AN APPROACH TO CRIME DATA ANALYSIS: A SYSTEMATIC REVIEW

Authors

  • Deepika Tyagi
  • Dr. Sanjiv Sharma

DOI:

https://doi.org/10.29121/ijetmr.v5.i2.2018.615

Keywords:

Crime Data Analysis, Data Mining, Machine Learning, Big Data.

Abstract

In the current era, number of crimes occurs in the society and this criminal rate increase day by day. There is tremendous growth of criminal data. Crime has negatively influenced the societies. Crime control is essential for the welfare, stability and development of society. Law enforcement agencies are seeking for the system to target crime structure efficiently. The intelligent crime data analysis provides the best understanding of the dynamics of unlawful activities, discovering patterns of criminal behavior that will be useful to understand where, when and why crimes can occur. There is a need for the advancements in the data storage collection, analysis and algorithm that can handle data and yield high accuracy. This paper demonstrates the data mining technologies which are used in criminal investigation. The contribution of this paper is to highlight the methodology used in crime data analytics. This paper summarizes the challenges arising during the analysis process, which should be removed to get the desired result.

                                     

Downloads

Download data is not yet available.

References

xu j, chen h., “ criminal network analysis and visualization,” community acm, 2005, 48:100-107. DOI: https://doi.org/10.1145/1064830.1064834

wang t, rudin c, wagner d, sevieri r., “learning to detect patterns of crime.” Joint european conference on machine learning and knowledge discovery in databases, springer, 2013 515-530. DOI: https://doi.org/10.1007/978-3-642-40994-3_33

m.i.pramanik, raymond y.k. lau, wei t.yue, yunming ye and chunping li., “big data analytics for security and criminal investigations” wiley interdisciplinary reviews-data mining and knowledge discovery 2017 vol.7 no.4,1-19. DOI: https://doi.org/10.1002/widm.1208

brahan jw, lam kp, chan h, leung w. “aicams: artificial intelligence crime analysis and management system,” knowledge system, 1998, 11: 355-361. DOI: https://doi.org/10.1016/S0950-7051(98)00064-1

zhou, f., b. Yang, l. Li and z. Chen “overview of the new types of intelligent decision support system,” international conference on innovative computing information and control ieee 2008 267-272. DOI: https://doi.org/10.1109/ICICIC.2008.412

li, s.t., s.c. kuo and f.c. tsai. “an intelligent decision-support model using fsom and rule extraction for crime prevention” expert system with applications, 2010, 37:7108-7119. DOI: https://doi.org/10.1016/j.eswa.2010.03.004

poelmans j, van hulle, mm, viaene, s, elzinga p, dedene g, “text mining with emergent selforganizing maps and multi-dimensional scaling: a comparative study on domestic violence,” applied soft computing 2011 11:3870-3876. DOI: https://doi.org/10.1016/j.asoc.2011.02.026

phillips, p. And i. Lee, “mining co-distribution patterns for large crime datasets,” expert system with applications 2012 39:11556-11563. DOI: https://doi.org/10.1016/j.eswa.2012.03.071

noor, n.m.m, retnowardhani a, m.l. abd, saman mmy “crime forecasting using arima model and fuzzy alpha-cut,” journal of applied sciences, 2013, 13:167-172. DOI: https://doi.org/10.3923/jas.2013.167.172

maarten v banerveld, nhien-an le-khac, m-tahar kechadi, “performance evaluation of a natural language processing approach applied in white collar crime investigation,” international conference on future data and security engineering, springer, 2014, 19-21. DOI: https://doi.org/10.1007/978-3-319-12778-1_3

wu, j. And d. Wang “the research based on bayesian behavior recognition technology,” journal of applied sciences, applied mechanics and materials, 2014, 543-547 2167-2170. DOI: https://doi.org/10.4028/www.scientific.net/AMM.543-547.2167

li, x. And m. Juhola “country crime analysis using the self-organizing map, with special regard to demographic factors,” artificial intelligence and society, springer, 2014, 29(1) 53-68 DOI: https://doi.org/10.1007/s00146-013-0441-7

noor maizura mohamad noor, siti haslini ab hamid, rosmayati mohemad, masita muhammad suzuri hitam. “Architecture of decision support system for crime visualization” journal of applied sciences 2015 15:1176-1183. DOI: https://doi.org/10.3923/jas.2015.1176.1183

tayal d.k., a. Jain, surbhi arora, surbhi agarwal, tushar gupta “crime detection and criminal identification in india using data mining techniques” ai & society springer, 2015, 30(1):117-127.

morgan burcher, chad whelan, “social network analysis as a tool for criminal intelligence: understanding its potential from the perspectives of intelligence analysts,” springer 2017 1084-4791 1936-4830.

chen h, chung w, xu jj, wang g, qin y, chau m. “crime data mining: a general framework and some examples,” computer, ieee, 2004 37:50-56. DOI: https://doi.org/10.1109/MC.2004.1297301

ku ch, iriberri a, leroy g., “crime information extraction from police and witness narrative reports”, ieee international conference on technologies for homeland security, ieee, 2008, 193-198. DOI: https://doi.org/10.1109/THS.2008.4534448

lu, y, luo x, polgar m, cao y , “social network analysis of a criminal hacker community,” journal computing information system, 2010 51: 31-41.

brown, de, gunderson, lf, “using clustering to discover the preferences of computer criminals,” ieee transaction system man cybern a syst hum, 2001, 31:311-318. DOI: https://doi.org/10.1109/3468.935048

xu, jennifer j, chen h, “fighting organized crimes: using shortest- path algorithms to identify associations in criminal networks,” decision support system, 2004, 38:473-487. DOI: https://doi.org/10.1016/S0167-9236(03)00117-9

nath, sv, “crime pattern detection using data mining,” ieee/wic/acm international conference on web intelligence and intelligent agent technology workshop, 2006, 41-44. DOI: https://doi.org/10.1109/WI-IATW.2006.55

baumgartner k, ferrari s, palermo g, “constructing bayesian networks for criminal profiling from limited data,” knowledge system, 2008, 21:563-572. DOI: https://doi.org/10.1016/j.knosys.2008.03.019

tseng th, ho, zp, yang, ks, chen, cc., “mining term networks from text collections for crime investigation,” expert system with applications 2012 39:10082-10090. DOI: https://doi.org/10.1016/j.eswa.2012.02.052

chung-hsien yu, max w. Ward, melissa morabito, wei ding, “crime forecasting using data mining techniques,” international conference on data mining workshops, ieee, 2011, 978-0-7695-4409-0.

Downloads

Published

2018-02-28

How to Cite

Tyagi, D. ., & Sharma , D. S. . (2018). AN APPROACH TO CRIME DATA ANALYSIS: A SYSTEMATIC REVIEW. International Journal of Engineering Technologies and Management Research, 5(2), 67–74. https://doi.org/10.29121/ijetmr.v5.i2.2018.615