Using importance flooding to identify interesting networks of criminal activity

Byron Marshall, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice information (e.g., open warrants and convictions) is important, but different data sets are needed for investigational activities where requirements are not as clear and policy concerns abound. The community needs sharing models that employ obtainable data sets and support real-world investigational tasks. This work presents a methodology for sharing and analyzing investigation-relevant data. Our importance flooding application extracts interesting networks of relationships from large law enforcement data sets using user-controlled investigation heuristics and spreading activation. Our technique implements path-based interestingness rules to help identify promising associations to support creation of investigational link charts. In our experiments, the importance flooding approach outperformed relationship-weight-only models in matching expert-selected associations. This methodology is potentially useful for large cross-jurisdictional data sets and investigations.

Original languageEnglish (US)
Title of host publicationIntelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings
PublisherSpringer-Verlag
Pages14-25
Number of pages12
ISBN (Print)3540344780, 9783540344780
DOIs
StatePublished - Jan 1 2006
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2006 - San Diego, CA, United States
Duration: May 23 2006May 24 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3975 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2006
CountryUnited States
CitySan Diego, CA
Period5/23/065/24/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Using importance flooding to identify interesting networks of criminal activity'. Together they form a unique fingerprint.

  • Cite this

    Marshall, B., & Chen, H. (2006). Using importance flooding to identify interesting networks of criminal activity. In Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings (pp. 14-25). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3975 LNCS). Springer-Verlag. https://doi.org/10.1007/11760146_2