Showing 1 - 14 results of 14 for search '"crime"', query time: 0.07s Refine Results
  1. 1

    Once Upon a Crime: Towards Crime Prediction from Demographics and Mobile Data by Bogomolov, Andrey, Lepri, Bruno, Staiano, Jacopo, Oliver, Nuria, Pianesi, Fabio, Pentland, Alex Paul

    Published 2016
    “…In this paper, we present a novel approach to predict crime in a geographic space from multiple data sources, in particular mobile phone and demographic data. …”
    Get full text
    Get full text
    Article
  2. 2

    Learning to Detect Patterns of Crime by Wang, Tong, Rudin, Cynthia, Wagner, Daniel, Sevieri, Rich

    Published 2013
    “…Our goal is to automatically detect patterns of crime. Among a large set of crimes that happen every year in a major city, it is challenging, time-consuming, and labor-intensive for crime analysts to determine which ones may have been committed by the same individual(s). …”
    Get full text
    Get full text
    Article
  3. 3

    Juvenile Incarceration, Human Capital, and Future Crime: Evidence from Randomly Assigned Judges by Aizer, Anna, Doyle, Joseph J.

    Published 2015
    “…Over 130,000 juveniles are detained in the United States each year with 70,000 in detention on any given day, yet little is known about whether such a penalty deters future crime or interrupts social and human capital formation in a way that increases the likelihood of later criminal behavior. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Improving interdisciplinary communication with standardized cyber security terminology: A literature review by Ramirez, Robert, Choucri, Nazli

    Published 2022
    “…The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in investment in new technology for securing computers around the globe. …”
    Get full text
    Get full text
    Article
  6. 6

    Institutional Foundations for Cyber Security: Current Responses and New Challenges by Choucri, Nazli, Madnick, Stuart E., Ferwerda, Jeremy

    Published 2016
    “…We begin with (a) highlights of international institutional theory and an empirical “census” of the institutions-in-place for cyber security, and then turn to (b) key imperatives of information technology-development linkages and the various cyber processes that enhance developmental processes, (c) major institutional responses to cyber threats and cyber crime as well as select international and national policy postures so critical for industrial countries and increasingly for developing states as well, and (d) the salience of new mechanisms designed specifically in response to cyber threats.…”
    Get full text
    Working Paper
  7. 7

    Taking the Long Way Home: U.S. Tax Evasion and Offshore Investments in U.S. Equity and Debt Markets by Hanlon, Michelle, Maydew, Edward L., Thornock, Jacob R.

    Published 2015
    “…Employing Becker's (1968) economic theory of crime, we identify the tax evasion component by examining how foreign portfolio investment varies with changes in the incentives to evade and the risks of detection. …”
    Get full text
    Get full text
    Article
  8. 8

    Institutions for cyber security: International responses and global imperatives by Choucri, Nazli, Madnick, Stuart E., Ferwerda, Jeremy

    Published 2022
    “…We begin with (a) highlights of international institutional theory and an empirical “census” of the institutions-in-place for cyber security, and then turn to (b) key imperatives of information technology-development linkages and the various cyber processes that enhance developmental processes, (c) major institutional responses to cyber threats and cyber crime as well as select international and national policy postures so critical for industrial countries and increasingly for developing states as well, and (d) the salience of new mechanisms designed specifically in response to cyber threats.…”
    Get full text
    Get full text
    Article
  9. 9

    Husband-Killer, Christian Heroine, Victim: The Execution of Madame Tiquet, 1699 by Ravel, Jeffrey

    Published 2011
    “…At least some observers came to believe that her crime represented a threat to husbands and paternal authority more generally throughout the kingdom. …”
    Get full text
    Get full text
    Article
  10. 10

    Institutions for Cyber Security: International Responses and Global Imperatives by Choucri, Nazli, Madnick, Stuart E, Ferwerda, Jeremy

    Published 2017
    “…We begin with (a) highlights of international institutional theory and an empirical “census” of the institutions-in-place for cyber security, and then turn to (b) key imperatives of information technology-development linkages and the various cyber processes that enhance developmental processes, (c) major institutional responses to cyber threats and cyber crime as well as select international and national policy postures so critical for industrial countries and increasingly for developing states as well, and (d) the salience of new mechanisms designed specifically in response to cyber threats.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Urban characteristics attributable to density-driven tie formation by Pan, Wei, Ghoshal, Gourab, Cebrian, Manuel, Pentland, Alex Paul, Krumme, Katherine Ann

    Published 2014
    “…Here we demonstrate that our model provides a robust and accurate fit for the dependency of city characteristics with city-size, ranging from individual-level dyadic interactions (number of acquaintances, volume of communication) to population level variables (contagious disease rates, patenting activity, economic productivity and crime) without the need to appeal to heterogeneity, modularity, specialization or hierarchy.…”
    Get full text
    Get full text
    Article
  12. 12

    Inference on Treatment Effects after Selection among High-Dimensional Controls by Chernozhukov, Victor V, Hansen, Christian B., Belloni, Alberto

    Published 2017
    “…We illustrate the use of the developed methods with numerical simulations and an application that considers the effect of abortion on crime rates.…”
    Get full text
    Get full text
    Article
  13. 13

    Clotting Mimicry from Robust Hemostatic Bandages Based on Self-Assembling Peptides by Tschabrunn, Cory M., Mehta, Manav, Perez-Cuevas, Monica B., Zhang, Shuguang, Hsu, Bryan Boen, Conway, William E., Hammond, Paula T

    Published 2016
    “…Uncontrolled bleeding from traumatic wounds is a major factor in deaths resulting from military conflict, accidents, disasters and crime. Self-assembling peptide nanofibers have shown superior hemostatic activity, and herein, we elucidate their mechanism by visualizing the formation of nanofiber-based clots that aggregate blood components with a similar morphology to fibrin-based clots. …”
    Get full text
    Article
  14. 14

    Wulgarity and Witality: On Making a Spectacle of Oneself in Pickwick by Buzard, James

    Published 2018
    “…In Henry Mayhew’s London Labour and the London Poor (1861), a massive, four-volume survey of urban workers living on the economic margins of Victorian society, city streets offer up plenty of appalling working-class vulgarity – strident voices, coarse language, gaudy clothing, and brazen behavior undisciplined by bourgeois standards of decency and reticence.1 But even as these crimes against propriety sharpen the contrast between the privileged observer and “the poor,” they also disturb the power relations between Mayhew and the subjects of his investigations. …”
    Get full text
    Get full text
    Article