Skip to main content
Erschienen in: Information Systems Frontiers 3/2010

01.07.2010

Knowledge management technology for organized crime risk assessment

verfasst von: Petter Gottschalk

Erschienen in: Information Systems Frontiers | Ausgabe 3/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information and communication technology is applied by law enforcement agencies in intelligence and investigation work. Assessment of risk caused by criminal gangs is an example of risk and technology in policing. This paper applies the knowledge management technology stage model to criminal risk assessment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bennet, A., & Bennet, D. (2005a). Designing the knowledge organization of the future: The intelligent complex adaptive system. In C. W. Holsapple (Ed.), Handbook of Knowledge Management (Vol. 2, pp. 623–638). Netherlands: Springer Science & Business Media. Bennet, A., & Bennet, D. (2005a). Designing the knowledge organization of the future: The intelligent complex adaptive system. In C. W. Holsapple (Ed.), Handbook of Knowledge Management (Vol. 2, pp. 623–638). Netherlands: Springer Science & Business Media.
Zurück zum Zitat Bennet, D., & Bennet, A. (2005b). The rise of the knowledge organization. In C. W. Holsapple (Ed.), Handbook of Knowledge Management (Vol. 1, pp. 5–20). Netherlands: Springer Science & Business Media. Bennet, D., & Bennet, A. (2005b). The rise of the knowledge organization. In C. W. Holsapple (Ed.), Handbook of Knowledge Management (Vol. 1, pp. 5–20). Netherlands: Springer Science & Business Media.
Zurück zum Zitat Centre. (2005b). Guidance on the national intelligence model. Bedford: Centrex, National Centre for Policing Excellence, UK. Centre. (2005b). Guidance on the national intelligence model. Bedford: Centrex, National Centre for Policing Excellence, UK.
Zurück zum Zitat Centrex. (2005a). Practice advice on core investigative doctrine. Bedford: National Centre for Policing Excellence, UK. Centrex. (2005a). Practice advice on core investigative doctrine. Bedford: National Centre for Policing Excellence, UK.
Zurück zum Zitat Davidson, J., & Gottschalk, P. (2008). Digital forensics in law enforcement: the case of online victimization of children. Electronic Government - International Journal (Toronto, Ont.), 5(4), 445–451.CrossRef Davidson, J., & Gottschalk, P. (2008). Digital forensics in law enforcement: the case of online victimization of children. Electronic Government - International Journal (Toronto, Ont.), 5(4), 445–451.CrossRef
Zurück zum Zitat FBI. (2008). Department of Justice launches new law enforcement strategy to combat increasing threat of international organized crime, Press Release April 23, Federal Bureau of Investigation, www.fbi.gov. “Overview of the Law Enforcement Strategy to Combat International Organized Crime”, U.S. Departement of Justice, Washington, D.C. FBI. (2008). Department of Justice launches new law enforcement strategy to combat increasing threat of international organized crime, Press Release April 23, Federal Bureau of Investigation, www.​fbi.​gov. “Overview of the Law Enforcement Strategy to Combat International Organized Crime”, U.S. Departement of Justice, Washington, D.C.
Zurück zum Zitat Felsen, D., & Kalaitzidis, A. (2005). A historical overview of transnational crime. In P. Reichel (Ed.), Handbook of Transnational Crime and Justice (pp. 3–19). London: Sage. Felsen, D., & Kalaitzidis, A. (2005). A historical overview of transnational crime. In P. Reichel (Ed.), Handbook of Transnational Crime and Justice (pp. 3–19). London: Sage.
Zurück zum Zitat Garud, R., & Kumaraswamy, A. (2005). Vicious and virtuous circles in the management of knowledge: the case of Infosys Technologies. MIS Quarterly, 29(1), 9–33. Garud, R., & Kumaraswamy, A. (2005). Vicious and virtuous circles in the management of knowledge: the case of Infosys Technologies. MIS Quarterly, 29(1), 9–33.
Zurück zum Zitat Gottschalk, P. (2007). Knowledge management systems in law enforcement - technologies and techniques. Hershey: Idea Group Publishing. Gottschalk, P. (2007). Knowledge management systems in law enforcement - technologies and techniques. Hershey: Idea Group Publishing.
Zurück zum Zitat Johnson, S. D., Birks, D. J., McLaughlin, L., Bowers, K. J., & Pease, K. (2007). Prospective crime mapping in operational context, Home Office, UK, Online Report 19/07, www.homeoffice.gov.uk. Johnson, S. D., Birks, D. J., McLaughlin, L., Bowers, K. J., & Pease, K. (2007). Prospective crime mapping in operational context, Home Office, UK, Online Report 19/07, www.​homeoffice.​gov.​uk.
Zurück zum Zitat Lind, H., Hjelm, J., & Lind, M. (2007). Privacy surviving data retention in Europe? W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, www.w3.org. Lind, H., Hjelm, J., & Lind, M. (2007). Privacy surviving data retention in Europe? W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, www.​w3.​org.
Zurück zum Zitat Mirchandani, D. A., Johnson, J. H., & Joshi, K. (2008). Perspectives of citizens towards e-government in Thailand and Indonesia: a multigroup analysis. Information Systems Frontiers, 10, 483–497. doi:10.1007/s10796-008-9102-7.CrossRef Mirchandani, D. A., Johnson, J. H., & Joshi, K. (2008). Perspectives of citizens towards e-government in Thailand and Indonesia: a multigroup analysis. Information Systems Frontiers, 10, 483–497. doi:10.​1007/​s10796-008-9102-7.CrossRef
Zurück zum Zitat Rassel, J. v., & Komarnicki, J. (2007). Gangs ranked – Crazy Dragons head list of Alberta crime threats, Calgary Herald, Saturday, July 21. Rassel, J. v., & Komarnicki, J. (2007). Gangs ranked – Crazy Dragons head list of Alberta crime threats, Calgary Herald, Saturday, July 21.
Zurück zum Zitat Scheepers, H., & Scheepers, R. (2008). A process-focused decision framework for analyzing the business value potential of IT investments. Information Systems Frontiers, 10, 321–330. doi:10.1007/s10796-008-9076-5.CrossRef Scheepers, H., & Scheepers, R. (2008). A process-focused decision framework for analyzing the business value potential of IT investments. Information Systems Frontiers, 10, 321–330. doi:10.​1007/​s10796-008-9076-5.CrossRef
Zurück zum Zitat Sheptycki, J. (2007). Police ethnography in the house of serious and organized crime. In A. Henry & D. J. Smith (Eds.), Transformations of Policing (pp. 51–77). Oxford: Ashgate. Sheptycki, J. (2007). Police ethnography in the house of serious and organized crime. In A. Henry & D. J. Smith (Eds.), Transformations of Policing (pp. 51–77). Oxford: Ashgate.
Zurück zum Zitat Tan, W. A., Jiang, C. Q., Li, L., & Lv, Z. (2008). Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies. Information Systems Frontiers, 10, 519–529. doi:10.1007/s10796-008-9107-2.CrossRef Tan, W. A., Jiang, C. Q., Li, L., & Lv, Z. (2008). Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies. Information Systems Frontiers, 10, 519–529. doi:10.​1007/​s10796-008-9107-2.CrossRef
Zurück zum Zitat Wasko, M. M., & Faraj, S. (2005). Why should i share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29(1), 35–57. Wasko, M. M., & Faraj, S. (2005). Why should i share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29(1), 35–57.
Zurück zum Zitat Weir, R., & Bangs, M. (2007). The use of Geographic Information Systems by crime analysts in England and Wales, Online Report 03/07, Home Office, www.homeoffice.gov.uk. Weir, R., & Bangs, M. (2007). The use of Geographic Information Systems by crime analysts in England and Wales, Online Report 03/07, Home Office, www.​homeoffice.​gov.​uk.
Metadaten
Titel
Knowledge management technology for organized crime risk assessment
verfasst von
Petter Gottschalk
Publikationsdatum
01.07.2010
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 3/2010
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-009-9178-8

Weitere Artikel der Ausgabe 3/2010

Information Systems Frontiers 3/2010 Zur Ausgabe

Premium Partner