Abstract
Online Social Networks (OSNs) have fundamentally and permanently altered the arena of digital and classical crime. Recently, law enforcement agencies (LEAs) have been using OSNs as a data source to collect Open Source Intelligence for fighting and preventing crime. However, most existing technological developments for LEAs to fight and prevent crime rely on conventional database technology, which poses problems. As social network usage is increasing rapidly, storing and querying data for information retrieval is critical because of the characteristics of social networks, such as unstructured nature, high volumes, velocity, and data interconnectivity. This paper presents a knowledge graph-based framework, an outline of a framework designed to support crime investigators solve and prevent crime, from data collection to inferring digital evidence admissible in court. The main component of the proposed framework is a hybrid ontology linked to a graph database, which provides LEAs with the possibility to process unstructured data and identify hidden patterns and relationships in the interconnected data of OSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdalla, A., Yayilgan, S.Y.: A review of using online social networks for investigative activities. In: Meiselwitz, G. (ed.) SCSM 2014. LNCS, vol. 8531, pp. 3–12. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07632-4_1
Ali, M.M., Mohammed, K.M., Rajamani, L.: Framework for surveillance of instant messages in instant messengers and social networking sites using data mining and ontology. In: Proceedings of the 2014 IEEE Students Technology Symposium (2014)
Almaatouq, A., et al.: If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int. J. Inf. Secur. 15, 1–17 (2016)
Almanie, T., Mirza, R., Lor, E.: Crime prediction based on crime types and using spatial and temporal criminal hotspots. Int. J. Data Min. Knowl. Manag. Process 5(4), 01–19 (2015)
Alsubaiee, S., Carey, M.J., Li, C.: LSM-based storage and indexing: an old idea with timely benefits. In: ACM Workshop on Managing and Mining Enriched Geo-Spatial Data - GeoRich 2015, pp. 1–6 (2015)
Appel, A.P., Moyano, L.G.: Link and graph mining in the big data era. In: Zomaya, A., Sakr, S. (eds.) Handbook of Big Data Technologies, pp. 583–616. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-49340-4_17
Arshad, H., Jantan, A., Hoon, G., Butt, A.: A multilayered semantic framework for integrated forensic acquisition on social media. Digit. Invest. 29, 147–158 (2019)
Breslin, J., Bojars, U., Passant, A., Fernandez, S., Decker, S.: SIOC: content exchange and semantic interoperability between social networks. In: W3C Workshop on the Future of Social Networking, pp. 15–16 (2009)
Brusa, G., Caliusco, M.L., Chiotti, O.: A process for building a domain ontology: an experience in developing a government budgetary ontology. In: 2nd Australasian Workshop on Advances in Ontologies, Hobart, TAS, Australia, 72, pp. 7–15 (2006)
Burnap, P., et al.: Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Soc. Netw. Anal. Min. 4, 206 (2014)
Caviglione, L., Wendzel, S., Mazurczyk, W.: The future of digital forensics: challenges and the road ahead. In: IEEE Security and Privacy, vol. 6, pp. 12–17 (2017). Investigation, vol. 29, pp. 147–158 (2019)
Chen, H., Schroeder, J., Hauck, R.V., et al.: COPLINK connect: information and knowledge management for law enforcement. Decis. Support Syst. 34(3), 271–285 (2003)
Chen, Y., Chen, Y.: Decomposing DAGs into spanning trees: a new way to compress transitive closures. In: 2011 IEEE 27th International Conference on Data Engineering, Hannover, pp. 1007–1018 (2011)
Cosic, J., Baca, M.: Leveraging DEMF to ensure and represent 5ws&1h in digital forensic domain. Int. J. Comput. Sci. Inf. Secur. 13(2), 7 (2015)
Dean, G., Fahsing, I.A., Gottschalk, P.: Profiling police investigative thinking: a study of police officers in Norway. Int. J. Sociol. Law 34, 221–228 (2006)
Elbattah, M., Roushdy, M., Aref, M., Salem, A.M.: Large-scale ontology storage and query using graph database-oriented approach: the case of freebase, pp. 39–43 (2015)
Ericson, R.V., Haggerty, K.: Policing the Risk Society. University of Toronto Press, Toronto (1997)
Europol. Crime in the age of technology, Europol unclassified - Basic protection level, The Hague 12.10.207, EDOC#924156v7 (2017)
Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Int. J. Hum Comput. Stud. 43(5–6), 907–928 (1995)
Gupta, A., Tyagi, S., Panwar, N., Sachdeva, S., Saxena, U.: NoSQL databases: critical analysis and comparison. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN) (2017)
Hart, G.: The five W’s: an old tool for the new task of task analysis. Tech. Commun. 43(2), 139–145 (1996)
Imran, M., Castillo, C., Diaz, F., Vieweg, S.: Processing social media messages in mass emergency: a survey. ACM Comput. Surv. 47(4), 67 (2015)
Kalemi, E., Yildirim, S., Domnori, E., Elezaj, O.: SMONT: an ontology for crime solving through social media. Int. J. Metadata Semant. Ontol. 12(2/3), 71–81 (2017)
Kastrati, Z., Imran, A.S., Yildirim-Yayilgan, S., Dalipi, F.: Analysis of online social networks posts to investigate suspects using SEMCON. In: Meiselwitz, G. (ed.) SCSM 2015. LNCS, vol. 9182, pp. 148–157. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20367-6_16
Khan, S., Gani, A., Wahab, A.W., Shiraz, M., Ahmad, I.: Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66, 214–235 (2016)
Kokkinos, C.M., Baltzidis, E., Xynogala, D.: Prevalence and personality correlates of Facebook bullying among university undergraduates. Comput. Hum. Behav. 55, 840–850 (2016)
Lim, M., Abdullah, A., Jhanjhi, N., Supramaniam, M.: Hidden link prediction in criminal networks using the deep reinforcement learning technique. Computers 8(1), 8 (2019)
Lomborg, S., Bechmann, A.: Using APIs for data collection on social media. Inf. Soc. 30(4), 256–265 (2014)
Mason, S., et al.: Electronic Evidence, Elsevier (UK) Ltd. (2012). Currie, R.J., Coughlan, S.: Chapter 9, Canada, p. 293 (2012)
Mcdaniel, M., Sloan, E., Nick, W., Mayes, J., Esterline, A.: Ontologies for situation-based crime scene identities. In: SoutheastCon 2017, pp. 1–8 (2017)
Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann, Amsterdam (2003)
Moore, K.: Social media ‘at least half’ of calls passed to front-line police. BBC Radio 4’s Law in Action. (2014). http://www.bbc.co.uk/news/uk-27949674
Murphy, J., Fontecilla, A.: Social media evidence in government investigations and criminal proceedings: a frontier of new legal issues. Rich JL Tech. XIX, 1–30 (2013)
Nouh, M., Nurse, J.R., Goldsmith, M.: Towards designing a multipurpose cybercrime intelligence framework. In: 2016 European Intelligence and Security Informatics Conference (EISIC) (2016)
Noy, N., McGuinness, D.: Ontology development 101: a guide to creating your first ontology. Stanford University (2000)
Oludare, A.I., Jantan, A., Omolara, A.E., Singh, M.M., Anbar, M., Zaaba, Z.F.: Forensic DNA profiling for identifying an individual crime. Int. J. Civil Eng. Technol. 9, 755–765 (2018)
Pramanik, M.I., Zhang, W., Lau, R.Y., Li, C.: A framework for criminal network analysis using big data. In: e-Business Engineering (ICEBE), pp. 17–23 (2016)
Protégé 5.5.0. https://protege.stanford.edu/. Accessed June 2019
Recchia, M.: Court of Appeals Declares Facebook “Private Data” and Other Social Media Subject to Discovery, New York Law Journal. www.law.com
Turnbull, B., Randhawa, S.: Automated event and social network extraction from digital evidence sources with ontological mapping. Digit. Invest. 13, 94–106 (2015)
Weimann, G.: New Terrorism and New Media. Commons Lab of the Woodrow Wilson International Center for Scholars, Washington, DC (2014)
Williams, D.W., Huan, J., Wang, W.: Graph database indexing using structured graph decomposition. In: IEEE 23rd International Conference on Data Engineering, pp. 976–985 (2007)
Acknowledgements
This work was carried out during the tenure of an ERCIM “Alain Bensoussan” Fellowship Programme.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Elezaj, O., Yayilgan, S.Y., Kalemi, E., Wendelberg, L., Abomhara, M., Ahmed, J. (2020). Towards Designing a Knowledge Graph-Based Framework for Investigating and Preventing Crime on Online Social Networks. In: Katsikas, S., Zorkadis, V. (eds) E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age. e-Democracy 2019. Communications in Computer and Information Science, vol 1111. Springer, Cham. https://doi.org/10.1007/978-3-030-37545-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-37545-4_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37544-7
Online ISBN: 978-3-030-37545-4
eBook Packages: Computer ScienceComputer Science (R0)