Providing a Framework for Assessing and Evaluating Network Data Studies in the Fight Against Social Anomalies

Document Type : Research Paper

Authors

1 Ph.D in Knowledge and Information Science, Department of Knowledge and Information Science, University of Tehran, Tehran, Iran.

2 Associate professor, Department of Knowledge and Information Science, Shahed University, Tehran, Iran.

3 Assistant professor, Department of Knowledge and Information Science, University of Tehran, Tehran, Iran.

Abstract

purpose: In today's world, every society is struggling with the challenges of crime and its control. Committing a crime represents one of the most significant social harms, necessitating the involvement of police and judicial institutions for effective management. Assessing, evaluating, and identifying crime patterns, as well as detecting and preventing criminal activities, have been the focal points of judicial and law enforcement agencies since ancient times. Consequently, crime prevention is consistently prioritized over crime detection after it occurs. Various methods have been introduced for crime detection, including a wide range of innovative computer techniques. Data mining is regarded as one of the most effective tools for data and information analysis in the field of crime detection. Many effective parameters are available for analyzing crime through data mining methods. Data mining serves as a valuable tool for examining crime data warehouses, helping to extract hidden knowledge within them. The application of data mining techniques, along with various machine learning methods, can yield significant benefits in identifying, predicting, and preventing crime in any society. Diagnosing, predicting, and preventing crime through data mining represents a progressive approach supported by statistical methods, psychology, artificial intelligence, criminology, machine learning, and database technologies. Consequently, the primary objective of this research is to establish a framework for analyzing digital network data in the battle against social anomalies, particularly the crime of theft. In this research, materials related to the crime of theft have been categorized into three areas: crime identification, prediction, and prevention. Additionally, the application of data mining methods has been explored within these domains.
Methodology: This research is applied in terms of its purpose and was conducted using documentary methods, content analysis, and data mining. The statistical population for this study consists of information related to theft crimes recorded by law enforcement and police organizations in 2019. Initially, the relevant data were collected in the form of documents and subsequently selected using the content analysis method to facilitate further analysis. Patterns of theft crimes were identified based on various factors, including the type of crime (such as home and car theft), entry location, entry method, search techniques, and residential area. This study utilized digital network data analysis tools and methods, specifically data mining, for classification and validation purposes. Additionally, clustering techniques, such as k-means, were employed to identify different forms of theft crimes. Classification algorithms, including neural networks, Bayesian rules, Bayesian navigation, and support vector machines, were used to predict theft crimes. The primary data analysis tool utilized in this research was Excel software.
Findings: The findings indicate that the season in which a theft occurs positively correlates with the month of the crime. Additionally, the method used to enter the crime scene shows a positive correlation with the method used to exit the scene. Furthermore, the accuracy of the Bayesian model in predicting and detecting the type of crime is 0.412. The model demonstrates the highest prediction accuracy for home thefts at 73%, while the lowest prediction accuracy for thefts from private locations is 27%. The results are expressed as a percentage. Additionally, the accuracy of each technique employed has been compared. The ROC findings indicate that the accuracy of the Bayesian methods and the Multilayer Perceptron (MLP) neural network, as well as the support vector machine, in predicting theft from public places is higher than for other types of theft. Conversely, in predicting home theft, these methods demonstrate lower accuracy compared to other thefts. Furthermore, the prediction accuracy of the support vector machine method, at approximately 91%, surpasses that of Bayesian methods (around 73%) and neural networks (about 90%) in predicting theft from public places. Moreover, the ROC chart for the support vector machine indicates that it is 7% less accurate in predicting pickpocketing compared to other thefts.
Conclusion: The results indicated that the Bayesian rules method is the most effective for detecting and predicting patterns of theft crimes. It demonstrates higher accuracy compared to other methods. Specifically, for predicting thefts from public places, the support vector method is recommended. As a result of the findings from data mining techniques, it is recommended that police and judicial organizations utilize a combination of data mining and artificial intelligence methods to enhance the detection and identification of thieves, particularly those with varying criminal histories related to theft. This approach aims to improve the accuracy of the information obtained about these individuals. Furthermore, based on the data mining techniques discussed in this research, an expert intelligent system can be developed to predict the likelihood of future criminal attempts by offenders.

Keywords


احمدوند، ع.، و آخوندزاده، ا. (1389). چارچوب کاربردی تکنیک‏های داده‏کاوی در مدل‌سازی جرائم. توسعه سازمانی پلیس، 7(30)، 11-22. http://pod.jrl.police.ir/article_9364.html
اسکندری، ح.، علیزاده، س.، و  کاظمی، ‌پ. (1390). کاربرد داده‌کاوی در شناسایی و کشف الگوهای پنهان جرم سرقت. پژوهش‌نامه نظم و امنیت انتظامی،  4(16)، 35-56.‎ http://osra.jrl.police.ir/article_9745.html
حاجی ده آبادی، ا.، و عسگری م. (1398). ترک فعل در جنایات غیرعمدی: از معیار تا مصداق. فصلنامه پژوهش حقوق کیفری، 8(29)، 233-259.‎ https://doi.org/10.22054/jclr.2019.37121.1790
خلیلی، م.، و نوایی فیجانی، آ. (1395). کاربرد ابر داده در مبارزه با جرم و جنایت [مقاله کنفرانسی]. همایش ملی پژوهش‌های نوین در علوم و فناوری.https://civilica.com/doc/531474/certificate/print
کیوان‏پور، م.، جاویده، م.، پهلوان زاده، ا.، و ابراهیمی، م. (1388). تحلیل و کشف جرم با بهره‌گیری از  روش‌های داده‏کاوی [مقاله کنفرانسی]، دومین کنفرانس  داده‏کاوی ایران، دانشگاه امیرکبیر.
کاظمی، پ.، و حسین‏پور، ج. (1388). کاربرد داده‏کاوی در سازمان‏های پلیسی و قضایی به‌منظور شناسایی الگوهای جرم و کشف جرائم. فصلنامه علمی کارآگاه، 3(8)،  32-63. http://det.jrl.police.ir/article_10620.html
Agarwal, J., Nagpal, R., & Sehgal, R. (2014). Reliability Of Component Based Software System Using Soft Computing Techniques – A Review. International Journal of Computer Applications, 94(2), 12-16.
Ahmadvand, A., & Akhonzadeh, E. (2011). Applied Framework for Data Mining Techniques in Crime Modeling. Police Organizational Development, 7(30), 11-22.
      http://pod.jrl.police.ir/article_9364.html?lang=en  [In Persian].
Çorapçıoğlu, A., & Erdoğan, S. (2004). A cross-sectional study on expression of anger and factors associated with criminal recidivism in prisoners with prior offences. Forensic science international, 140(2-3), 167-174. https://doi.org/10.1016/j.forsciint.2003.11.019
D'Alessio, S. J., & Stolzenberg, L. (2010). Do Cities Influence Co-Offending? Journal of Criminal Justice, 38(4), 711–719. https://doi.org/10.1016/j.jcrimjus.2010.04.045
Deadman, D. (2003). Forecasting Residential Burglary. International Journal of Forecasting, 19(4), 567–578. https://doi.org/10.1016/S0169-2070(03)00091-8
Eskandari, E., Alizadeh, S., & Kazemi, P. (2011). Crime analysis using data mining techniques. Quarterly of order and security guards, 4(16), 35-56.
      http://osra.jrl.police.ir/article_9745.html?lang=en [In Persian].
Hajidehabadi, A., & Asgari Morovat, A. (2020). Manslaughter by Omission: from Criterion to Instance. Journal of Criminal Law Research, 8(29), 233-259.
      https://doi.org/10.22054/jclr.2019.37121.1790 [In Persian].
Karlis, D., & Meligkotsidou, L. (2007). Finite Mixtures of Multivariate Poisson Distributions with Application. Journal of Statistical Planning and Inference, 137(6), 1942– 1960. https://doi.org/10.1016/j.jspi.2006.07.001
Kazemi, P., & Hosseinpour, J. (2008). The use of data mining in police and judicial organizations to identify crime patterns and detect crimes. Detective Journal, 3(8) 32-63. http://det.jrl.police.ir/article_10620.html  [In Persian].
Keyvanpour, M., Javideh, M., Pahlavanzadh, A., & Ebrahimi, M. (2008). Analysis and detection of crime using data mining methods [Conference presentation]. The second data mining conference of Iran, Amir Kabir University. https://civilica.com/doc/70469 [In Persian].
Khalili, M., & Navaei Fijani, A. (2016). Application of big data to fight crime [Conference presentation]. National conference of new researches in science and technology. https://civilica.com/doc/531474/certificate/print  [In Persian].
Li, S. T., Kuo, S. C., & Tsai, F. C. (2010). An intelligent decision-support model using FSOM and rule extraction for crime prevention. Expert Systems with Applications37(10), 7108-7119. https://doi.org/10.1016/j.eswa.2010.03.004
Liu, H., & Brown, D. E. (2003). Criminal incident prediction using a point-pattern-based density model. International journal of forecasting, 19(4), 603-622.
Lopez-Rojas, E. A., & Axelsson, S. (2012). Multi agent based simulation (mabs) of financial transactions for anti money laundering (aml) [Conference Paper}. In Nordic Conference on Secure IT Systems. Blekinge Institute of Technology.
Malathi, A., & Santhosh, B. (2011). An Enhanced Algorithm to Predict a Future Crime using Data Mining. International Journal of Computer Applications, 21,
Mande, U., Srinivas, Y., & Murthy, J. V. R. (2012). An intelligent analysis of crime data using data mining & auto correlation models. Int J Eng Res Appl (IJERA)2(4), 149-153. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=96b814e73cb7140de589555a53f26d0eafdc7a7e
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A General Theory of Crime and Computer Crime: An Empirical Test. Journal Criminal Justice, 38(4), 767–772.
Murtagh, F., Ganz, A., & McKie, S. (2009). The Structure of Narrative: The Case of Film Scripts, Pattern Recognition, 42, 302 – 312. https://doi.org/10.1016/j.patcog.2008.05.026
Oatley, G. C., & Ewart, B. W. (2003). Crimes Analysis Software: ‘Pins in Maps’, Clustering and Bayes Net Prediction. Expert Systems with Applications, 25(4), 569–588.
Phua, C., Lee, V., Smith, K., & Gayler, R. (2010). A comprehensive survey of data mining-based fraud detection research. ArXiv preprint arXiv:1009.6119.
Xue, Y., & Brown, D. E. (2006). Spatial Analysis with Preference Specification of Latent Decision Makers for Criminal Event Prediction. Decision Support Systems, 41(3), 560– 573. https://doi.org/10.1016/j.dss.2004.06.007