{"id":"https://openalex.org/W2907538595","doi":"https://doi.org/10.1109/isi.2018.8587337","title":"Copresence networks","display_name":"Copresence networks","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2907538595","doi":"https://doi.org/10.1109/isi.2018.8587337","mag":"2907538595"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2018.8587337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006135009","display_name":"David B. Skillicorn","orcid":"https://orcid.org/0000-0003-0605-4029"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"David Skillicorn","raw_affiliation_strings":["School of Computing, Queen\u2019s University, Kingston, Canada","School of Computing, Queen's University, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen\u2019s University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]},{"raw_affiliation_string":"School of Computing, Queen's University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031269002","display_name":"Christian Leuprecht","orcid":"https://orcid.org/0000-0001-9498-4749"},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Christian Leuprecht","raw_affiliation_strings":["Political Science, Royal Military College of Canada, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"Political Science, Royal Military College of Canada, Kingston, Canada","institution_ids":["https://openalex.org/I51768193"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5006135009"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25606453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"118","last_page":"123"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.6184669733047485},{"id":"https://openalex.org/keywords/homophily","display_name":"Homophily","score":0.5934702754020691},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5687599182128906},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5408973693847656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48278987407684326},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4416831135749817},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3448958098888397},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.25062501430511475},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.241108238697052},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09246104955673218},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07332661747932434},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.062040477991104126}],"concepts":[{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.6184669733047485},{"id":"https://openalex.org/C2779812341","wikidata":"https://www.wikidata.org/wiki/Q5891525","display_name":"Homophily","level":2,"score":0.5934702754020691},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5687599182128906},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5408973693847656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48278987407684326},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4416831135749817},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3448958098888397},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.25062501430511475},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.241108238697052},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09246104955673218},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07332661747932434},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.062040477991104126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2018.8587337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1997092589","https://openalex.org/W2001207210","https://openalex.org/W2043930431","https://openalex.org/W2131771132","https://openalex.org/W2132914434","https://openalex.org/W2172018899","https://openalex.org/W2183579278","https://openalex.org/W2592999263","https://openalex.org/W4238265136","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3185373886","https://openalex.org/W3010567961","https://openalex.org/W2588006872","https://openalex.org/W4385338594","https://openalex.org/W3119171992","https://openalex.org/W4200127153","https://openalex.org/W2011190096","https://openalex.org/W3175275009","https://openalex.org/W1971924293","https://openalex.org/W2560747187"],"abstract_inverted_index":{"Copresence":[0,130],"networks":[1,26,49,131],"are":[2,8,32,50,62,108,123,150],"constructed":[3],"by":[4],"associating":[5],"individuals":[6],"who":[7,107],"at":[9,13,21],"the":[10,14,83,90,146],"same":[11,15],"place":[12],"time":[16],"-":[17,60],"in":[18,64,86,94,115,135,153],"our":[19],"case":[20],"police-involved":[22],"incidents.":[23],"They":[24],"generalize":[25],"such":[27,48,138],"a":[28,80,87],"co-offender":[29],"networks,":[30],"which":[31],"becoming":[33],"mainstream":[34],"police":[35,45,128],"and":[36,97,142],"intelligence":[37,143],"tools.":[38],"Because":[39],"copresence":[40,73],"can":[41],"be":[42],"generated":[43],"from":[44],"incident":[46],"data,":[47],"cheap":[51],"to":[52],"construct":[53],"since":[54],"they":[55,61],"require":[56],"no":[57],"specialised":[58],"surveillance":[59],"implicit":[63],"data":[65],"that":[66,72,113,126],"is":[67],"routinely":[68],"collected.":[69],"We":[70,110],"demonstrate":[71],"network":[74],"analytics,":[75],"using":[76],"graph":[77],"embedding,":[78],"gives":[79],"sense":[81],"of":[82,92,117],"criminal":[84],"landscape":[85],"city;":[88],"shows":[89],"importance":[91],"non-criminals":[93,106],"this":[95],"landscape;":[96],"suggests":[98],"targets":[99],"for":[100],"further":[101],"in-depth":[102],"attention":[103],"(unusual":[104],"subgroups,":[105],"brokers).":[109],"also":[111,132,151],"show":[112],"homophily":[114],"level":[116],"criminality":[118],"generally":[119],"holds,":[120],"but":[121],"there":[122],"strong":[124],"exceptions":[125],"deserve":[127],"attention.":[129],"arise":[133],"naturally":[134],"other":[136],"domains":[137],"as":[139],"border":[140],"protection":[141],"surveillance,":[144],"so":[145],"techniques":[147],"described":[148],"here":[149],"applicable":[152],"those":[154],"domains.":[155]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
