skip to main content
Skip header Section
Investigative Data Mining for Security and Criminal DetectionDecember 2002
Publisher:
  • Butterworth-Heinemann
  • 313 Washington Street Newton, MA
  • United States
ISBN:978-0-7506-7613-7
Published:01 December 2002
Pages:
272
Skip Bibliometrics Section
Reflects downloads up to 20 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

Coverage of specific technologies available that represent the cutting-edge in evidence gathering and collection through established information networks

- Introduces professionals to case studies illustrating real-world applications of data mining to law enforcement and investigators

- Illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science

- Includes numerous diagrams and screen captures to illustrate the use of these technologies

Cited By

  1. ACM
    Sohony I, Pratap R and Nambiar U Ensemble learning for credit card fraud detection Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, (289-294)
  2. ACM
    van Dijk J, Kalidien S and Choenni S Development, implementation and use of a judicial data space system Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance, (174-181)
  3. Duman E and Elikucuk I Solving credit card fraud detection problem by the new metaheuristics migrating birds optimization Proceedings of the 12th international conference on Artificial Neural Networks: advences in computational intelligence - Volume Part II, (62-71)
  4. Duman E and Elikucuk I Applying Migrating Birds Optimization to Credit Card Fraud Detection Revised Selected Papers of PAKDD 2013 International Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 7867, (416-427)
  5. Kalidien S, Choenni S and Meijer R Crime statistics online Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities, (131-137)
  6. ACM
    Pavlou K and Snodgrass R (2008). Forensic analysis of database tampering, ACM Transactions on Database Systems (TODS), 33:4, (1-47), Online publication date: 1-Nov-2008.
  7. Ozgul F, Erdem Z and Aksoy H Comparing Two Models for Terrorist Group Detection Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (149-160)
  8. Amirbekyan A and Estivill-Castro V A new efficient privacy-preserving scalar product protocol Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (209-214)
  9. Amirbekyan A and Estivill-Castro V Privacy-preserving regression algorithms Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization, (37-45)
  10. Amirbekyan A and Estivill-Castro V The privacy of k-NN retrieval for horizontal partitioned data Proceedings of the eighteenth conference on Australasian database - Volume 63, (33-42)
  11. Shaikh M, Wang J, Liu H and Song Y Investigative data mining for counterterrorism Proceedings of the 1st international conference on Advances in hybrid information technology, (31-41)
  12. Cao L Activity mining Proceedings of the Second international conference on Advanced Data Mining and Applications, (582-593)
  13. Wang J, Fu T, Lin H and Chen H A framework for exploring gray web forums Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, (498-503)
  14. Amirbekyan A and Estivill-Castro V Privacy preserving DBSCAN for vertically partitioned data Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, (141-153)
  15. ACM
    Yin X, Yurcik W, Treaster M, Li Y and Lakkaraju K VisFlowConnect Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, (26-34)
Contributors

Reviews

Peter P. Mykytyn

Since 9/11, there has been a significant amount of attention devoted to all of the various aspects of physical security, such as security at airports. In addition, law enforcement agencies, such as the FBI and, more recently, the Office of Homeland Security, have invested considerable resources in ways to analyze information before the fact, in order to prevent terrorism and crime. In his book, the author often refers to this information as “precrime.” Mena discusses and identifies a number of specific technologies that have been in use in business and industry, and provides great detail regarding their application to identifying information that can be used for crime prevention. He accomplishes this without burdening the reader with excess mathematics. The book integrates data mining concepts, which involve terms like “discover,” “identify,” and “probe,” with important aspects of artificial intelligence (AI), involving terms like “link analysis,” “intelligent agents,” “text mining,” “neural networks,” and “machine learning.” The purpose of the book is to provide explanations of these technologies, and to discuss their applications to precrime. The information provided will be of interest to law enforcement investigators, fraud specialists, information technology security personnel, military and civilian security analysts, and decision makers who are responsible for criminology and criminal analysis, but who have little or no experience with data analysis and data mining, behavioral analysis, modeling, and prediction. An introductory chapter introduces a number of the important concepts that are elaborated on in later chapters. Terms such as behavioral profiling, data mining, and data warehousing are defined for the reader, using terminology applicable to the precrime setting. AI aspects are also introduced and explained briefly. In addition to in-depth discussions of AI issues, such as machine learning and neural networks, Mena includes a chapter titled “Net Fraud: A Case Study.” This chapter focuses on credit card fraud in a real-time environment. Other chapters include “Criminal Patterns: Detection Techniques,” “Intrusion Detection: Techniques and Systems,” “Mapping Crime: Clustering Case Work,” and “The Entity Validation System (EVS): A Conceptual Architecture.” Several appendices are also included in the book. Appendix A lists URLs for 1,000 online sources for the investigative data miner, divided into several subcategories. Appendix B lists products, services, freeware, and projects relevant to intrusion detection systems (IDS). Appendix C is a comprehensive intrusion detection glossary. Appendix D is a list of investigative data mining products and services, complete with names, organizations, and Web site addresses. The book also includes a substantial index, as well as numerous end-of-chapter references. The entire text is approximately 460-pages long, including the introductory pages. One of the nice features of the book is its generous use of charts, graphs, and figures. Often, the figures are screen shots from various software tools and packages, making it easier to comprehend some of the material. Several case studies are also included in various chapters, which also adds to the comprehensibility of the topics. The author makes generous use of headings and subheadings within the chapters, which serve to provide appropriate segregation of materials for the reader. However, I found the repetition of certain paragraphs rather strange: two paragraphs in chapter 1 dealing with calibrating crime (Section 1.4) are essentially verbatim repetitions of the same paragraphs presented on page 14 dealing with precrime (Section 1.10). These were the only two occurrences of repetitions I found, but it made me wonder if there were others that went unnoticed. Overall, I found the book interesting and very informative. The intended audience should certainly find this book very worthwhile. It is essentially a “how to” book for detecting and discovering information age crime before it happens. Other readers, such as corporate executives, and even the general reader, might also find the book worthwhile, informative, and enlightening. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations