[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1123098.1123190acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
Article

Using shortest path algorithms to identify criminal associations

Published: 19 May 2002 Publication History

Abstract

Frequently in criminal investigations, law enforcement agencies face the problem of identifying associations between a group of entities such as individuals and organizations. In this paper we present a link analysis technique to solve such a problem. This approach uses shortest path algorithms to find the strongest associations between two or more given entities. The experimental results have demonstrated that our approach is potentially useful in terms of quality and efficiency. Specifically, we found that the two-tree Priority-First Search algorithm in most cases was the fastest algorithm to find shortest paths and the paths found consisted of meaningful criminal associations around 80 percent of the time.

References

[1]
Anderson, T., Arbetter, L., Benawides, A., and Longmore-Etheridge A. (1994). Security works. Security Management, 38(17), 17--20.
[2]
Dijkstra, E. (1959). A. note on two problems in connexion with graphs. Numerische Mathematik, 1, 269--271.
[3]
Evans, J. and Minieka, E. (1992). Optimization Algorithms for Networks and Graphs, 2nd ed., Marcel Dekker, New York.
[4]
Horn, R. D, Birdwell, J. D., and Leedy, L. W. (1997). Link discovery tool. Proceedings of the Counterdrug Technology Assessment Center and Counterdrug Technology Assessment Center's ONDCP/CTAC International Symposium, Chicago, IL. August 18--22, 1997.
[5]
Helgason, R. V., Kennington, J. L., and Stewart, B. D. (1993). The one-to-one shortest-path problem: Am empirical analysis with the two-tree Dijkstra algorithm. Computational Optimization and Applications, 1, 47--75.
[6]
Chen H., and Lynch, K. J. (1992). Automatic construction of networks of concepts characterizing document databases. IEEE Transactions on Systems, Man and Cybernetics, 22(5), 885--902.
[7]
Cormen, T. H, Leiserson, C., E., and Rivest, R. L. (1991). Introduction to Algorithms. Cambridge, MA: The M. I. T. Press.
[8]
Goldberg, H. G., and Senator, T. E. (1998). Restructuring databases for knowledge discovery by consolidation and link formation. In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (Menlo Park CA, 1998). AAAI Press.
[9]
Goldberg, H. G. and Wong, R. W. H. (1998). Restructuring transactional data for link analysis in the FinCEN AI system. In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (Menlo Park CA, 1998). AAAI Press.
[10]
Hauck, R. V., Atabakhsh, H., Ongvasith, P., Gupta, H., and Chen, H. (2002). COPLINK concept space: An application for criminal intelligence analysis. IEEE Computer Digital Government Special Issue, 35(3), 30--37.
[11]
Lee, R. (1998). Automatic information extraction from documents: A tool for intelligence and law enforcement analysts. In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (Menlo Park CA, 1998). AAAI Press.
[12]
Sparrow, M. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251--274.
[13]
Tolle, K. M., and Chen, H. (2000). Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science, 51(4), 352--370.

Cited By

View all
  • (2003)CrimeLink explorerProceedings of the 1st NSF/NIJ conference on Intelligence and security informatics10.5555/1792094.1792111(168-180)Online publication date: 2-Jun-2003

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '02: Proceedings of the 2002 annual national conference on Digital government research
May 2002
1234 pages

Publisher

Digital Government Society of North America

Publication History

Published: 19 May 2002

Check for updates

Qualifiers

  • Article

Conference

dg.o '02
dg.o '02: Digital government research
May 19 - 22, 2002
California, Los Angeles, USA

Acceptance Rates

Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2003)CrimeLink explorerProceedings of the 1st NSF/NIJ conference on Intelligence and security informatics10.5555/1792094.1792111(168-180)Online publication date: 2-Jun-2003

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media