Skip to main content

The Use of Data Mining Techniques in Operational Crime Fighting

  • Conference paper
Intelligence and Security Informatics (ISI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3073))

Included in the following conference series:

Abstract

This paper looks at the application of data mining techniques, principally the Self Organising Map, to the recognition of burglary offences committed by an offender who, although part of a small network, appears to work on his own. The aim is to suggest a list of currently undetected crimes that may be attributed to him, improve on the time taken to complete the task manually and the relevancy of the list of crimes. The data was drawn from one year of burglary offences committed within the West Midlands Police area, encoded from text and analysed using techniques contained within the data mining workbench of SPSS/Clementine. The undetected crimes were analysed to produce a list of offences that may be attributed to the offender.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adderley, R.: The use of data mining techniques in active crime fighting. In: International conference on computer, communication and control technologies and the 9th international conference on information systems analysis and synthesis, July 31- August 3, CCCT, Orlando (2003)

    Google Scholar 

  2. Adderley, R.: The use of data mining techniques in operational crime fighting. In: Zurada, J., Kantardzic, M. (eds.) New Generations of Data Mining Applications (2004) (Due to be published in April 2004)

    Google Scholar 

  3. Adderley, R., Musgrove, P.B.: General review of police crime recording and investigation systems. A user’s view. Policing: An International Journal of Police Strategies and Management 24(1), 100–114 (2001)

    Article  Google Scholar 

  4. Adderley, R., Musgrove, P.B.: Modus operandi modelling of group offending; a data mining case study. Accepted by An International Journal of Police Science and Management 5(4), 265–276 (2003)

    Google Scholar 

  5. Adriaans, P., Zantige, D.: Data Mining. Addison-Wesley, Reading (1996)

    Google Scholar 

  6. Brantingham, P.L., Brantingham, P.J.: Notes on the geometry of crime, in Environmental Criminology. Wavelend Press Inc., USA (1991)

    Google Scholar 

  7. Brantingham, P.J., Brantingham, P.L.: Environmental criminology: From theory to urban planning practice. Studies on Crime and Crime Prevention 7(1), 31–60 (1998)

    Google Scholar 

  8. Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., Wirth, R.: CRISP-DM 1.0 Step-by-step data mining guide, USA: SPSS Inc. CRISPWP-0800 (2000)

    Google Scholar 

  9. Clarke, R.V., Felson, M.: Introduction: Criminology, Routine activity, and rational choice. In: Clarke, R.V., Felson, M. (eds.) Routine activity and rational choice: Advances in criminological theory, vol. 5, Transaction Publishers, New Jersey (1993)

    Google Scholar 

  10. Cohen, L.E., Felson, M.: Social change and crime rate trends: A routine activity approach. American Sociological Review 44, 588–608 (1979)

    Article  Google Scholar 

  11. Coles, N.: It’s not what you know – it’s who you know that counts. Analysing serious crime groups as social networks. British Journal of Criminology 44, 580–594 (2001)

    Google Scholar 

  12. Eck, J.E.: A general model of the geography of illicit marketplaces. Crime Prevention Studies 4, 67–94 (1995)

    Google Scholar 

  13. Felson, M.: Routine activities and crime prevention: armchair concepts and practical action. Studies on Crime and Crime Prevention 1, 30–34 (1992)

    Google Scholar 

  14. Kohonen, T.: Self organising formation of topologically correct feature maps. Biological Cybernitics 43(1), 59–69 (1982)

    Article  MATH  Google Scholar 

  15. Policing and Reducing Crime Unit, Opportunity makes the thief: Practical theory for crime prevention. Police Research Paper 98, London; Home Office (1998)

    Google Scholar 

  16. Reiss, A.J.: Co-offending and criminal careers. In: Tonry, M., Morris, N. (eds.) Crime and justice: A review of research, vol. 10, pp. 117–170 (1988)

    Google Scholar 

  17. Weiss, S.M., Indurkhya, N.: Predictive data mining: a practical guide. Morgan Kaufman Publishers Inc., San Francisco (1998)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Adderley, R. (2004). The Use of Data Mining Techniques in Operational Crime Fighting. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25952-7_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22125-8

  • Online ISBN: 978-3-540-25952-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics