𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Geographical profiling obscene phone calls—a case study

✍ Scribed by Jessica Ebberline


Book ID
102353732
Publisher
John Wiley and Sons
Year
2008
Tongue
English
Weight
182 KB
Volume
5
Category
Article
ISSN
1544-4759

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

Studies on geographical profiling have typically focused on crimes with physical crime sites. This study focused on crimes with no physical crimes sites (i.e. no physical contact occurred between the victim and the offender). A single offender made obscene phone calls to 86 children during the years 1999–2000 in the south of Sweden. The locations in which obscene phone calls were received were analysed in a geographical profiling system (Dragnet) to see whether it could provide a map that showed the most likely area the offender would reside in. The purpose of this study was to explore whether geographical software such as Dragnet can be used by investigators of crimes with no physical crime locations. The result showed that the offender in this case had his home close to the region assigned the highest probability of containing home or base, which indicates that Dragnet can provide maps that can narrow down the search areas for the police in cases without physical crime locations. Copyright © 2008 John Wiley & Sons, Ltd.


📜 SIMILAR VOLUMES


A case–case study of mobile phone use an
✍ Yasuto Sato; Suminori Akiba; Osami Kubo; Naohito Yamaguchi 📂 Article 📅 2010 🏛 John Wiley and Sons 🌐 English ⚖ 92 KB 👁 3 views

Results of case-control studies of mobile phone use and acoustic neuroma have been inconsistent. We conducted a case-case study of mobile phone use and acoustic neuroma using a self-administered postal questionnaire. A total of 1589 cases identified in 22 hospitals throughout Japan were invited to p

Future consumer mobile phone security: A
✍ André van Cleeff 📂 Article 📅 2008 🏛 Elsevier Science 🌐 English ⚖ 250 KB

Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model