Use of Official Data of State Institutions in the Scientific Research of the Population Security

Jurisprudencija: Mokslo darbu žurnalas 121 (3):283-294 (2010)
  Copy   BIBTEX

Abstract

The paper discusses the problems in the detection of security information in legal and other administrative data. The authors analyse the prospects of the use of datamining in the solution of two key problems: abundance and indirectness of these data. Security research uses two kinds of data. The first one is scientific data, designed and gathered specially for the verification of certain security theories. They are the data of criminological, sociological, psychological surveys, experimental data, etc. The second kind is data that are not designed for security research. Most of the data are the by-products of the national legal system, especially its criminal justice, of national and local institutions responsible for the maintenance of public order, and of other public agencies. All the data provide huge amounts of information destined to control and direct the activities of these institutions. There are two kinds of problems in the use of this information in security study. First, this information has to be ‘decoded’ from data describing the activities of related institutions. Second, data on security are lost in huge amounts of other public data. Thus, they have to be ‘mined’. The paper discusses the prospects of the modern information proceeding method—data-mining in the solution of both problems. A new concept of data mining as a meta-procedure is proposed. The object of this meta-procedure is supposed to be the integration of multiple current theories (for example, criminal security) and related statistical procedures. A general algorithm of such data-mining is proposed

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,349

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Data mining: Proprietary rights, people and proposals.Dinah Payne & Cherie Courseault Trumbach - 2009 - Business Ethics, the Environment and Responsibility 18 (3):241-252.
Four Pillars of Internet Research Ethics with Web 2.0.Barry Rooke - 2013 - Journal of Academic Ethics 11 (4):265-268.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Data models and the acquisition and manipulation of data.Todd Harris - 2003 - Philosophy of Science 70 (5):1508-1517.
Issues in Data Management.Sharon S. Krag - 2010 - Science and Engineering Ethics 16 (4):743-748.

Analytics

Added to PP
2013-11-24

Downloads
18 (#808,169)

6 months
3 (#1,023,809)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references