Smart Policing for a Smart World Opportunities, Challenges and Way Forward

  • Muhammad Mudassar YaminEmail author
  • Andrii Shalaginov
  • Basel Katt
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1129)


Our world is getting evolved to smart world day by day. This smart world is being developed to make people life easier through the data generated by the smart devices. Data is the fuel that powers the smart world evolution, however, making things smart have its consequences. Smart devices are inherently vulnerable to cyber attacks, that’s why we are observing an increase in crimes related to cyber space comparing to physical space. To address these crimes, police of the future need to evolve as well and data will be at the center stage of this evolution. In this contribution we are proposing a data centric policing proposal for smart cities. We analyzed current and developing technologies and the opportunities they offered for smart policing for a smart world.


Smart cities Police IOT Crime Machine Learning 



The authors are grateful for the support by the Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology (NTNU). The researchers would like to acknowledge the NTNU team participation in the Interpol Thinkathon 2018 competition: Danny Lopez Murillo, Kyle Porter and Ivan Talwar, who equally contributed in development of the winning idea. The researchers would also like to thank the valuable feedback from our coaches Basel Katt, Jens-Petter Sandvik, Katrin Frank and Stewart James Kolwaski, without which this work would not be possible.


  1. 1.
    Ab Rahman, N.H., Glisson, W.B., Yang, Y., Choo, K.-K.R.: Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3(1), 50–59 (2016)CrossRefGoogle Scholar
  2. 2.
    Abu-Matar, M., Davies, J.: Data driven reference architecture for smart city ecosystems. In: 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 1–7. IEEE (2017)Google Scholar
  3. 3.
    Agrawal, V.: Information security risk management practices: community-based knowledge sharing (2018)Google Scholar
  4. 4.
    Alexy, R.: A theory of legal argumentation: the theory of rational discourse as theory of legal justification (2009)Google Scholar
  5. 5.
    Anthopoulos, L., Giannakidis, G.: Policy making in smart cities: standardizing city’s energy efficiency with task-based modelling. J. ICT Stand. 4(2), 111–146 (2016)Google Scholar
  6. 6.
    Bačić, Ž., Jogun, T., Majić, I.: Integrated sensor systems for smart cities. Tehnički Vjesn. 25(1), 277–284 (2018)Google Scholar
  7. 7.
    Bartoli, A., Hernández-Serrano, J., Soriano, M., Dohler, M., Kountouris, A., Barthel, D.: Security and privacy in your smart city. In: Proceedings of the Barcelona Smart Cities Congress, vol. 292 (2011)Google Scholar
  8. 8.
  9. 9.
    Bryson, J., Winfield, A.: Standardizing ethical design for artificial intelligence and autonomous systems. Computer 50(5), 116–119 (2017)CrossRefGoogle Scholar
  10. 10.
    Castanedo, F.: A review of data fusion techniques. Sci. World J. 2013 (2013) Google Scholar
  11. 11.
    Cvijikj, I.P., Kadar, C., Ivan, B., Te, Y.-F.: Towards a crowdsourcing approach for crime prevention. In: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, pp. 1367–1372. ACM (2015)Google Scholar
  12. 12.
    Dawid, I.: As cities become safer crime decamps for the suburbs. Planetizen.
  13. 13.
    Efthymiopoulos, M.-P.: Cyber-security in smart cities: the case of Dubai. J. Innov. Entrep. 5(1), 11 (2016)CrossRefGoogle Scholar
  14. 14.
    Eggers, W.D., Bill, R.S.: Deloitte, Center for Government Insights, and Deloitte Consulting LLP. Building the smart city with data, digital, and design—deloitte us, January 2018Google Scholar
  15. 15.
    Elyas, M., Ahmad, A., Maynard, S.B., Lonie, A.: Digital forensic readiness: expert perspectives on a theoretical framework. Comput. Secur. 52, 70–89 (2015)CrossRefGoogle Scholar
  16. 16.
  17. 17.
    Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based on IoT. Procedia Comput. Sci. 52, 1089–1094 (2015)CrossRefGoogle Scholar
  18. 18.
    GDPREU. GDPR - personal data.
  19. 19.
    Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary version, vol. 78 (1998)Google Scholar
  20. 20.
    Goodman, M.: Future crimes: everything is connected, everyone is vulnerable and what we can do about it. Anchor (2015)Google Scholar
  21. 21.
    Gottinger, H.W., Weimann, H.-P.: Intelligent decision support systems. In: Methodology, Implementation and Applications of Decision Support Systems, pp. 1–27. Springer (1991)Google Scholar
  22. 22.
    Hollywood, J.S., Winkelman, Z.: Improving information-sharing across law enforcement: why can’t we know? National Criminal Justice Reference Service (2015)Google Scholar
  23. 23.
    Kelkboom, E.J.C., Zhou, X., Breebaart, J., Veldhuis, R.N.J., Busch, C.: Multi-algorithm fusion with template protection. In: 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, pp. 1–8. IEEE (2009)Google Scholar
  24. 24.
    Kovacevic, A.: Police are using big data to predict future crime rates, November 2018Google Scholar
  25. 25.
    Kowalski, S.: The SBC model as a conceptual framework for reporting it crimes. In: Proceedings of the IFIP TC9/WG9. 6 Working Conference on Security and Control of Information Technology in Society on Board M/S Illich and Ashore, pp. 207–226. North-Holland Publishing Co. (1993)Google Scholar
  26. 26.
    Lim, C., Kim, K.-J., Maglio, P.P.: Smart cities with big data: reference models, challenges, and considerations. Cities 82, 86–99 (2018)CrossRefGoogle Scholar
  27. 27.
    McWhirter, C., Fields, G.: Crime migrates to suburbs, December 2012Google Scholar
  28. 28.
    Michie, D., Spiegelhalter, D.J., Taylor, C.C., et al.: Machine learning. Neural and Statistical Classification, vol. 13 (1994)Google Scholar
  29. 29.
    Minelli, M.: Fully homomorphic encryption for machine learning. Ph.D. thesis, PSL University (2018)Google Scholar
  30. 30.
    NIST. Cybersecurity framework.
  31. 31.
    Østby, G., Yamin, M.M., Al Sabbagh, B.: sieMS in crisis management: detection, escalation and presentation–a work in progress. In: 5th InterdisciPlinary Cyber Research Conference 2019, p. 38 (2019)Google Scholar
  32. 32.
    PredPol. Machine learning and policing.
  33. 33.
    Rotuna, C., Cîrnu, C.E., Smada, D., Gheorghiţă, A.: Smart city applications built on big data technologies and secure IoT. Ecoforum J. 6(3) (2017)Google Scholar
  34. 34.
    Rowlingson, R.: A ten step process for forensic readiness. Int. J. Digit. Evid. 2(3), 1–28 (2004)Google Scholar
  35. 35.
    Shahriari, B., Swersky, K., Wang, Z., Adams, R.P., De Freitas, N.: Taking the human out of the loop: a review of Bayesian optimization. Proc. IEEE 104(1), 148–175 (2016)CrossRefGoogle Scholar
  36. 36.
    Shalaginov, A.: Advancing neuro-fuzzy algorithm for automated classification in largescale forensic and cybercrime investigations: adaptive machine learning for big data forensic. Ph.D. thesis, Norwegian University of Science and Technology (2018)Google Scholar
  37. 37.
    Shapiro, A.: Reform predictive policing. Nat. News 541(7638), 458 (2017)CrossRefGoogle Scholar
  38. 38.
    Sivarajah, U., Kamal, M.M., Irani, Z., Weerakkody, V.: Critical analysis of big data challenges and analytical methods. J. Bus. Res. 70, 263–286 (2017)CrossRefGoogle Scholar
  39. 39.
    Trædal, T.J.: Norsk forskning på framtidens politi til topps i interpol, October 2018Google Scholar
  40. 40.
    Ullah, M., Alaya Cheikh, F.: A directed sparse graphical model for multi-target tracking. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1816–1823 (2018)Google Scholar
  41. 41.
    Ullah, M., Cheikh, F.A., Imran, A.S.: Hog based real-time multi-target tracking in Bayesian framework. In: 2016 13th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 416–422. IEEE (2016)Google Scholar
  42. 42.
  43. 43.
    Wang, T., Rudin, C., Wagner, D., Sevieri, R.: Learning to detect patterns of crime. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 515–530. Springer (2013)Google Scholar
  44. 44.
    Yamin, M.M., Katt, B: Inefficiencies in cyber-security exercises life-cycle: a position paper. In: AAAI Fall Symposium: ALEC, pp. 41–43 (2018)Google Scholar
  45. 45.
    Yamin, M.M., Katt, B.: A survey of automated information exchange mechanisms among certs. In: CERC, pp. 311–322 (2019)Google Scholar
  46. 46.
    Yamin, M.M., Katt, B., Torseth, E., Gkioulos, V., Kowalski, S.J.: Make it and break it: an IoT smart home testbed case study. In: Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control, p. 26. ACM (2018)Google Scholar
  47. 47.
    Yamin, M.M., Katt, B., Kianpour, M.: Cyber weapons storage mechanisms. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 354–367. Springer (2019)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Muhammad Mudassar Yamin
    • 1
    Email author
  • Andrii Shalaginov
    • 1
  • Basel Katt
    • 1
  1. 1.Department of Information Security and Communication TechnologyNorwegian University of Science and TechnologyGjøvikNorway

Personalised recommendations