{"title":"Dynamic Bayesian Networks, Elicitation and Data Embedding for Secure Environments","authors":"Kieran Drury, Jim Q. Smith","doi":"arxiv-2409.07389","DOIUrl":null,"url":null,"abstract":"Serious crime modelling typically needs to be undertaken securely behind a\nfirewall where police knowledge and capabilities can remain undisclosed. Data\ninforming an ongoing incident is often sparse, with a large proportion of\nrelevant data only coming to light after the incident culminates or after\npolice intervene - by which point it is too late to make use of the data to aid\nreal-time decision making for the incident in question. Much of the data that\nis available to police to support real-time decision making is highly\nconfidential so cannot be shared with academics, and is therefore missing to\nthem. In this paper, we describe the development of a formal protocol where a\ngraphical model is used as a framework for securely translating a model\ndesigned by an academic team to a model for use by a police team. We then show,\nfor the first time, how libraries of these models can be built and used for\nreal-time decision support to circumvent the challenges of data missingness and\ntardiness seen in such a secure environment. The parallel development described\nby this protocol ensures that any sensitive information collected by police,\nand missing to academics, remains secured behind a firewall. The protocol\nnevertheless guides police so that they are able to combine the typically\nincomplete data streams that are open source with their more sensitive\ninformation in a formal and justifiable way. We illustrate the application of\nthis protocol by describing how a new entry - a suspected vehicle attack - can\nbe embedded into such a police library of criminal plots.","PeriodicalId":501425,"journal":{"name":"arXiv - STAT - Methodology","volume":"73 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - STAT - Methodology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.07389","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Serious crime modelling typically needs to be undertaken securely behind a
firewall where police knowledge and capabilities can remain undisclosed. Data
informing an ongoing incident is often sparse, with a large proportion of
relevant data only coming to light after the incident culminates or after
police intervene - by which point it is too late to make use of the data to aid
real-time decision making for the incident in question. Much of the data that
is available to police to support real-time decision making is highly
confidential so cannot be shared with academics, and is therefore missing to
them. In this paper, we describe the development of a formal protocol where a
graphical model is used as a framework for securely translating a model
designed by an academic team to a model for use by a police team. We then show,
for the first time, how libraries of these models can be built and used for
real-time decision support to circumvent the challenges of data missingness and
tardiness seen in such a secure environment. The parallel development described
by this protocol ensures that any sensitive information collected by police,
and missing to academics, remains secured behind a firewall. The protocol
nevertheless guides police so that they are able to combine the typically
incomplete data streams that are open source with their more sensitive
information in a formal and justifiable way. We illustrate the application of
this protocol by describing how a new entry - a suspected vehicle attack - can
be embedded into such a police library of criminal plots.