ABSTRACT
Law enforcement and intelligence agencies have long realized that analysis of co-offending networks, networks of offenders who have committed crimes together, is invaluable for crime investigation, crime reduction and prevention. Investigating crime can be a challenging and difficult task, especially in cases with many potential suspects and inconsistent witness accounts or inconsistencies between witness accounts and physical evidence. We present here a novel approach to crime suspect recommendation based on partial knowledge of offenders involved in a crime incident and a known co-offending network. To solve this problem, we propose a random walk based method for recommending the top-K potential suspects. By evaluating the proposed method on a large crime dataset for the Province of British Columbia, Canada, we show experimentally that this method outperforms baseline random walk and association rule-based methods. Additionally, results obtained for public domain data from experiments for co-author recommendation on a DBLP co-authorship network are consistent with those on the crime dataset. Compared to the crime dataset, the performance of all competitors is much better on the DBLP dataset, confirming that crime suspect recommendation is an inherently harder task.
- A. J. Reiss. Co-offending and criminal careers. Crime and Justice: A Review of Research, 1988.Google Scholar
- A. J. Reiss, and D. P. Farrington, Advancing knowledge about co-offending: Results from a prospective longitudinal survey of London males. Journal of Criminal Law and Criminology 82 (2), 1991.Google ScholarCross Ref
- R. V. Hauck, H. Atabakhsh, P. Ongvasith, H. Gupta and H. Chen. Using Coplink to analyze criminal-justice data. IEEE Computer, Vol. 35, No. 3: 3037, 2002. Google ScholarDigital Library
- J. M. McGloin et al. Investigating the stability of co-offending and co-offenders among a sample of youthful offenders. Criminology 46 (1), 2008.Google Scholar
- P. L. Brantingham, M. Ester, R. Frank, U. Glässer and M. A. Tayebi. Co-offending Network Mining. In Uffe Kock Wiil (Ed.), Counterterrorism and Open Source Intelligence, Lecture Notes in Social Networks, Vol. 2, Springer, 2011.Google Scholar
- J. J. Xu and H. Chen. CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems, Vol 23 No 2. pp. 201--226, 2005. Google ScholarDigital Library
- M. A. Tayebi, L. Bekker, U. Glässer and V. Dabbaghian. Locating Central Actors in Co-offending Networks. In Proc. ASONAM Conference, 2011. Google ScholarDigital Library
- K. Baumgartner, S. Ferrari and G. Palermo. Constructing Bayesian networks for criminal profiling from limited data. Knowledge-Based Systems, 2008. Google ScholarDigital Library
- S. Ferrari, K. C. Baumgartner, G. Palermo, R. Bruzzone and M. Strano. Network Models of Criminal Behavior: Comparing Bayesian and Neural Networks for Decision Support in Criminal Investigations. IEEE Control Systems Magazine, 2008.Google Scholar
- A. Block. East SideWest Side: Organizing Crime in New York City. 19301950, 2nd ed., New Brunswick, NJ: Transaction 1994.Google Scholar
- J. J. Xu and H. Chen Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems, 2004. Google ScholarDigital Library
- Z. Xia. Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network. Knowledge-Based Systems, 2008. Google ScholarDigital Library
- M. Jamali and M. Ester. A Matrix Factorization Technique with Trust Propagation for Recommendation in Social Networks. In Proc. third ACM conference on Recommender systems, 2010. Google ScholarDigital Library
- M. Jamali and M. Ester. TrustWalker: a random walk model for combining trust-based and item-based recommendation. In Proc. 15th ACM SIGKDD Conference, 2009. Google ScholarDigital Library
- M. Jamali and M. Ester. Using a trust network to improve top-N recommendation. In Proc. third ACM conference on Recommender systems, 2009. Google ScholarDigital Library
- M. N. Smith and P. J. H. King. Incrementally Visualising Criminal Networks. In Proc. Sixth International Conference on Information Visualisation, 2002.Google Scholar
- S. Kaza , and H. Chen. Effect of inventor status on intra organizational innovation evolution. In Proc. Hawaii International Conference on System Sciences, 2009. Google ScholarDigital Library
- J. J. Xu, and H. Chen. Untangling Criminal Networks: A Case Study. In Proc. ISI Conference, 2003. Google ScholarDigital Library
- R. Agrawal, T. Imielinski and A. Swami. Mining association rules between sets of items in large databases. In Proc. of the ACM SIGMOD Conf. on Management of Data, May 1993. Google ScholarDigital Library
- P. Hajek, I. Havel and M. Chytil. The guha method of automatic hypotheses determination. Computing, 1:293--308, 1966.Google ScholarCross Ref
- R. Agrawal and R. Srikant, Fast algorithms for mining association rules. In Proc. 20th VLDB Conference, 1994. Google ScholarDigital Library
- J. Han, J. Pei, Y. Yin and R. Mao. Mining frequent patterns without candidate generation. Data Mining and Knowledge Discovery, 2004. Google ScholarDigital Library
- X. Fu, J. Budzik, and K. J. Hammond. Mining navigation history for recommendation. In Proc. 2000 Conference on Intelligent User Interfaces, 2000. Google ScholarDigital Library
- W. Lin , S. A. Alvarez and C. Ruiz. Efficient Adaptive-Support Association Rule Mining for Recommender Systems. Data Mining and Knowledge Discovery, 2002. Google ScholarDigital Library
- R. Boba, Crime analysis and crime mapping. Thousand Oaks, Sage Publication Inc., 2005.Google Scholar
- D. Mcandrew. The structural analysis of criminal networks. In the Social Psychology of Crime: Groups, Teams, and Networks. In D. Canter and L. Alison (Ed.), Dartmouth Publishing, Aldershot, 1999.Google Scholar
- P. Lazarsfeld and R. Merton. Freedom and Control in Modern Society. In M. Berger, T. Abel and C. Page (Ed.), Van Nostrand, New York, 1954.Google Scholar
- M. McPherson, L. Smith-Lovin and J. M. Cook. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 2001.Google ScholarCross Ref
Index Terms
- CrimeWalker: a recommendation model for suspect investigation
Recommendations
Understanding the link between social and spatial distance in the crime world
SIGSPATIAL '12: Proceedings of the 20th International Conference on Advances in Geographic Information SystemsIndividuals frequently have routine daily activities that require commuting between several places, such as their home, work, shopping centres and recreational facilities. According to Crime Pattern Theory, offenders most likely commit opportunistic ...
First Investigation into Developing Electronic Commerce in Agriculture of China: The Case of Jiaxing City, Zhejiang Province
ICEE '12: Proceedings of the 2012 3rd International Conference on E-Business and E-Government - Volume 05This paper begins by examining the review of the Electronic Commerce Development in Agriculture of the Developed Countries, to evaluate the necessary and feasibility of developing E-Commerce in Agriculture sector in Jiaxing city, Zhejiang Province of ...
Using parliamentary open data to improve participation
ICEGOV '13: Proceedings of the 7th International Conference on Theory and Practice of Electronic GovernanceFor a lay-citizen, it is difficult to keep up to date with all the bills that are being discussed and will be voted at each level of the law making bodies of the government (e.g. a parliament, the congress, the senate). Currently, some citizens are very ...
Comments