{"title":"数据挖掘在犯罪领域的应用分析","authors":"P. Thongtae, S. Srisuk","doi":"10.1109/CIT.2008.WORKSHOPS.80","DOIUrl":null,"url":null,"abstract":"In this paper, we give comprehensive surveys of efficient and effective methods/techniques on data mining for crime data analysis. These techniques aim at finding the illegal activities of professional identity fraudsters based on knowledge discovered from their own histories. We also raise some problems of applied data mining in crime control and criminal suppression. It is known that detecting crime from data analysis can be difficult because daily activities of criminal generate large amounts of data and stem from various formats. In addition, the quality of data analysis depends greatly on background knowledge of analyst. A criminal can range from civil infraction such as illegal driving to terrorism mass murder such as the 9/11 attacks, therefore it is difficult to model the perfect algorithm to cover all of them. Finally, this paper proposes a guideline to overcome the problem.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"42","resultStr":"{\"title\":\"An Analysis of Data Mining Applications in Crime Domain\",\"authors\":\"P. Thongtae, S. Srisuk\",\"doi\":\"10.1109/CIT.2008.WORKSHOPS.80\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we give comprehensive surveys of efficient and effective methods/techniques on data mining for crime data analysis. These techniques aim at finding the illegal activities of professional identity fraudsters based on knowledge discovered from their own histories. We also raise some problems of applied data mining in crime control and criminal suppression. It is known that detecting crime from data analysis can be difficult because daily activities of criminal generate large amounts of data and stem from various formats. In addition, the quality of data analysis depends greatly on background knowledge of analyst. A criminal can range from civil infraction such as illegal driving to terrorism mass murder such as the 9/11 attacks, therefore it is difficult to model the perfect algorithm to cover all of them. Finally, this paper proposes a guideline to overcome the problem.\",\"PeriodicalId\":155998,\"journal\":{\"name\":\"2008 IEEE 8th International Conference on Computer and Information Technology Workshops\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"42\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE 8th International Conference on Computer and Information Technology Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIT.2008.WORKSHOPS.80\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.80","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Analysis of Data Mining Applications in Crime Domain
In this paper, we give comprehensive surveys of efficient and effective methods/techniques on data mining for crime data analysis. These techniques aim at finding the illegal activities of professional identity fraudsters based on knowledge discovered from their own histories. We also raise some problems of applied data mining in crime control and criminal suppression. It is known that detecting crime from data analysis can be difficult because daily activities of criminal generate large amounts of data and stem from various formats. In addition, the quality of data analysis depends greatly on background knowledge of analyst. A criminal can range from civil infraction such as illegal driving to terrorism mass murder such as the 9/11 attacks, therefore it is difficult to model the perfect algorithm to cover all of them. Finally, this paper proposes a guideline to overcome the problem.