Agushaka, Jeffrey Ovre, C. E. Chijioke, and Yakmut I. Daniel. "AN INTELLIGENT CRIME MANAGEMENT SYSTEM FOR LAFIA METROPOLIS." FUDMA JOURNAL OF SCIENCES 6, no. 3 (2022): 138–50. http://dx.doi.org/10.33003/fjs-2022-0603-990.

Full text
Abstract:
Security is one of the major concerns in our societies today, and the issues related to it are steadily increasing in both intensity and complication. Predicting crimes could help, but that is a huge challenge as it requires a study of the behavioral pattern or trend of criminal activities. This research aims to develop an Intelligent Crime Management System for the Nigeria Police Force using a case study of Lafia metropolis in Nasarawa State. The java development kit (JDK), android software development kit (SDK), sinch sdk for app-to-app call, android studio, firebase and a virtual emulator,
APA, Harvard, Vancouver, ISO, and other styles
32

Liao, Tony, Hocheol Yang, Songyi Lee, Kun Xu, and Spencer McLain Bennett. "Augmented criminality: How people process in situ augmented reality crime information in relation to space/place." Mobile Media & Communication 8, no. 3 (2020): 360–78. http://dx.doi.org/10.1177/2050157919899696.

Full text
Abstract:
Communication about crime and the places it occurs has been an important area of study for criminology, sociology, public policy, and media scholars. Where incidents used to be communicated through word of mouth, physical evidence, and news outlets, recent advances in crime tracking, mapping, and mobile media have dramatically changed how individuals are informed about crime. Many organizations have adopted mobile text alerts, and recent advances in augmented reality (AR) technologies have made it possible to overlay visuals about crime on top of users’ physical surroundings. How people make s
APA, Harvard, Vancouver, ISO, and other styles
33

Ambreen Aslam, Muhammad Tahir, and Rubab Shaikh. "The Role of Community Policing in Crime Prevention and Public Trust in Law Enforcement." International Journal of Social Science & Entrepreneurship 4, no. 3 (2024): 466–76. https://doi.org/10.58661/ijsse.v4i3.329.

Full text
Abstract:
In major cities of Pakistan, the crime rate is steadily intensifying. One of the immense causes of increasing crime in major cities is a relocating movement of criminals from their native areas to metropolitan cities. These individuals momentarily or permanently reside in major urban cities and there they commit crimes ranging from street crimes like mugging, car theft, mobile phone snatching, to more serious offenses such as murder and both shortterm and long-term kidnapping and after committing offences they escape back to their hometowns. Characteristically these criminals are committing cr
APA, Harvard, Vancouver, ISO, and other styles
34

He, Li, Antonio Páez, Jianmin Jiao, et al. "Ambient Population and Larceny-Theft: A Spatial Analysis Using Mobile Phone Data." ISPRS International Journal of Geo-Information 9, no. 6 (2020): 342. http://dx.doi.org/10.3390/ijgi9060342.

Full text
Abstract:
In the spatial analysis of crime, the residential population has been a conventional measure of the population at risk. Recent studies suggest that the ambient population is a useful alternative measure of the population at risk that can better capture the activity patterns of a population. However, current studies are limited by the availability of high precision demographic characteristics, such as social activities and the origins of residents. In this research, we use spatially referenced mobile phone data to measure the size and activity patterns of various types of ambient population, an
APA, Harvard, Vancouver, ISO, and other styles
35

Rossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.

Full text
Abstract:
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement,
APA, Harvard, Vancouver, ISO, and other styles
36

Rummens, Anneleen, Thom Snaphaan, Nico Van de Weghe, Dirk Van den Poel, Lieven J. R. Pauwels, and Wim Hardyns. "Do Mobile Phone Data Provide a Better Denominator in Crime Rates and Improve Spatiotemporal Predictions of Crime?" ISPRS International Journal of Geo-Information 10, no. 6 (2021): 369. http://dx.doi.org/10.3390/ijgi10060369.

Full text
Abstract:
This article assesses whether ambient population is a more suitable population-at-risk measure for crime types with mobile targets than residential population for the purpose of intelligence-led policing applications. Specifically, the potential use of ambient population as a crime rate denominator and predictor for predictive policing models is evaluated, using mobile phone data (with a total of 9,397,473 data points) as a proxy. The results show that ambient population correlates more strongly with crime than residential population. Crime rates based on ambient population designate different
APA, Harvard, Vancouver, ISO, and other styles
37

Song, Guangwen, Jiajun Liang, Linlin Wu, Lin Liu, and Chunxia Zhang. "The Impact of Residents’ Daily Internet Activities on the Spatial Distribution of Online Fraud: An Analysis Based on Mobile Phone Application Usage." ISPRS International Journal of Geo-Information 14, no. 4 (2025): 151. https://doi.org/10.3390/ijgi14040151.

Full text
Abstract:
In recent years, there has been a sharp increase in the number of online fraud cases. However, research on crime geography has paid little attention to online crimes, especially to the influencing factors behind their spatial distributions. Online fraud is closely related to people’s daily internet use. The existing literature has explored the impact of internet use on online crimes based on small samples of individual interviews. There is a lack of large-scale studies from a community perspective. This study applies the routine activity theory to online activities to test the relationship bet
APA, Harvard, Vancouver, ISO, and other styles
38

Purnomo W.P., Yohanes Sigit, Theresia Devi Indriasari, Kusworo Anindito, Yoshua Andrean, and Jaka Galih Prasetyo. "CrimeID: Towards Crime Prevention and Community Safety in Indonesia using Mobile and Web Technology." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 09 (2019): 52. http://dx.doi.org/10.3991/ijim.v13i09.10172.

Full text
Abstract:
The rate of crime incidence in Indonesia is quite high. Some efforts to prevent crime and to create community safety have been already conducted. However, the information technology has not been implemented yet. CrimeID could be a technology tool for both individual and collective crime prevention. The citizen could participate individually as a crowd to annotate the crime data from news article through the crowdsourcing platform using gamification concept. The collected data could be used to raise the awareness among community members of the crime that happens surrounding them by using the lo
APA, Harvard, Vancouver, ISO, and other styles
39

Jaatsiyah Fath Falaq Am. Nur, Andi, and Andi Patimbangi. "Kebijakan Penanganan Cyber Crime Pengguna m-Banking dalam Penilaian Loyalitas Nasabah." Islamic Banking and Finance 5, no. 1 (2025): 645–59. https://doi.org/10.30863/ibf.v5i1.5825.

Full text
Abstract:
Penelitian ini membahas tentang Analisis Kebijakan Penanganan Cyber Crime Pada Pengguna Mobile Banking dalam Menilai Loyalitas Nasabah (Studi Pada Bank Syariah Indonesia Kabupaten Sinjai). Tujuan penelitian ini adalah (1) Untuk mengetahui bagaimana kebijakan yang dilakukan oleh pihak BSI Cabang Sinjai dalam penanganan cyber crime pada pengguna mobile banking, (2) Untuk mengetahui bagaimana perilaku nasabah menanggapi kebijakan pihak BSI Cabang Sinjai dalam penanganan cyber crime pada pengguna mobile banking. Jenis penelitian yang digunakan adalah penelitian lapangan (field research) dengan men
APA, Harvard, Vancouver, ISO, and other styles
40

Kommey, Benjamin, Daniel Opoku, Albert Asare-Appiah, George Ofori Wiredu, and Paul Kwasi Baah. "An Ad-Hoc Crime Reporting Information Management System." International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) 4, no. 2 (2023): 122–46. http://dx.doi.org/10.34010/injiiscom.v4i2.11436.

Full text
Abstract:

 
 
 
 Criminals often escape punishment due to delayed sharing of information with law enforcement agencies. The traditional method of reporting crimes is slow, thus, the need for a faster and modern approach, one that uses modern technology to apprehend perpetrators. It is therefore important to have a well-organized system for reporting criminal activities. This system should be free and easily accessible to the public. With information being delivered promptly and remotely, there is no need for visits to police stations, which can be time-consuming and tedious. This pr
APA, Harvard, Vancouver, ISO, and other styles
41

Ahmad, Adil, and Mehdi Hussain. "A Forensic Analysis of Video Streaming Activities on Android Applications." Mobile and Forensics 4, no. 1 (2022): 44–52. http://dx.doi.org/10.12928/mf.v4i1.5762.

Full text
Abstract:
Mobile applications of video streaming platforms store a lot of information on mobile devices which can have both positive and negative impacts. Positive, in the sense that it could assist law enforcement agencies in solving crime, and the negative impact is that it could be accessed by malicious actors. In this study, we forensically investigate the Netflix, Amazon Prime Video, and iFlix android applications. The major focus is on identifying stored artifacts on the mobile devices left behind by the android video streaming applications. It will give law enforcement agencies and forensic inves
APA, Harvard, Vancouver, ISO, and other styles
42

Ahmad, Adil, and Mehdi Hussain. "A Forensic Analysis of Video Streaming Activities on Android Applications." Mobile and Forensics 4, no. 1 (2022): 44–52. http://dx.doi.org/10.12928/mf.v4i1.5762.

Full text
Abstract:
Mobile applications of video streaming platforms store a lot of information on mobile devices which can have both positive and negative impacts. Positive, in the sense that it could assist law enforcement agencies in solving crime, and the negative impact is that it could be accessed by malicious actors. In this study, we forensically investigate the Netflix, Amazon Prime Video, and iFlix android applications. The major focus is on identifying stored artifacts on the mobile devices left behind by the android video streaming applications. It will give law enforcement agencies and forensic inves
APA, Harvard, Vancouver, ISO, and other styles
43

Umar, Rusydi, Imam Riadi, and Guntur Maulana Zamroni. "Mobile Forensic Tools Evaluation for Digital Crime Investigation." International Journal on Advanced Science, Engineering and Information Technology 8, no. 3 (2018): 949. http://dx.doi.org/10.18517/ijaseit.8.3.3591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

McCarty, William P., and Daniel P. Hepworth. "Mobile home parks and crime: Does proximity matter?" Journal of Crime and Justice 36, no. 3 (2013): 319–33. http://dx.doi.org/10.1080/0735648x.2012.715796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Rayate, Swapnali. "Crime Monitoring and Controlling System by Mobile Device." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 1 (2015): 123–26. http://dx.doi.org/10.17762/ijritcc2321-8169.150125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ali Mussa, Mussa. "Strategies used for Crime Prevention in Urban District, Zanzibar." EAST AFRICAN JOURNAL OF EDUCATION AND SOCIAL SCIENCES 4, no. 1 (2023): 108–13. http://dx.doi.org/10.46606/eajess2023v04i01.0262.

Full text
Abstract:
The study sought to establish strategies used for crime prevention in Urban District, Zanzibar using the descriptive study design. Data was collected from 83 respondents using a questionnaire. Data was analyzed through descriptive statistics. The study concludes that the Urban District utilized improvement of information literacy level to community members, placement of central camera televisions at frequently visited areas, supporting community patrol officers with amounts of money to buy patrol equipment, private security guards for crime prevention and provision of certificates to recognize
APA, Harvard, Vancouver, ISO, and other styles
47

Vaishali Nagar. "Cyber Crime And Its Punishment: An Analytical Study." Legal Research Development 6, no. IV (2022): 22–24. http://dx.doi.org/10.53724/lrd/v6n4.07.

Full text
Abstract:
In the present scenario, people want to live with lots of amenities such as television, laptops, mobile phone, electronic watch, Bluetooth and other etc. After the invention of androids and the touch screens, mobile phones lot of work was done by the mobile phone. With the help of social media, people get to touch each other easily. And go for the communication for personal use as well as business. Nowadays we know that all government offices work out with the help of cyber. And Private sector people also work out by the online system. Even hotel and restaurant delivery systems are online. Rai
APA, Harvard, Vancouver, ISO, and other styles
48

Okmi, Mohammed, Lip Yee Por, Tan Fong Ang, Ward Al-Hussein, and Chin Soon Ku. "A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions." Sensors 23, no. 9 (2023): 4350. http://dx.doi.org/10.3390/s23094350.

Full text
Abstract:
Digital technologies have recently become more advanced, allowing for the development of social networking sites and applications. Despite these advancements, phone calls and text messages still make up the largest proportion of mobile data usage. It is possible to study human communication behaviors and mobility patterns using the useful information that mobile phone data provide. Specifically, the digital traces left by the large number of mobile devices provide important information that facilitates a deeper understanding of human behavior and mobility configurations for researchers in vari
APA, Harvard, Vancouver, ISO, and other styles
49

Truntsevsky, Y. V., I. I. Lukiny, A. V. Sumachev, and A. V. Kopytova. "A smart city is a safe city: the current status of street crime and its victim prevention using a digital application." MATEC Web of Conferences 170 (2018): 01067. http://dx.doi.org/10.1051/matecconf/201817001067.

Full text
Abstract:
Modern street crime has been increasingly affecting the formation of the criminogenic situation in Russia. The main goal of this paper is exploring the possible application of modern digital technologies in the evaluation and prevention of public crime. The methods presented in this empirical research are: monitoring, statistical methods, modeling and questioning, content analysis, research result processing. As a result of the analysis of the received data, generalized quantitative and qualitative indicators of modern street crime were presented: prevalence of mercenary and violent crimes (61
APA, Harvard, Vancouver, ISO, and other styles
50

Solemon, Badariah, and Wan Muhammad Luqman Wan Abu Bakar. "Factors Motivating the Public to Participate in Crowdsourcing of Crime Information." International Journal of Engineering & Technology 7, no. 4.35 (2018): 583. http://dx.doi.org/10.14419/ijet.v7i4.35.22917.

Full text
Abstract:
This paper presents the results of an exploratory study conducted to identify the factors that influence people and communities to participate in crowdsourcing approach of crime information. The study uses as survey, self-administered questionnaires distributed to the crowd in the public areas in Selangor and Wilayah Persekutuan, Malaysia as well as through an online survey website. Analysis performed to more than half of 139 valid responses of the survey reveals that the respondents participated in crowdsourced crime reporting and sharing using recent technologies such as mobile application m
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!