Crime data mining: A general framework and some examples

被引:240
作者
Chen, HC [1 ]
Chung, WY
Xu, JJ
Wang, G
Qin, Y
Chau, M
机构
[1] Univ Arizona, Eller Coll Business & Adm, Tucson, AZ 85721 USA
[2] Univ Arizona, Dept Management Informat Syst, Tucson, AZ 85721 USA
[3] Univ Hong Kong, Sch Business, Hong Kong, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
D O I
10.1109/MC.2004.1297301
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Concern about national security has increased significantly since the terrorist attacks on 11 September 2001. The CIA, FBI, and other federal agencies are actively collecting domestic and foreign intelligence to prevent future attacks. These efforts have in turn motivated local authorities to more closely monitor criminal activities in their own jurisdictions. A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. For example, complex conspiracies are often difficult to unravel because information on suspects can be geographically diffuse and span long periods of time. Detecting cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. Data mining is a powerful tool that enables criminal investigators who may lack extensive training as data analysts to explore large databases quickly and efficiently.(1) Computers can process thousands of instructions in seconds, saving precious time. In addition, installing and running software often costs less than hiring and training personnel. Computers are also less prone to errors than human investigators, especially those who work long hours. We present a general framework for crime data mining that draws on experience gained with the Coplink project (http://ai.bpa.arizona.edu/coplink), which researchers at the University of Arizona have been conducting in collaboration with the Tucson and Phoenix police departments since 1997.
引用
收藏
页码:50 / +
页数:8
相关论文
共 12 条
[1]  
[Anonymous], P NAT C DIG GOV RES
[2]  
[Anonymous], 1994, SOCIAL NETWORK ANAL
[3]  
Chang WP, 2003, LECT NOTES COMPUT SC, V2665, P379
[4]  
de Vel O, 2001, SIGMOD REC, V30, P55, DOI 10.1145/604264.604272
[5]  
Fayyad U. M., 2002, COMM ACM AUG, P28
[6]  
GRAY A, 1997, P 3 BIANN C INT ASS, P1
[7]  
Han J., 2012, Data Mining, P393, DOI [DOI 10.1016/B978-0-12-381479-1.00009-5, 10.1016/B978-0-12-381479-1.00001-0]
[8]   Using coplink to analyze criminal-justice data [J].
Hauck, RV ;
Atabakhsh, H ;
Ongvasith, P ;
Gupta, H ;
Chen, HC .
COMPUTER, 2002, 35 (03) :30-+
[9]  
Kargupta H, 2003, LECT NOTES COMPUT SC, V2665, P336
[10]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132