Advertisement

Abstract

Our central aim is the development of decision support systems based on appropriate technology for such purposes as profiling single and series of crimes or offenders, and matching and predicting crimes.

This paper presents research in this area for the high-volume crime of Burglary Dwelling House, with examples taken from the authors’ own work a United Kingdom police force.

Discussion and experimentation include exploratory techniques from spatial statistics and forensic psychology. The crime matching techniques used are case-based reasoning, logic programming and ontologies, and naïve Bayes augmented with spatio-temporal features. The crime prediction techniques are survival analysis and Bayesian networks.

Keywords

Bayesian Network Geographical Information System Logic Programming Bayesian Belief Network Forensic Psychology 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hirschfield, A., 2001. Decision support in crime prevention: data analysis, policy evaluation and GIS. In: Mapping and Analysing Crime Data — Lessons from Research and Practice, A., Hirschfield & K, Bowers (Eds.). Taylor and Francis, 2001, pp. 237–269.Google Scholar
  2. 2.
    Oatley, G.C., & Ewart, B.W., 2003. Crimes Analysis Software: Tins in Maps’, Clustering and Bayes Net Prediction. Expert Systems with Applications 25(4) Nov 2003 569–588CrossRefGoogle Scholar
  3. 3.
    Soomro, T.R., Naqvi, M.,R. & Zheng, K., 2001. GIS: A Weapon to Combat the Crime. In: Proceedings of SCI 2001/ISAS 2001 (International Conference on Information Systems, Analysis and Synthesis): Part I.Google Scholar
  4. 4.
    COPS 2004. Community Oriented Policing Services home page. http://www.cops.usdoj.gov. Online, accessed 2004
  5. 5.
    Bishop. 1995. Neural Networks for Pattern Recognition, Clarendon Press, Oxford.Google Scholar
  6. 6.
    Pease, K., 1998. Repeat Victimisation: Taking Stock. Police Research Group. Crime Detection and Prevention Series, Paper 90. London, Crown CopyrightGoogle Scholar
  7. 7.
    Levine, N., 2002. CrimeStat: A Spatial Statistics Program for the Analysis of Crime Incident Locations (v 2.0). Ned Levine & Associates, Houston, TX, and the National Institute of Justice, Washington, DC. May 2002.Google Scholar
  8. 8.
    Ewart, B.W., Inglis P., Wilbert, M.N. & Hill, I., 1997. An analysis of time intervals of victimisation. Forensic Update 50, pp 4–9, 1997Google Scholar
  9. 9.
    Green, E. J., Booth, C. E., & Biderman, M. D. 1976. Cluster analysis of burglary M/O’s. Journal of Police Science and Administration, 4, 382–388.Google Scholar
  10. 10.
    Pease, K., 2001. What to do about it? Lets turn off our minds and GIS. In: Mapping and Analysing Crime Data — Lessons from Research and Practice, A., Hirschfield & K, Bowers (Eds.). Taylor and Francis, London and New York, 2001, pp. 225–237.Google Scholar
  11. 11.
    Ewart, B.W., Oatley, G.C., & Burn K., 2004. Matching Crimes Using Burglars’ Modus Operandi: A Test of Three Models. Forthcoming.Google Scholar
  12. 12.
    Oatley, G.C., 2004. Case-based reasoning (chapter). In: D., Addison & J., Maclntyre (Eds.), Intelligent Computing Techniques; A Review, Springer-Verlag, ISBN: 1-85233-585-8Google Scholar
  13. 13.
    Gupta, K. M., & Montazemi, A. R., 1997. Empirical Evaluation of Retrieval in Case-Based Reasoning Systems Using Modified Cosine Matching Function. Transactions on Systems, Man, and Cybernetics — Part A: Systems and Humans, 27(5), pp. 601–612.CrossRefGoogle Scholar
  14. 14.
    Ratcliffe J.H., 2002. Aoristic signatures and spatio-temporal analysis of high volume crime patterns. J. Quantitative Criminology Vol. 18, No. 1, MarchGoogle Scholar
  15. 15.
    Allen J.F., 1983. Maintaining Knowledge about Temporal Intervals. Communication of ACM Vol.26, 123–154, (1983).CrossRefGoogle Scholar
  16. 16.
    Jaere, M.D., Aamodt A., & Skalle, P., 2002. Representing temporal knowledge for case-based prediction. In: S., Craw & A., Preece (Eds.) Proceedings of ECCBR 2002, Springer Verlag, LNAI 2416, pp. 174–188Google Scholar
  17. 17.
    Yokota, K., & Watanabe, S., 2002. Computer based retrieval of suspects using similarity of modus operandi. International Journal of Police Science and Management 2002 Vol.4, Pt. 1, pp. 5–15.Google Scholar
  18. 18.
    Carlin, J.B. and Louis, T.A. 2000. Bayes and Empirical Bayes Methods for Data Analysis (2nd edition), New York: Chapman and Hall.zbMATHGoogle Scholar
  19. 19.
    Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., & Chau, M., 2004. Crime data mining: a general framework and some examples. IEEE Computer April 2004, Vol 37, No. 4Google Scholar
  20. 20.
    Leary, R.M. 2003. New Intelligence of the 21st Century: How Smart is it? Forensic Technology News November: 6.Google Scholar
  21. 21.
    Noy, N.F., Grosso, W. & Musen, M.A., 2000. Knowledge-Acquisition Interfaces for Domain Experts: An Empirical Evaluation of Protege-2000. Twelfth International Conference on Software Engineering and Knowledge Engineering (SEKE2000), Chicago, IL.Google Scholar
  22. 22.
    Mooney, R.J., Melville, P., Rupert, Tang, R.T, Shavlik, J., Dutra, I., Page, D., & Costa, V.S., 2004. Inductive Logic Programming for Link Discovery. In: H. Kargupta, A., Joshi, K., Sivajumar, & Y., Yesha (Eds.), Data Mining: Next Generation Challenges and Future Directions, AAAI Press, 2004Google Scholar
  23. 23.
    Oatley, G.C., MacIntyre, J., Ewart, B.W., & Mugambi, E., 2002. SMART Software for Decision Makers KDD Experience. Knowledge Based Systems 15 (2002) 323–333.CrossRefGoogle Scholar
  24. 24.
    Ewart, B.W., & Oatley, G.C., 2003. Applying the concept of revictimization: using Burglars’ behaviour to predict houses at risk of future victimization. International Journal of Police Science and Management 5(2) 2003Google Scholar
  25. 25.
    Polvi, N., Looman, T., Humphries, C., & Pease, K., 1991. The Time Course of Repeat Burglary Victimization. British Journal of Criminology 31(4) 411–414Google Scholar
  26. 26.
    Pearl, J., 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers, Inc, 1988.Google Scholar
  27. 27.
    Zeleznikow, J., 2002. Designing decision support systems for crime investigation. In: Proceedings. of the Fifth International Conference on Forensic Statistics (ICFS5), Isola di San Servolo, Venice, Italy, August 30–September 2, 2002Google Scholar

Copyright information

© Springer-Verlag London Limited 2005

Authors and Affiliations

  • G. C. Oatley
    • 1
  • J. Zeleznikow
    • 2
  • B. W. Ewart
    • 3
  1. 1.School of Computing and TechnologyUniversity of SunderlandUK
  2. 2.School of Information SystemsVictoria UniversityAustralia
  3. 3.Division of PsychologyUniversity of SunderlandUK

Personalised recommendations