Professional Documents
Culture Documents
in Crime Domain
with crime data analysis has been explored in the same year.
Charlottesville City and Albemarle County areas were a
relatively safety community within a central Virginia. The
number of reported criminal incidents in this area was Geographic
Database Clustering
Information System Control Charting
typically 30,000 events per year. In contrast, Richmond City Querying MapInfo Visual Basic
Algorithms
Visual Basic
Visual Basic Visual Basic
alone has approximately 100,000 events of incidents per
year. The analyst needed to get the details of data such as
where incidents occurred and when. They needed to query
incidents from database management system in order to
generate all reports. Then, the results queried from database
Printed Results
are turned into useful information to display on the Disk Storage
Graphical User Interface
It should be noted that, it took three minutes to search and Figure 1: A diagram of ReCAP [2]
analyze and took five queries per report. Therefore, the
analyst might spend 450,000 minutes for Charlottesville City
and 1.5 million minutes for Richmond City. Clearly, It should be emphasized that this is not a new approach in
manually analysis of crime data is infeasible. data mining. It is only a feasible framework in development
The data mining is therefore a must choice that can be process. However, one attractive feature of the approach is
used to support a geographic information system. It reduces that knowledge from data analysis can be presented in a form
data analysis time consuming and enlarges a frontier of crime of geo-graphic map.
analysis. The knowledge from crime analysis can be
available by which the data mining is used as a core process B. Investigative Profiling
in data analysis.
Brown [2] proposed a framework for regional crime Investigative profiling can be narrowly used to discover
analysis program (ReCAP). The data mining was adopted as one or many criminals. It can also be used to search
an algorithm for crime data analysis. The core concept of knowledge from a large amount of data. Normally,
ReCAP program consists of: association rules are frequently used to search customer
4.1.1 Meta-Data: A data context described about data itself personalization, by providing a relationship between items.
such as pistol data and periodic report. In a marketing research, this technique can be used to search
4.1.2 Process and Display: An analysis process of data pleasure and behavior of consumers, i.e., their buying
such as database querying and clustering algorithm. A pattern. Therefore, retailers can conclude from relationship
displaying system is a graphical information system that is and offer products or services to individual, and lastly a
used to turn data into useful spatial information. personal profile can be created from customer buying pattern.
In figure 1, the system is a general data mining, its In 2002, a profiling technique has been applied in order to
structure is aimed to be used in geo-graphic data mining. In solve a problem in an investigation analysis. They interpreted
addition, the author provides a software framework for the results from data mining as an association rule sets which
spatial data mining. This method employs two significant is created from log data. The researcher then analyzed them
technologies, GIS and DBMS, to support a broader range of to create the perpetrator profiles.
crime analytical function. Information queried from Typically, the perpetrator profiling can be categorized into
geo-graphic data consume a long period of time. Therefore, if two types, actual and behavior profiles. Example of actual
we can construct a technique to filter data such as eliminating profile name is status of hiring and username, and of behavior
a small side road that we could not see, the analyst would profile is log file transactions, header and body of electronic
concentrate on searching relationship of more important data mail and call recording. By creating profiling by using
Crime Severity Difference
association rules, the results are the rules of relationship in
Minor Intermediate Severe
the same or different profile type. For example, a rule # Fac. # Fac. # Fac. Summed
Ind. 1 0.1 1 0.5 2 0.4 3
(StaffType = admin) ^ (DayofWeek = tuesday) ^ 0.1 1.0 1.2 2.3
(Application = database) ⇒ (Access = valid)
Ind. 2 0.3 1 0.4 2 0.3 3
0.3 0.8 0.9 2.0
Diff. 0.3
is a relationship between actual profile (admin) and behavior Total Profile Difference: 0.9
profile (access time). The meaning of this rule is that “the
administrator has authorization to access the database Table 2: The calculation for difference of crime nature and
program.” severity [3]
In an analysis process, log files can be obtained from
various computers and network devices such as system log Therefore, if the criminal profiles are analyzed for each
files, database log files and personal user files. The log files year, the trends of criminal career and crime varying would
are then processed by using association mining rules, the be revealed. The results from this knowledge discovery can
results present in the rules of profile relationship. However, be used to define the priority in which what types of victim
the rules are the item set that usually created with support must be protected. However, this method is time-consuming,
value. The remaining rules are pruned. Additional technique it is therefore not appropriate to use this algorithm with an
is used as “contrasting raw data to profiles” in order to enormous data.
change unexpected information to be profiles again. Hence, it
is possible to represent profiles as abnormal behavior of user. D. Crime Pattern Detection Using Data Mining
Accordingly, investigative profiling by the association
mining rules can be used to discover the pattern of crime that Nath [6] outlined a new approach for crime pattern
is frequently occurred. It can also reveal the behavior that is discovery. It is rather complex because the system searches
hidden or abnormal. By using this technique, the factor of knowledge from a huge data. Each record is composed of
crimes can be clearly illustrated such as environments, many attributes which describes the crimes, such as
properties of victims and criminal types. In particular, date/time, location, outline, demographic and weapon.
knowledge from investigative profiling leads to a plan for However, only a small portion of which relates to illegal
preventing and destroying opportunities of crime. activities which is useful for crime pattern construction.
However, in this method the relevance of attributes must Clustering techniques group entities into classes with
be selected by analyst before actually mining process. similar characteristics, i.e. data in similar characteristic is
Therefore, the results of data mining also depend on the defined to be the same class. Each group is then shown on
background knowledge of the analyst. geo-spatial information which describes distribution of crime
with different colors.
C. Data Mining Approaches to Criminal Career Analysis The results from a clustering technique can be used to
identify escape criminal. Incidents of the same group may
The criminal career analysis is an analyzing of data in have some relationships rise from suspects who conduct
order to determine a trend changing in offended behavior. In crimes in similar ways. Therefore, evidences from the
2006, the interested attributes were extracted from criminal incidents can be proved that it is collected from the same
profiles, example of which is crime nature, frequency, group. For instance, injured person in the incident said that
duration and severity. The interested attributes is then the offender was black hair, a witness said that the offender
processed by a clustering technique. Firstly, this technique was middle age, and injured person confirmed that he saw a
determines percentage of severity in each crime type as tattoo on the offender’s left arm.
shown in Table 1. Hence, the law enforcement can take this technique to
Crime type Traffic Financial … Sex analyze the pattern of crime data, by which the knowledge is
Crimes Crimes Crimes used to catch the escape offender.
Severity minor minor … severe
Percentage 0.0 0.6 … 0.1
Table 1: A criminal’s profile [3]
IV. DISCUSSION
Next, the algorithm calculates the difference in each We can conclude from a comprehensive survey that most
profile class such as crime nature and severity (Table 2). It of works analyze large amount of crime data. The algorithm
then sums all of difference which is computed with a number in meta-data and data mining techniques will be selected
of crimes for one year. The result is a difference of criminal based on background knowledge of analyst. Therefore, it is
career as two separated data groups, the first one is a general possible to choose inappropriate data items which turn into
street crime the other is a serious crime. redundant work when they must repeatedly performing
experiments. As a result, knowledge from crime analysis in
Crime Nature Difference data mining depends heavily on the background knowledge
Ind. 1 0.1 0.0 0.0 0.0 0.5 0.4 0.0 0.0 of analysts.
Ind. 2 0.0 0.2 0.1 0.0 0.4 0.3 0.0 0.0 summed
Diff. 0.1 0.2 0.1 0.0 0.0 0.0 0.0 0.0 0.6
However, most of analysts may have a computer skill but
they may lack extensive training on discovering the key
factors in crime analysis. Moreover, they can not make sure
that the result from crime data mining is best suited for real
situation in criminal investigations. Finally, they may do not
know that how to use it in practice.
We believe that the statistical method can be used to solve
the addressed problem. There are two interesting issues that
the statistical method can be applied in the future research
work. The first one is an attribute selection in which time
consuming can be reduced. It also helps to decide which data
mining technique can be adopted. The second one is the
quality assessment in the result of the crime data mining. It
can be used in appropriate situation so that a more quality
better could be obtained.
V. CONCLUSION
Data mining has been as active research area for a last
decade. We have shown its usefulness to a variety of tasks
including crime control and criminal suppression. It should
be pointed out that the result from data mining process is
useful knowledge that may be changed over time. In a
conventional system, they started by proposing a design and
development processes of information system for catching
criminal, so the data mining was just a database system based
SQL query command. When we were entered to a terrorism
era, the data mining has become to be knowledge discovery
for crime pattern understanding. Several data mining
techniques have been adopted in order to conquer with
terrorist. For example, the mining association rules can be
used to create the offender’s profile. The clustering technique
composes of two subsequent methods. The first one is the
partitioning which is a method to compute a difference of
crime career. We can also perceive the trends of crime pattern
that changes over year. The second one is data classification
in which the data in similar characteristics is classified as the
same group. Therefore, it can be used to identify the escape
offender. It is very encouraging finding that the crime pattern
understanding can be discovered from data analysis. Finally,
it is also possible to construct a novel method where the
quality of research is conducted from crime prediction point
of view.
REFERENCES
[1] T. Abraham and O. de Vel, "Investigative profiling with computer
forensic log data and association rules," in Proceedings of the IEEE
International Conference on Data Mining (ICDM'02), pp. 11 – 18,
2006.
[2] D.E. Brown, "The regional crime analysis program (RECAP): A
frame work for mining data to catch criminals," in Proceedings of the
IEEE International Conference on Systems, Man, and Cybernetics,
Vol. 3, pp. 2848-2853, 1998.
[3] J.S. de Bruin, T.K. Cocx, W.A. Kosters, J. Laros and J.N. Kok, “Data
mining approaches to criminal career analysis,” in Proceedings of the
Sixth International Conference on Data Mining (ICDM’06), pp.
171-177, 2006.
[4] J. Han and M. Kamber, “Data Mining: Concepts and Techniques,”
Morgan Kaufmann publications, pp. 1-39, 2006.
[5] J. Mena, “Investigative Data Mining for Security and Criminal
Detection”, Butterworth Heinemann Press, pp. 15-16, 2003.
[6] S.V. Nath, “Crime pattern detection using data mining,” in
Proceedings of the 2006 IEEE/WIC/ACM International Conference
on Web Intelligence and Intelligent Agent Technology, pp. 41-44,
2006.