skip to main content
10.1145/3231830.3231832acmotherconferencesArticle/Chapter ViewAbstractPublication PagesawictConference Proceedingsconference-collections
research-article

CLogVis: Crime Data Analysis and Visualization Tool

Published: 13 November 2017 Publication History

Abstract

Recently, cell phone usage has increased incrementally to huge numbers. Statistics show that a total number of mobile phone users worldwide, from 2013 to 2019, is about 60 percent of the Earth's population. This reflects that the use of cell phones is the traditional way of communicating for most of the people in the world. Making calls and sending text messages are the main methods of communication used with cell phones. The purpose of this work is to present "CLogVis," a crime data analysis and visualization system that helps police departments and security agencies connect criminals and suspects by using their cell phone data. Cell phones contain a huge amount of information that helps agencies and police departments in various ways find relationships and connections between criminals. Moreover, information in cell phones will expand in an incremental way when the suspect uses the Internet through their cell phone. In our system, we will be looking to build relationships and connecttions between criminals by using phonebooks and call history (inbound and outbound) to find the relationships between suspects. Regarding the nature of crime organizations, which are built on networks, graph techniques are used to build connections throughout datasets gathered from arrested suspects, criminals, and Telecommunications Service Provider (TSP) log files.

References

[1]
https://www.statista.com/statistics/274756/forecast-of-mobile-phone-users-in-finland/
[2]
WILLIAM J. BUCHANAN. (2011). The Increasing Challenge of DIGITAL FORENSICS, 10--12. EDINBURGH NAPIER UNIVERSITY, UK.
[3]
D. R. John Arquilla, Networks and Netwars:, www.rang.org, November 2001.
[4]
E. Ferrara, P. De Meo, S. Catanese, and G. Fiumara, "Detecting criminal organizations in mobile phone networks," Expert Systems with Applications, vol. 41, pp. 5733--5750, 2014.
[5]
S. A. Catanese and G. Fiumara, "A visual tool for forensic analysis of mobile phone traffic," in Proceedings of the 2nd ACM workshop on Multimedia in forensics, security, and intelligence, 2010, pp. 71--76.
[6]
Marturana, F., Me, G., Bertè, R., & Tacconi, S. (2011). A quantitative approach to triaging in mobile forensics. Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, 582--588.
[7]
Didimo, W., Liotta, G., & Montecchiani, F. (2014). Network visualization for financial crime detection. Journal of Visual Languages and Computing, 25(4), 433--451.
[8]
S.Z. Li, A.K. Jain (Eds.), Handbook of Face Recognition, Springer, 2005.
[9]
Terrettaz-Zufferey, A. L., Ratle, F., Ribaux, O., Esseiva, P., & Kanevski, M. (2007). Pattern detection in forensic case data using graph theory: Application to heroin cutting agents. Forensic Science International, 167(2--3), 242--246.
[10]
P. Chamikara, D. Yapa, R. Kodituwakku and J. Gunathilake, "SLSecureNet: intelligent policing using data mining techniques,"International Journal of Soft Computing and Engineering, vol. 2, no. 1, pp. 175--180, 2012
[11]
Jayaweera, I., Sajeewa, C., Liyanage, S., Wijewardane, T., Perera, I., & Wijayasiri, A. (2015). Crime analytics: Analysis of crimes through newspaper articles. MERCon 2015 -- Moratuwa
[12]
GrTSPos, G. (2010). Exploratory Comparison of Forensic Evidence Recovery Techniques for a Windows Mobile Smartphone, 8(September), 23--36
[13]
Sgaras, C., Kechadi, M. T., & Le-Khac, N. A. (2015). Forensics acquisition and analysis of instant messaging and VoIP applications. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8915, 188--199
[14]
Sai, D. M., Prasad, N. R. G. K., & Dekka, S. (2015). The Forensic Process Analysis of Mobile Device, 6(5), 4847--4850
[15]
K. Ruohonen, Graph Theory, Tampere University of Technology, 2013
[16]
Terrettaz-Zufferey, A. L., Ratle, F., Ribaux, O., Esseiva, P., & Kanevski, M. (2007). Pattern detection in forensic case data using graph theory: Application to heroin cutting agents. Forensic Science International, 167(2--3), 242--246.

Cited By

View all
  • (2022)Ethical Tensions in Applications of AI for Addressing Human Trafficking: A Human Rights PerspectiveProceedings of the ACM on Human-Computer Interaction10.1145/35551866:CSCW2(1-29)Online publication date: 11-Nov-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AWICT 2017: Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies
November 2017
116 pages
ISBN:9781450353106
DOI:10.1145/3231830
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • CNRS: Centre National De La Rechercue Scientifique

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Crimes Data Analysis
  2. Forensics
  3. Graph Theory

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AWICT 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)2
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Ethical Tensions in Applications of AI for Addressing Human Trafficking: A Human Rights PerspectiveProceedings of the ACM on Human-Computer Interaction10.1145/35551866:CSCW2(1-29)Online publication date: 11-Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media