Abstract
Detecting criminal networks from arrest data and offender demographics data made possible with our previous models such as GDM, OGDM, and SoDM and each of them proved successful on different types of criminal networks. To benefit from all features of police arrest data and offender demographics, a new combined model is developed and called as combined detection model (ComDM). ComDM uses crime location, date and modus operandi similarity as well as surname and hometown similarity to detect criminal networks in crime data. ComDM is tested on two datasets and performed better than other models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brandes, U.: A Faster Algorithm for betweenness centrality. Journal of Mathematical Sociology 25(2), 163–177 (2001)
Coffman, T.R., Marcus, S.E.: Pattern Classification in Social Network Analysis: A case study. In: 2004 IEEE Aerospace Conference, March 6-13 (2004)
Hunter, A.: Leninist Cell Data Analysis. 21st Century Technologies Inc., Austin (2002)
Smith, M.N., King, P.J.H.: Incrementally Visualising Criminal Networks. In: Sixth International Conference on Information Visualisation (IV’02), IEEE, Los Alamitos (2002)
Wang, G.A., Xu, J.J., Chen, H.: Using Social Contextual Information to Match Criminal Identities. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, vol. 04, pp. 81.2. IEEE Computer Society, Los Alamitos (2006)
Ozgul, F., Bondy, J., Aksoy, H.: Mining for offender group detection and story of a police operation. In: Sixth Australasian Data Mining Conference (AusDM 2007), Australian Computer Society Conferences in Research and Practice in Information Technology (CRPIT), Gold Coast, Australia (2007)
Ozgul, F., Erdem, Z., Aksoy, H.: Comparing Two Models for Terrorist Group Detection: GDM or OGDM? In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 149–160. Springer, Heidelberg (2008)
Mcglorin, J.M., Sullivan, C.J., Piquero, A.R., Bacon, S.: Investigating the stability of co-offenders among a sample of youthful offenders. Criminology 46(1), 155–187 (2008)
Canter, D.: A partial order scalogram analysis of criminal network structures. Behaviormetrika 31(2), 131–152 (2004)
Golbeck, J.: Trust and nuanced profile similarity in online social networks. ACM Trans. Web 3, 4, Article 12, 33 pages(2009)
Crandall, D., Cosley, D., Huttenlocher, D., Kleinberg, J., Suri, S.: Feedback Effects between Similarity and Social Influence in Online Communities. In: KDD’08, Las Vegas, Nevada, USA, August 24-27. ACM, New York (2008)
Chau, M., Xu, J., Chen, H.: Extracting meaningful entities from police narrative reports. In: National Conference on Digital Government Research (2001)
Xu, J., Chen, H.C.: Fighting Organised Crimes: using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems 38(3), 473–487 (2003)
Xu, J., Chen, H.C.: CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems 23(2), 201–226 (2005)
Oatley, G.C., Zeleznikov, J., Ewart, B.W.: Matching and predicting crimes. In: AI 2004-The 24th SGAI International Conference on Knowledge Based Systems and Applications of Artificial Intelligence (2004)
Goldberg, H.G., Wong, R.W.H.: Restructuring transactional data for link analysis in FinCEN AI System. In: AAAI Fall Symposium (1998)
Skillicorn, D.B.: Clusters within clusters: SVD and counterterrorism. In: Workshop on Data Mining for Counterterrorism and Security (2003)
Adderley, R., Badii, A., Wu, C.: The automatic identification and prioritization of criminal networks from police crime data. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds.) EuroIsI 2008. LNCS, vol. 5376, pp. 5–14. Springer, Heidelberg (2008)
Adderley, R., Mushgrove, P.B.: Data mining case study: Modeling the behavior of offenders who commit sexual assaults. In: ACM SIGKDD 2001 International Conference on Knowledge Discovery and Data Mining, New York, pp. 215–220 (2001)
Coffman, T., Greenblatt, S., Marcus, S.: Graph-based technologies for intelligence analysis. Communication of ACM 47(3), 45–47 (2004)
Marcus, S., Coffman, T.: Terrorist Modus Operandi Discovery System 1.0: Functionality, Examples, and Value. 21st Century Technologies, Austin (2002)
Marcus, S.E., Moy, M., Coffman, T.: Social Network Analysis. In: Cook, D.J., Holder, L.B. (eds.) Mining Graph Data. John Wiley & Sons, Inc., Hoboken (2007)
Moy, M.: Using TMODS to run best friends group detection algorithm. 21st Century Technologies, Austin (2005)
Coffman, T.R., Marcus, S.E.: Dynamic Classification of Suspicious Groups using social network analysis and HMMs. In: 2004 IEEE Aerospace Conference, March 6-13 (2004)
Greenblatt, S., Coffman, T., Marcus, S.: Emerging Information Technologies and enabling policies for counter terrorism. In: Behaivoural Network Analysis for Terrorist Detection. Wiley-IEEE Press, Hoboken (2005)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. (2001)
Kantardzic, M.: Data Mining: Concepts, Models, Methods, and Algorithms. John Wiley & Sons, New York (2003)
Kaza, S., Hu, D., Atabakhsh, H., Chen, H.: Predicting criminal relationships using multivariate survival analysis. In: Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains, pp. 290–291. Digital Government Society of North America, Philadelphia (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ozgul, F., Erdem, Z., Bowerman, C., Bondy, J. (2010). Combined Detection Model for Criminal Network Detection . In: Chen, H., Chau, M., Li, Sh., Urs, S., Srinivasa, S., Wang, G.A. (eds) Intelligence and Security Informatics. PAISI 2010. Lecture Notes in Computer Science, vol 6122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13601-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-13601-6_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13600-9
Online ISBN: 978-3-642-13601-6
eBook Packages: Computer ScienceComputer Science (R0)