메뉴 건너뛰기




Volumn 7, Issue 4, 2017, Pages

Big data analytics for security and criminal investigations

Author keywords

[No Author keywords available]

Indexed keywords

CRIME; DATA MINING; INTELLIGENT AGENTS; LAW ENFORCEMENT; LEARNING SYSTEMS;

EID: 85019062819     PISSN: 19424787     EISSN: 19424795     Source Type: Journal    
DOI: 10.1002/widm.1208     Document Type: Review
Times cited : (45)

References (110)
  • 2
    • 20344376408 scopus 로고    scopus 로고
    • Criminal network analysis and visualization
    • Xu J, Chen H. Criminal network analysis and visualization. Commun ACM 2005, 48:100–107.
    • (2005) Commun ACM , vol.48 , pp. 100-107
    • Xu, J.1    Chen, H.2
  • 5
    • 80052897846 scopus 로고    scopus 로고
    • Introduction to social network analysis (SNA) as an investigative tool
    • Van der Hulst RC. Introduction to social network analysis (SNA) as an investigative tool. Trends Organ Crime 2009, 12:101–121.
    • (2009) Trends Organ Crime , vol.12 , pp. 101-121
    • Van der Hulst, R.C.1
  • 9
    • 33846624589 scopus 로고    scopus 로고
    • Decision support systems for police: lessons from the application of data mining techniques to “soft” forensic evidence
    • Oatley G, Ewart B, Zeleznikow J. Decision support systems for police: lessons from the application of data mining techniques to “soft” forensic evidence. Artif Intell Law 2006, 14:35–100.
    • (2006) Artif Intell Law , vol.14 , pp. 35-100
    • Oatley, G.1    Ewart, B.2    Zeleznikow, J.3
  • 10
    • 13844262010 scopus 로고    scopus 로고
    • Link mining: a new data mining challenge
    • Getoor L. Link mining: a new data mining challenge. ACM SIGKDD Explor Newslett 2003, 5:84–89.
    • (2003) ACM SIGKDD Explor Newslett , vol.5 , pp. 84-89
    • Getoor, L.1
  • 11
    • 34247141976 scopus 로고    scopus 로고
    • Automated criminal link analysis based on domain knowledge
    • Schroeder J, Xu J, Chen H, Chau M. Automated criminal link analysis based on domain knowledge. J Am Soc Inf Sci Technol 2007, 58:842–855.
    • (2007) J Am Soc Inf Sci Technol , vol.58 , pp. 842-855
    • Schroeder, J.1    Xu, J.2    Chen, H.3    Chau, M.4
  • 13
    • 0242465495 scopus 로고    scopus 로고
    • The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands
    • Klerks P. The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 2001, 24:53–65.
    • (2001) Connections , vol.24 , pp. 53-65
    • Klerks, P.1
  • 14
    • 34248386387 scopus 로고    scopus 로고
    • Crimelink explorer Using domain knowledge to facilitate automated crime association analysis
    • 2 June,, –. Berlin, Heidelberg Springer.
    • Schroeder J, Xu J, Chen H. Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis. In: International Conference on Intelligence and Security Informatics, 2 June, 2003, 168–180. Berlin, Heidelberg: Springer.
    • (2003) In, International Conference on Intelligence and Security Informatics , pp. 168-180
    • Schroeder, J.1    Xu, J.2    Chen, H.3
  • 16
    • 79951581922 scopus 로고    scopus 로고
    • Structural investigation of supply networks: a social network analysis approach
    • Kim Y, Choi TY, Yan T, Dooley K. Structural investigation of supply networks: a social network analysis approach. J Oper Manage 2011, 29:194–211.
    • (2011) J Oper Manage , vol.29 , pp. 194-211
    • Kim, Y.1    Choi, T.Y.2    Yan, T.3    Dooley, K.4
  • 17
    • 84155181035 scopus 로고    scopus 로고
    • Topic oriented community detection through social objects and link analysis in social networks
    • Zhao Z, Feng S, Wang Q, Huang JZ, Williams GJ, Fan J. Topic oriented community detection through social objects and link analysis in social networks. Knowl Syst 2012, 26:164–173.
    • (2012) Knowl Syst , vol.26 , pp. 164-173
    • Zhao, Z.1    Feng, S.2    Wang, Q.3    Huang, J.Z.4    Williams, G.J.5    Fan, J.6
  • 19
    • 77955458634 scopus 로고    scopus 로고
    • Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service
    • Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordónez F. Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 2010, 40:267–290.
    • (2010) Interfaces , vol.40 , pp. 267-290
    • Jain, M.1    Tsai, J.2    Pita, J.3    Kiekintveld, C.4    Rathi, S.5    Tambe, M.6    Ordónez, F.7
  • 21
    • 34548058199 scopus 로고    scopus 로고
    • Protecting against biological terrorism: statistical issues in electronic biosurveillance
    • Fricker RD Jr, Rolka H. Protecting against biological terrorism: statistical issues in electronic biosurveillance. Chance 2006, 19:4–14.
    • (2006) Chance , vol.19 , pp. 4-14
    • Fricker, R.D.1    Rolka, H.2
  • 22
    • 0034885145 scopus 로고    scopus 로고
    • Intelligent software agents for forest fire prevention and fighting
    • Jaber A, Guarnieri F, Wybo JL. Intelligent software agents for forest fire prevention and fighting. Safety Sci 2001, 39:3–17.
    • (2001) Safety Sci , vol.39 , pp. 3-17
    • Jaber, A.1    Guarnieri, F.2    Wybo, J.L.3
  • 25
    • 0442322890 scopus 로고    scopus 로고
    • Technology implementation management in law enforcement: COPLINK system usability and user acceptance evaluations
    • Lin C, Hu PJ, Chen H. Technology implementation management in law enforcement: COPLINK system usability and user acceptance evaluations. Soc Sci Comput Rev 2004, 22:24–36.
    • (2004) Soc Sci Comput Rev , vol.22 , pp. 24-36
    • Lin, C.1    Hu, P.J.2    Chen, H.3
  • 29
    • 85169834575 scopus 로고    scopus 로고
    • Restructuring transactional data for link analysis in the FinCEN AI system
    • January, –.
    • Goldberg HG, Wong RW. Restructuring transactional data for link analysis in the FinCEN AI system. In: AAAI Fall Symposium, January 1998, 38–46.
    • (1998) In, AAAI Fall Symposium , pp. 38-46
    • Goldberg, H.G.1    Wong, R.W.2
  • 30
    • 84873127711 scopus 로고    scopus 로고
    • eds., Berlin, Germany, Springer Science & Business Media
    • Aggarwal CC, Zhai C, eds. Mining Text Data. Berlin, Germany: Springer Science & Business Media; 2012.
    • (2012) Mining Text Data
    • Aggarwal, C.C.1    Zhai, C.2
  • 31
    • 82155181743 scopus 로고    scopus 로고
    • Effective pattern discovery for text mining
    • Zhong N, Li Y, Wu ST. Effective pattern discovery for text mining. IEEE Trans Knowl Data Eng 2012, 24:30–44.
    • (2012) IEEE Trans Knowl Data Eng , vol.24 , pp. 30-44
    • Zhong, N.1    Li, Y.2    Wu, S.T.3
  • 33
    • 84862828907 scopus 로고    scopus 로고
    • Mining term networks from text collections for crime investigation
    • Tseng YH, Ho ZP, Yang KS, Chen CC. Mining term networks from text collections for crime investigation. Expert Syst Appl 2012, 39:10082–10090.
    • (2012) Expert Syst Appl , vol.39 , pp. 10082-10090
    • Tseng, Y.H.1    Ho, Z.P.2    Yang, K.S.3    Chen, C.C.4
  • 34
    • 79954572852 scopus 로고    scopus 로고
    • Text mining with emergent self organizing maps and multi-dimensional scaling: a comparative study on domestic violence
    • Poelmans J, Van Hulle MM, Viaene S, Elzinga P, Dedene G. Text mining with emergent self organizing maps and multi-dimensional scaling: a comparative study on domestic violence. Appl Soft Comput 2011, 11:3870–3876.
    • (2011) Appl Soft Comput , vol.11 , pp. 3870-3876
    • Poelmans, J.1    Van Hulle, M.M.2    Viaene, S.3    Elzinga, P.4    Dedene, G.5
  • 35
    • 4544372935 scopus 로고    scopus 로고
    • Automatic information extraction from documents A tool for intelligence and law enforcement analysts
    • 23 October,, Menlo Park, CA AAAI Press.
    • Lee R. Automatic information extraction from documents: A tool for intelligence and law enforcement analysts. In: Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis, 23 October, 1998. Menlo Park, CA: AAAI Press.
    • (1998) In, Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis
    • Lee, R.1
  • 36
    • 79952437990 scopus 로고    scopus 로고
    • An investigation of data and text mining methods for real world deception detection
    • Fuller CM, Biros DP, Delen D. An investigation of data and text mining methods for real world deception detection. Expert Syst Appl 2011, 38:8392–8398.
    • (2011) Expert Syst Appl , vol.38 , pp. 8392-8398
    • Fuller, C.M.1    Biros, D.P.2    Delen, D.3
  • 38
    • 85021213064 scopus 로고    scopus 로고
    • Using Perilog to explore “Decision Making at NASA”.
    • McGreevy MW. Using Perilog to explore “Decision Making at NASA”.
    • McGreevy, M.W.1
  • 40
    • 79957758280 scopus 로고    scopus 로고
    • Personal development under market conditions: NLP and the emergence of an ethics of sensitivity based on the idea of the hidden potential of the individual
    • Bovbjerg KM. Personal development under market conditions: NLP and the emergence of an ethics of sensitivity based on the idea of the hidden potential of the individual. J Contemp Relig 2011, 26:189–205.
    • (2011) J Contemp Relig , vol.26 , pp. 189-205
    • Bovbjerg, K.M.1
  • 41
    • 84871900799 scopus 로고    scopus 로고
    • A comprehensive foundation
    • Haykin S, Network N. A comprehensive foundation. Neural Netw 2004, 2:41.
    • (2004) Neural Netw , vol.2 , pp. 41
    • Haykin, S.1    Network, N.2
  • 42
    • 1942500388 scopus 로고    scopus 로고
    • Crime data mining: a general framework and some examples
    • Chen H, Chung W, Xu JJ, Wang G, Qin Y, Chau M. Crime data mining: a general framework and some examples. Computer 2004, 37:50–56.
    • (2004) Computer , vol.37 , pp. 50-56
    • Chen, H.1    Chung, W.2    Xu, J.J.3    Wang, G.4    Qin, Y.5    Chau, M.6
  • 43
    • 3142618406 scopus 로고    scopus 로고
    • A neural network applied to criminal psychological profiling: an Italian initiative
    • Strano M. A neural network applied to criminal psychological profiling: an Italian initiative. Int J Offender Ther Comp Criminol 2004, 48:495–503.
    • (2004) Int J Offender Ther Comp Criminol , vol.48 , pp. 495-503
    • Strano, M.1
  • 45
    • 4544224894 scopus 로고    scopus 로고
    • Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks
    • Xu JJ, Chen H. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks. Decis Support Syst 2004, 38:473–487.
    • (2004) Decis Support Syst , vol.38 , pp. 473-487
    • Xu, J.J.1    Chen, H.2
  • 46
    • 0032205202 scopus 로고    scopus 로고
    • AICAMS: artificial intelligence crime analysis and management system
    • Brahan JW, Lam KP, Chan H, Leung W. AICAMS: artificial intelligence crime analysis and management system. Knowl Syst 1998, 11:355–361.
    • (1998) Knowl Syst , vol.11 , pp. 355-361
    • Brahan, J.W.1    Lam, K.P.2    Chan, H.3    Leung, W.4
  • 47
    • 84880217681 scopus 로고    scopus 로고
    • Exploration of unstructured narrative crime reports: an unsupervised neural network and point pattern analysis approach
    • Helbich M, Hagenauer J, Leitner M, Edwards R. Exploration of unstructured narrative crime reports: an unsupervised neural network and point pattern analysis approach. Cartogr Geogr Inf Sci 2013, 40:326–336.
    • (2013) Cartogr Geogr Inf Sci , vol.40 , pp. 326-336
    • Helbich, M.1    Hagenauer, J.2    Leitner, M.3    Edwards, R.4
  • 48
    • 0003692623 scopus 로고    scopus 로고
    • Handbook of Neural Computing Applications
    • Academic Press
    • Maren AJ, Harston CT. Pap RM. Handbook of Neural Computing Applications: Academic Press; 2014.
    • (2014) Pap RM
    • Maren, A.J.1    Harston, C.T.2
  • 49
    • 0035402082 scopus 로고    scopus 로고
    • Using clustering to discover the preferences of computer criminals
    • Brown DE, Gunderson LF. Using clustering to discover the preferences of computer criminals. IEEE Trans Syst Man Cybern A Syst Hum 2001, 31:311–318.
    • (2001) IEEE Trans Syst Man Cybern A Syst Hum , vol.31 , pp. 311-318
    • Brown, D.E.1    Gunderson, L.F.2
  • 50
    • 18844436266 scopus 로고    scopus 로고
    • Classification system for serial criminal patterns
    • Dahbur K, Muscarello T. Classification system for serial criminal patterns. Artif Intell Law 2003, 11:251–269.
    • (2003) Artif Intell Law , vol.11 , pp. 251-269
    • Dahbur, K.1    Muscarello, T.2
  • 56
    • 51149091221 scopus 로고    scopus 로고
    • Constructing Bayesian networks for criminal profiling from limited data
    • Baumgartner K, Ferrari S, Palermo G. Constructing Bayesian networks for criminal profiling from limited data. Knowl Syst 2008, 21:563–572.
    • (2008) Knowl Syst , vol.21 , pp. 563-572
    • Baumgartner, K.1    Ferrari, S.2    Palermo, G.3
  • 60
    • 50649118132 scopus 로고    scopus 로고
    • Crime information extraction from police and witness narrative reports
    • In, 2008 , IEEE, 12 May,, –.
    • Ku CH, Iriberri A, Leroy G. Crime information extraction from police and witness narrative reports. In: 2008 I.E. Conference on Technologies for Homeland Security, IEEE, 12 May, 2008, 193–198.
    • (2008) I.E. Conference on Technologies for Homeland Security , pp. 193-198
    • Ku, C.H.1    Iriberri, A.2    Leroy, G.3
  • 62
    • 84987704255 scopus 로고    scopus 로고
    • Scalable machine-learning algorithms for big data analytics: a comprehensive review
    • Gupta P, Sharma A, Jindal R. Scalable machine-learning algorithms for big data analytics: a comprehensive review. WIREs Data Min Knowl Discov 2016, 6:194–214.
    • (2016) WIREs Data Min Knowl Discov , vol.6 , pp. 194-214
    • Gupta, P.1    Sharma, A.2    Jindal, R.3
  • 65
    • 34748814355 scopus 로고    scopus 로고
    • Terrorism and crime related weblog social network link, content analysis and information visualization
    • IEEE, 23 May,, May 23, –.
    • Yang CC, Ng TD. Terrorism and crime related weblog social network: link, content analysis and information visualization. In: Intelligence and Security Informatics, IEEE, 23 May, 2007 May 23, 55–58.
    • (2007) In, Intelligence and Security Informatics , pp. 55-58
    • Yang, C.C.1    Ng, T.D.2
  • 69
    • 56349087921 scopus 로고    scopus 로고
    • Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering
    • Gao S, Xu D. Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Syst Appl 2009, 36:1493–1504.
    • (2009) Expert Syst Appl , vol.36 , pp. 1493-1504
    • Gao, S.1    Xu, D.2
  • 70
    • 85008018414 scopus 로고    scopus 로고
    • Automatically detecting criminal identity deception: an adaptive detection algorithm
    • Wang GA, Chen H, Xu JJ, Atabakhsh H. Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Trans Syst Man Cybern A Syst Hum 2006, 36:988–999.
    • (2006) IEEE Trans Syst Man Cybern A Syst Hum , vol.36 , pp. 988-999
    • Wang, G.A.1    Chen, H.2    Xu, J.J.3    Atabakhsh, H.4
  • 71
    • 0002909686 scopus 로고    scopus 로고
    • Adaptive detection of approximately duplicate database records and the database integration approach to information discovery
    • University of California, San Diego
    • Monge AE. Adaptive detection of approximately duplicate database records and the database integration approach to information discovery. Doctoral dissertation, University of California, San Diego, 1997.
    • (1997) Doctoral dissertation
    • Monge, A.E.1
  • 73
    • 0000892585 scopus 로고
    • Detection of management fraud: a neural network approach
    • Fanning K, Cogger KO, Srivastava R. Detection of management fraud: a neural network approach. ISAFM 1995, 4:113–126.
    • (1995) ISAFM , vol.4 , pp. 113-126
    • Fanning, K.1    Cogger, K.O.2    Srivastava, R.3
  • 74
    • 33847291246 scopus 로고    scopus 로고
    • Use of data mining techniques to model crime scene investigator performance
    • Adderley R, Townsley M, Bond J. Use of data mining techniques to model crime scene investigator performance. Knowl Syst 2007, 20:170–176.
    • (2007) Knowl Syst , vol.20 , pp. 170-176
    • Adderley, R.1    Townsley, M.2    Bond, J.3
  • 75
    • 79951846085 scopus 로고    scopus 로고
    • Social network analysis of a criminal hacker community
    • Lu Y, Luo X, Polgar M, Cao Y. Social network analysis of a criminal hacker community. J Comput Inform Syst 2010, 51:31–41.
    • (2010) J Comput Inform Syst , vol.51 , pp. 31-41
    • Lu, Y.1    Luo, X.2    Polgar, M.3    Cao, Y.4
  • 76
    • 0003042363 scopus 로고
    • Models of network structure
    • Burt RS. Models of network structure. Annu Rev Sociol 1980, 6:79–141.
    • (1980) Annu Rev Sociol , vol.6 , pp. 79-141
    • Burt, R.S.1
  • 78
    • 4243116398 scopus 로고    scopus 로고
    • Countering terrorism through information technology
    • Popp R, Armour T, Numrych K. Countering terrorism through information technology. Commun ACM 2004, 47:36–43.
    • (2004) Commun ACM , vol.47 , pp. 36-43
    • Popp, R.1    Armour, T.2    Numrych, K.3
  • 80
    • 85104094046 scopus 로고    scopus 로고
    • Big data analytics in healthcare: promise and potential
    • Raghupathi W, Raghupathi V. Big data analytics in healthcare: promise and potential. Health Inf Sci Syst 2014, 2:3.
    • (2014) Health Inf Sci Syst , vol.2 , pp. 3
    • Raghupathi, W.1    Raghupathi, V.2
  • 85
    • 77955933052 scopus 로고    scopus 로고
    • Cassandra: a decentralized structured storage system
    • Lakshman A, Malik P. Cassandra: a decentralized structured storage system. ACM SIGOPS Operat Syst Rev 2010, 44:35–40.
    • (2010) ACM SIGOPS Operat Syst Rev , vol.44 , pp. 35-40
    • Lakshman, A.1    Malik, P.2
  • 90
    • 84861200365 scopus 로고    scopus 로고
    • Data mining techniques and applications–a decade review from 2000 to 2011
    • Liao SH, Chu PH, Hsiao PY. Data mining techniques and applications–a decade review from 2000 to 2011. Expert Syst Appl 2012, 39:11303–11311.
    • (2012) Expert Syst Appl , vol.39 , pp. 11303-11311
    • Liao, S.H.1    Chu, P.H.2    Hsiao, P.Y.3
  • 91
    • 34249751638 scopus 로고    scopus 로고
    • The link-prediction problem for social networks
    • Liben-Nowell D, Kleinberg J. The link-prediction problem for social networks. J Assoc Inf Sci Technol 2007, 58:1019–1031.
    • (2007) J Assoc Inf Sci Technol , vol.58 , pp. 1019-1031
    • Liben-Nowell, D.1    Kleinberg, J.2
  • 93
    • 84925679859 scopus 로고    scopus 로고
    • Demystifying big data analytics for business intelligence through the lens of marketing mix
    • Fan S, Lau RY, Zhao JL. Demystifying big data analytics for business intelligence through the lens of marketing mix. Big Data Res 2015, 2:28–32.
    • (2015) Big Data Res , vol.2 , pp. 28-32
    • Fan, S.1    Lau, R.Y.2    Zhao, J.L.3
  • 95
    • 0038205937 scopus 로고    scopus 로고
    • The role of criminal profiling in the computer forensics process
    • Rogers M. The role of criminal profiling in the computer forensics process. Comput Secur 2003, 22:292–298.
    • (2003) Comput Secur , vol.22 , pp. 292-298
    • Rogers, M.1
  • 96
    • 0004102297 scopus 로고    scopus 로고
    • Concept-based knowledge discovery in texts extracted from the web
    • Loh S, Wives LK, de Oliveira JP. Concept-based knowledge discovery in texts extracted from the web. ACM SIGKDD Explor Newslett 2000, 2:29–39.
    • (2000) ACM SIGKDD Explor Newslett , vol.2 , pp. 29-39
    • Loh, S.1    Wives, L.K.2    de Oliveira, J.P.3
  • 102
    • 22144492593 scopus 로고    scopus 로고
    • Characterising data mining software
    • Giraud-Carrier C, Povel O. Characterising data mining software. Intell Data Anal 2003, 7:181–192.
    • (2003) Intell Data Anal , vol.7 , pp. 181-192
    • Giraud-Carrier, C.1    Povel, O.2
  • 103
    • 45249112487 scopus 로고    scopus 로고
    • Data integration advisor: set the stage with data preparation
    • 15 –.
    • Sherman R. Data integration advisor: set the stage with data preparation. DM Rev 2005, 15: 54–55.
    • (2005) DM Rev , pp. 54-55
    • Sherman, R.1
  • 105
    • 84926623018 scopus 로고    scopus 로고
    • Washington, DC Executive Office of the President. [WWW document].
    • House W. Big data: seizing opportunities, preserving values (Report for the President), 2014. Washington, DC: Executive Office of the President. [WWW document]. Available at: http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
    • (2014) Big data seizing opportunities, preserving values (Report for the President)
    • House, W.1
  • 106
    • 2942664322 scopus 로고    scopus 로고
    • Knowledge discovery in databases: 10 years after
    • Piatetsky-Shapiro G. Knowledge discovery in databases: 10 years after. ACM SIGKDD Explor Newslett 2000, 1:59–61.
    • (2000) ACM SIGKDD Explor Newslett , vol.1 , pp. 59-61
    • Piatetsky-Shapiro, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.