Abstract
This paper looks at the application of data mining techniques, principally the Self Organising Map, to the recognition of burglary offences committed by an offender who, although part of a small network, appears to work on his own. The aim is to suggest a list of currently undetected crimes that may be attributed to him, improve on the time taken to complete the task manually and the relevancy of the list of crimes. The data was drawn from one year of burglary offences committed within the West Midlands Police area, encoded from text and analysed using techniques contained within the data mining workbench of SPSS/Clementine. The undetected crimes were analysed to produce a list of offences that may be attributed to the offender.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adderley, R.: The use of data mining techniques in active crime fighting. In: International conference on computer, communication and control technologies and the 9th international conference on information systems analysis and synthesis, July 31- August 3, CCCT, Orlando (2003)
Adderley, R.: The use of data mining techniques in operational crime fighting. In: Zurada, J., Kantardzic, M. (eds.) New Generations of Data Mining Applications (2004) (Due to be published in April 2004)
Adderley, R., Musgrove, P.B.: General review of police crime recording and investigation systems. A user’s view. Policing: An International Journal of Police Strategies and Management 24(1), 100–114 (2001)
Adderley, R., Musgrove, P.B.: Modus operandi modelling of group offending; a data mining case study. Accepted by An International Journal of Police Science and Management 5(4), 265–276 (2003)
Adriaans, P., Zantige, D.: Data Mining. Addison-Wesley, Reading (1996)
Brantingham, P.L., Brantingham, P.J.: Notes on the geometry of crime, in Environmental Criminology. Wavelend Press Inc., USA (1991)
Brantingham, P.J., Brantingham, P.L.: Environmental criminology: From theory to urban planning practice. Studies on Crime and Crime Prevention 7(1), 31–60 (1998)
Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., Wirth, R.: CRISP-DM 1.0 Step-by-step data mining guide, USA: SPSS Inc. CRISPWP-0800 (2000)
Clarke, R.V., Felson, M.: Introduction: Criminology, Routine activity, and rational choice. In: Clarke, R.V., Felson, M. (eds.) Routine activity and rational choice: Advances in criminological theory, vol. 5, Transaction Publishers, New Jersey (1993)
Cohen, L.E., Felson, M.: Social change and crime rate trends: A routine activity approach. American Sociological Review 44, 588–608 (1979)
Coles, N.: It’s not what you know – it’s who you know that counts. Analysing serious crime groups as social networks. British Journal of Criminology 44, 580–594 (2001)
Eck, J.E.: A general model of the geography of illicit marketplaces. Crime Prevention Studies 4, 67–94 (1995)
Felson, M.: Routine activities and crime prevention: armchair concepts and practical action. Studies on Crime and Crime Prevention 1, 30–34 (1992)
Kohonen, T.: Self organising formation of topologically correct feature maps. Biological Cybernitics 43(1), 59–69 (1982)
Policing and Reducing Crime Unit, Opportunity makes the thief: Practical theory for crime prevention. Police Research Paper 98, London; Home Office (1998)
Reiss, A.J.: Co-offending and criminal careers. In: Tonry, M., Morris, N. (eds.) Crime and justice: A review of research, vol. 10, pp. 117–170 (1988)
Weiss, S.M., Indurkhya, N.: Predictive data mining: a practical guide. Morgan Kaufman Publishers Inc., San Francisco (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adderley, R. (2004). The Use of Data Mining Techniques in Operational Crime Fighting. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_32
Download citation
DOI: https://doi.org/10.1007/978-3-540-25952-7_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22125-8
Online ISBN: 978-3-540-25952-7
eBook Packages: Springer Book Archive