The use of data mining techniques in operational crime fighting

15Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper looks at the application of data mining techniques, principally the Self Organising Map, to the recognition of burglary offences committed by an offender who, although part of a small network, appears to work on his own. The aim is to suggest a list of currently undetected crimes that may be attributed to him, improve on the time taken to complete the task manually and the relevancy of the list of crimes. The data was drawn from one year of burglary offences committed within the West Midlands Police area, encoded from text and analysed using techniques contained within the data mining workbench of SPSS/Clementine. The undetected crimes were analysed to produce a list of offences that may be attributed to the offender. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Adderley, R. (2004). The use of data mining techniques in operational crime fighting. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3073, 418–425. https://doi.org/10.1007/978-3-540-25952-7_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free