Skip to main content

Part of the book series: Lecture Notes in Computer Science ((TCCI,volume 7770))

Abstract

We consider the ontological modeling of knowledge concerning the class of linked economic crimes, namely the fraudulent disbursement accompanied by money laundering. The applied method of conceptual modeling results in obtaining a layered ontological structure with the foundational ontology on top of it and the application ontology at its bottom. As the foundational level we use the constructive descriptions and situations ontology. The application level entities were manually separated from the motivating crime scenarios. The latter level covers both the conceptualization of ”a domain” whose attributes and relations are of interest and ”a task” that supports the realization of the functionality of a crime analysis application. The domain-based part of the ontology is engineered in the OWL language while the task-based part, designed to support knowledge extraction from databases, is implemented via rules in the SWRL language. The rules are used to extract data concerning: documents and their attributes, the formal hierarchy in a company and the parameters of transactions. They are also used to deduce sanctions against people engaged in a crime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Core Legal Ontology, http://www.loa-cnr.it/ontologies/clo/corelegal.owl

  2. DOLCE+, http://www.loa-cnr.it/ontologies/dlp_397.owl

  3. Suggested Upper Merged Ontology, http://www.ontologyportal.org/

  4. Aleven, V.: Using background knowledge in case-based legal reasoning: a computational model and an intelligent learning environment. Artificial Intelligence 150, 183–237 (2003)

    Article  MATH  Google Scholar 

  5. Bak, J., Brzykcy, G., Jedrzejek, C.: Extended Rules in Knowledge-Based Data Access. In: Olken, F., Palmirani, M., Sottara, D. (eds.) RuleML - America 2011. LNCS, vol. 7018, pp. 112–127. Springer, Heidelberg (2011)

    Google Scholar 

  6. Bak, J., Jedrzejek, C.: Application of an Ontology-Based Model to a Selected Fraudulent Disbursement Economic Crime. In: Casanovas, P., Pagallo, U., Sartor, G., Ajani, G. (eds.) AICOL Workshops 2009. LNCS (LNAI), vol. 6237, pp. 113–132. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Bak, J., Jedrzejek, C., Falkowski, M.: Usage of the Jess Engine, Rules and Ontology to Query a Relational Database. In: Governatori, G., Hall, J., Paschke, A. (eds.) RuleML 2009. LNCS, vol. 5858, pp. 216–230. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Bak, J., Jedrzejek, C., Falkowski, M.: Application of an Ontology-Based and Rule-Based Model to Selected Economic Crimes: Fraudulent Disbursement and Money Laundering. In: Dean, M., Hall, J., Rotolo, A., Tabet, S. (eds.) RuleML 2010. LNCS, vol. 6403, pp. 210–224. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Bezzazi, H.: Building an ontology that helps identify articles that apply to a cybercrime case. In: Proc. of the Second International Conference on Software and Data Technologies, ICSOFT 2007, Barcelona, Spain, pp. 179–185 (2007)

    Google Scholar 

  10. Biasiotti, M., Francesconi, E., Palmirani, M., Sartor, G., Vitali, F.: Legal Informatics and Management of Legislative Documents. Global Centre for ICT in Parliament, Working Paper No. 2, United Nations, Department of Economics and Social Affairs (2008)

    Google Scholar 

  11. Breuker, J.: Dreams, awakenings and paradoxes of ontologies, invited talk presentation, 3rd Workshop on Legal Ontologies and Artificial Intelligence Techniques (2009), http://ontobra.comp.ime.eb.br/apresentacoes/keynote-ontobra-2009.ppt

  12. Bruninghaus, S., Ashley, K.D.: Predicting the outcome of case-based legal arguments. In: Proc. of Conference on Artificial Intelligence and Law, ICAIL 2003, Edinburgh, Scotland, UK, pp. 233–242 (2003)

    Google Scholar 

  13. Casellas, N.: Modelling Legal Knowledge through Ontologies. OPJK: the Ontology of Professional Judicial Knowledge. Ph.D. thesis, Universitat Autónoma de Barcelona, Barcelona (2008)

    Google Scholar 

  14. Corcho, O., Fernández-López, M., Gómez-Pérez, A.: Methodologies, tools and languages for building ontologies. Where is their meeting point? Data & Knowledge Engineering 46(1), 41–64 (2003)

    Article  Google Scholar 

  15. Cybulka, J.: Applying the c.DnS Design Pattern to Obtain an Ontology for Investigation Management System. In: Nguyen, N.T., Kowalczyk, R., Chen, S.-M. (eds.) ICCCI 2009. LNCS, vol. 5796, pp. 516–527. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Cybulka, J.: Fuel Crime Conceptualization Through Specialization of Ontology for Investigation Management System. Transactions on Computational Collective Intelligence 2, 123–146 (2010)

    Article  Google Scholar 

  17. Cybulka, J.: The OWL version of the ontology of criminal processes and investigation procedures (2010), http://www.man.poznan.pl/~jolac/cDnSPL.zip

  18. Cybulka, J., Jedrzejek, C., Martinek, J.: Police investigation management system based on the workflow technology. In: Francesconi, E., Sartor, G., Tiscornia, D. (eds.) Legal Knowledge and Information Systems. Frontiers in Artificial Intelligence and Applications, pp. 150–159. IOS Press, Amsterdam (2008)

    Google Scholar 

  19. Darlington, M., Culley, S.: Investigating ontology development for engineering design support. Advanced Engineering Informatics 22(1), 112–134 (2008)

    Article  Google Scholar 

  20. De Nicola, A., Missikoff, M., Navigli, R.: A software engineering approach to ontology building. Information Systems 34, 258–275 (2009)

    Article  Google Scholar 

  21. Fernández-López, M.: Overview of methodologies for building ontologies. In: Proc. of the IJCAI 1999 Workshop on Ontologies and Problem Solving Methods KRR5 Stockholm, Sweden (1999)

    Google Scholar 

  22. Gangemi, A.: The c.DnS ontology, http://www.loa-cnr.it/ontologies/collint.owl

  23. Gangemi, A., Lehmann, J., Catenacci, C.: Norms and plans as unification criteria for social collectives. In: Proc. of Dagstuhl Seminar 07122, Normative Multi-agent Systems, vol. II, pp. 48–87 (2007) ISSN 1862-4405

    Google Scholar 

  24. Gangemi, A., Lehmann, J., Presutti, V., Nissim, M., Catenacci, C.: C-ODO: an OWL Meta-model for Collaborative Ontology Design. In: Proc. of the Workshop on Social and Collaborative Construction of Structured Knowledge (CKC 2007) at the 16th International WWW Conference, WWW 2007, Banff, Canada (2007)

    Google Scholar 

  25. Gómez-Pérez, A., Suárez de Figueroa Baonza, M.C., Villazón, B.: Neon Methodology for Building Ontology Networks: Ontology Specification, excerpt from NeOn Deliverable D5.4.1 (2008), http://www.neon-project.org

  26. Hoekstra, R., Breuker, J., Bello, M.D., Boer, A.: The LKIF-core ontology of basic legal concepts. In: Proc. of the Workshop on Legal Ontologies and Artificial Intelligence Techniques (LOAIT 2007) at the International Conference on AI and Law (ICAIL 2007), Stanford, USA, pp. 43–63 (2007)

    Google Scholar 

  27. Jedrzejek, C., Bak, J., Falkowski, M.: Graph Mining for Detection of a Large Class of Financial Crimes. In: 17th International Conference on Conceptual Structures, ICCS 2009, Moscow, Russia (2009)

    Google Scholar 

  28. Jedrzejek, C., Bak, J., Falkowski, M., Cybulka, J., Nowak, M.: On the Detection and Analysis of VAT Carousel Crime. In: Proc. of JURIX 2011: The Twenty-Fourth Annual Conference Legal Knowledge and Information Systems. Frontiers in Artificial Intelligence Applications, vol. 235, pp. 130–134. IOS Press (2011)

    Google Scholar 

  29. Jedrzejek, C., Cybulka, J., Bak, J.: Application Ontology-based Crime Model for a Selected Economic Crime. In: Proc. of Conference on Computer Methods and Systems, CMS 2009, Kraków, Poland, pp. 71–74 (2009)

    Google Scholar 

  30. Jędrzejek, C., Cybulka, J., Bąk, J.: Towards Ontology of Fraudulent Disbursement. In: O’Shea, J., Nguyen, N.T., Crockett, K., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2011. LNCS, vol. 6682, pp. 301–310. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  31. Jedrzejek, C., Falkowski, M., Smoleński, M.: Link Analysis of Fuel Laundering Scams and Implications of Results for Scheme Understanding and Prosecutor Strategy. In: 22nd International Conference on Legal Knowledge and Information Systems, JURIX 2009, Rotterdam, The Netherlands (2009)

    Google Scholar 

  32. Jess: Java Expert Rules, http://jessrules.com/

  33. Kerremans, K., Zhao, G.: Topical ontology for VAT. Tech. Rep. of the FFPOIROT IP project (IST-2001-38248). Deliverable D2.3 (WP 2), STARLab VUB (2005)

    Google Scholar 

  34. Kingston, J., Schafer, B., Vandenberghe, W.: No Model Behaviour: Ontologies for Fraud Detection. In: Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.) Law and the Semantic Web. LNCS (LNAI), vol. 3369, pp. 233–247. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  35. Lame, G.: Methodologies, tools and languages for building ontologies. Where is their meeting point? Artificial Intelligence and Law 12(4), 379–396 (2004)

    Article  Google Scholar 

  36. Martinek, J.: Hydra case formal structural description. Tech. rep., Polish Platform for Homeland Security, Poznań University of Technology, Poznań, Poland (2008)

    Google Scholar 

  37. Mommers, L.: Applied legal epistemology. Building a knowledge-based ontology of the legal domain. Ph.D. thesis, Leiden University, Leiden (2002)

    Google Scholar 

  38. Spyns, P., Tang, Y., Meersman, R.: An ontology engineering methodology for DOGMA. Applied Ontology 3, 13–39 (2008)

    Google Scholar 

  39. Tempich, C., Pinto, H.S., Staab, S.: Ontology Engineering Revisited: An Iterative Case Study. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, pp. 110–124. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  40. Unger, B.: The Scale and Impacts of Money Laundering. Edward Elgar Publishing, Cheltenham (2007)

    Google Scholar 

  41. Valente, A.: Legal Knowledge Engineering. A Modelling Approach. IOS Press, Amsterdam (1995)

    MATH  Google Scholar 

  42. Visser, P.R., van Kralingen, R.W., Bench-Capon: A method for the development of legal knowledge systems. In: Proc. of the 6th International Conference on Artificial Intelligence and Law, ICAIL 1997, Melbourne, Australia, pp. 151–160 (1997)

    Google Scholar 

  43. Więckowski, J.: Hydra case indictment analysis, District Public Prosecutor’s Office in Katowice, Poland, Personal Communication (2009)

    Google Scholar 

  44. Wyner, A.: An ontology in OWL for legal case-based reasoning. Artificial Intelligence and Law 3, 361–387 (2008)

    Article  Google Scholar 

  45. Zhang, H., Li, Y., Tan, H.: Measuring design complexity of semantic web ontologies. Journal of Systems & Software 83(5), 41–64 (2010)

    Google Scholar 

  46. Zhao, G., Leary, R.: AKEM: an ontology engineering methodology in FFPoirot. Tech. Rep. of the FFPOIROT IP project (IST-2001-38248). Deliverable D6.8 (WP 6), STARLab VUB (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bak, J., Cybulka, J., Jedrzejek, C. (2013). Ontological Modeling of a Class of Linked Economic Crimes. In: Nguyen, N.T. (eds) Transactions on Computational Collective Intelligence IX. Lecture Notes in Computer Science, vol 7770. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36815-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36815-8_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36814-1

  • Online ISBN: 978-3-642-36815-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics