Kaushik et al., 2024 - Google Patents
System for Managing Online Crime and Enhancing Public ServicesKaushik et al., 2024
- Document ID
- 18302418559245696567
- Author
- Kaushik P
- Mary J
- Nakra M
- Awasthi H
- Kumar R
- et al.
- Publication year
- Publication venue
- 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N)
External Links
Snippet
An Online Crime Management System has been developed to enhance the effectiveness and efficiency of criminal investigations and data management for law enforcement agencies. This web-based platform provides multiple access levels, including administrative …
- 230000002708 enhancing effect 0 title description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ardabili et al. | Understanding policy and technical aspects of ai-enabled smart video surveillance to address public safety | |
| Hajli et al. | Towards an understanding of privacy management architecture in big data: an experimental research | |
| US11789969B2 (en) | Data analysis and visualization using structured data tables and nodal networks | |
| CA3073714A1 (en) | Method and system for identifying potential fraud activity in a tax return preparation system to trigger an identity verification challenge through the tax return preparation system | |
| Singh et al. | Design and implementation of continuous monitoring and auditing in SAP enterprise resource planning | |
| Saleh et al. | Issues, challenges and solutions of big data in information management: an overview | |
| Van der Waldt | Preparing for Digital Governance: Mapping Competency Domains for Postgraduate Programmes in Public Administration and Management | |
| Altarawneh et al. | Business intelligence and information system management: A conceptual view | |
| Jacob et al. | AI in forensics: a data analytics perspective | |
| Sayed | Ethical considerations in the use of big data for business analytics: а cross-industry perspective | |
| Kaushik et al. | System for Managing Online Crime and Enhancing Public Services | |
| Alstete et al. | Big data in managerial decision-making: concerns and concepts to reduce risk | |
| Franco et al. | Implementation of big data analytics tool in a higher education Institution | |
| Trierweiler | Evaluation the use of big data analytics to facilitate compliance and fraud prevention: an empirical study about usefulness and usage of big data analytics to prevent occupational fraud in German speaking companies/submitted by Michaela Trierweiler | |
| Hollywood et al. | Addressing Emerging Trends to Support the Future of Criminal Justice: Findings of the Criminal Justice Technology Forecasting Group | |
| Kazaure et al. | Digital Forensic Investigation on Social Media Platforms: A Survey on Emerging Machine Learning Approaches. | |
| Irwin et al. | The Future of Technology in Customer Identification & Relationship Risk | |
| Ababii | BANKING SUPERVISION THROUGH SUPTECH | |
| Williams | Integration of Artificial Intelligence and Cloud Computing | |
| Hafner et al. | User-centred threat identification for anonymized microdata | |
| Chen | From digital library to digital government: A case study in crime data mapping and mining | |
| Leite et al. | Process automation in the scenario of intelligence and investigation units: an experience | |
| Yeskov et al. | Implementation of system analysis in a law enforcement organization, as a need for automation of processing a large database | |
| Guy | Analysis of Law Enforcement's Use of Internet of Things for Digital Evidence Collection in Metropolitan Atlanta | |
| KUMUKUMU et al. | DEVELOPMENT OF ONLINE APPLICATION FOR CRIME REPORTING AND HANDLING IN MALAWI POLICE SERVICE (CHATBOT). |