Call for papers: Computation Criminology: computer science methods for crime analysis
Guest editors: Anton Borg and Martin Boldt, Department of Computer Science and Engineering, Blekinge Institute of Technology, Sweden
Law enforcement agencies face different conditions today, as the behaviour of criminals has changed with increased mobility and international connections. This, coupled with demands from more resource-efficient police organizations, as well as the requirements of more proactive approaches (e.g. predictive policing) rather than reactive, requires law enforcement agencies to adopt new methods and approaches to handle their goal of enforcing the law.
In order to adapt to these changing circumstances, law enforcement agencies look towards automating what is often manual labour using computerized tools (e.g. regarding data collection, analytics, forecasting). As such, various computer science methods are being employed within the field of computational criminology.
For this special issue of Security Informatics, original contributions that add to the understanding of how crime can be modelled and analyzed using computer science methods are appreciated. The concept of 'crime' should be interpreted in a broad sense, i.e. not limited to serious crimes. Also, submitted manuscripts should demonstrate both how they improve beyond the current state-of-the-art as well as their usefulness within a law enforcement context.
The scope includes, but is not limited to:
- Models for forecasting crime and measuring impact
- Models for crime pattern recognition
- Comprehensible/transparent models for crime analysis
- Handling class-imbalance and biased samples for crime analysis
- Web-based intelligence monitoring, mining, and analysis
- Social network analysis for crime analysis and investigations
- Visualization techniques for crime analysis and investigation
Proposals for submissions should be sent to the Guest Editors at firstname.lastname@example.org and email@example.com. The proposal should describe the background, method and expected contributions (max 500 words). If successful, the authors will be invited to submit through the web-based submission system. All submissions will be subject to standard blind peer review process by the Security Informatics Editorial Board.