skip to main content
10.1145/1165485.1165520acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicailConference Proceedingsconference-collections
Article

Probabilistic abductive computation of evidence collection strategies in crime investigation

Published: 06 June 2005 Publication History

Abstract

This paper presents a methodology for integrating two approaches to building decision support systems (DSS) for crime investigation: symbolic crime scenario abduction [16] and Bayesian forensic evidence evaluation [5]. This is achieved by means of a novel compositional modelling technique that allows for automatically generating a space of models describing plausible crime scenarios from given evidence and formally represented domain knowledge. The main benefit of this integration is that the resulting DSS is capable to formulate effective evidence collection strategies useful for differentiating competing crime scenarios. A running example is used to demonstrate the theoretical developments.

References

[1]
C. Aitken, F. Taroni, and P. Garbolino. A graphical model for the evaluation of cross-transfer evidence in DNA profiles. Theoretical Population Biology, 63(3): 179--190, 2003.
[2]
M. Bromby, M. MacMillan, and P. McKellar. A common-kads representation for a knowledge based system to evaluate eyewitness identification. International Review of Law Computers and Technology, 17(1):99--108, 2003.
[3]
H. Chen, J Schroeder, R. V. Hauck, L. Ridgeway, H. Atabakhsh, H. Gupta, C. Boarman, K. Rasmussen, and A. W. Clements. COPLINK Connect: Information and knowledge management for law enforcement. Decision Support Systems: Special Issue on Digital Government, 34(3):271--285, 2002.
[4]
R. Cook, I. Evett, G. Jackson, P. Jones, and J. Lambert. A model for case assessment and interpretation. Science and Justice, 38:151--156, 1998.
[5]
R. Cook, I. Evett, G. Jackson, P. Jones, and J. Lambert. Case pre-assessment and review in a two-wat transfer case. Science and Justice, 39:103--111, 1999.
[6]
G. de Cooman. Precision - imprecision equivalence in a broad class of imprecise hierarchical uncertainty models. Journal of Statistical Planning and Inference, 105(1):175--198, 2002.
[7]
J. de Kleer. An assumption-based TMS. Artificial Intelligence, 28:127--162, 1986.
[8]
D. Dixon. Police investigative procedures. In C. Walker and K. Starmer, editors, Miscarriage of Justice. A Review of Justice in Error, 1999.
[9]
I. Evett, G. Jackson, J. Lambert, and S. McCrossan. The impact of the principles of evidence interpretation on the structure and content of statements. Science and Justice, 40:233--239, 2000.
[10]
I. Goodman and H. Nguyen. Probability updating using second order probabilities and conditional event algebra. Information Sciences, 121(3-4):295--347, 1999.
[11]
J. Halliwell, J. Keppens, and Q. Shen. Linguistic bayesian networks for reasoning with subjective probabilities in forensic statistics. In Proceedings of the 9th International Conference on Artificial Intelligence and Law, pages 42--50, 2003.
[12]
W. Hamscher, L. Console, and J. de Kleer, editors. Readings in Model-Based Diagnosis. Morgan-Kaufmann, San Mateo, 1992.
[13]
R. V. Hauck, H. Atabakhsh, P. Ongvasith, H. Gupta, and H. Chen. Using coplink to analyze criminal justice data. IEEE Computer, 35(3):30--37, 2002.
[14]
A. Jamieson. A rational approach to the principles and practice of crime scene investigation: I. principles. Science & Justice, 44(1):3--7, 2004.
[15]
J. Keppens and Q. Shen. Compositional model repositories via dynamic constraint satisfaction with order-of-magnitude preferences. Journal of Artificial Intelligence Research, 21:499--550, 2004.
[16]
J. Keppens and J. Zeleznikow. A model based reasoning approach for generating plausible crime scenarios from evidence. In Proceedings of the 9th International Conference on Artificial Intelligence and Law, pages 51--59, 2003.
[17]
P. Lazarsfeld and N. Henry. Latent Structure Analysis. Houghton Mill, Boston, 1968.
[18]
R. Loui, J. Norman, J. Alpeter, D. Pinkard, D. Craven, J. Linsday, and M. Foltz. Progress on room 5: a testbed for public interactive semi-formal legal argumentation. In Proceedings of the 6th Internation Conference on Artificial Intelligence and Law, pages 207--214, 1997.
[19]
T. M. Mitchell. Machine Learning. McGraw-Hill, 1997.
[20]
J. Mortera, A. Dawid, and S. Lauritzen. Probabilistic expert systems for dna mixture profiling. Theoretical Population Biology, 63(3):191--205, 2003.
[21]
J. Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan-Kaufmann, 1988.
[22]
D. Poole. Explanation and prediction: An architecture for default and abductive reasoning. Computational Intelligence, 5(2):97--110, 1989.
[23]
H. Prakken, C. Reed, and D. Walton. Argumentation schemes and generalisations in reasoning about evidence. In Proceedings of the 9th Internation Conference on Artificial Intelligence and Law, 2003.
[24]
M. Redmond and C. Blackburn Line. Empirical analysis of case-based reasoning and other prediction methods in a social science domain: Repeat criminal victimization. In Proceedings of the 5th International Conference on Case-Based Reasoning, pages 452--464, 2003.
[25]
D. Schum. The Evidential Foundations of Probabilistic Reasoning. Northwestern University Press, 1994.
[26]
J. Toland and B. Rees. Applying case-based reasoning to law enforcement. International Association of Law Enforcement Intelligence Analysts Journal, 15, 2005.
[27]
B. Verheij. Automated argumentation assistance for lawyers. In Proceedings of the 7th Internation Conference on Artificial Intelligence and Law, pages 43--52, 1999.
[28]
P. Walley. Statistical inferences based on a second-order possibility distribution. International Journal of General Systems, 9:337--383, 1997.
[29]
D. Walton. Argumentation and theory of evidence. New Trends in Criminal Investigation and Evidence, 2:711--732, 2000.

Cited By

View all
  • (2025)Comparing the performance of a large language model and naive human interviewers in interviewing children about a witnessed mock-eventPLOS ONE10.1371/journal.pone.031631720:2(e0316317)Online publication date: 28-Feb-2025
  • (2013)E-Cyborg: The cybercrime evidence finder2013 8th International Conference on Information Technology in Asia (CITA)10.1109/CITA.2013.6637579(1-6)Online publication date: Jul-2013
  • (2012)Social Network Inspired Approach to Intelligent Monitoring of Intelligence DataSocial Network Mining, Analysis, and Research Trends10.4018/978-1-61350-513-7.ch006(79-100)Online publication date: 2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICAIL '05: Proceedings of the 10th international conference on Artificial intelligence and law
June 2005
270 pages
ISBN:1595930817
DOI:10.1145/1165485
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • The International Association for Artificial Intelligence and Law
  • CIRSFID

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 June 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bayesian networks
  2. crime investigation
  3. decision support systems
  4. model based reasoning

Qualifiers

  • Article

Conference

ICAIL05
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Comparing the performance of a large language model and naive human interviewers in interviewing children about a witnessed mock-eventPLOS ONE10.1371/journal.pone.031631720:2(e0316317)Online publication date: 28-Feb-2025
  • (2013)E-Cyborg: The cybercrime evidence finder2013 8th International Conference on Information Technology in Asia (CITA)10.1109/CITA.2013.6637579(1-6)Online publication date: Jul-2013
  • (2012)Social Network Inspired Approach to Intelligent Monitoring of Intelligence DataSocial Network Mining, Analysis, and Research Trends10.4018/978-1-61350-513-7.ch006(79-100)Online publication date: 2012
  • (2012)Argument diagram extraction from evidential Bayesian networksArtificial Intelligence and Law10.1007/s10506-012-9121-z20:2(109-143)Online publication date: 1-May-2012
  • (2012)Reasoning about Evidence using Bayesian NetworksAdvances in Digital Forensics VIII10.1007/978-3-642-33962-2_7(99-113)Online publication date: 2012
  • (2011)Compositional Bayesian modelling for computation of evidence collection strategiesApplied Intelligence10.1007/s10489-009-0208-535:1(134-161)Online publication date: 1-Aug-2011
  • (2011)The Forensic Disciplines: Some Areas of Actual or Potential ApplicationComputer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation10.1007/978-90-481-8990-8_8(841-989)Online publication date: 24-Oct-2011
  • (2011)Models of Forming an OpinionComputer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation10.1007/978-90-481-8990-8_2(13-128)Online publication date: 24-Oct-2011
  • (2011)F-IDS: A Technique for Simplifying Evidence Collection in Network ForensicsSoftware Engineering and Computer Systems10.1007/978-3-642-22203-0_58(693-701)Online publication date: 2011
  • (2010)An integrated DNA decision support system using grid environment for crime investigation2010 International Symposium on Information Technology10.1109/ITSIM.2010.5561529(636-641)Online publication date: Jun-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media