ISTAfrica2020 Paper Ref 124
ISTAfrica2020 Paper Ref 124
ISTAfrica2020 Paper Ref 124
1. Introduction
Intelligence gathering is the purview of any government that seeks to ensure the safety of
its citizens. According to [1], every government has the interests of the citizen within the
realm of responsibilities that cannot be avoided. Regardless, many governments find it very
challenging to promise, guarantee or even control the security in the nation. Criminal
activities around the world can be in two forms; local crime and international crime [2, 3].
Local criminal activities intend to cause harm, loss of property and unfair gain in wealth
or resources through corrupt or illegal means. International crimes are initiated and
executed by organized crime syndicates. They often include; prostitution rings, illegal
firearms trade, drug peddling, ivory and exotic wildlife trade, human trafficking and other
commercial crimes such as fraud. The constitution of Kenya is very clear about the actions
that need to be taken once a criminal or suspect is apprehended in connection to any of
these crimes. However, the constitution does not prescribe investigation methods.
Based on the assertion by [4], as criminal activities continue to increase, they become
more sophisticated and difficult to detect. There are modern technologies such as social
media and cloud technologies that have motivated cybercrime as well. As technology
advances, it is important to take advantage of the same technologies to combat crime. Most
criminal activities are repeat patterns of fraud and con schemes that can be detected if the
2. Objectives
The aim of this research is to develop a model for Real-Time Location based Prototype for
Notification of Crime Hotspots Using Crowdsourcing so as to aid in intelligence and in
combating criminal activity. By having data gathered about the different criminal activities
and represented in an information gathering interface, the solution is a concise and effective
tool to efficiently guide in crime prevention.
1. To investigate factors relating to crime hotspots identification.
2. To review the existing techniques and solutions used in the identification of crime
hotspot areas.
3. To develop a crowd-based prototype for gathering criminal-related information and
analyse it in order to identify crime hotspot areas in Nairobi.
4. To validate the proposed solution.
3. Methodology
This research incorporated both qualitative and quantitative methods of research. The
qualitative research objective was to get an enhanced understanding through truthful
reporting, first-hand experience, and citations of actual conversations. This was used to
understand the current platforms and process being used in crowdsourcing of data by the
different organizations applying the technology. The quantitative research was used to see
the number of people who would like to participate in crowdsourcing for the purpose of
reporting criminal hotspots.
Agile Development Methodology was applied since it allowed for faster iteration and
more frequent release with subsequent user feedback and it also enabled the researchers to
better define the system requirements as the process is done incrementally [8]. The steps
followed in this study to achieve the set objectives are as follows: The first step was
requirements, which involved the collection of the intended product specification, or
features and specifying what it should do or how it should do it. The second step was the
architecture and design, which includes defining the architecture and design of the system.
Development of the system is the third step, which involved implementation of the system.
Test and feedback is the fourth step, which allowed for the product improvement [9]. The
developed prototype was tested independently during every development iteration. The data
flow between the different components was also tested. Testing the prototype was for
purposes of making sure that the needed functionalities are working as required.
The target population was majorly persons actively involved on Twitter as a
crowdsourcing platform. Since the population is greater than 50,000, a sample size for
infinite population was determined appropriately. According to [10], the sample size for
such a population can be determined using the formula shown in Formula 3.1
SS=Z^2*P*(1-p)/C^2
This can be resolved for n (the sample), used to determine the minimum sample size to
be used in order to assure a given level of confidence and maximum error allowed.
2
4. Technology Description
In order to develop the solution, requirements were obtained from a survey conducted via a
questionnaire. The target population was majorly persons actively involved on Twitter as a
crowdsourcing platform. The research had a sample of 100 participants, of which 90 were
successfully reached to fill out questionnaires by the means of Google forms. The
questionnaires were appropriately distributed to the respondents relatively at the same time.
Out of the 90 questionnaires sent out, a total of 74 forms were filled by the respondents.
This is in congruent to the provisions of [11] who argue that; as long as the response rate
from a questionnaire is more than half of the submitted lot, the response rate is valid to
make conclusions about the research. Figure 1 shows the questionnaire return rate.
For purposes of this study, three major age brackets were considered; below 30 years,
between 31-45 years and above 45 years. The goal was not to estimate the exact age of the
respondents but to get an estimate of the feeling of the respondents from the different age
brackets. The responses from the participants concerning their age estimates is as indicated
in Table 2.
Table 2: Age Bracket of the Respondents
AGE BRACKET (YRS) NUMBER RATE (%)
BELOW 30 YEARS 42 56.8
31-45 YEARS 22 29.7
ABOVE 45 YEARS 10 13.5
TOTAL 74 100.0
Table 3 on the other hand shows the participant’s exposure to crowdsourcing platforms.
Table 3: Participants’ Exposure to Crowdsourcing Platforms
Exposure Level Number of Respondents Rate (%)
Very Exposed (5) 25 33.8
Exposed (4) 24 32.4
Moderately exposed (3) 11 14.9
Less Exposed (2) 9 12.2
Unexposed (1) 5 6.7
Total 74 100
The participants’ willingness to participate in the use and testing of a prototype in any
way was asked. The answered sought were either ‘yes’ or ‘no.’ Figure 2 indicates the
willingness of the participants to participate in the use of the prototype.
5. Results
An integrated development environment was utilized for the development of the prototype.
This encompassed the use of technologies necessary for developing of PHP web
applications with other development languages namely; JavaScript, SQL, CSS and HTML.
Generally, the prototype was based on effective control of data about certain phenomenon
Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 6 of 10
and the ability to get the right respondents to test the system. A web-based design was
incorporated to capture data and allow respondents offer information concerning their
location and witnessed crimes.
The developed prototype consists of the following modules:
1. A user module for reporting crime incidents.
2. A crime information module that analyses crimes as they are reported. This module
presents statistics about criminal activities in the city.
3. A general information module that is consistently updated as users continue updating
the system. It contains information about general crime update about the city.
In order to ensure that the posts are legitimate, a user registration and login feature is
provided. To log into the system, the user has to input their username and password in the
login prompt and press the return key (Enter) or [Login] button indicated, to ensure that
only authorized users are granted access. Upon Keying in the user details, the system is be
able to verify the credentials and then direct the user to the appropriate page. The login
prompt is as shown in Figure 6.
7. Conclusions
The research proved that indeed, a crowd-based system can be used for crime hotpots
reporting and criminal activity description. This system was designed using the parameters
used in a police crime incident reporting system from the literature and Twitter users. These
parameters were then used to develop the system and improve on its functionalities. Since
the input parameters on the system were similar to the expected inputs by users of the
system, the design of the system was quite flexible and appealing. It did not require too
many improvements on the crime hotspot network interface, and neither did it require an
overhaul of existing criminal database systems.
In relation to user acceptance, from the literature studied, many city dwellers are
resistant to technological change of such a nature, especially reporting crimes, as they
feared victimization. It is therefore important to formulate strategies to encourage crime
reporting beyond just the usual indication of anonymization.
A key weakness of the proposed solution is that, in as much as the targeted users were
very active on Twitter, pushing them to use a separate platform to report crimes can be
cumbersome. Therefore, integrating the developed platform with Twitter may provide
additional value. Additionally, the test results also showed divergent views about the need
for a login interface for such purposes. This is an aspect that may be explored further on
how to improve. Additionally, more direct engagements need to be done with other key
stakeholders including the local government and the police. In as much as their
representation had been considered via the sampling technique used, there is need for a
more dedicated engagement through various data collection channels. Moreover, there is
more that can be improved through integration of geolocation capabilities that have had
significant developments over the past few years.