Skip to main content

Discovering Investigation Clues through Mining Criminal Databases

  • Chapter
Intelligence and Security Informatics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 135))

  • 1091 Accesses

Abstract

The law enforcement holds a large quantity of data that are records of official operations or private materials of the people. These data can be used for increasing benefits of the people or enhancing the efficiency of governmental operations. Data mining is one of the emerging techniques to manipulate huge amount of data. In this paper we will apply to this technique to the data of stolen automobiles to explore the unknown knowledge hidden in the data and provide this knowledge to transportation, insurance as well as police agencies for decision supports. The data we use are abstracted from 378 thousand records of stolen automobiles in the past eleven years in Taiwan. After constructing a data warehouse, we apply to the technique of classification, clustering, association rule, prediction, data generalization and summarization-based characterization to discover new knowledge. Our results include the understanding of automobile theft, possibility of finding stolen automobiles, intrigue in theft claims, etc. The knowledge we acquired is useful in decision support, showing the applicability of data mining in public affairs. The experience we gathered in this study would help the use of this technique in other public sectors. Along with the research results, we suggest the law enforcement to consider data mining as a new means to investigate criminal cases, to set up a team of criminal data analysis, to launch a new program to crack down automobile thefts, and to improve the quality of criminal data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atabakhsh, H., Schroeder, J., Chen, H., Chau, M., Xu, J., Zhang, J., Bi, H.H.: COPLINK knowledge management for law enforcement. In: Text analysis, visualization and collaboration. National Conference on Digital Government, Los Angeles, CA, May 2001, pp. 21–23 (2001)

    Google Scholar 

  2. Barclay, P., Buckley, J., Brantingham, P.J., Brantingham, P.L., Whinn-Yates, T.: Preventing Automobile theft in Suburban Vancouver Commuter Lots: Effects of a Bike Patrol. In: Clarke, R.V. (ed.) Crime Prevention Studies, vol. 6, pp. 133–162. Criminal Justice Press, NY (1996)

    Google Scholar 

  3. Bowen, J.E.: An Expert System for Police Investigators of Economic Crimes. Expert Systems with Applications 7(2), 235–248 (1994)

    Article  Google Scholar 

  4. Brahan, J.W., Lam, K.P., Chan, H., Leung, W.: AICAMS: Artificial Intelligence Crime Analysis and Management System. Knowledge-Based Systems 11, 355–361 (1998)

    Article  Google Scholar 

  5. Buller, D.B., Burgoon, J.K.: Interpersonal Deception Theory. Communication Theory 6, 203–242 (1996)

    Article  Google Scholar 

  6. Burgoon, J.K., Blair, J.P., Moyer, E.: Effects of Communication Modality on Arousal, Cognitive Complexity, behavioral Control and Deception Detection during Deceptive Episodes. In: The Annual Meeting of the National Communication Association, Miami (2003)

    Google Scholar 

  7. Chen, P.S.: An Automatic System for Collecting Crime Information on the Internet. Journal of Information, Law and Technology (3) (2000)

    Google Scholar 

  8. Chen, P.S., Chan, P.P.: Using Text Mining in Finding Criminal Data on the Web. In: Proceedings of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI), Orlando, July 18–21 (2004)

    Google Scholar 

  9. Chen, H., Chung, W., Xu, J., Wang, G., Chau, M.: Crime Data Mining: A General Framework and Some Examples. In: IEEE Computer Society, April.2004, pp. 50–56 (2004)

    Google Scholar 

  10. Chilton, R.J.: Middle Class Delinquency and Specific Offence Analysis. In: Vaz, E.W. (ed.) Middle-Class Juvenile Delinquency, pp. 91–101. Harper & Row, New York (1967)

    Google Scholar 

  11. Clarke, R.V.: Theoretical Background to Crime Prevention through Environmental Design (CPTED) and Situational Prevention. In: Geason, S., Wilson, P. (eds.) Designing Out Crime: The Conference Papers, pp. 13–20, Australian Institute of Criminology, Canberra (1989)

    Google Scholar 

  12. Clarke, R.V., Harris, P.M.: Automobile theft and Its Prevention. In: Tonry, M. (ed.) Crime and Justice: A Review of Research, vol. 16, University of Chicago Press, Chicago (1992)

    Google Scholar 

  13. Cohen, L.E., Felson, M.: Social Change and Crime Rate Trends: A Routine Activities Approach. American Sociological Review 44, 588–608 (1979)

    Article  Google Scholar 

  14. Coleman, C., Moynihan, J.: Understanding Crime Data. Open University Press, Milton Keynes (1996)

    Google Scholar 

  15. Cornish, D.B., Clarke, R.V. (eds.): The reasoning criminal: Rational choice perspectives on offending. Springer, New York (1986)

    Google Scholar 

  16. Fazlollahi, B., Gordon, J.S.: CATCH: Computer Assisted Tracking of Criminal Histories System. Interfaces 23(2), 51–62 (1993)

    Article  Google Scholar 

  17. George, J.F., Carlson, J.R.: Group support systems and deceptive communication. Presented at HICSS-32. In: Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences (1999)

    Google Scholar 

  18. Han, J., Kamber, M.: Data Ming: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2001)

    Google Scholar 

  19. Hauck, R.V., Chen, H.: Coplink: a case of intelligent analysis and knowledge management. In: Proceedings of the 20th international conference on Information Systems, January 1999, pp. 15–27 (1999)

    Google Scholar 

  20. Hope, T.: Residential aspects of auto crime. In: Research Bulletin, vol. 23, pp. 28–33, Home Office, London (1987)

    Google Scholar 

  21. Kantardzic, M.: Data Mining: Concepts, Models, Methods, and Algorithms, November 2002. IEEE Press & John Wiley (2002)

    Google Scholar 

  22. Massey, J.L., Krohn, M.D., Bonati, L.M.: Property Crime and the Routine Activity of Individuals. Journal of Research in Crime and Delinquency 26, 378–400 (1989)

    Article  Google Scholar 

  23. McCaghy, C.H., Giordano, P.C., Henson, T.K.: Automobile theft: Offender and Offense Characteristics. Criminology 15, 367–385 (1977)

    Article  Google Scholar 

  24. Miethe, T.D., Meier, R.F.: Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. State University of New York Press, Albany (1994)

    Google Scholar 

  25. Ogrodnik, L., Paiement, R.: Motor Automobile Theft. In: Jurist at Service Bulletin, Canadian Centre for Justice Statistics, vol. 12. Minister of Industry, Science, and Technology, Ottawa, Canada (1992)

    Google Scholar 

  26. Pliant, L.: High-technology Solutions. The Police Chief 5(38), 38–51 (1996)

    Google Scholar 

  27. Potchak, M.C., McGloin, J.M., Zgoba, K.M.: A Spatial Analysis of Criminal Effort: Auto Theft in Newark, New Jersey. Criminal Justice Policy Review 13(3), 257–285 (2002)

    Article  Google Scholar 

  28. Rice, K.J., Smith, W.R.: Socioecologicl Models of Automobile Theft: Integrating Routine Activity and Social Disorganization Approaches. Journal of Research in Crime and Delinquency 39(3), 304–336 (2002)

    Google Scholar 

  29. Rhodes, W.M., Conly, C.: Crime and mobility: An empirical study. In: Brantingham, P.J., Brantingham, P.L. (eds.) Environmental criminology, Prospect Heights, Waveland, IL, pp. 167–188 (1981)

    Google Scholar 

  30. Rossmo, D.K.: A methodological model. American Journal of Criminal Justice 11(2), 1–16 (1993)

    Article  Google Scholar 

  31. Rossmo, D.K.: Overview: Multivariate spatial profiles as a tool in crime investigation. In: Block, C.R., Daboub, M., Fregly, S. (eds.) Crime analysis through computer mapping, pp. 65–98. Police Executive Research Forum, Washington, DC (1995)

    Google Scholar 

  32. Sanders, W.B.: Juvenile Delinquency, Praeger, New York, p. 94. Praeger, New York (1976)

    Google Scholar 

  33. Schepses, E.: Boys Who Steal Cars. Federal Probation, 56–62 (March 1961)

    Google Scholar 

  34. Taiwan: Crime Statistics Yearly Report, National Police Agency, Taiwan (2004)

    Google Scholar 

  35. U.S. News and World Report, p. 14 (January 15, 1996)

    Google Scholar 

  36. van Koppen, P.J., Jansen, R.W.J.: The road to robbery: Travel patterns in commercial robberies. British Journal of Criminology 38, 230–246 (1998)

    Google Scholar 

  37. White, C.H., Burgoon, J.K.: Adaptation and commutative design: Patterns of Interaction in truthful and deceptive conversation. Human Communication Research 27, 9–37 (2001)

    Article  Google Scholar 

  38. Wilcox, J.: IT-armed Officers Fight Gangs. Government Computer News: State and Local 3(12), 19–20 (1997)

    Google Scholar 

  39. Zhou, L., Burgoon, J.K., Twitchell, D.P.: A Longitudinal Analysis of Language Behavior of Deception in E-mail. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 102–110. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hsinchun Chen Christopher C. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Chen, P.S. (2008). Discovering Investigation Clues through Mining Criminal Databases. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69209-6_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69207-2

  • Online ISBN: 978-3-540-69209-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics