A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement

作者: Matthew Edwards , Awais Rashid , Paul Rayson

DOI: 10.1145/2811403

关键词:

摘要: As an increasing amount of crime takes on a digital aspect, law enforcement bodies must tackle online environment generating huge volumes data. With manual inspections becoming increasingly infeasible, are optimising investigations through data-mining technologies. Such technologies be well designed and rigorously grounded, yet no survey the literature exists which examines their techniques, applications rigour. This article remedies this gap systematic mapping study describing visibly targets applications, using evidence-based practices in making to produce replicable analysis can methodologically examined for deficiencies.

参考文章(198)
David Skillicorn, Detecting Related Message Traffic ,(2004)
Ashish Sureka, Ponnurangam Kumaraguru, Atul Goyal, Sidharth Chhabra, Mining YouTube to Discover Extremist Videos, Users and Hidden Communities asia information retrieval symposium. pp. 13- 24 ,(2010) , 10.1007/978-3-642-17187-1_2
Malcolm W. Corney, Analysing e-mail text authorship for forensic purposes Queensland University of Technology. ,(2003)
Julia Hirschberg, William Warner, Detecting Hate Speech on the World Wide Web Proceedings of the Second Workshop on Language in Social Media. pp. 19- 26 ,(2012)
Thamar Solorio, Paolo Rosso, Dasha Bogdanova, Modelling Fixated Discourse in Chats with Cyberpedophiles Proceedings of the Workshop on Computational Approaches to Deception Detection. pp. 86- 90 ,(2012)
Xiaofeng Wang, Matthew S. Gerber, Donald E. Brown, Automatic Crime Prediction Using Events Extracted from Twitter Posts Social Computing, Behavioral - Cultural Modeling and Prediction. pp. 231- 238 ,(2012) , 10.1007/978-3-642-29047-3_28
Yiming Yang, Bryan Klimt, Introducing the Enron Corpus. conference on email and anti-spam. ,(2004)
Jianbin Ma, Guifa Teng, Shuhui Chang, Xiaoru Zhang, Ke Xiao, Social Network Analysis Based on Authorship Identification for Cybercrime Investigation Intelligence and Security Informatics. pp. 27- 35 ,(2011) , 10.1007/978-3-642-22039-5_3