Predictive Models in Cybercrime Investigation: An Application of Data Mining Techniques

With increased access to computers across the world, cybercrime is becoming a major challenge to law enforcement agencies. Cybercrime investigation in India is in its infancy and there has been limited success in prosecuting the offenders; therefore, a need to understand and strengthen the existing investigation methods and systems for controlling cybercrimes is greatly needed. This study identifies important factors that will enable law enforcement agencies to reach the first step in effective prosecution, namely charge-sheeting of the cybercrime cases. Data on 300 cybercrime cases covering a number of demographic, technical and other variables related to cybercrime was analyzed using data mining techniques to identify and prioritize various factors leading to filing of the charge-sheet. These factors and the respective priority rankings are used to suggest various policy measures for improving the success rate of prosecution of cybercrimes.

[1]  Norwood East International Review of Criminal Policy , 1953 .

[2]  Mario Piattini,et al.  Security Engineering for Cloud Computing: Approaches and Tools , 2012 .

[3]  Jarkko Vesa Mobile Services In The Networked Economy , 2005 .

[4]  Jan Muntermann,et al.  Mobile Emergency Management Services Targeting Large Public Events , 2011, Int. J. Serv. Sci. Manag. Eng. Technol..

[5]  F. Pocar New Challenges for International Rules Against Cyber-Crime , 2002 .

[6]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[7]  Adamantios Koumpis,et al.  Service Science for Socio-Economical and Information Systems Advancement: Holistic Methodologies , 2009 .

[8]  Bo K. Wong,et al.  Neural network applications in business: A review and analysis of the literature (1988-1995) , 1997, Decis. Support Syst..

[9]  Shihchieh Chou,et al.  Cybercrime & Cybercriminals: An Overview of the Taiwan Experience , 2006, J. Comput..

[10]  Richard S. Rosenberg,et al.  Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention , 2004 .

[11]  Sven Laumer,et al.  An IT-Architecture to Align E-Recruiting and Retention Processes , 2009, Int. J. E Serv. Mob. Appl..

[12]  Nikos Passas,et al.  Background and outline of the 2nd world summit of attorneys general, prosecutors general, chief prosecutors, prosecutors and ministers of justice , 2007 .

[13]  Tugrul U. Daim,et al.  Exploration of Adoption of Service Innovations through Technology Road-Mapping: Case of Location Based Services , 2010, Int. J. Serv. Sci. Manag. Eng. Technol..

[14]  Adamantios Koumpis Service Science and Practice , 2010 .

[15]  Mokerrom Hossain,et al.  Global-Local Nexus and the Emerging Field of Criminology and Criminal Justice in South Asia: Bangladesh Case , 2008 .

[16]  Chris Chatfield,et al.  Time series forecasting with neural networks: a comparative study using the air line data , 2008 .

[17]  Richard Bassett,et al.  Computer Forensics: An Essential Ingredient for Cyber Security , 2006 .

[18]  Daniele Cangemi,et al.  Procedural law provisions of the council of Europe convention on cybercrime1 , 2004 .