Comparative Analysis of Data Mining in Criminal and Fraud Detection

Authors

  • Ayushi Dwivedi Amity University, Noida, India. Author

DOI:

https://doi.org/10.61841/1w60ea05

Keywords:

FBI, Data Mining,, Computer, KDD, data cleaning,, data integration, data selection,, data transformation,, extraction, pattern, , pattern evaluation, interestingness measures, knowledge presentation,, database, database warehouse,, repository, pattern evaluation,, user interface,, data warehouse, user interaction.

Abstract

This manuscript explains the concept of data mining and its application in cybercrimes. Cybercrimes are becoming very serious day by day due to large data sets are generated by organizations and lack of the awareness of the internet users. The application of data mining in cybercrime and framework of data mining for detection of financial fraud is explained. A comparative analysis on digital forensic tools and techniques are done with their benefits

 

Downloads

Download data is not yet available.

References

1. Han, M. Kamber, Data Mining: Concepts and Techniques, Second ed, Morgan Kaufmann Publishers, 2006, pp. 285–464.

2. P. Tan, M. Steinbach, V. Kumar, Introduction to Data Mining, First ed.AddisonWesley Longman Publishing Co., Inc, 2005

3. D. Zhang, L. Zhou, Discovering golden nuggets: data mining in financial application, IEEE Transactions on Systems, Man and Cybernetics 34 (4) (2004) Nov.

4. Yue, X. Wu, Y. Wang, Y. Li, C. Chu, A review of data mining-based financial fraud detection research, international conference on wireless communications Sep, Networking and Mobile Computing (2007) 5519–5522

5. E.W.T. Ngai, L. Xiu, D.C.K. Chau, Application of data mining techniques in customer relationship management: a literature review and classification, Expert Systems with Applications 36 (2) (2009) 2592– 2602

6. Chau, M., Xu,J.J., & Chen,H. (2002,May) .Extracting meaningful entities from police narrative reports. In Proceedings of the 2002 annual national conference on Digital government research (pp. 1-5). Digital Government Society of North America.

7. Chen, H., Chung, W.,Xu. J., Wang,G., Qin,Y.,& Chau,M.(2004). Crime data mining: a general frame work and some examples. computer, (4),50-56.

8. Cocx, T. K., &Kosters, W.A. (2006, July). A distance measure for determining. Similarity between criminal investigations. An Industrial Conference on Data Mining. (pp.511-525). Springer, Berlin, Heidelberg

9. Ku,C. H., Iriberri,A.,and Leroy.G.(2008).Crime information extraction from police and witness narrative reports. In: Proceedings of the IEEE Conference on Technologies for Homeland Security,12-13May, Waltham, MA:193–198.

10. Pinheiro, V., Furtado, V.,Pequeno, T., and Nogueira,D.(2010). Naturallan-guage processing based on semantic inferentialism for extracting crime information from text. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), 23-26May, Vancouver, BC, Canada:19–24.

11. Nath, S. V. (2006, December). Crime pattern detection using data mining. In2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops (pp. 41-44).

12. Pang-Ning,T., Steinbach,M.,and Kumar,V.(2014). Introduction to Data Mining. First Edition,Pearson:UK.

13. Dietterich,T. G.,Becker, S.,& Ghahramani,Z.(Eds.). (2002).AdvancesinNeural Information Processing Systems 14:Proceedings ofthe2001Conference (Vol.2). MIT Press.

14. Anderberg, M.R. (1973). Cluster analysis for applications (No.OAS-TR-73-9). Office of the assistant for study support kirtlandAFBnmex.

15. Ng,R. T., &Han,J.(1994, September).E cientand E ective clustering methods for spatial data mining.In Proceedings of VLDB (pp. 144-155).

16. Schroeder, J., Xu,J., Chen,H.,and Chau, M. (2007). Automated criminal link analysis based on domain knowledge. Journal of the American Society for Information Science and Technology,58(6):842–855.

17. Brown,D.E., and Hagen,S.(2003). Data association methods with applications to law enforcement. DecisionSupportSystems,34(4):369–378.

18. Lin, S., & Brown D. E. (2006). An outlier-based data association method for linking criminalincidents. DecisionSupportSystems,41(3),604-615.

19. Appavu, S., Pandian, M., andRajaram,R.(2007).AssociationRuleMiningfor Suspicious Email Detection: A Data Mining Approach In:Proceedings ofthe IEEE IntelligenceandSecurityInformatics,23- 24May,NewBrunswick,NJ:316–323.

20. Ng,V., Chan,S., Lau,D.,&Ying,C.M. (2007,March).Incremental mining for temporalassociationrulesforcrimepatterndiscoveries.InProceedings of the eighteenth conference on Australasiandatabase-Volume63(pp.123-132). Australian Computer Society,Inc..

21. Buczak,A.L., and Gifford, C.M. (2010). Fuzzy Association Rule mining for community crime pattern discovery. In: Proceedings of the ACM SIGKDD Work-shop on Intelligence andSecurityInformatics,25- 28July, WashingtonDC.

22. Sparrow, M.K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social networks, 13(3), 251-274.

23. Wang,J.C., and Chiu,C.Q.(2005). Detecting online auction inflated-reputation behaviors using social network analysis.In: Proceedings of the Annual Conference of the NorthAmerican Association for Computational Socialand Organizational Science,Notre Dame:26–28

24. Qin, J.,Xu,J. J., Hu,D., Sageman,M.,and Chen,H. (2005). Analyzing terrorist networks:In Intelligence and Security informatics,3495:287–304.

25. McNally, D., &Alston,J. (2005). The use of social network analysis (SNA)in the examination of an outlaw motor cycle gang. Journal of Gang Research,13(3),1.

Downloads

Published

30.06.2020

How to Cite

Dwivedi, A. (2020). Comparative Analysis of Data Mining in Criminal and Fraud Detection. International Journal of Psychosocial Rehabilitation, 24(6), 1449-1460. https://doi.org/10.61841/1w60ea05