[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2623330.2623353acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Spatially embedded co-offence prediction using supervised learning

Published: 24 August 2014 Publication History

Abstract

Crime reduction and prevention strategies are essential to increase public safety and reduce the crime costs to society. Law enforcement agencies have long realized the importance of analyzing co-offending networks---networks of offenders who have committed crimes together---for this purpose. Although network structure can contribute significantly to co-offence prediction, research in this area is very limited. Here we address this important problem by proposing a framework for co-offence prediction using supervised learning. Considering the available information about offenders, we introduce social, geographic, geo-social and similarity feature sets which are used for classifying potential negative and positive pairs of offenders. Similar to other social networks, co-offending networks also suffer from a highly skewed distribution of positive and negative pairs. To address the class imbalance problem, we identify three types of criminal cooperation opportunities which help to reduce the class imbalance ratio significantly, while keeping half of the co-offences. The proposed framework is evaluated on a large crime dataset for the Province of British Columbia, Canada. Our experimental evaluation of four different feature sets show that the novel geo-social features are the best predictors. Overall, we experimentally show the high effectiveness of the proposed co-offence prediction framework. We believe that our framework will not only allow law enforcement agencies to improve their crime reduction and prevention strategies, but also offers new criminological insights into criminal link formation between offenders.

Supplementary Material

MP4 File (p1789-sidebyside.mp4)

References

[1]
R. Boba. Crime analysis and crime mapping. SAGE Publications, 2005.
[2]
U. S. Department of Justice. Crime in the United States: uniform crime reports. Federal Bureau of Investigation; Washington, DC., 2008.
[3]
J. Zhang. Costs of crime in canada, 2008. Research and Statistics Division, Department of Justice Canada., 2011.
[4]
W. Gorr and R. Harries. Introduction to crime forecasting. International Journal of Forecasting, 19(4):551--555, 2003.
[5]
H. Liu and D. E. Brown. Criminal incident prediction using a point-pattern-based density model. International journal of forecasting, 19(4):603--622, 2003.
[6]
A. J. Reiss Jr. Co-offending and criminal careers. Crime and justice, pages 117--170, 1988.
[7]
C. Morselli. Inside criminal networks, volume 73. Springer, 2008.
[8]
D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. J. Am. Soc. Inf. Sci. Technol., 58(7):1019--1031, May 2007.
[9]
M. A. Hasan, V. Chaoji, S. Salem, and M. Zaki. Link prediction using supervised learning. In Proc. SDM'06, 2006.
[10]
R. N. Lichtenwalter, J. T. Lussier, and N. V. Chawla. New perspectives and methods in link prediction. In Proc. KDD '10, 2010.
[11]
C. Wang, V. Satuluri, and S. Parthasarathy. Local probabilistic models for link prediction. In Proc. ICDM '07, 2007.
[12]
M. A. Tayebi, M. Jamali, M. Ester, U. Glásser, and R. Frank. Crimewalker: a recommendation model for suspect investigation. In Proc. RecSys'11, 2011.
[13]
M. A. Tayebi, R. Frank, and U. Glásser. Understanding the link between social and spatial distance in the crime world. In Proc. SIGSPATIAL GIS'12, 2012.
[14]
F. M. Weerman. Co-offending as social exchange: Explaining characteristics of co-offending. British Journal of Criminology, 43(2):398--416, 2003.
[15]
J. McGloin, C. J. Sullivan, A. R. Piquero, and S. Bacon. Investigating the stability of co-offending and co-offenders among a sample of youthful offenders. Criminology, 46(1):155--188, 2008.
[16]
P. J. Brantingham and P. L. Brantingham. Environmental criminology. Sage Publications, 1981.
[17]
D.K. Rossmo. Geographic Profiling. CRC Press, 2000.
[18]
E.H. Sutherland. Principles of criminology. Philadelphia: Lippincott, 1947.
[19]
S. Scellato, A. Noulas, and C. Mascolo. Exploiting place features in link prediction on location-based social networks. In Proc. KDD'11, 2011.
[20]
D. Wang, D. Pedreschi, C. Song, F. Giannotti, and A. Barabasi. Human mobility, social ties, and link prediction. In Proc. KDD'11, 2011.
[21]
C. Zhang, L. Shou, K. Chen, G. Chen, and Y. Bei. Evaluating geo-social influence in location-based social networks. In Proc. CIKM'12, 2012.
[22]
E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: user movement in location-based social networks. In Proc. KDD '11, 2011.
[23]
A. Reid, M. A. Tayebi, and R. Frank. Exploring the structural characteristics of social networks in a large criminal court database. In Proc. ISI'13, 2013.
[24]
P. L. Brantingham, M. Ester, R. Frank, U. Glásser, and M. A. Tayebi. Co-offending network mining. Counterterrorism and Open Source Intelligence, pages 73--102, 2011.
[25]
D. V. Canter and A. Gregory. Identifying the residential location of rapists. Journal of the Forensic Science Society, 34(3):169--175, 1994.
[26]
M. Felson. Crime and Nature. SAGE Publications, 2006.
[27]
B. Snook. Individual differences in distance travelled by serial burglars. Journal of Investigative Psychology and Offender Profiling, 1(1):53--66, 2004.
[28]
A. Calvó-Armengol and Y. Zenou. Social networks and crime decisions: The role of social structure in facilitating delinquent behavior. International Economic Review, 45(3):939--958, 2004.
[29]
M. Felson. The process of co-offending. In M. Smith and D. Cornish, eds, Theory and Practice in Situational Crime Prevention. Monsey, NJ: Criminal Justice Press, 2003.
[30]
L. A. Adamic and E. Adar. Friends and neighbors on the web. Social networks, 25(3):211--230, 2003.
[31]
M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, pages 415--444, 2001.
[32]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. SIGKDD Explor. Newsl., pages 10--18, 2009.
[33]
F. J. Provost, T. Fawcett, and R. Kohavi. The case against accuracy estimation for comparing induction algorithms. In Proc. ICML'98, 1998.
[34]
P. J. Brantingham, G. Tita, M. B. Short, and S. Reid. The ecology of gang territorial boundaries. Criminology, 50, 2012.
[35]
K. Harries. Mapping crime principle and practice. Washington D.C, U.S. Department of Justice Office of Justice Programs, 1999.

Cited By

View all
  • (2022)FIGAT: Accurately Classify Individual Crime Risks with Multi-information FusionIEEE Transactions on Services Computing10.1109/TSC.2022.3206093(1-14)Online publication date: 2022
  • (2022)Identification of Chinese dark jargons in Telegram underground markets using context-oriented and linguistic featuresInformation Processing & Management10.1016/j.ipm.2022.10303359:5(103033)Online publication date: Sep-2022
  • (2021)FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)10.1109/DSC53577.2021.00041(248-255)Online publication date: Oct-2021
  • Show More Cited By

Index Terms

  1. Spatially embedded co-offence prediction using supervised learning

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '14: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining
    August 2014
    2028 pages
    ISBN:9781450329569
    DOI:10.1145/2623330
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 August 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. co-offence prediction
    2. link prediction
    3. social network

    Qualifiers

    • Research-article

    Conference

    KDD '14
    Sponsor:

    Acceptance Rates

    KDD '14 Paper Acceptance Rate 151 of 1,036 submissions, 15%;
    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 04 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)FIGAT: Accurately Classify Individual Crime Risks with Multi-information FusionIEEE Transactions on Services Computing10.1109/TSC.2022.3206093(1-14)Online publication date: 2022
    • (2022)Identification of Chinese dark jargons in Telegram underground markets using context-oriented and linguistic featuresInformation Processing & Management10.1016/j.ipm.2022.10303359:5(103033)Online publication date: Sep-2022
    • (2021)FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)10.1109/DSC53577.2021.00041(248-255)Online publication date: Oct-2021
    • (2020)Combining Machine Learning and Social Network Analysis to Reveal the Organizational StructuresApplied Sciences10.3390/app1005169910:5(1699)Online publication date: 2-Mar-2020
    • (2020)Revealing the Character of Nodes in a Blockchain With Supervised LearningIEEE Access10.1109/ACCESS.2020.30016768(109639-109647)Online publication date: 2020
    • (2019)A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)10.1109/TrustCom/BigDataSE.2019.00036(208-215)Online publication date: Aug-2019
    • (2018)Crime in Urban Areas:ACM SIGKDD Explorations Newsletter10.1145/3229329.322933120:1(1-12)Online publication date: 29-May-2018
    • (2017)MSTM: A novel map matching approach for low-sampling-rate trajectories2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2017.8292591(1-7)Online publication date: Oct-2017
    • (2017)NSIM: A robust method to discover similar trajectories on cellular network location data2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2017.8292237(1-7)Online publication date: Oct-2017
    • (2017)Link Prediction by Network AnalysisPrediction and Inference from Social Networks and Social Media10.1007/978-3-319-51049-1_5(97-114)Online publication date: 18-Mar-2017
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media