• Deepika Tyagi
  • Dr. Sanjiv Sharma
Keywords: Crime Data Analysis, Data Mining, Machine Learning, Big Data.


In the current era, number of crimes occurs in the society and this criminal rate increase day by day. There is tremendous growth of criminal data. Crime has negatively influenced the societies. Crime control is essential for the welfare, stability and development of society. Law enforcement agencies are seeking for the system to target crime structure efficiently. The intelligent crime data analysis provides the best understanding of the dynamics of unlawful activities, discovering patterns of criminal behavior that will be useful to understand where, when and why crimes can occur. There is a need for the advancements in the data storage collection, analysis and algorithm that can handle data and yield high accuracy. This paper demonstrates the data mining technologies which are used in criminal investigation. The contribution of this paper is to highlight the methodology used in crime data analytics. This paper summarizes the challenges arising during the analysis process, which should be removed to get the desired result.



Download data is not yet available.


xu j, chen h., “ criminal network analysis and visualization,” community acm, 2005, 48:100-107. DOI:

wang t, rudin c, wagner d, sevieri r., “learning to detect patterns of crime.” Joint european conference on machine learning and knowledge discovery in databases, springer, 2013 515-530. DOI:

m.i.pramanik, raymond y.k. lau, wei t.yue, yunming ye and chunping li., “big data analytics for security and criminal investigations” wiley interdisciplinary reviews-data mining and knowledge discovery 2017 vol.7 no.4,1-19. DOI:

brahan jw, lam kp, chan h, leung w. “aicams: artificial intelligence crime analysis and management system,” knowledge system, 1998, 11: 355-361. DOI:

zhou, f., b. Yang, l. Li and z. Chen “overview of the new types of intelligent decision support system,” international conference on innovative computing information and control ieee 2008 267-272. DOI:

li, s.t., s.c. kuo and f.c. tsai. “an intelligent decision-support model using fsom and rule extraction for crime prevention” expert system with applications, 2010, 37:7108-7119. DOI:

poelmans j, van hulle, mm, viaene, s, elzinga p, dedene g, “text mining with emergent selforganizing maps and multi-dimensional scaling: a comparative study on domestic violence,” applied soft computing 2011 11:3870-3876. DOI:

phillips, p. And i. Lee, “mining co-distribution patterns for large crime datasets,” expert system with applications 2012 39:11556-11563. DOI:

noor, n.m.m, retnowardhani a, m.l. abd, saman mmy “crime forecasting using arima model and fuzzy alpha-cut,” journal of applied sciences, 2013, 13:167-172. DOI:

maarten v banerveld, nhien-an le-khac, m-tahar kechadi, “performance evaluation of a natural language processing approach applied in white collar crime investigation,” international conference on future data and security engineering, springer, 2014, 19-21. DOI:

wu, j. And d. Wang “the research based on bayesian behavior recognition technology,” journal of applied sciences, applied mechanics and materials, 2014, 543-547 2167-2170. DOI:

li, x. And m. Juhola “country crime analysis using the self-organizing map, with special regard to demographic factors,” artificial intelligence and society, springer, 2014, 29(1) 53-68 DOI:

noor maizura mohamad noor, siti haslini ab hamid, rosmayati mohemad, masita muhammad suzuri hitam. “Architecture of decision support system for crime visualization” journal of applied sciences 2015 15:1176-1183. DOI:

tayal d.k., a. Jain, surbhi arora, surbhi agarwal, tushar gupta “crime detection and criminal identification in india using data mining techniques” ai & society springer, 2015, 30(1):117-127.

morgan burcher, chad whelan, “social network analysis as a tool for criminal intelligence: understanding its potential from the perspectives of intelligence analysts,” springer 2017 1084-4791 1936-4830.

chen h, chung w, xu jj, wang g, qin y, chau m. “crime data mining: a general framework and some examples,” computer, ieee, 2004 37:50-56. DOI:

ku ch, iriberri a, leroy g., “crime information extraction from police and witness narrative reports”, ieee international conference on technologies for homeland security, ieee, 2008, 193-198. DOI:

lu, y, luo x, polgar m, cao y , “social network analysis of a criminal hacker community,” journal computing information system, 2010 51: 31-41.

brown, de, gunderson, lf, “using clustering to discover the preferences of computer criminals,” ieee transaction system man cybern a syst hum, 2001, 31:311-318. DOI:

xu, jennifer j, chen h, “fighting organized crimes: using shortest- path algorithms to identify associations in criminal networks,” decision support system, 2004, 38:473-487. DOI:

nath, sv, “crime pattern detection using data mining,” ieee/wic/acm international conference on web intelligence and intelligent agent technology workshop, 2006, 41-44. DOI:

baumgartner k, ferrari s, palermo g, “constructing bayesian networks for criminal profiling from limited data,” knowledge system, 2008, 21:563-572. DOI:

tseng th, ho, zp, yang, ks, chen, cc., “mining term networks from text collections for crime investigation,” expert system with applications 2012 39:10082-10090. DOI:

chung-hsien yu, max w. Ward, melissa morabito, wei ding, “crime forecasting using data mining techniques,” international conference on data mining workshops, ieee, 2011, 978-0-7695-4409-0.

How to Cite
Tyagi, D., & Sharma , D. S. (2018). AN APPROACH TO CRIME DATA ANALYSIS: A SYSTEMATIC REVIEW. International Journal of Engineering Technologies and Management Research, 5(2), 67-74.