[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1056808.1056893acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Visualization in law enforcement

Published: 02 April 2005 Publication History

Abstract

Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at the Tucson Police Department (TPD), we found that two types of tasks are important for crime analysis: crime pattern recognition and criminal association discovery. We developed two separate systems that provide automatic visual assistance on these tasks. To help identify crime patterns, a Spatial Temporal Visualization (STV) system was designed to integrate a synchronized view of three types of visualization techniques: a GIS view, a timeline view and a periodic pattern view. The Criminal Activities Network (CAN) system extracts, visualizes and analyzes criminal relationships using spring-embedded and blockmodeling algorithms. This paper discusses the design and functionality of these two systems and the lessons learned from the development process and interaction with law enforcement officers.

References

[1]
Chen H., Jenny Schroeder, R. V. Hauck, L. Ridgeway, H. Atabakhsh, H. Gupta, C. Boarman, K. Rasmussen, A. W. Clements (2002), " COPLINK Connect: Information and Knowledge Management for Law Enforcement"; Decision Support Systems, 34: pp. 271--285.
[2]
Chen H., Zeng D., Atabakhsh H., Wyzga W., Schroeder J. COPLINK: Managing Law Enforcement Data and Knowledge. Communication of the ACM. Special Issue on Digital Government: Technologies and Practices. 2003
[3]
Brown, Donald E. (1998). "The Regional Crime Analysis Program (RECAP): A Framework for Mining Data to Catch Criminals," Proceedings from IEEE.
[4]
Plaisant, C., B. Milash, A. Rose, S. Widoff & B. Schneiderman (1996). "Lifelines: Visualizing Personal Histories," ACM CHI '96 Conference Proceedings. pp 221--227.
[5]
Zeng, D., Chen, H., Tseng, C., Larson, C., Eidson, M., Gotham, I., Lynch, C., and Ascher, M. (2004). ``Towards A National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and Botulism,'' Proceedings of the Fifth Annual National Conference on Digital Government Research, 2004
[6]
Xu, J. and H. Chen (2004). "Fighting organized crime: Using shortest-path algorithms to identify associations in criminal networks." Decision Support Systems 38(3): 473--487
[7]
J. Schroeder, J. Xu, H. Chen, & M. Chau, "Automated Link Analysis Using CrimeLink Explorer," under the 2nd round review of IEEE Transactions on Systems, Man and Cybernetics.
[8]
White, Harrison C., Scott Boorman, Ronald Breiger. 1976. "Social Structure from Multiple Networks. I. Blockmodels of Roles and Positions."American Journal of Sociology 81: 730--780.

Cited By

View all
  • (2024)Requirements and Attitudes towards Explainable AI in Law EnforcementProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661629(995-1009)Online publication date: 1-Jul-2024
  • (2020)Mirante: A visualization tool for analyzing urban crimes2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)10.1109/SIBGRAPI51738.2020.00028(148-155)Online publication date: Nov-2020
  • (2019)Visual time period analysis: a multimedia analytics application for summarizing and analyzing eye-tracking experimentsMultimedia Tools and Applications10.1007/s11042-019-07950-1Online publication date: 11-Jul-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems
April 2005
1358 pages
ISBN:1595930027
DOI:10.1145/1056808
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. association network
  2. crime analysis
  3. crime network
  4. law enforcement
  5. social network analysis
  6. spatial and temporal visualization

Qualifiers

  • Article

Conference

CHI05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Requirements and Attitudes towards Explainable AI in Law EnforcementProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661629(995-1009)Online publication date: 1-Jul-2024
  • (2020)Mirante: A visualization tool for analyzing urban crimes2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)10.1109/SIBGRAPI51738.2020.00028(148-155)Online publication date: Nov-2020
  • (2019)Visual time period analysis: a multimedia analytics application for summarizing and analyzing eye-tracking experimentsMultimedia Tools and Applications10.1007/s11042-019-07950-1Online publication date: 11-Jul-2019
  • (2018)Fairness and Accountability Design Needs for Algorithmic Support in High-Stakes Public Sector Decision-MakingProceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3174014(1-14)Online publication date: 21-Apr-2018
  • (2018)TIME°DIFF: A Visual Approach to Compare Period Data2018 22nd International Conference Information Visualisation (IV)10.1109/iV.2018.00017(38-43)Online publication date: Jul-2018
  • (2018)Study on Visual Techniques of Potential Pattern Discovery for Time Series DataMATEC Web of Conferences10.1051/matecconf/201823202049232(02049)Online publication date: 19-Nov-2018
  • (2016)DropoutSeer: Visualizing learning patterns in Massive Open Online Courses for dropout reasoning and prediction2016 IEEE Conference on Visual Analytics Science and Technology (VAST)10.1109/VAST.2016.7883517(111-120)Online publication date: Oct-2016
  • (2016)TimeLineCurator: Interactive Authoring of Visual Timelines from Unstructured TextIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2015.246753122:1(300-309)Online publication date: 31-Jan-2016
  • (2014)Network visualization for financial crime detectionJournal of Visual Languages and Computing10.1016/j.jvlc.2014.01.00225:4(433-451)Online publication date: 1-Aug-2014
  • (2011)An advanced network visualization system for financial crime detection2011 IEEE Pacific Visualization Symposium10.1109/PACIFICVIS.2011.5742391(203-210)Online publication date: Mar-2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media