Data mining for intelligence, fraud, & criminal detection : (Record no. 6431)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04251nam a22002297a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240110170034.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210924b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781420067231 (alk. paper) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | BUL |
Transcribing agency | BUL |
Modifying agency | BUL |
Language of cataloging | eng |
Description conventions | rda |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.256 |
Edition number | 23 |
Item number | WES |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Westphal, Christopher R. |
Fuller form of name | (Christopher Ralph), |
245 10 - TITLE STATEMENT | |
Title | Data mining for intelligence, fraud, & criminal detection : |
Remainder of title | advanced analytics & information sharing technologies / |
Statement of responsibility, etc. | Christopher Westphal. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton : |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | c2009. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxii, 426 p. : |
Other physical details | ill., maps ; |
Dimensions | 27 cm. |
500 ## - GENERAL NOTE | |
General note | CONTENTS<br/><br/>Chapter 1 - Overview <br/>Sharing Data <br/>Connect the Dots <br/>Analytical Versus Referential Data <br/>Information Sharing <br/>Conclusion <br/><br/>Chapter 2 - The Quality of Data <br/>Value Errors <br/>Missing Data and Bad Structures <br/>Unique Addresses <br/>Distinct Phone Numbers <br/>Individual ID Numbers <br/>Anomalous Accounts <br/>One of a Kind Transactions <br/>Original Organizations <br/>Perspicuous People <br/>Entity Resolution <br/>Anonymous Resolution <br/>Conclusion <br/><br/>Chapter 3 - What are Patterns? <br/>Which Pattern Is More Important? <br/>Do These Patterns Make Sense? <br/>Is This a Reliable Pattern? <br/>Is This an Actionable Pattern? <br/>Which Pattern is More Valuable? <br/>What Does this Pattern Show? <br/>Who is the Most Important Person? <br/>Conclusion <br/><br/>Section 2 Introduction<br/> <br/>Chapter 4 - Border Protection <br/>I-94- Arrival/Departure Records <br/>Land Border Targeting <br/>Cluster by Hour of the Day (HOD) <br/>Cluster by Day of the Week (DOW) <br/>Figure 4.18. Date Grid Showing Crossing Behavior by Day/Week <br/>Cluster by Date <br/>Cluster by Port of Entry (POE) <br/>Clusters by Lane <br/>Cluster by Inspector <br/>Cluster by City/State <br/>Cluster by VIN <br/>Putting It Together <br/>Conclusion <br/><br/>Chapter 5 - Money Laundering and Financial Crimes <br/>Suspicious Activity Reports <br/>Structuring Transactions <br/>Bust Out Schemes <br/>A Consumer Bust-Out Scheme <br/>Busting and Kiting <br/>Identity Fraud <br/>Large Connections <br/>Attorneys and Law Firms <br/>Cheap Motels <br/>Location, Location, Location <br/>Individual Taxpayer Identification Number <br/>SAR Versus STR <br/>Timing is Everything <br/>A Final Note <br/>Conclusion <br/><br/>Chapter 6 - Money Service Businesses <br/>Why Wire Remitters? <br/>Steps of a Wire Remittance <br/>Structure of a Wire Transfer <br/>Combating Human Smuggling <br/>The Smuggling Process <br/>Changing the Rules <br/>Seizing Assets <br/>Corridor States <br/>Drug Dealers <br/>Suspicious Activity Reports <br/>Elderly Abuse Pattern <br/>Ornery Old Man <br/>Other MSB Patterns <br/>Multiple Locations <br/>Minimal Overlaps <br/>Official Deposits <br/>Heavenly Offerings <br/>Dirty Dancing <br/>Conclusion <br/><br/>Chapter 7 - Fraud Analytics <br/>Warranty Fraud Anecdotes <br/>Automobile Warranties <br/>Hurricane Katrina <br/>Corporate Frauds <br/>Employees as Vendors <br/>Vendors as Vendors <br/>Corporate Expenses <br/>Duplicate Payments <br/>Human Resources <br/>Gift Card Fraud <br/>Additional Examples <br/>Pharmaceutical <br/>Phishing / Click Fraud <br/>Tax Evasion <br/>Conclusion <br/><br/>Section 3 Introduction <br/><br/>Chapter 8 - Information Sharing Protocols <br/>Global Justice XML Data Model (Global JXDM) <br/>Data Dictionary <br/>Data Model <br/>Component Reuse Repository <br/>National Information Exchange Model <br/>28 CFR Part <br/>Conclusion <br/><br/>Chapter 9 - Information Sharing Systems <br/>Automated Regional Justice Information System ARJIS <br/>Comprehensive Regional Information Management Exchange System (CRIMES) <br/>Factual Analysis Criminal Threat Solution (FACTS) System <br/>Florida Information Network for Data Exchange and Retrieval (FINDER) <br/>Ohio Local Law Enforcement Information Sharing Network (OLLEISN), <br/>Law Enforcement Information Exchange (LInX) <br/>OneDOJ , R-DEx, N-DEx <br/>Law Enforcement Online (LEO) <br/>Joint Regional Information Exchange System (JRIES) <br/>Joint Terrorism Task Force (JTTF) <br/>State-Level Fusion Centers <br/>High Intensity Drug Trafficking Area (HIDTA) <br/>High Intensity Financial Crime Areas (HIFCA) <br/>Regional Information Sharing Systems (RISS) <br/>Conclusion <br/>Summary 1 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index p. 411-426 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data mining in law enforcement |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Table of contents only |
Uniform Resource Identifier | <a href="http://www.loc.gov/catdir/toc/ecip0819/2008021209.html">http://www.loc.gov/catdir/toc/ecip0819/2008021209.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book Closed Access |
Classification part | 363.256 |
Item part | 1 |
Call number prefix | WES |
Call number suffix | 363.256 WES |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Engineering Library | Engineering Library | 09/24/2021 | Purchased | 0027685 | 363.256 WES 1 | BUML24010153 | 09/24/2021 | 1 | 09/24/2021 | Book Closed Access |