File #2298: "2018_Book_Community-OrientedPolicingAndT.pdf"
Text
1|Acknowledgment|6
1|Contents|8
1|About the Editors|10
1|Contributors|12
1|1 Serious Games: An Attractive Approach to Improve Awareness|15
2|Introduction|15
2|The Future of Law Enforcement|16
2|TRILLION's Serious Games|18
3|Serious Games for Citizens|18
3|Serious Games for LEAs|19
4|Game Elements|20
2|Results|21
2|Conclusions|22
2|References|22
1|2 Can Technology Build Trust? Community-Oriented Policing and ICT in Afghanistan|24
2|Introduction: The Scene|24
2|Scope of the Paper|25
2|Research Methodology and Approach|25
2|ICT and Policing|25
2|Human Security and Trust|26
2|Afghan Security Sector and ICT|26
2|Civil Society, the Police and ICTs|28
2|Police Engagement with Civil Society ICT Efforts|29
2|Conclusions|29
2|References|30
1|3 Community Outreach Using Incident Records and Visual Analytics|32
2|Introduction|32
2|Perceptions of Community Policing|33
3|Problem Oriented Policing|33
3|Hot Spot Policing|34
3|Crime Mapping Technologies|34
2|Community Outreach with VALET|35
3|Real Time Data Analysis|36
2|Discussion|37
3|Insight into Crime Trends|37
3|Community Perception|38
3|Limitations|38
2|Conclusion|39
2|References|39
1|4 Robust End-User-Driven Social Media Monitoring for Law Enforcement and Emergency Monitoring|41
2|Introduction|41
2|Related Work|42
2|System Overview|42
2|End-User-Driven Topic Detection|43
2|Experiments and Results|44
2|Conclusions|47
2|References|47
1|5 Architecting Next Generating Community Policing Solutions|49
2|Emerging Trends for Next Generation Community Policing and INSPEC2T|49
2|Architecture Work Package|50
2|Risk and Cost Driven Architecture|51
2|Goals, Challenges and Opportunities|52
2|Development Approach|53
2|Integration Guidelines|54
2|Integration Plan|54
2|Open, Modular and Loosely Coupled Architecture|55
2|Architecture Validation Approach|57
2|Designed for Integration and Evolution, More than a Set of Views|58
2|References|58
1|6 Developing and Assessing Next Generation Community Policing Social Networks with THOR Methodology|59
2|Evolving Community Policing Models and the Impact of Social Network|59
2|Next Generation Community Policing: The INSPEC2T Solution|60
3|INSPEC2T Solution Modules|60
2|Next Generation CP (NGCP) Functions Associated with Use Cases|63
3|Interaction with NGCP-SN|64
3|Communities|65
3|Incident Reporting and Management|65
3|Interaction with Other Social Networks|66
3|Back End Intelligence|67
3|Rules and Supporting Actions|67
2|INSPEC2T Pilot Evaluation|67
3|NGCP Evaluation Framework|68
4|Technology|69
4|Human|69
4|Organisational|70
4|Regulatory|70
2|Interim Evaluation Findings|71
2|Conclusions|73
2|References|73
1|7 Next Generation of CP: The Unity IT Toolkit|75
2|Introduction|75
2|Unity IT Toolkit Architecture|76
2|End User Assessment|79
2|Conclusions|79
2|References|80
1|8 A Descriptive, Practical, Hybrid Argumentation Model to Assist with the Formulation of Defensible Assessments in Uncertain Sense-Making Environments|81
2|Introduction|81
2|Method|82
2|Literature Review and Results|83
3|Schemas (Green Coding)|83
3|Relations of Inference (Yellow Coding)|84
3|Macro-Cognition (Blue, Pink and Purple Coding)|85
2|Discussion and Conclusion|88
2|References|93
1|9 Situating Fear of Crime: The Prospects for Criminological Research to Use Smartphone Applications to Gather Experience Sampling Data|96
2|Introduction|96
2|Fear of Crime, Situational Dynamics, and Lifestyle-Routine Activities|97
2|Measuring Situational Dynamics and Lifestyle-Routine Activities Using Smartphones|99
2|Locating Fear in Place, Time and Situation: The Prospects for Future Research|101
2|References|102
1|10 Analytic Provenance as Constructs of Behavioural Markers for Externalizing Thinking Processes in Criminal Intelligence Analysis|105
2|Introduction|105
2|Related Works|106
2|Development Approach of Behavioural Marker System|107
3|Detection Method|107
3|Action Sequences Computation|111
2|Conclusion|113
2|References|114
1|11 Analysis of Suspended Terrorism-Related Content on Social Media|116
2|Introduction|116
2|Related Work|117
2|Data Collection and Analysis|118
3|Methodology|118
3|Data Collection|119
2|Experimental Results|119
3|User Account Lifetime|119
3|Analysis of Mention Networks|120
3|Friends and Followers|121
3|Posts, Favorites, and Lists|122
3|Spatial Distribution of Accounts|124
2|Conclusions|126
2|References|126
1|12 UAVs and Their Use in Servicing the Community|128
2|Introduction|128
2|Needs Assessment|129
3|Civil Protection Operational Needs|131
3|Community Policing Operational Needs|132
2|UAS Capabilities and Operational Requirements|134
3|UAS Component Categories and Types|134
4|Operational Requirements|135
2|Mission Planning|136
3|Visual Data Gathering|136
3|Path Planning|137
2|Proof of Concept|138
2|Conclusions|139
2|References|139
Generation Community Policing
|Erratum to: Architecting Next|Solutions
1|Contents|8
1|About the Editors|10
1|Contributors|12
1|1 Serious Games: An Attractive Approach to Improve Awareness|15
2|Introduction|15
2|The Future of Law Enforcement|16
2|TRILLION's Serious Games|18
3|Serious Games for Citizens|18
3|Serious Games for LEAs|19
4|Game Elements|20
2|Results|21
2|Conclusions|22
2|References|22
1|2 Can Technology Build Trust? Community-Oriented Policing and ICT in Afghanistan|24
2|Introduction: The Scene|24
2|Scope of the Paper|25
2|Research Methodology and Approach|25
2|ICT and Policing|25
2|Human Security and Trust|26
2|Afghan Security Sector and ICT|26
2|Civil Society, the Police and ICTs|28
2|Police Engagement with Civil Society ICT Efforts|29
2|Conclusions|29
2|References|30
1|3 Community Outreach Using Incident Records and Visual Analytics|32
2|Introduction|32
2|Perceptions of Community Policing|33
3|Problem Oriented Policing|33
3|Hot Spot Policing|34
3|Crime Mapping Technologies|34
2|Community Outreach with VALET|35
3|Real Time Data Analysis|36
2|Discussion|37
3|Insight into Crime Trends|37
3|Community Perception|38
3|Limitations|38
2|Conclusion|39
2|References|39
1|4 Robust End-User-Driven Social Media Monitoring for Law Enforcement and Emergency Monitoring|41
2|Introduction|41
2|Related Work|42
2|System Overview|42
2|End-User-Driven Topic Detection|43
2|Experiments and Results|44
2|Conclusions|47
2|References|47
1|5 Architecting Next Generating Community Policing Solutions|49
2|Emerging Trends for Next Generation Community Policing and INSPEC2T|49
2|Architecture Work Package|50
2|Risk and Cost Driven Architecture|51
2|Goals, Challenges and Opportunities|52
2|Development Approach|53
2|Integration Guidelines|54
2|Integration Plan|54
2|Open, Modular and Loosely Coupled Architecture|55
2|Architecture Validation Approach|57
2|Designed for Integration and Evolution, More than a Set of Views|58
2|References|58
1|6 Developing and Assessing Next Generation Community Policing Social Networks with THOR Methodology|59
2|Evolving Community Policing Models and the Impact of Social Network|59
2|Next Generation Community Policing: The INSPEC2T Solution|60
3|INSPEC2T Solution Modules|60
2|Next Generation CP (NGCP) Functions Associated with Use Cases|63
3|Interaction with NGCP-SN|64
3|Communities|65
3|Incident Reporting and Management|65
3|Interaction with Other Social Networks|66
3|Back End Intelligence|67
3|Rules and Supporting Actions|67
2|INSPEC2T Pilot Evaluation|67
3|NGCP Evaluation Framework|68
4|Technology|69
4|Human|69
4|Organisational|70
4|Regulatory|70
2|Interim Evaluation Findings|71
2|Conclusions|73
2|References|73
1|7 Next Generation of CP: The Unity IT Toolkit|75
2|Introduction|75
2|Unity IT Toolkit Architecture|76
2|End User Assessment|79
2|Conclusions|79
2|References|80
1|8 A Descriptive, Practical, Hybrid Argumentation Model to Assist with the Formulation of Defensible Assessments in Uncertain Sense-Making Environments|81
2|Introduction|81
2|Method|82
2|Literature Review and Results|83
3|Schemas (Green Coding)|83
3|Relations of Inference (Yellow Coding)|84
3|Macro-Cognition (Blue, Pink and Purple Coding)|85
2|Discussion and Conclusion|88
2|References|93
1|9 Situating Fear of Crime: The Prospects for Criminological Research to Use Smartphone Applications to Gather Experience Sampling Data|96
2|Introduction|96
2|Fear of Crime, Situational Dynamics, and Lifestyle-Routine Activities|97
2|Measuring Situational Dynamics and Lifestyle-Routine Activities Using Smartphones|99
2|Locating Fear in Place, Time and Situation: The Prospects for Future Research|101
2|References|102
1|10 Analytic Provenance as Constructs of Behavioural Markers for Externalizing Thinking Processes in Criminal Intelligence Analysis|105
2|Introduction|105
2|Related Works|106
2|Development Approach of Behavioural Marker System|107
3|Detection Method|107
3|Action Sequences Computation|111
2|Conclusion|113
2|References|114
1|11 Analysis of Suspended Terrorism-Related Content on Social Media|116
2|Introduction|116
2|Related Work|117
2|Data Collection and Analysis|118
3|Methodology|118
3|Data Collection|119
2|Experimental Results|119
3|User Account Lifetime|119
3|Analysis of Mention Networks|120
3|Friends and Followers|121
3|Posts, Favorites, and Lists|122
3|Spatial Distribution of Accounts|124
2|Conclusions|126
2|References|126
1|12 UAVs and Their Use in Servicing the Community|128
2|Introduction|128
2|Needs Assessment|129
3|Civil Protection Operational Needs|131
3|Community Policing Operational Needs|132
2|UAS Capabilities and Operational Requirements|134
3|UAS Component Categories and Types|134
4|Operational Requirements|135
2|Mission Planning|136
3|Visual Data Gathering|136
3|Path Planning|137
2|Proof of Concept|138
2|Conclusions|139
2|References|139
Generation Community Policing
|Erratum to: Architecting Next|Solutions