Science informed policing /
Saved in:
Imprint: | Cham : Springer, 2020. |
---|---|
Description: | 1 online resource (262 p.). |
Language: | English |
Series: | Advanced Sciences and Technologies for Security Applications Advanced sciences and technologies for security applications. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/12456182 |
Table of Contents:
- Intro
- Introduction
- Policing and Crime Prevention
- Policing Tools and Strategies
- Contents
- Part I: Policing and Crime Prevention
- How Offender Decision-making Can Inform Policing: A Focus on the Perceived Certainty of Apprehension
- 1 Introduction
- 2 Deterrence-Based Policing Strategies
- 2.1 Random Preventative Patrol
- 2.2 Increasing the Number of Police
- 2.3 Hot Spots Policing
- 2.4 Problem-Oriented Policing
- 3 Recent Innovations in Offender Decision-making Research
- 3.1 Updating Perceptions
- 3.2 Tipping Points and Threshold Effects
- 3.3 Ambiguity
- 4 Future Directions
- References
- An Epidemiological Framework for Investigating Organized Crime and Terrorist Networks
- 1 Introduction
- 2 Epidemiology
- 3 Understanding Complexity: Cynefin
- 4 Connecting Epidemiology and Policing Practices
- 5 Applications of Epidemiological Concepts in Policing Operations
- 6 Conclusion
- References
- Sex Offenders' Forensic Awareness Strategies to Avoid Police Detection
- 1 Introduction
- 2 Avoiding Police Detection for Sex Offenders: A Rational Choice Perspective
- 3 What Lead Sex Offenders to Avoid Police Detection?
- 3.1 CSI Effect
- 3.2 Previous Criminal History
- 4 Why Do Some Sex Offenders Not Use FAS?
- 5 How Do Sex Offenders Use Forensic Awareness?
- 6 Is the Use of FAS a Specific Feature of Sexual Offenders?
- 7 Does the Use of FAS Allow Sex Offenders to Avoid Police Detection?
- 8 Criminal Investigations and Forensic Identification
- 8.1 Theory of Forensic Evidence in Sexual Crime Investigation
- 8.2 Detection of Forensic Evidence in Practice
- 8.3 Police Efficiency to Detect and Analyze Forensic Evidences
- 8.4 Investigative Failures
- 9 Conclusion
- References
- Tracking Terrorism: The Role of Technology in Risk Assessment and Monitoring of Terrorist Offenders
- 1 Introduction
- 2 Technologies and Counterterrorism
- 3 The Internet and Counter Terrorism
- 4 Threat Management vs. Threat Identification
- 5 Future Possibilities for Technology and Counter terrorism
- 6 Conclusion
- Bibliography
- Human Trafficking and the Darknet: Technology, Innovation, and Evolving Criminal Justice Strategies
- 1 Introduction
- 2 Human Trafficking Goes Digital
- 2.1 The Use of Technology in Sex Trafficking
- 2.2 The Use of Technology in Labor Trafficking
- 2.3 The Use of Technology in Other Forms of Human Trafficking
- 2.4 Normalization of Human Trafficking Through Advances in Technology
- 3 Human Trafficking Goes Dark
- 4 Criminal Justice Response
- References
- Part II: Policing Tools & Strategies
- Scientific and Technological Advances in Law Enforcement Intelligence Analysis
- 1 Introduction
- 1.1 Intelligence, Data and Information
- 1.2 Human-Centered Advances in Intelligence
- 1.2.1 Professionalization of Law Enforcement Intelligence Analysis
- 1.2.2 Applying Science to Improve Human Analytic Performance