Data mining and crime analysis

An essential component of criminal investigation involves the interrogation of large databases of information held by police and other criminal justice agencies. Data mining and decision support systems have an important role to play in assisting human inference in this forensic domain that creates one of the most challenging decision‐making environments. Technologies range widely and include social network analysis, geographical information systems, and data mining technologies for clustering crimes, finding links between crime and profiling offenders, identifying criminal networks, matching crimes, generating suspects, and predicting criminal activity. This paper does not intend to cover the gamut of techniques available to the investigator of crime as this has been presented elsewhere (Oatley GC, Ewart BW, Zeleznikow J. Decision support systems for police: lessons from the application of data mining techniques to ‘soft’ forensic evidence. Artif Intell Law 2006, 14:35–100). Rather, the objective is to highlight issues of implementation and interpretation of the techniques available to the crime analyst. To this end, the authors draw from their experiences of working with real‐world crime databases (Oatley GC, Belem B, Fernandes K, Hoggarth E, Holland B, Lewis C, Meier P, Morgan K, Santhanam J, et al. The gang gun‐crime problem—solutions from social network theory, epidemiology, cellular automata, Bayesian networks and spatial statistics. Accepted: book chapter for IEEE publication Computational Forensics; 2008; Oatley GC, McGarry K, Ewart BW. Offender network metrics. WSEAS Trans Inf Sci Appl 2006, 3:2440–2448; Oatley GC, Ewart BW. Crimes analysis software: pins in maps, clustering and Bayes net prediction. Expert Syst Appl 2003, 25:569–588), involving gun and gang crime, fraud, terrorism, burglary, and retail crime. © 2011 John Wiley & Sons, Inc. WIREs Data Mining Knowl Discov 2011 1 147‐153 DOI: 10.1002/widm.6

[1]  Brent Snook,et al.  Shortcuts to Geographic Profiling Success: A Reply to Rossmo (2005). , 2005 .

[2]  Nigel Coles,et al.  It's Not What You Know-It's Who You Know that Counts. Analysing Serious Crime Groups as Social Networks , 2001 .

[3]  Pierre Margot,et al.  THE ANALYSIS OF SERIAL CRIME THROUGH THE USE OF DIFFERENT SOURCES OF DATA , 2001 .

[4]  S. Oskamp OVERCONFIDENCE IN CASE-STUDY JUDGMENTS. , 1965, Journal of consulting psychology.

[5]  Chris Davies,et al.  Beyond the Network: A Crime Science Approach to Organized Crime , 2008 .

[6]  David V. Canter,et al.  Prioritizing Burglars: Comparing the Effectiveness of Geographical Profiling Methods , 2007 .

[7]  Pierre Margot,et al.  Inference structures for crime analysis and intelligence: the example of burglary using forensic science data , 1999 .

[8]  P Margot,et al.  Case based reasoning in criminal intelligence using forensic case data. , 2003, Science & justice : journal of the Forensic Science Society.

[9]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[10]  Kate Smith-Miles,et al.  A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.

[11]  K. Schreiner Landmine detection research pushes forward, despite challenges , 2002 .

[12]  Ken Pease,et al.  How Efficiently Can We Target Prolific Offenders? , 2002 .

[13]  Qiwei Liu,et al.  Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis , 2007, PAISI.

[14]  Jennifer Xu,et al.  Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs , 2008 .

[15]  Politika tudományok,et al.  Analysis of Competing Hypotheses , 2011 .

[16]  Peter Lipton,et al.  Testing Hypotheses: Prediction and Prejudice , 2005, Science.

[17]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .

[18]  Peter Lipton Précis of Inference to the Best Explanation, 2nd Edition* , 2007 .

[19]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[20]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[21]  Michael Levi,et al.  The nature, extent and economic impact of fraud in the UK , 2007 .

[22]  D. Canter Offender profiling and criminal differentiation , 2000 .

[23]  M. Weatherford,et al.  Mining for fraud , 2002 .

[24]  Ronald V. Clarke,et al.  Become a Problem-solving Crime Analyst in 55 Small Steps , 2003 .

[25]  C. Lawrence The Social Psychology of Crime: Groups, Teams and Networks , 2000 .

[26]  Ziggy MacDonald,et al.  Official Crime Statistics: Their Use and Interpretation , 2002 .

[27]  John Kingston,et al.  Towards a Financial Fraud Ontology: A Legal Modelling Approach , 2004, Artificial Intelligence and Law.

[28]  Shane D. Johnson,et al.  The Stability of Space-Time Clusters of Burglary , 2004 .