12 Computer science

In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question...

Full description

Autores:
Tipo de recurso:
http://purl.org/coar/resource_type/c_1162
Fecha de publicación:
2019
Institución:
Universidad de Bogotá Jorge Tadeo Lozano
Repositorio:
Expeditio: repositorio UTadeo
Idioma:
eng
OAI Identifier:
oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/16841
Acceso en línea:
https://library.oapen.org/bitstream/handle/20.500.12657/25198/9780415826266_oachapter12.pdf?sequence=1
http://hdl.handle.net/20.500.12010/16841
Palabra clave:
Ciencias de la Computación
Informática -- algoritmo
Redes informáticas
Computadoras
Rights
License
Abierto (Texto Completo)
id UTADEO2_a645207b7dbee123840d1265df22f5f2
oai_identifier_str oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/16841
network_acronym_str UTADEO2
network_name_str Expeditio: repositorio UTadeo
repository_id_str
dc.title.spa.fl_str_mv 12 Computer science
title 12 Computer science
spellingShingle 12 Computer science
Ciencias de la Computación
Informática -- algoritmo
Redes informáticas
Computadoras
title_short 12 Computer science
title_full 12 Computer science
title_fullStr 12 Computer science
title_full_unstemmed 12 Computer science
title_sort 12 Computer science
dc.subject.spa.fl_str_mv Ciencias de la Computación
topic Ciencias de la Computación
Informática -- algoritmo
Redes informáticas
Computadoras
dc.subject.lemb.spa.fl_str_mv Informática -- algoritmo
Redes informáticas
Computadoras
description In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question we use the 25 techniques of situational crime prevention to provide a systematic assessment of how computer and network technology can be used to prevent crime. The second question will be addressed by discussing computer simulation methods in cases where real experiments with crime prevention would be too costly or impractical.
publishDate 2019
dc.date.created.none.fl_str_mv 2019-04-26
dc.date.accessioned.none.fl_str_mv 2021-01-21T18:06:57Z
dc.date.available.none.fl_str_mv 2021-01-21T18:06:57Z
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_1162
format http://purl.org/coar/resource_type/c_1162
dc.identifier.isbn.none.fl_str_mv 978-0-415-82626-6
978-0-203-43140-5
dc.identifier.other.none.fl_str_mv https://library.oapen.org/bitstream/handle/20.500.12657/25198/9780415826266_oachapter12.pdf?sequence=1
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/20.500.12010/16841
identifier_str_mv 978-0-415-82626-6
978-0-203-43140-5
url https://library.oapen.org/bitstream/handle/20.500.12657/25198/9780415826266_oachapter12.pdf?sequence=1
http://hdl.handle.net/20.500.12010/16841
dc.language.iso.spa.fl_str_mv eng
language eng
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.local.spa.fl_str_mv Abierto (Texto Completo)
dc.rights.creativecommons.none.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
rights_invalid_str_mv Abierto (Texto Completo)
https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
http://purl.org/coar/access_right/c_abf2
dc.format.extent.spa.fl_str_mv 13 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Taylor & Francis
institution Universidad de Bogotá Jorge Tadeo Lozano
bitstream.url.fl_str_mv https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16841/1/12%20Computer%20science%20_92.pdf
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16841/2/license.txt
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16841/3/12%20Computer%20science%20_92.pdf.jpg
bitstream.checksum.fl_str_mv f27d1b66180c0c03c51117ffbd40c480
abceeb1c943c50d3343516f9dbfc110f
ab483310fa512aaf79738197a9d674de
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional - Universidad Jorge Tadeo Lozano
repository.mail.fl_str_mv expeditio@utadeo.edu.co
_version_ 1808495348250836992
spelling 2021-01-21T18:06:57Z2021-01-21T18:06:57Z2019-04-26978-0-415-82626-6978-0-203-43140-5https://library.oapen.org/bitstream/handle/20.500.12657/25198/9780415826266_oachapter12.pdf?sequence=1http://hdl.handle.net/20.500.12010/1684113 páginasapplication/pdfengTaylor & FrancisCiencias de la ComputaciónInformática -- algoritmoRedes informáticasComputadoras12 Computer scienceAbierto (Texto Completo)https://creativecommons.org/licenses/by-nc-nd/4.0/legalcodehttp://purl.org/coar/access_right/c_abf2In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question we use the 25 techniques of situational crime prevention to provide a systematic assessment of how computer and network technology can be used to prevent crime. The second question will be addressed by discussing computer simulation methods in cases where real experiments with crime prevention would be too costly or impractical.http://purl.org/coar/resource_type/c_1162Hartel, PieterJunger, MarianneORIGINAL12 Computer science _92.pdf12 Computer science _92.pdfapplication/pdf604871https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16841/1/12%20Computer%20science%20_92.pdff27d1b66180c0c03c51117ffbd40c480MD51open accessLICENSElicense.txtlicense.txttext/plain; charset=utf-82938https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16841/2/license.txtabceeb1c943c50d3343516f9dbfc110fMD52open accessTHUMBNAIL12 Computer science _92.pdf.jpg12 Computer science _92.pdf.jpgIM Thumbnailimage/jpeg7634https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16841/3/12%20Computer%20science%20_92.pdf.jpgab483310fa512aaf79738197a9d674deMD53open access20.500.12010/16841oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/168412021-01-31 18:26:32.247open accessRepositorio Institucional - Universidad Jorge Tadeo Lozanoexpeditio@utadeo.edu.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