{"id":"https://openalex.org/W4389314760","doi":"https://doi.org/10.1145/3627377.3627400","title":"Research on Crime Prevention and Control Based on Big Data Method","display_name":"Research on Crime Prevention and Control Based on Big Data Method","publication_year":2023,"publication_date":"2023-09-22","ids":{"openalex":"https://openalex.org/W4389314760","doi":"https://doi.org/10.1145/3627377.3627400"},"language":"en","primary_location":{"id":"doi:10.1145/3627377.3627400","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627377.3627400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 6th International Conference on Big Data Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031607880","display_name":"Hongyan Li","orcid":"https://orcid.org/0009-0001-1525-5677"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hongyan Li","raw_affiliation_strings":["Hainan Vocational College of Politics and Law, China"],"affiliations":[{"raw_affiliation_string":"Hainan Vocational College of Politics and Law, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5031607880"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5503,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83244969,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"146","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14280","display_name":"Big Data Technologies and Applications","score":0.8450000286102295,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14280","display_name":"Big Data Technologies and Applications","score":0.8450000286102295,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.7386000156402588,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8627012968063354},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.8328312635421753},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6725871562957764},{"id":"https://openalex.org/keywords/crime-prevention","display_name":"Crime prevention","score":0.6266022324562073},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5553313493728638},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49452754855155945},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.44655460119247437},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.43958571553230286},{"id":"https://openalex.org/keywords/a-priori-and-a-posteriori","display_name":"A priori and a posteriori","score":0.43076974153518677},{"id":"https://openalex.org/keywords/public-security","display_name":"Public security","score":0.4274914860725403},{"id":"https://openalex.org/keywords/criminal-behaviour","display_name":"Criminal behaviour","score":0.42050501704216003},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.41516488790512085},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3135203421115875},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.17188647389411926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16061070561408997},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13641703128814697},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12071141600608826}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8627012968063354},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.8328312635421753},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6725871562957764},{"id":"https://openalex.org/C2776348852","wikidata":"https://www.wikidata.org/wiki/Q855848","display_name":"Crime prevention","level":2,"score":0.6266022324562073},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5553313493728638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49452754855155945},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.44655460119247437},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.43958571553230286},{"id":"https://openalex.org/C75553542","wikidata":"https://www.wikidata.org/wiki/Q178161","display_name":"A priori and a posteriori","level":2,"score":0.43076974153518677},{"id":"https://openalex.org/C2986045029","wikidata":"https://www.wikidata.org/wiki/Q294240","display_name":"Public security","level":2,"score":0.4274914860725403},{"id":"https://openalex.org/C2910942459","wikidata":"https://www.wikidata.org/wiki/Q83267","display_name":"Criminal behaviour","level":2,"score":0.42050501704216003},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.41516488790512085},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3135203421115875},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.17188647389411926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16061070561408997},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13641703128814697},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12071141600608826},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3627377.3627400","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627377.3627400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 6th International Conference on Big Data Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2805036021"],"related_works":["https://openalex.org/W2368427438","https://openalex.org/W2350325198","https://openalex.org/W4200548410","https://openalex.org/W2389703798","https://openalex.org/W1029078758","https://openalex.org/W2189099401","https://openalex.org/W2360332718","https://openalex.org/W2380646403","https://openalex.org/W2353965659","https://openalex.org/W1532366924"],"abstract_inverted_index":{"New":[0],"features":[1],"have":[2],"appeared":[3],"in":[4,7],"criminal":[5,36,46],"acts":[6],"the":[8,33,53,57,67],"era":[9],"of":[10,25,35,40,60],"big":[11,15],"data.":[12],"Based":[13],"on":[14],"data":[16,27],"analysis,":[17],"this":[18,51],"method":[19],"pre-processes":[20],"and":[21,38,64,66],"mines":[22],"useful":[23],"information":[24],"text":[26],"here.":[28],"Combined":[29],"with":[30],"Apriori":[31],"algorithm,":[32],"characteristics":[34],"subjects":[37],"victims":[39],"cybercrime":[41],"are":[42],"also":[43],"analyzed.":[44],"Meanwhile,":[45],"psychology":[47],"is":[48],"explored.":[49],"On":[50],"basis,":[52],"findings":[54],"further":[55],"show":[56],"main":[58],"points":[59],"social":[61],"security":[62],"prevention":[63,72],"control":[65],"ways":[68],"to":[69],"establish":[70],"crime":[71],"mechanism.":[73]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
