Narrow your search

Library

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

ULiège (4)

VIVES (4)

UGent (3)

ULB (3)

KBC (1)


Resource type

book (4)


Language

English (4)


Year
From To Submit

2021 (2)

2020 (1)

2012 (1)

Listing 1 - 4 of 4
Sort by

Book
Evidence-Based Policing and Community Crime Prevention
Authors: --- ---
ISBN: 3030763633 3030763625 Year: 2021 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book addresses and reviews progress in a major innovative development within police work known as evidence-based policing. It involves a significant extension and strengthening of links between research and practice and is directed to the task of increasing police effectiveness in the field of community crime prevention. This volume provides an international perspective that synthesizes recent research results from the United States and other countries – including systematic reviews of large bodies of evidence – to illuminate several of the most challenging issues currently confronting police departments. It examines recent advances in research-based models of policing and the expanding base in outcome evaluation. Key areas of coverage include: Managing the nighttime economy. Supervising sex offenders. Tackling domestic/intimate partner violence. Addressing school violence and the formation of gangs. Reducing victim and witness retraction and disengagement. Responding to mental disorders, safeguarding vulnerable adults, and providing victim support. Leveraging public awareness campaigns. In addition, each chapter presents an overview of key issues within a designated area, synthesizes existing reviews, and examines the most recent research. The book clearly and concisely presents major concepts, theories, and research findings, thereby providing both conceptual and analytic tools alongside an integrated presentation of principal findings and messages. The volume concludes with a discussion of current directions in research, key developments in policing strategies, and identification of effective operational structures for facilitating and sustaining research-practice links. Evidence-Based Policing and Community Crime Prevention is a must-have resource for researchers, clinicians and other professionals, and graduate students in forensic psychology, criminology and criminal justice, public health, developmental psychology, psychotherapy and counseling, psychiatry, social work, educational policy and politics, health psychology, nursing, and behavioral therapy/rehabilitation.


Book
Artificial Intelligence, Computational Modelling and Criminal Proceedings : A Framework for A European Legal Discussion
Author:
ISBN: 3030524701 3030524698 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book discusses issues relating to the application of AI and computational modelling in criminal proceedings from a European perspective. Part one provides a definition of the topics. Rather than focusing on policing or prevention of crime – largely tackled by recent literature – it explores ways in which AI can affect the investigation and adjudication of crime. There are two main areas of application: the first is evidence gathering, which is addressed in Part two. This section examines how traditional evidentiary law is affected by both new ways of investigation – based on automated processes (often using machine learning) – and new kinds of evidence, automatically generated by AI instruments. Drawing on the comprehensive case law of the European Court of Human Rights, it also presents reflections on the reliability and, ultimately, the admissibility of such evidence. Part three investigates the second application area: judicial decision-making, providing an unbiased review of the meaning, benefits, and possible long-term effects of ‘predictive justice’ in the criminal field. It highlights the prediction of both violent behaviour, or recidivism, and future court decisions, based on precedents. Touching on the foundations of common law and civil law traditions, the book offers insights into the usefulness of ‘prediction’ in criminal proceedings.

Keywords

Criminal law --- Private international law. --- Conflict of laws. --- Mass media. --- Law. --- Computers. --- Law and legislation. --- European Criminal Law. --- Private International Law, International & Foreign Law, Comparative Law . --- IT Law, Media Law, Intellectual Property. --- Legal Aspects of Computing. --- European Union countries. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Mass communication --- Media, Mass --- Media, The --- Communication --- Choice of law --- Conflict of laws --- Intermunicipal law --- International law, Private --- International private law --- Private international law --- Law --- Legal polycentricity --- Civil law --- Intel·ligència artificial --- Investigació criminal --- Països de la Unió Europea --- Investigació de delictes --- Investigació policial --- Policia judicial --- Procediment penal --- Criminalística --- Interrogatori policial --- Persones desaparegudes --- Prova penal --- Detecció del maltractament infantil --- Detectius --- Identificació de l'escriptura --- Intervenció de les comunicacions --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial --- Unió Europea, Països de la --- Europa --- Alemanya --- Àustria --- Bèlgica --- Dinamarca --- Espanya --- Finlàndia --- França --- Gran Bretanya --- Grècia --- Irlanda --- Itàlia --- Luxemburg --- Països Baixos --- Portugal --- Suècia --- Operacions policials encobertes


Book
Mobile, Secure, and Programmable Networking : 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers
Author:
ISBN: 3030675505 3030675491 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020. The 16 full papers presented in this volume were carefully reviewed and selected from 31 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Keywords

Computer communication systems. --- Application software. --- Special purpose computers. --- Computer security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Special Purpose and Application-Based Systems. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing --- Computer networks --- Application software --- Security measures. --- Development. --- Development of application software --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Cadena de blocs (Bases de dades) --- Sistemes de seguretat --- Computació en núvol --- Informàtica en núvol --- Processament distribuït de dades --- Serveis web --- Mesures de seguretat --- Control d'accés --- Intervenció de les comunicacions --- Seguretat informàtica --- Serveis de seguretat privats --- Targetes intel·ligents --- Vigilància electrònica --- Blockchains (Bases de dades) --- Cadenes de blocs (Bases de dades)


Book
Security and intelligent information systems : International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011 : revised selected papers
Authors: ---
ISBN: 3642252605 3642252613 Year: 2012 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three thematic tracks: security and trust, data mining and machine learning, and natural language processing.

Keywords

Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Computer Science --- Computer security --- Computer networks --- Data encryption (Computer science) --- Data mining --- Natural language processing (Computer science) --- Security measures --- Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Artificial intelligence. --- Computer Science. --- Computer Systems Organization and Communication Networks. --- Information Systems and Communication Service. --- Systems and Data Security. --- Artificial Intelligence (incl. Robotics). --- Data Encryption. --- Information Systems Applications (incl. Internet). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Organization, Computer --- Informatics --- Science --- Protection --- Computer network architectures. --- Information systems. --- Artificial Intelligence. --- Cryptology. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Sistemes de seguretat --- Mineria de dades --- Tractament del llenguatge natural (Informàtica) --- Llenguatge natural (Informàtica) --- Processament del llenguatge natural (Informàtica) --- Processament en llenguatge natural (Informàtica) --- Informàtica --- Intel·ligència artificial --- Processament de dades --- Prospecció de dades --- Cerca en bases de dades --- Arquitectura orientada a serveis (Informàtica) --- Extracció de dades de llocs web --- Mineria de web --- Mesures de seguretat --- Control d'accés --- Intervenció de les comunicacions --- Seguretat informàtica --- Serveis de seguretat privats --- Targetes intel·ligents --- Vigilància electrònica

Listing 1 - 4 of 4
Sort by