Data Management Techniques for Criminal Investigations

G Mann - … Driven Frameworks for Combating Terrorism and …, 2011 - Springer
Xanalys PowerCase supports a defined set of procedures that should operate in an “incident
room” or “case office”. These procedures were ascertained through a detailed …

Links: common lisp resources on the web

R St. Amant, RM Young - intelligence, 2001 - dl.acm.org
The ALU Web site lists over fifty different Common Lisp implementations of varying
compliance with the ANSI standard [14]. For any of the most common desktop platforms today (…

Application of intelligence analysis software in competitive intelligence

R Kopal - Central European COnference on Information and …, 2009 - search.proquest.com
… Although there are around ten serious companies in the field of intelligence analytical
software, for the scope of this work it will be shown the products of i2 and Xanalys companies. …

[PDF][PDF] APPLYING VISUAL ANALYTICS IN SOCIAL NETWORK ANALYSIS AND LARGE SCALE DATA

A Galappaththi - pgis.pdn.ac.lk
We are living in the world where information found in structured or unstructured way and the
information or data is in large scale. Generally we call them “Big Data”. Analysing big data is …

An advanced network visualization system for financial crime detection

W Didimo, G Liotta, F Montecchiani… - 2011 IEEE Pacific …, 2011 - ieeexplore.ieee.org
We present a new system, VISFAN, for the visual analysis of financial activity networks. It
supports the analyst with effective tools to discover financial crimes, like money laundering and …

Visual analysis of financial crimes: [system paper]

E Di Giacomo, W Didimo, G Liotta… - Proceedings of the …, 2010 - dl.acm.org
… /), XANALYS Link Explorer (https://www.xanalys.com/). Visual analysis of criminal networks
is also the subject of scientific projects and surveys (see, eg, [3, 7]). In the specific context of …

CrimeNet explorer: a framework for criminal network knowledge discovery

JJ Xu, H Chen - ACM Transactions on Information Systems (TOIS), 2005 - dl.acm.org
… Given a person’s name, XANALYS Link Explorer can automatically form a database query
to search for related persons. The related persons found are linked to the given person and …

Issues for the next generation of criminal network investigation tools

UK Wiil - 2013 European Intelligence and Security Informatics …, 2013 - ieeexplore.ieee.org
Criminal network investigation involves a number of complex knowledge management tasks
and both humans and software tools play a central role in performing such tasks. The paper …

Shareable Intelligence: New and Improved Software Helps Police Fight Crime and Terrorism

C Miller - Law Enforcement Technology, 2005 - ojp.gov
The intelligence tools since the terrorist attacks on September 2001 focus not only on
collecting and organizing information, but also on sharing that information with others in law …

[PDF][PDF] Considerations on the use of XBRL during the financial audit missions: Approach of a model

LC Eni - … Computation & Economic Cybernetics Studies & …, 2013 - researchgate.net
The purpose of the study was to investigate few of the reporting tools that could be used by
auditors to document and detect occupational fraud. To this scope, we reviewed some of the …