scispace - formally typeset
Search or ask a question
Institution

Dutch Ministry of Justice

About: Dutch Ministry of Justice is a based out in . It is known for research contribution in the topics: Poison control & Prison. The organization has 111 authors who have published 153 publications receiving 2764 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors present the results of empirical analyses of the use of information technology (IT) by organized crime groups, in particular, how IT affects the processes of origin and growth of criminal networks.
Abstract: This article presents the results of empirical analyses of the use of information technology (IT) by organized crime groups. In particular, it explores how the use of IT affects the processes of origin and growth of criminal networks. The empirical data presented in this article consist of 30 large scale criminal investigations into organized crime, including traditional organized crime, traditional organized crime in which IT is an innovative element, low tech cybercrimes and high tech cybercrimes. Networks involved in cybercrimes or traditional crimes with an innovative IT element can be characterized as a mixture of old school criminals that have a long criminal career, and a limited number of technically skilled members. Furthermore, almost all cases have a local dimension. Also the cybercrime cases. Dutch sellers of drugs on online marketplace, for example, mainly work for customers in the Netherlands and surrounding countries.

17 citations

Journal Article
TL;DR: In this paper, an approach inspired by the Dempster-shafer theory is proposed to capture uncertainty and ignorance in database support for effective decision making. But, the approach is limited to the case where dependent data are represented in different relations.
Abstract: In many applications, uncertainty and ignorance go hand in hand. Therefore, to deliver database support for effective decision making, an integrated view of uncertainty and ignorance should be taken. So far, most of the efforts attempted to capture uncertainty and ignorance with probability theory. In this paper, we discuss the weakness to capture ignorance with probability theory, and propose an approach inspired by the Dempster-Shafer theory to capture uncertainty and ignorance. Then, we present a rule to combine dependent data that are represented in different relations. Such a rule is required to perform joins in a consistent way. We illustrate that our rule is able to solve the so-called problem of information loss, which was considered as an open problem so far.

17 citations

Proceedings ArticleDOI
03 Jan 2018
TL;DR: This contribution aims to help policymakers in adopting policies and strategies that stimulate others to develop, deploy and use IoT devices, applications and services in secure, privacy-friendly and safe ways.
Abstract: The Internet of Things (IoT) is rapidly growing, and offers many economical and societal potentials and benefits. Nevertheless, the IoT also introduces new threats to our Security, Privacy and Safety (SPS). The existing work on mitigating these SPS threats often fails to address the fundamental challenges behind the mitigation measures proposed, and fails to make the relations between different mitigation measures explicit. This paper, therefore, offers a conceptual framework for understanding and approaching the challenges and obstacles that arise in addressing the SPS threats of the IoT. This contribution aims to help policymakers in adopting policies and strategies that stimulate others to develop, deploy and use IoT devices, applications and services in secure, privacy-friendly and safe ways.

17 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide empirical insight into how organized crime offenders use IT to launder their money, and the most striking similarities between cybercrime and traditional crime is the offenders' preference for cash.

17 citations

Journal ArticleDOI
TL;DR: The prevalence and satisfaction of existing technologies, including wiretapping, fingerprints, DNA research, database coupling, data mining and profiling, camera surveillance and network analyses, and the extent to which policing technologies are evaluated and yield success stories were investigated.

16 citations


Authors

Showing all 111 results

Network Information
Related Institutions (5)
George Mason University
39.9K papers, 1.3M citations

76% related

University of Mannheim
12.9K papers, 446.5K citations

74% related

Copenhagen Business School
9.6K papers, 341.8K citations

74% related

London School of Economics and Political Science
35K papers, 1.4M citations

73% related

University of North Carolina at Greensboro
13.7K papers, 456.2K citations

73% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20214
20205
20195
20188
201712
201620