Crime D Ata Mining

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

CRIME DATA MINING2010

 ZHIJIANG CHEN (0440426)


What is a crime?

 The breach of one or more rules or


laws for which governing authority
via police power may ultimately
prescribe a conviction.
 It is injurious to the general
population or the state.
 So, crime prevention and identifying
the criminals is the necessity in
today's society.

Crime type at different law-enforcement
levels.
Major challenges

 All law-enforcement and intelligence-


gathering organizations are
currently facing problems of
accurately and efficiently analyzing
the growing volumes of crime data
 Different modes, patterns, cross-
border operations, technologically
advanced crimes are difficult to
track and solve the case.
 Investigation of the crime takes
longer duration due to complexity
What is data mining?

 “Data mining is a collection of


techniques for efficient automated
discovery of previously unknown,
valid, novel, useful and
understandable patterns in large
databases. The patterns must be
actionable so that they may be
used in an enterprise’s decision
making process.”
Which model suits the process of criminal
identification?
 Different law-enforcement agencies
are involved in investigation of
different kinds based on severity
and jurisdiction of crime.
 Researchers have developed various
automated data mining techniques
for both local law enforcement and
national security applications.
Objective of Crime Data Mining

 Using Data mining techniques to aid


analysis of data related to crimes
 Extracting named entities from
narrative reports
 Detecting deceptive criminal
identities
 Identifying criminal groups and key
members

Key technologies used

 Entity extraction.
 Clustering techniques.
 Association rule mining.
 Deviation detection.
 Classification.
 String comparator.
 Social network analysis.

Crime data mining framework

 Identifies relationship between techniques


applied in criminal and intelligence analysis
at various level.
Criminal-Network Analysis

 P ro b le m s : D ru g , C y b e rcrim e ,
Te rro rism e tc .
 C lu e : C rim in a ls o fte n d e v e lo p s
n e tw o rk s in w h ich th e y fo rm
g ro u p s o r te a m s to ca rry o u t
v a rio u s ille g a l a ctiv a te s .

Objective

 Primary:
To identify subgroups and key
members in the criminal
networks and studying
interaction patterns
 Secondary:
To develop effective strategies
for disrupting the networks

Data collection

 272 Tucson Police Department


incidents summaries
 Involving 164 crimes
 Committed form 1985 through May
2002

Methods and Techniques

 Concept Space (Clustering)


 To extract criminal relations and
create a likely network of suspects.
 Co –Occurrence Weight –To find the
strength
 Hierarchical Clustering –To partition
the network into subgroups
 Block Modeling –To identify
interaction patterns between these
subgroups
Tool

164 Criminals
 Sub Groups

Advantages

 Increase crime analysts’ work


productivity
 Visualize Criminal Networks
 Risk is reduced
 Time is saved-Police can use it for
other valuable tasks
 Reduce error
 Effective strategies can be
formulated to disrupting criminal
networks
Conclusion

 Crime data has increased to very large


quantities running into
zotabytes(1024bytes) requiring
advanced techniques such as data
mining
 Data mining has immense potential for
crime data analysis
 As is the case with any other new
technology, even DM has its own
limitations as of now
 But as the technology advances, it is
CRIME DATA MINING
THE END

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy