<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Case Study of an Australian Crime Dataset</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Jessica</forename><surname>Liebig</surname></persName>
							<email>jessica.liebig@rmit.edu.au</email>
							<affiliation key="aff0">
								<orgName type="department">School of Mathematical and Geospatial Sciences</orgName>
								<orgName type="institution">RMIT University</orgName>
								<address>
									<settlement>Melbourne</settlement>
									<region>VIC</region>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Asha</forename><surname>Rao</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Mathematical and Geospatial Sciences</orgName>
								<orgName type="institution">RMIT University</orgName>
								<address>
									<settlement>Melbourne</settlement>
									<region>VIC</region>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The Case Study of an Australian Crime Dataset</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2904C45088760D7ED81B895E3078F6F1</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T15:19+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Crime data</term>
					<term>Visualisation</term>
					<term>Networks</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Analysis of crime data is crucial for prevention and assessment of illegal activity. This paper is one of the first case studies of a crime dataset collected in New South Wales, Australia. We apply methods from complex network analysis to identify key aspects of criminal activity in the state of New South Wales. We further detect groups of local government areas and examine their dynamics over time. We represent our results by using various different visualisation techniques.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>INTRODUCTION</head><p>The analysis of crime datasets is necessary in order to prevent and assess criminal activity <ref type="bibr" target="#b15">[17]</ref>. Information about different types of crimes can often be found in the form of annual reports published by government bodies, but rarely in the form of publicly available datasets that may be used for research. In contrast, the New South Wales Bureau of Crime Statistics and Research in Australia has published data on criminal activity in the state of New South Wales (NSW) <ref type="bibr" target="#b1">[4]</ref>. It contains information collected between 1995 and 2012, recording several types of offences and the local government area where they occurred.</p><p>In this paper we use this NSW crime dataset to shed light on the dynamics of criminal activity. This is one of the first case studies of this dataset along with the one presented in <ref type="bibr" target="#b3">[6]</ref>. We make use of tools from complex network analysis and apply various visualisation techniques to present our results. A network is a mathematical representation of a system, consisting of nodes that represent different entities of the system, and edges that connect them. In a social network, for instance, nodes may represent different people whereas an edge connecting two people could represents friendship between the individuals.</p><p>Much research has been conducted in order to identify influential people and other entities in networks <ref type="bibr" target="#b5">[7,</ref><ref type="bibr" target="#b7">9,</ref><ref type="bibr" target="#b8">10]</ref>. For example, in the development of marketing strategies, knowledge of important people can help to spread information about new products quickly. Similarly, such knowledge has been shown to aid the termination of the spread of disease in human and animal contact networks <ref type="bibr" target="#b6">[8]</ref>. In this paper we apply a variation of a method finding influential people that was introduced by us in a previous publication <ref type="bibr" target="#b9">[11]</ref> and which we used therein to successfully find the most important people in a social and a terrorist network.</p><p>In addition to identifying important locations and offence categories within the crime network, we discover that local government areas form different groups. It is often the case that certain locations associate with different groupings over time and we present several visualisations to clarify the dynamics of the discovered groups.</p><p>The rest of the paper is organised as follows: First, we give a detailed description of the dataset and its network representation. We then outline the approach used to find important areas and offence categories and visualise the results. Next we describe the process of detecting groups and show the dynamics of their structure over time. Finally we give the conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>THE DATA</head><p>The dataset analysed in this paper is publicly available<ref type="foot" target="#foot_0">1</ref> and contains information about the different types of crime that took place in New South Wales between 1995 and 2012. It records the local government area where the crime occurred along with its offence category and the month and year of the crime. The New South Wales Bureau of Crime Statistics also provides a helpful visualisation tool for the dataset on their website <ref type="foot" target="#foot_1">2</ref> . It allows the user to research various basic statistics of the local government areas and offence categories.</p><p>As outlined in the introduction we use tools from complex network analysis as a means to analyse this data and represent the given information as a network. In the case of the NSW crime data, there are 155 local government areas and 49 offence categories, that can be represented by two different types of nodes. A government area can never be linked directly to another government area. Similarly, a connection cannot be established between two offence categories and hence, links are solely found between areas and offences. For example, the scenario of a person stealing from a retail store in Bourke and two people escaping custody in the local government areas, Wagga Wagga and Upper Hunter Shire, may be represented as the network depicted in Figure <ref type="figure" target="#fig_0">1</ref>. We are particularly interested in changes in the data between 2000 and 2012 and hence have divided the dataset into 156 networks, each covering a period of one month. Analysing each network separately and comparing the results gives valuable insights into the dynamics of criminal activity with respect to the local government areas.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IDENTIFYING CENTRAL ASPECTS TO CRIME ACTIVITY</head><p>The identification of central crime locations and offences is highly beneficial in preventing future criminal activity <ref type="bibr" target="#b15">[17]</ref>. Knowledge of critical areas allows government agencies to target illegal activities more efficiently. By applying a combination of the two methods introduced in <ref type="bibr" target="#b9">[11]</ref> and <ref type="bibr" target="#b10">[12]</ref>, we find the most important areas and offences in the NSW crime network. The process works as follows: We calculate the concentration of the four different patterns shown in Figure <ref type="figure" target="#fig_1">2</ref> with respect to every location and offence category (called the local clustering coefficient <ref type="bibr" target="#b9">[11,</ref><ref type="bibr" target="#b10">12]</ref>) in each network. We then compare the calculated concentrations of all nodes of the same type to the average concentration in the network. A location or offence type that shows a concentration that is very different to the average, plays an important role for the dynamics of the network. To be able to make the comparison to the average concentration, we calculate a score based on the mean and standard deviation of the various concentrations. For more detail on this method see <ref type="bibr" target="#b9">[11]</ref> and <ref type="bibr" target="#b10">[12]</ref>. The local government areas and offence categories can then be ranked accordingly. We have ranked the local government areas and offence categories for every month between January 2000 and December 2012. Note that the rankings of the local government areas are based on all 49 offence categories and vice versa.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ranking of local government areas</head><p>A total of 155 local government areas form the Australian state of New South Wales. Their ranks range between 0 and 1 and are inversely proportional to the concentration. Thus, a rank close to zero shows that the concentration of a particular area was higher than the mean concentration. A rank close to 0.5 shows a similar concentration to the average, and a high rank (close to one) represents a concentration much lower than the average. Examination of our results shows that the rank of any individual area never fell below 0.3, meaning that the concentrations are skewed with many areas exhibiting concentrations below the average. We found that isolated and sparsely populated areas received extremely high ranks and did not show much variation over time. We have plotted the ranks of four government areas over time in Figure <ref type="figure" target="#fig_2">3</ref>. Being able to make a clear connection between the rate of certain crimes in particular areas and their rank requires further work. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ranking of offence categories</head><p>Similar to the government areas, the ranks of the 49 offence categories range between 0 and 1. We observe that more common, often less serious, crimes are ranked low (close to 0) while, offences that are less common, but more serious, are given a high rank (close to 1). The ranking of offence categories changes from month to month, however, the observed difference in the ranking of each category is generally small. Two of the lowest ranked categories in the NSW crime dataset in the years between 2000 and 2012 are possession and use of cannabis and sexual offences. Some offences that fall under disorderly conduct and certain offences against justice procedures were also ranked low throughout the 13 year period. Figure <ref type="figure" target="#fig_4">4</ref> shows the change in ranking of these offences together with other similar offences that fall within the same super-category.  Looking at the first plot in Figure <ref type="figure" target="#fig_4">4</ref>, we can see that the rank of the offence category use or possession of cannabis is much lower than that that of other listed drugs. Although Australia has seen a significant decline in the use of drugs after the tightening of drug strategies in 1998, cannabis is still one of the most common and frequently used drugs <ref type="bibr" target="#b2">[5]</ref>.</p><p>Both sexual offence categories recorded in the dataset received very low rankings throughout the 13 year period. Sexual offences are a huge issue everywhere in Australia with New South Wales having the highest total number of sexual assaults reported to police <ref type="bibr" target="#b14">[16]</ref>. According to the Australian Bureau of Statistics, 20% of women and 5% of men over the age of 15, experience sexual violence <ref type="bibr">[1]</ref>.</p><p>Disorderly conduct is another common offence in NSW, specifically on weekends and in connection with alcohol consumption <ref type="bibr" target="#b13">[15]</ref>. Interestingly, the category criminal intent, is ranked higher than other acts of disorderly conduct. This is an indicator that in many cases the police do not pick up the planning of criminal activity.</p><p>On the other hand, homicide and the dealing of cocaine are two of the highest ranked categories (see Figure <ref type="figure" target="#fig_5">5</ref>). According to the Australian Institute of Criminology [3], homicide incidents are currently one of the lowest crime rates in Australia and it is unlikely that a homicide remains unreported, as is often the case with domestic violence. With regards to cocaine dealing, between 2003 and 2012 cocaine arrests have accounted for less than 1.5% of national illicit drug arrests <ref type="bibr" target="#b0">[2]</ref>.</p><p>Clearly, the rank of offences reflects the severity of the crime and not the rate at which it occurs. All data indicates that more petty crimes such as trespassing occur more often than serious crimes such as murder. location is not guaranteed to be successful in another. If two local government areas are classified to be in the same group they certainly have many things in common. Therefore, a prevention strategy that works in one area is more likely to work in another area that is part of the same group.</p><p>Determining groups of local government areas and offence categories respectively, requires a simplification of the network. Without loss of generality we describe the process in terms of the local government areas. The network is simplified in the following manner: The nodes representing the 49 different offence categories are dropped and two areas are linked if one or more crimes of the same category occurred in both areas. For instance, if an attempted murder occurred in the two areas Bourke and Wagga Wagga, a connection is established between these regions. Connections are associated with an attribute that records the number of crimes in common. Once the network is simplified, it is possible to determine the most significant connections. Dropping all insignificant connections reveals the different groups as such connections often occur between groups, whereas significant links usually occur within groups. Details on how to determine the significance of a connection can be found in <ref type="bibr" target="#b11">[13]</ref>. Note that the identified groups depend on significant connections to all 49 offence categories.</p><p>We are interested not solely in finding different groups but also in their development over time and hence have explored the dynamics in group structure of the local government areas.</p><p>We identified groups of local government areas in all 156 networks and always found two main groups as well as some smaller groups. The two largest groups usually contained government areas in the north east and south west respectively. We often found groups that only consisted of a single government area. Interestingly, such areas always received one of the highest ranks during the corresponding month. Figure <ref type="figure" target="#fig_6">6</ref> shows a map of NSW and its local government areas. Areas are coloured according to group membership. The largest group is coloured in blue, the second largest in green, with the size of a group determined by the number of its members and not the total area covered. The colour grey represents missing data for that month. Examination of data from October 2000 (third map in Figure <ref type="figure" target="#fig_6">6</ref>) reveals that the areas in the largest group, coloured in green, experienced higher crime rates of trespassing than the average for NSW during that month. Trespassing happened to be the lowest ranked crime during that month. To answer the question whether this pattern continues throughout the dataset requires more</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. The network representation of the following scenario: A person steals from a retail store in Bourke and two people escape custody in the local government areas, Wagga Wagga and Upper Hunter Shire.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. Finding the concentration of the four different patterns reveals (circles and squares represent locations and crimes respectively) the offences and areas that are most important. The four structures represent how well any three offence categories or locations are connected.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. The graphs illustrate the rankings of four local government areas (Leichhardt, Kogarah, Unincorporated Far West, Lord Howe Island) over time.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>use, possession) Possession and/or use of cocaine Possession and/or use of narcotics Possession and/or use of cannabis Possession and/or use of amphetamines Possession and/or use of ecstasy Possession and/or use of other drugs Resisting or hindering officer Other offences against justice procedures</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. The rankings of offence categories that were particularly low over time together with similar categories that fall into the same super-category.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 .</head><label>5</label><figDesc>Figure 5. The highest ranked offence categories were homicide and drug dealing offences.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 6 .</head><label>6</label><figDesc>Figure 6. Maps of New South Wales and its government areas in the months August to November 2000. The different local government areas are coloured according to their group membership. The colour grey (see map on extreme right) indicates no data being available for the corresponding area in that month.</figDesc><graphic coords="5,308.85,520.75,82.20,73.85" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">http://data.gov.au/dataset/nsw-crime-data/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">http://crimetool.bocsar.nsw.gov.au/bocsar/ Proc. of the</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2"> rd  Annual Conference of Research@Locate 31</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_3">Proc. of the 3 rd Annual Conference of Research@Locate 32</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_4">Proc. of the 3 rd Annual Conference of Research@Locate 33</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_5">Proc. of the 3 rd Annual Conference of Research@Locate 34</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>DETECTION OF GROUPS</head><p>The detection of groups, of entities within a system, has been another field of great interest in the area of complex networks in recent years <ref type="bibr" target="#b12">[14]</ref>. Being able to divide the local government areas of NSW into groups may further aid in the prevention of crime. Certain strategies of crime prevention that are already in place in some areas may be applied to other areas. However, a prevention scheme that works in one research and is left for future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CONCLUSION</head><p>This paper has shown how tools from complex network analysis can be applied to crime data in order to describe its dynamics. We have ranked the different offence categories and local government areas in the state of New South Wales in order to gain an understanding of the underlying mechanics of criminal activity. Different visualisation techniques were used to present the results. Being able to draw clear conclusions and find causations of the results presented in this paper requires further research.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="&lt;https://www.crimecommission.gov.au/sites/default/files/290414-IDDR-2012-13.pdf&gt;" />
		<title level="m">Illicit drug data report</title>
				<imprint>
			<publisher>Australian Crime Commission</publisher>
			<date type="published" when="2014-12-10">2014. 10 December 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="&lt;http://data.gov.au/dataset/nsw-crime-data&gt;" />
		<title level="m">NSW crime data</title>
				<imprint>
			<date type="published" when="2013-12-06">2013. 6 December 2015</date>
		</imprint>
		<respStmt>
			<orgName>NSW Bureau of Crime Statistics and Research</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">United Nations Office on Drugs and Crime</title>
		<imprint>
			<date type="published" when="2015-12-10">10 December 2015</date>
		</imprint>
	</monogr>
	<note>&lt;www.unodc</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Analysis of two crime-related networks derived from bipartite social networks</title>
		<author>
			<persName><forename type="first">T</forename><surname>Alzahrani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Horadam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Social Networks Analysis and Mining (ASONAM)</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m">IEEE/ACM International Conference on</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="890" to="897" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Identifying influential and susceptible members of social networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Aral</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Walker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science</title>
		<imprint>
			<biblScope unit="volume">337</biblScope>
			<biblScope unit="page" from="337" to="341" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Identifying influential nodes in complex networks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ü</forename></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M.-S</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-C</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physica A</title>
		<imprint>
			<biblScope unit="volume">391</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1777" to="1787" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Identifying influential nodes in large-scale directed networks: The role of clustering</title>
		<author>
			<persName><forename type="first">D.-B</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ü</forename></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">PloS One</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page">e77455</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Identifying influential spreaders in complex networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kitsak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">K</forename><surname>Gallos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Havlin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Liljeros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Muchnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">E</forename><surname>Stanley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Makse</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nature Physics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page">36</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Identifying influential nodes in bipartite networks using the clustering coefficient</title>
		<author>
			<persName><forename type="first">J</forename><surname>Liebig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Tenth International Conference on Signal-Image Technology and Internet-Based Systems</title>
				<imprint>
			<date type="published" when="2014">2014. 2014</date>
			<biblScope unit="page" from="323" to="330" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Predicting item popularity: Analysing local clustering behaviour of users</title>
		<author>
			<persName><forename type="first">J</forename><surname>Liebig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physica A</title>
		<imprint>
			<biblScope unit="volume">442</biblScope>
			<biblScope unit="page" from="523" to="531" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Fast extraction of the backbone of projected bipartite networks to aid community detection</title>
		<author>
			<persName><forename type="first">J</forename><surname>Liebig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Europhysics Letters</title>
		<imprint>
			<biblScope unit="page">25</biblScope>
			<date type="published" when="2016-01">January 2016</date>
		</imprint>
	</monogr>
	<note>To appear</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Finding community structure in networks using the eigenvectors of matrices</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E J</forename><surname>Newman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physical Review E</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page">36104</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Alcohol and disorderly conduct on Friday and Saturday nights</title>
		<author>
			<persName><forename type="first">J</forename><surname>Sweeney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Payne</surname></persName>
		</author>
		<ptr target="&lt;http://www.aic.gov.au/publications/current%20series/rip/1-10/15.html&gt;" />
		<imprint>
			<date type="published" when="2012-12-10">2012. 10 December 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">The nature and extent of sexual assault and abuse in Australia</title>
		<author>
			<persName><forename type="first">C</forename><surname>Tarczon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Quadara</surname></persName>
		</author>
		<ptr target="//www3.aifs.gov.au/acssa/pubs/sheets/rs5/&gt;" />
		<imprint>
			<date type="published" when="2012-12-10">2012. 10 December 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The spatial structure of crime in urban environments</title>
		<author>
			<persName><forename type="first">S</forename><surname>White</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yehle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Serrano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Menezes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Social Informatics</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="102" to="111" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
