AN APPROACH TO CRIME DATA ANALYSIS: A SYSTEMATIC REVIEW
In the current era, number of crimes occurs in the society and this criminal rate increase day by day. There is tremendous growth of criminal data. Crime has negatively influenced the societies. Crime control is essential for the welfare, stability and development of society. Law enforcement agencies are seeking for the system to target crime structure efficiently. The intelligent crime data analysis provides the best understanding of the dynamics of unlawful activities, discovering patterns of criminal behavior that will be useful to understand where, when and why crimes can occur. There is a need for the advancements in the data storage collection, analysis and algorithm that can handle data and yield high accuracy. This paper demonstrates the data mining technologies which are used in criminal investigation. The contribution of this paper is to highlight the methodology used in crime data analytics. This paper summarizes the challenges arising during the analysis process, which should be removed to get the desired result.
xu j, chen h., “ criminal network analysis and visualization,” community acm, 2005, 48:100-107. DOI: https://doi.org/10.1145/1064830.1064834
wang t, rudin c, wagner d, sevieri r., “learning to detect patterns of crime.” Joint european conference on machine learning and knowledge discovery in databases, springer, 2013 515-530. DOI: https://doi.org/10.1007/978-3-642-40994-3_33
m.i.pramanik, raymond y.k. lau, wei t.yue, yunming ye and chunping li., “big data analytics for security and criminal investigations” wiley interdisciplinary reviews-data mining and knowledge discovery 2017 vol.7 no.4,1-19. DOI: https://doi.org/10.1002/widm.1208
brahan jw, lam kp, chan h, leung w. “aicams: artificial intelligence crime analysis and management system,” knowledge system, 1998, 11: 355-361. DOI: https://doi.org/10.1016/S0950-7051(98)00064-1
zhou, f., b. Yang, l. Li and z. Chen “overview of the new types of intelligent decision support system,” international conference on innovative computing information and control ieee 2008 267-272. DOI: https://doi.org/10.1109/ICICIC.2008.412
li, s.t., s.c. kuo and f.c. tsai. “an intelligent decision-support model using fsom and rule extraction for crime prevention” expert system with applications, 2010, 37:7108-7119. DOI: https://doi.org/10.1016/j.eswa.2010.03.004
poelmans j, van hulle, mm, viaene, s, elzinga p, dedene g, “text mining with emergent selforganizing maps and multi-dimensional scaling: a comparative study on domestic violence,” applied soft computing 2011 11:3870-3876. DOI: https://doi.org/10.1016/j.asoc.2011.02.026
phillips, p. And i. Lee, “mining co-distribution patterns for large crime datasets,” expert system with applications 2012 39:11556-11563. DOI: https://doi.org/10.1016/j.eswa.2012.03.071
noor, n.m.m, retnowardhani a, m.l. abd, saman mmy “crime forecasting using arima model and fuzzy alpha-cut,” journal of applied sciences, 2013, 13:167-172. DOI: https://doi.org/10.3923/jas.2013.167.172
maarten v banerveld, nhien-an le-khac, m-tahar kechadi, “performance evaluation of a natural language processing approach applied in white collar crime investigation,” international conference on future data and security engineering, springer, 2014, 19-21. DOI: https://doi.org/10.1007/978-3-319-12778-1_3
wu, j. And d. Wang “the research based on bayesian behavior recognition technology,” journal of applied sciences, applied mechanics and materials, 2014, 543-547 2167-2170. DOI: https://doi.org/10.4028/www.scientific.net/AMM.543-547.2167
li, x. And m. Juhola “country crime analysis using the self-organizing map, with special regard to demographic factors,” artificial intelligence and society, springer, 2014, 29(1) 53-68 DOI: https://doi.org/10.1007/s00146-013-0441-7
noor maizura mohamad noor, siti haslini ab hamid, rosmayati mohemad, masita muhammad suzuri hitam. “Architecture of decision support system for crime visualization” journal of applied sciences 2015 15:1176-1183. DOI: https://doi.org/10.3923/jas.2015.1176.1183
tayal d.k., a. Jain, surbhi arora, surbhi agarwal, tushar gupta “crime detection and criminal identification in india using data mining techniques” ai & society springer, 2015, 30(1):117-127.
morgan burcher, chad whelan, “social network analysis as a tool for criminal intelligence: understanding its potential from the perspectives of intelligence analysts,” springer 2017 1084-4791 1936-4830.
chen h, chung w, xu jj, wang g, qin y, chau m. “crime data mining: a general framework and some examples,” computer, ieee, 2004 37:50-56. DOI: https://doi.org/10.1109/MC.2004.1297301
ku ch, iriberri a, leroy g., “crime information extraction from police and witness narrative reports”, ieee international conference on technologies for homeland security, ieee, 2008, 193-198. DOI: https://doi.org/10.1109/THS.2008.4534448
lu, y, luo x, polgar m, cao y , “social network analysis of a criminal hacker community,” journal computing information system, 2010 51: 31-41.
brown, de, gunderson, lf, “using clustering to discover the preferences of computer criminals,” ieee transaction system man cybern a syst hum, 2001, 31:311-318. DOI: https://doi.org/10.1109/3468.935048
xu, jennifer j, chen h, “fighting organized crimes: using shortest- path algorithms to identify associations in criminal networks,” decision support system, 2004, 38:473-487. DOI: https://doi.org/10.1016/S0167-9236(03)00117-9
nath, sv, “crime pattern detection using data mining,” ieee/wic/acm international conference on web intelligence and intelligent agent technology workshop, 2006, 41-44. DOI: https://doi.org/10.1109/WI-IATW.2006.55
baumgartner k, ferrari s, palermo g, “constructing bayesian networks for criminal profiling from limited data,” knowledge system, 2008, 21:563-572. DOI: https://doi.org/10.1016/j.knosys.2008.03.019
tseng th, ho, zp, yang, ks, chen, cc., “mining term networks from text collections for crime investigation,” expert system with applications 2012 39:10082-10090. DOI: https://doi.org/10.1016/j.eswa.2012.02.052
chung-hsien yu, max w. Ward, melissa morabito, wei ding, “crime forecasting using data mining techniques,” international conference on data mining workshops, ieee, 2011, 978-0-7695-4409-0.
Copyright (c) 2018 Deepika Tyagi, Dr. Sanjiv Sharma
This work is licensed under a Creative Commons Attribution 4.0 International License.
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section