<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-3108</journal-id>
<journal-title><![CDATA[Revista Criminalidad]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Crim.]]></abbrev-journal-title>
<issn>1794-3108</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-31082023000300011</article-id>
<article-id pub-id-type="doi">10.47741/17943108.522</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[The use of citizen information in criminal investigation through a collaborative technological innovation process to counteract theft from the person in Bogotá]]></article-title>
<article-title xml:lang="es"><![CDATA[El uso de la información ciudadana en la investigación criminal mediante un proceso de innovación tecnológico colaborativo para contrarrestar el hurto a personas en Bogotá]]></article-title>
<article-title xml:lang="pt"><![CDATA[O uso da informação dos cidadãos na investigação criminal através de um processo colaborativo de inovação tecnológica para combater o roubo de pessoas em Bogotá]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez-Ortega]]></surname>
<given-names><![CDATA[Jair David]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,University of the Andes  ]]></institution>
<addr-line><![CDATA[Bogotá D. C ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2023</year>
</pub-date>
<volume>65</volume>
<numero>3</numero>
<fpage>11</fpage>
<lpage>30</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-31082023000300011&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-31082023000300011&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-31082023000300011&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Theft from the person is one of the highest impact crimes in Bogotá, with a national share of approximately 38 %. This crime brought to the attention of the authorities is referred to by academics as recorded or reported crime and is used by the police for different purposes, particularly for criminal investigation, but with inefficient results in the identification of perpetrators. Therefore, the type of research is qualitative and has the objective of linking the citizen through a process of collaborative technological innovation, with the purpose of collecting, processing and analysing reported or non-reported information (hidden crime) in a timely, anonymous and efficient manner with disruptive technologies prioritized for the project. The methodology used begins with the discovery stage by identifying key actors and building user stories. Then, in the understanding stage, the value proposition is put forth by means of a hypothesis that is validated in a process of experimentation, and finally, in the build stage, a technology watch analysis is carried out and the proposal for the collaborative system between the citizen and the police with a technological approach is put forward. The results are based on the identification and prioritization of five technologies, two actors, three variables and application of six low and medium fidelity prototypes, as well as the acceptance of citizens in collecting and sharing timely information at 87 %; that information focuses on video, audio, photos and localization at 55 %. On the other hand, with the entry into operation of the collaborative system, the researchers indicate that it would optimise investigation by 50 % through the timely identification of the perpetrators. As for the conclusion, the information analyzed and obtained from the results allows to reach, in a first phase, validation of the established hypothesis, but at the same time recognising the importance of including methodologies such as System Dynamics that allow for the systemic analysis of the information established by other actors and its impact on the proposed collaborative system.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El hurto a personas es uno de los delitos de mayor impacto en temas de seguridad para Bogotá con una participación a nivel nacional del 38 % aproximadamente. Este delito puesto en conocimiento de las autoridades es denominado por académicos como criminalidad registrada o denunciada y es utilizada por la institución policial para diferentes fines, en especial para la investigación criminal, pero con resultados poco eficientes en la identificación de victimarios. Por lo tanto, el tipo de investigación es cualitativa y tiene como objetivo vincular al ciudadano mediante un proceso de innovación tecnológico colaborativo, con el propósito de recolectar, tratar y analizar información denunciada y no denunciada (criminalidad oculta) de manera oportuna, anónima y eficiente con tecnologías disruptivas priorizadas para el proyecto. La metodología empleada inicia con la etapa de descubrir mediante la identificación de actores claves y la construcción de historias de usuario. Luego, en la etapa comprender se plantea la propuesta de valor mediante una hipótesis que se valida en un proceso de experimentación, y por último en la etapa construir, se realiza un análisis de vigilancia tecnológica y se plantea la propuesta del sistema colaborativo entre el ciudadano y la policía con enfoque tecnológico. Los resultados se basan en la identificación y priorización de cinco tecnologías, dos actores, tres variables y aplicación de seis prototipos de baja y mediana fidelidad, así como la aceptación de la ciudadanía en recolectar y compartir información oportuna en un 87 %, esa información se centra en videos, audios, fotos y localización con un 55 %. Por otro lado, con la entrada en funcionamiento del sistema colaborativo, los investigadores indican que optimizaría la investigación en un 50 % mediante la identificación oportuna de los victimarios. En cuanto a la conclusión, la información analizada y obtenida de los resultados, permite llegar en una primera fase, a validar la hipótesis establecida, pero a la vez, la importancia de incluir metodologías como la Dinámica de Sistemas que permita el análisis sistémico de la información establecida por otros actores y su impacto en el sistema colaborativo propuesto.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo O roubo de pessoas é um dos crimes de maior impacto nas questões de segurança de Bogotá, com uma participação nacional de aproximadamente 38 %. Este crime levado ao conhecimento das autoridades é denominado pelos acadêmicos como crime registrado ou denunciado e é utilizado pela instituição policial para diversos fins, principalmente para investigação criminal, mas com resultados ineficientes na identificação dos autores. Portanto, o tipo de pesquisa é qualitativo e visa vincular os cidadãos por meio de um processo colaborativo de inovação tecnológica, como objetivo de coletar, tratar e analisar informações denunciadas e não denunciadas (crimes ocultos) de maneira oportuna, anônima e eficiente, priorizando tecnologias disruptivas. para o projeto. A metodologia utilizada começa com a fase de descoberta, identificando os principais atores e construindo histórias de usuários. Depois, na fase de compreensão, é proposta a proposta de valor através de uma hipótese que é validada num processo de experimentação e, finalmente, na fase de construção, é realizada uma análise de vigilância tecnológica e é proposta a proposta de um sistema colaborativo entre cidadãos. e a polícia com foco tecnológico. Os resultados baseiam-se na identificação e priorização de cinco tecnologias, dois atores, três variáveis e aplicação de seis protótipos de baixa e média fidelidade, bem como na aceitação dos cidadãos na recolha e partilha de informação atempada em 87 %, esta informação centra-se em vídeos, áudios, fotos e localização com 55 %. Por outro lado, com a entrada em funcionamento do sistema colaborativo, os investigadores indicam que otimizaria a investigação em 50 % através da identificação atempada dos autores. Quanto à conclusão, a informação analisada e obtida a partir dos resultados permite-nos chegar numa primeira fase à validação da hipótese estabelecida, mas ao mesmo tempo, a importância de incluir metodologias como a Dinâmica de Sistemas que permite a análise sistémica da informação estabelecida por outros atores e seu impacto no sistema colaborativo proposto.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Criminal investigation]]></kwd>
<kwd lng="en"><![CDATA[design]]></kwd>
<kwd lng="en"><![CDATA[citizen reporting of crime]]></kwd>
<kwd lng="en"><![CDATA[theft]]></kwd>
<kwd lng="en"><![CDATA[innovation in policing and in technologies]]></kwd>
<kwd lng="es"><![CDATA[Investigación criminal]]></kwd>
<kwd lng="es"><![CDATA[diseño]]></kwd>
<kwd lng="es"><![CDATA[denuncia ciudadana del delito]]></kwd>
<kwd lng="es"><![CDATA[hurto]]></kwd>
<kwd lng="es"><![CDATA[innovación en policía y en tecnologías]]></kwd>
<kwd lng="pt"><![CDATA[Investigação criminal]]></kwd>
<kwd lng="pt"><![CDATA[desenho]]></kwd>
<kwd lng="pt"><![CDATA[denúncia de crimes pelos cidadãos]]></kwd>
<kwd lng="pt"><![CDATA[roubos]]></kwd>
<kwd lng="pt"><![CDATA[inovação policial e tecnológica]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arenas]]></surname>
<given-names><![CDATA[R. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Satellite technology innovation for crime prevention in the State of Mexico]]></article-title>
<source><![CDATA[Journal del Instituto de Ciencias Jurídicas de Puebla]]></source>
<year>2013</year>
<volume>7</volume>
<numero>31</numero>
<issue>31</issue>
<page-range>7-27</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aunger]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Types of technology]]></article-title>
<source><![CDATA[Technological Forecasting and Social Change]]></source>
<year>2010</year>
<volume>77</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>762-82</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azhar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Exponential, 1. Order and Chaos in an Age of Accelerating Technology: Random House]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Becker]]></surname>
<given-names><![CDATA[G. S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime and Punishment: An economic approach]]></article-title>
<source><![CDATA[Journal of Political Economy]]></source>
<year>1968</year>
<volume>76</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>169.217</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bland]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Osterwalder]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Testing Business Ideas. A Field Guide for Rapid Experimentation (A. Smith, &amp; T. Papadakos, eds.).]]></source>
<year>2019</year>
<publisher-name><![CDATA[Wiley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boyd]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldenberg]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Inside the box: A proven system of creativity for breakthrough results.]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caceres]]></surname>
<given-names><![CDATA[O. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El sistema de informacion e inteligencia Plataforma Mexico]]></article-title>
<source><![CDATA[URVIO Revista Latinoamericana de Estudios de Seguridad]]></source>
<year>2017</year>
<volume>21</volume>
<page-range>175</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caminha]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Furtado]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Pequeno]]></surname>
<given-names><![CDATA[T. H. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ponte]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Melo]]></surname>
<given-names><![CDATA[H. P. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Oliveira]]></surname>
<given-names><![CDATA[E. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Andrade]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human mobility in large cities as a proxy for crime]]></article-title>
<source><![CDATA[PLOS ONE]]></source>
<year>2017</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ceballos-Espinoza]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From classical criminology to modern criminology: Multifactorial criminal investigation in the digital age]]></article-title>
<source><![CDATA[Formación y Desarrollo Policial]]></source>
<year>2021</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>59-85</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Space-time analysis of crime patterns in central London]]></article-title>
<source><![CDATA[The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences]]></source>
<year>2012</year>
<volume>39</volume>
<page-range>47-52</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chun-Young]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin-Chien]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Yo-Hao]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[En-Chun]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Yuh-Shyan]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A smart public security strategy: The new Taipei city technology defense plan]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2019</year>
<volume>159</volume>
<page-range>1715-9</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Guzman]]></surname>
<given-names><![CDATA[J. B.]]></given-names>
</name>
<name>
<surname><![CDATA[De Guzman]]></surname>
<given-names><![CDATA[R. C. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ado]]></surname>
<given-names><![CDATA[R. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mobile Emergency response application using geolocation for command centers]]></article-title>
<source><![CDATA[International Journal of Computer and Communication Engineering]]></source>
<year>2014</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>235-8</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Demestichas]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Alexakis]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Peppes]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Remoundou]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Loumiotis]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Avgerinakis]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prediction and visual intelligence platform for detection of irregularities and abnormal behaviour]]></article-title>
<source><![CDATA[Detection Machine Learning for Trend and Weak Signal Detection in Social Networks and Social Media]]></source>
<year>2020</year>
<volume>2606</volume>
<page-range>25-30</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diamandis]]></surname>
<given-names><![CDATA[P. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kotler]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[The future is faster than you think: How converging technologies are transforming business, industries, and our lives]]></source>
<year>2020</year>
<publisher-name><![CDATA[Simon &amp; Schuster]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elnas]]></surname>
<given-names><![CDATA[J. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Duran]]></surname>
<given-names><![CDATA[E. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mayol]]></surname>
<given-names><![CDATA[J. L. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Lavilles]]></surname>
<given-names><![CDATA[R. Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Location-based reporting and mapping of crimes using Google Maps]]></article-title>
<source><![CDATA[Lecture Notes on Software Engineering]]></source>
<year>2015</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>44-8</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hussain]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Xi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Q]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Big data analytics and mining for effective visualization and trends forecasting of crime data]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>106111.-106123</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gaver]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Dunne]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Pacenti]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Design: Cultural probes]]></article-title>
<source><![CDATA[Interactions]]></source>
<year>1999</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>21-9</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>Crime Information Group</collab>
<source><![CDATA[Thefts from persons in the form of robbery and arrests by the National Police, years 2007 to 2022]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamthan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Shahmir]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effective user stories are affective. Lecture Notes in Computer Science]]></article-title>
<source><![CDATA[Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics]]></source>
<year>2017</year>
<page-range>605-11</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Keatley]]></surname>
<given-names><![CDATA[D. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Arntfield]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Clare]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Oatley]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bouhana]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Clarke]]></surname>
<given-names><![CDATA[D. D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Behaviour tracking: Using geospatial and behaviour sequence analysis to map crime]]></article-title>
<source><![CDATA[Security Journal]]></source>
<year>2021</year>
<volume>34</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>184-201</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kiran]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Suresh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Suresh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intelligent vehicle license plate recognition by deploying deep learning model for smart cities]]></article-title>
<source><![CDATA[International Journal of Mechanical Engineering]]></source>
<year>2022</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>6739-44</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yen]]></surname>
<given-names><![CDATA[M. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[L. C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Grid-based crime prediction using geographical features]]></article-title>
<source><![CDATA[International Journal of Geo-Information]]></source>
<year>2018</year>
<volume>7</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lira]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fuentes]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial Intelligence models for crime prediction in urban spaces]]></article-title>
<source><![CDATA[Machine Learning and Applications: An International Journal]]></source>
<year>2021</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lopez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Carmina]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Citizen security and technology: Use, planning and regulation of video surveillance in Latin America]]></article-title>
<source><![CDATA[Revista de Investigación en Derecho, Criminología y Consultoría Jurídica]]></source>
<year>2020</year>
<volume>27</volume>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Hanington]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Universal methods of design: 100 ways to research complex problems, develop innovative ideas, and design effective solutions]]></source>
<year>2012</year>
<publisher-name><![CDATA[Rockport Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mondal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime hotspot detection using statistical and geospatial methods: A case study of Pune City]]></article-title>
<source><![CDATA[Maharashtra, India. GeoJournal]]></source>
<year>2022</year>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Pallmer]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Muhlenberg]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Loumiotis]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Remoundou]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kosmides]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Demestichas]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Machine learning for discovery analytics to support criminal investigations]]></source>
<year>2020</year>
<publisher-name><![CDATA[SPIE-Intl Soc Optical Eng]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[O&#8217;Connor]]></surname>
<given-names><![CDATA[G. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Leifer]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Paulson]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Peters]]></surname>
<given-names><![CDATA[L. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Grabbing lightning: Building a capability for breakthrough innovation]]></source>
<year>2008</year>
<volume>1</volume>
<publisher-name><![CDATA[Jossey-Bass]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olaya]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[More engineering and less science please. In C. Olaya]]></source>
<year>2013</year>
<conf-name><![CDATA[ XI Latin American Congress of System Dynamics Instituto Tecnológico y de Estudios Superiores]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patil]]></surname>
<given-names><![CDATA[G. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital governance, hotspot geoinformatics, and sustainable development: A preface.]]></article-title>
<source><![CDATA[Environmental and Ecological Statistics]]></source>
<year>2010</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>133-47</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perez]]></surname>
<given-names><![CDATA[F. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Garrido]]></surname>
<given-names><![CDATA[V. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Garcia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zambrano]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kozik]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chora&#347;]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Muhlenberg]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pallmer]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multimedia analysis platform for crime prevention and investigation: Results of MAGNETO project]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2021</year>
<volume>80</volume>
<numero>15</numero>
<issue>15</issue>
<page-range>23681-700</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pokharel]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaidya]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Study of Userb Story in Practice,&#8221; 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI)]]></source>
<year>2020</year>
<page-range>1-5</page-range><publisher-name><![CDATA[Sakheer, Bahrain]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<collab>National Police</collab>
<source><![CDATA[Crime statistics]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pramanik]]></surname>
<given-names><![CDATA[M. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Lau]]></surname>
<given-names><![CDATA[R. Y. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Yue]]></surname>
<given-names><![CDATA[W. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ye]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Big data analytics for security and criminal investigations]]></article-title>
<source><![CDATA[Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery]]></source>
<year>2017</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahmani]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Azhir]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mohammadi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[O. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghafour]]></surname>
<given-names><![CDATA[M. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[S.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hosseinzadeh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial intelligence approaches and mechanisms for big data analytics: A systematic study]]></article-title>
<source><![CDATA[PeerJ Computer Science,]]></source>
<year>2021</year>
<volume>7</volume>
<page-range>1-28</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rawashdeh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Al Zamil]]></surname>
<given-names><![CDATA[M. G. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Samarah]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Obaidat]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Masud]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[IoTbased service migration for connected communities]]></source>
<year>2021</year>
<volume>96</volume>
<publisher-name><![CDATA[Computers and Electrical Engineering]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Razzouk]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Shute]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What is design thinking and why is it important?]]></article-title>
<source><![CDATA[Review of Educational Research]]></source>
<year>2012</year>
<volume>82</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>330.-48</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Restrepo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fifty years of criminality recorded by the National Police]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2008</year>
<volume>50</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>27-36</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mejía]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Caro]]></surname>
<given-names><![CDATA[L. del P.]]></given-names>
</name>
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Campos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implications of the process of integration of administrative crime records between the SPOA of the Attorney General&#8217;s Office and the SIEDCO of the National Police of Colombia, and the implementation of the &#8220;!ADenunciar!&#8221; application on crime figures]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2018</year>
<volume>60</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>9-27</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schilling]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Strategic management of technological innovation]]></source>
<year>2020</year>
<volume>1</volume>
<edition>6th</edition>
<publisher-name><![CDATA[McGraw-Hill Education]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tundis]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaleem]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Muhlhauser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting and tracking criminals in the real world through an IoT-based system]]></article-title>
<source><![CDATA[Sensors]]></source>
<year>2020</year>
<volume>20</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>1-27</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tundis]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Uzair]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Muhlhauser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[An IoTbased context-aware model for danger situations detection. Computers and Electrical Engineering]]></source>
<year>2021</year>
<page-range>96</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Valderrama-Cumbe]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Arboleda-Cardenas]]></surname>
<given-names><![CDATA[Y. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Criollo-Rey]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ospina-Baena]]></surname>
<given-names><![CDATA[J.H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Recurrence as a tool in the judge&#8217;s assessment when imposing a preventive detention measure in a prison in Colombia]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2021</year>
<volume>63</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>53-66</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van der Meij]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Kupper]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Beers]]></surname>
<given-names><![CDATA[P. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Broerse]]></surname>
<given-names><![CDATA[J. E. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hybrid e-learning tool TransLearning: Video storytelling to foster vicarious learning within multi-stakeholder collaboration networks]]></article-title>
<source><![CDATA[International Journal of Lifelong Education]]></source>
<year>2016</year>
<volume>35</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>413</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villalobos]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Technological development in policing: A recipe for success in crime prevention]]></article-title>
<source><![CDATA[Journal of International Relations, Strategy and Security]]></source>
<year>2020</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>79-97</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lo]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Stepinski]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Salazar]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Morabito]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime hotspot mapping using the crime related factors A spatial data mining approach]]></article-title>
<source><![CDATA[Applied Intelligence]]></source>
<year>2013</year>
<volume>39</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>772-81</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Public security video image detection system construction platform in cloud computing environment]]></article-title>
<source><![CDATA[Computational Intelligence and Neuroscience]]></source>
<year>2022</year>
<volume>2022</volume>
<numero>113</numero>
<issue>113</issue>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
