Chapter 12 Computer science

In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question...

Full description

Saved in:
Bibliographic Details
Main Author: Hartel, Pieter (auth)
Other Authors: Junger, Marianne (auth)
Format: Electronic Book Chapter
Language:English
Published: Taylor & Francis 2019
Series:Routledge International Handbooks
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_25198
005 20191017
003 oapen
006 m o d
007 cr|mn|---annan
008 20191017s2019 xx |||||o ||| 0|eng d
020 |a 9780203431405 
040 |a oapen  |c oapen 
041 0 |a eng 
042 |a dc 
072 7 |a UY  |2 bicssc 
100 1 |a Hartel, Pieter  |4 auth 
700 1 |a Junger, Marianne  |4 auth 
245 1 0 |a Chapter 12 Computer science 
260 |b Taylor & Francis  |c 2019 
300 |a 1 electronic resource (13 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Routledge International Handbooks 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question we use the 25 techniques of situational crime prevention to provide a systematic assessment of how computer and network technology can be used to prevent crime. The second question will be addressed by discussing computer simulation methods in cases where real experiments with crime prevention would be too costly or impractical. 
540 |a Creative Commons  |f by-nc-nd/4.0/  |2 cc  |4 http://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
650 7 |a Computer science  |2 bicssc 
653 |a crime 
653 |a computers 
653 |a networks 
653 |a computer science 
653 |a crime prevention 
773 1 0 |t Routledge Handbook of Crime Science  |7 nnaa  |o OAPEN Library UUID: fe73b562-84db-4e34-9aff-d54dc37eb1d3 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/fb0a8cb6-2dfe-42b3-ae5a-327d11604796/9780415826266_oachapter12.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u http://library.oapen.org/handle/20.500.12657/25198  |7 0  |z OAPEN Library: description of the publication