REFERENCES
Bache, R, Crestani, F, Canter D, Youngs, D 2007
‘Application of Language Models to Suspect
Prioritisation and Suspect Likelihood in Serial
Crimes’, IAS ‘07 Proceedings of the Third
International Symposium on Information Assurance
and Security, IEEE Computer Society Washington,
DC, USA, pp. 399-404.
BRÅ 2009. Brottsförebyggande Rådet (Translation: ‘The
Swedish National Council for Crime Prevention’),
Available in English at http://www.bra.se/extra/pod/
?action=pod_show&id=1&module_instance=11
Charles, J 1998, ‘AI and law enforcement’, Intelligent
Systems and their Applications, IEEE, vol. 13, no. 1,
pp. 77-80.
Chau, M, Xu, J, Chen, H 2002, ‘Extracting meaningful
entities from police narrative reports’, Proceedings of
the 2002 annual national conference on digital
government research, Digital Government Society of
North America, pp. 1-5
Chen, H, Chung, W, Xu, J.J, Wang, G, Qin, Y, Chau, M
2004, ‘Crime data mining: a general framework and
some examples’, Computer, vol. 37, no. 4, pp. 50-56.
Creswell, J W 2003, Research design: qualitative,
quantitative and mixed methods approaches, 2nd edn,
Sage Publications Inc, London.
Goodwill, A, Alison, L 2006, ‘The development of a filter
model for prioritising suspects in burglary offences’,
Psychology, Crime and Law, vol. 12, no. 4, pp. 395-
416.
Heaton, J 2008, Introduction to neural networks for Java,
2nd edn. Heaton Research, Chesterfield.
Helberg, C 2002, Data mining with confidence – SPSS
(2nd edn). SPSS Inc, Chicago, Illinois.
Hevner, A. R, Chatterjee, S 2010, Design research in
information systems: Theory and practice, Springer,
New York; London.
Hevner, A. R, March, S, Park, J, Ram, S 2004, ‘Design
science in information systems research’, MIS
Quarterly, vol. 28, no. 1, pp. 75-105.
Jeffries, R, Turner, A. A, Polson, P. G, Atwood, M. E
1981, ‘The processes involved in designing software’,
in Anderson, J. R. (ed.), Cognitive Skills And Their
Acquisition, Hillsdale, NJ: Lawrence Erlbaum
Associates, pp, 255-283.
Kingston, C 1992, ‘Neural networks in forensic science’,
Journal of Forensic Sciences, vol. 37, no. 1.
Kuechler, W. and Vaishnavi, V. 2007, ‘Design [science]
research in IS: A work in progress’ Proceedings of 2nd
International Conference on Design Science Research
in Information Systems and Technology (DESRIST
‘07), Pasedena, CA, May 13-16, 2007.
Liang, B, Austin, J 2005, ‘A neural network for mining
large volumes of time series data’, Conference on
industrial technology, pp. 688-693, 14-17 December
2005.
Myers, M, Newman, M 2007 “The qualitative interview in
IS research: examining the craft”, Information and
Organization, vol. 17, no. 1, pp. 2-26.
Nath, S V, 2006 ‘Crime pattern detection using data
mining’, Proceeding of the 2006 IEEE/WIC/ACM
International Conference on Web Intelligent Agent
Technology, Oracle Corporation, Florida, Atlantic
University, pp. 41-44.
Rajagopalan, B, Isken, M.W. 2001, “Exploiting data
preparation to enhance mining and knowledge
discovery,” IEEE Transactions on Systems, Man, and
Cybernetics, Part C: Applications and Reviews,
vol.31, no.4, pp.460-467.
Schön, D. A 1983, The reflective practitioner: How
professionals think in action, Basic Books, New York.
Shaon, A, Woolf, A 2008, ‘An OASIS based approach to
effective long-term digital metadata curation’,
Computer and Information Science, vol. 1, no. 2, pp.
2-12.
Tanasescu, A, Boussaid, O, Bentayeb, F 2005, ‘Preparing
complex data for warehousing’ The 3rd ACS/IEEE
International Conference on Computer Systems and
Applications, pp. 30-33.
Williams, C 1983 ‘A brief introduction to artificial
intelligence’, OCEANS’83 Proceedings, vol., no., pp.
94-99.
Wolcott, H.T. 1994, Transforming qualitative data:
description, analysis, and interpretation, Sage,
Thousand Oaks, CA.
Younghoon, K, Kyoung-Gu, W, Hyoungmin, P, Kyuseok,
S 2010, ‘Efficient processing of substring match
queries with inverted q-gram indexes’ International
Conference on Data Engineering (ICDE), vol., no., pp.
721-732, 01-06 March 2010.
ICAART 2012 - International Conference on Agents and Artificial Intelligence
218