Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

Along with the rapid popularity of the Internet, crime information on the web is becoming increasingly rampant, and the majority of them are in the form of text. Because a lot of crime information in documents is described through events, event-based semantic technology can be used to study the patterns and trends of web-oriented crimes. The purpose of this paper is to provide a review to mining useful information by means of Data Mining. The procedure of extracting knowledge and information from large set of data is data mining that applying artificial intelligence method to find unseen relationships of data. There is more study on data mining applications that attracted more researcher attention and one of the crucial field is criminology that applying in data mining which is utilized for identifying crime characteristics. Detecting and exploring crimes and investigating their relationship with criminals are involved in the analyzing crime process. Criminology is a suitable field for using data mining techniques that shows the high volume and the complexity of relationships between crime datasets. Therefore, for further analysis development, the identifying crime characteristic will be the first step and obtained knowledge from data mining approaches is a very useful tool to help and support police forces. This research aims to provide a review to extract Detecting Suspicion Information on the Web using Crime Data Mining Techniques Javad Hosseinkhani, Mohammad Koochakzaei, Solmaz keikhaee, and Javid Hosseinkhani Naniz Copyright © 2014 Helvetic Editions LTD All Rights Reserved www.elvedit.com 33 useful information by means of Data Mining, in order to find crime hot spots out and predict crime trends for them using crime data mining techniques.

[1]  Mithilesh Kumar,et al.  An approach to adaptive user interfaces using interactive media systems , 2006, IUI '06.

[2]  Ramasamy Uthurusamy,et al.  EVOLVING DATA MINING INTO SOLUTIONS FOR INSIGHTS , 2002 .

[3]  S. Chuprat,et al.  Discovering criminal networks by Web structure mining , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[4]  Bing Liu,et al.  Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data , 2006, Data-Centric Systems and Applications.

[5]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[6]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[7]  Hsinchun Chen,et al.  Extracting Meaningful Entities from Police Narrative Reports , 2002, DG.O.

[8]  Cherri M. Pancake,et al.  HyperSQL: web-based query interfaces for biological databases , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[9]  Stephen G. MacDonell,et al.  Software Forensics: Extending Authorship Analysis Techniques to Computer Programs , 2002 .

[10]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[11]  Petra Perner,et al.  Data Mining on Multimedia Data , 2002, Lecture Notes in Computer Science.

[12]  Pierre Baldi,et al.  Modeling the Internet and the Web: Probabilistic Methods and Algorithms. By Pierre Baldi, Paolo Frasconi, Padhraic Smith, John Wiley and Sons Ltd., West Sussex, England, 2003. 285 pp ISBN 0 470 84906 1 , 2006, Inf. Process. Manag..

[13]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[14]  Kun Liu,et al.  Privacy Sensitive Distributed Data Mining from Multi-party Data , 2003, ISI.

[15]  Chabane Djeraba,et al.  Mining Multimedia and Complex Data , 2002, Lecture Notes in Computer Science.

[16]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[17]  Hamed Taherdoost,et al.  Criminal Network Mining by Web Structure and Content Mining , 2012 .

[18]  Ted E. Senator,et al.  The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions , 1995, IAAI.

[19]  Hamed Taherdoost,et al.  Propose a Framework for Criminal Mining by Web Structure and Content Mining , 2013 .

[20]  Suhaimi Ibrahim,et al.  Web Crime Mining by Means of Data Mining Techniques , 2014 .

[21]  Vladimir I. Levenshtein,et al.  Binary codes capable of correcting deletions, insertions, and reversals , 1965 .

[22]  Karl Aberer,et al.  The design of query interfaces to the GPCRDB biological database , 1999, Proceedings User Interfaces to Data Intensive Systems.

[23]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[24]  Gang Wang,et al.  Automatically detecting deceptive criminal identities , 2004, CACM.

[25]  Hsinchun Chen,et al.  Using Coplink to Analyze Criminal-Justice Data , 2002, Computer.

[26]  Mohammad Reza Keyvanpour,et al.  Detecting and investigating crime by means of data mining: a general crime matching framework , 2011, WCIT.