Academia.eduAcademia.edu

Outline

Crime Analysis using Open Source Information

2019

Abstract

In this paper, we present a method of crime analysis from open source information. We employed un-supervised methods of data mining to explore the facts regarding the crimes of an area of interest. The analysis is based on well known clustering and association techniques. The results show that the proposed method of crime analysis is efficient and gives a broad picture of the crimes of an area to analyst without much effort. The analysis is evaluated using manual approach, which reveals that the results produced by the proposed approach are comparable to the manual analysis, while a great amount of time is saved.

FAQs

sparkles

AI

What patterns emerged from analyzing FBI press releases on crime incidents?add

The study reveals that terms like 'bank' and 'robbery' co-occur frequently, indicating that bank robberies are significant in Albuquerque.

What methodology was used for processing open source crime information?add

The research utilizes un-supervised data mining techniques, specifically clustering and the Apriori algorithm for pattern recognition.

How effective is the proposed crime analysis method compared to manual analysis?add

The manual evaluation shows that the proposed automated method provides the same amount of insights as manual reading, confirming its efficiency.

What are the critical terms identified in crime news from Albuquerque?add

Prominent terms included 'child' (61 occurrences), 'man' (144 occurrences), and 'assault' (31 occurrences), highlighting several key crime concerns.

When is future research expected to explore social media for crime analysis?add

The study suggests analyzing social media content during specific events to gauge public attitudes and responses to crime-related issues.

References (12)

  1. Chen, H., W. Chung, Y. Qin, M. Chau, J. J. Xu, G. Wang, and H. Atabakhsh, "Crime data mining: an overview and case studies." In Proceedings of the 2003 annual national conference on Digital government research, 1-51.
  2. Fellman, P. V., J. P. Clemens, R. Wright, J. V. Post, and M. Dadmun, (2015). Disrupting terrorist networks: a dynamic fitness landscape approach. In Conflict and Complexity 165-178. Springer New York.
  3. Galam, S. (2002) "The September 11 th attack: A percolation of individual passive support." The European Physical Journal B-Condensed Matter and Complex Systems, Vol. 26, No 3, 269-272.
  4. Jennifer J. X. and H. Chen, (2005). "Crimenet explorer: a framework for criminal network knowledge discovery." ACM Transactions on Information Systems (TOIS), Vol. 23, No 2, 201-226, Lindelauf, R., P. Borm, and H. Hamers, (2009). On heterogeneous covert networks. 215-228. Springer Vienna.
  5. Maeno, Y., and Y. Ohsawa, (2009) "Analyzing covert social network foundation behind terrorism disaster". International journal of services sciences, Vol.
  6. McGahan, A. M. (2015). Jacob N. Shapiro: The Terrorist"s Dilemma: Managing Violent Covert Organizations. Administrative Science Quarterly, 60(1), NP10-NP12.
  7. Memon, N., D. L. Hicks, and H. L. Larsen, (2007) "How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks." In Advanced Data Mining and Applications, 430-441. Springer Berlin Heidelberg,.
  8. Nizamani, S. (2014) "Computational models for analysis of illicit activities." PhD dissertation, University of Southern Denmark.
  9. Nizamani, S., and Memon, N. (2012). Semantic analysis of FBI news reports. In Neural Information Processing 322-329. Springer Berlin Heidelberg.
  10. Sandler, T, and G. Daniel and M.Arce (2003) "Terrorism and game theory. Simulation & Gaming." Vol. 34, No 3, 319-337.
  11. Sengupta, A., M Kumar, and S. Upadhyay, (2014) Crime analyses using r." In Yanchang Zhao and Yonghua Cen, editors, Data Mining Applications with 367-395. Academic Press, Boston.
  12. Steele, R. D. (2007)"Open source intelligence." Handbook of intelligence studies, 129-147. London Zhao, Y., (2012) "Data Mining: Examples and Case Studies", Elsevier Academic Press, USA.