Domain Specific Report Big Data
Domain Specific Report Big Data
records. Likewise, another technique was presented in [4], network analytics because they can effectively integrate the
primarily using NLP technique to find entities like occupa- elusive qualities of human reasoning with the perfect mem-
tion, people, addresses etc, by matching words or sentences ory of computers, compulsive thoroughness, precise logic
from the already available text data. Then, those words and commutation.
or sentences are compared within the criminal network to Using ANN, a model was proposed in [12], where the
find any associations or trends. It is feasible to recognise previous knowledge of the behavior of a criminal can be
dishonest people using text mining techniques based on used to predict the future crime location. The authors used
linguistic characteristics. For instance, text mining and data criminal classification to retrieve the most accurate pattern.
mining techniques were used in [5] to find bogus items in a A number of ANN tools have been developed over the years,
textual content. A rule-based approach was created by Yin to having user friendly interfaces and having the ability to
capture sentiment features, where contextual elements were automatically change, according to their environment, their
found by comparing textual postings to a window of nearby internal structure.
textual posts in [6]. Additionally, SVM was used in the
text mining technique to categorise abusive posts on online
social media. Furthermore, perilog is a tool introduced by
NASA that can extract relevant data by context from any
text document or phrases in [7]. It was originally created
as part of FAA’s Aviation Safety Reporting System, whose
implementation was done to look for the primary reason for
the crash of an airline in [8].
4.4. Progress
The integration of big data in law enforcement has been a
rapidly advancing field, increasingly utilized by law enforce-
ment agencies globally. The following are some examples of
how big data has been implemented in law enforcement, as
well as the advancements made:
4.3. Method - Crime Prevention: Law enforcement agencies are lever-
The above mentioned data mining techniques are few of aging big data to prevent crimes before they happen. They
the ones that can be used to get information about crimes use data analytics to study previous crimes, predict where
and criminals from the available data. Cluestering, block- and when future crimes are likely to occur, and then allocate
mining, association rules are some of the techniques that resources more efficiently to proactively prevent crimes.
can be used for this purpose. Some authors have proposed - Investigation: Big data is also used for investigations.
solution that implement most of these techniques and can By analyzing data from social media, surveillance cameras,
be practically implemented after overcoming their respective and other sources, law enforcement agencies can collect ev-
fields’ challenges. We can build systems with these technolo- idence and identify suspects more efficiently and accurately.
gies, feed data to it, and then the system will train to predict - Predictive Policing: Predictive policing is a method that
future trends. uses data analysis to identify areas with a high likelihood
of crime. Law enforcement agencies use big data to build
Conclusion predictive models that determine where and when crimes are
Big data applications in law run the risk of being char- most likely to occur, enabling them to deploy resources more
acterized as either inevitable or impractical. Understanding effectively.
the techniques used, the biases introduced when selecting a - Sentencing: Big data is also used to inform sentencing
method for machine learning, the type of inferences formed, decisions. By studying data on past sentencing decisions,
law enforcement agencies can identify disparities and biases scaling: A comparative study on domestic violence, Applied Soft
and develop more equitable sentencing guidelines. Computing 11 (2011) 3870–3876.
- Real-Time Analytics: Real-time analytics involves an- [4] R. Lee, Automatic information extraction from documents: A tool for
intelligence and law enforcement analysts, in: Proceedings of 1998
alyzing data as it is produced to provide law enforcement AAAI Fall Symposium on Artificial Intelligence and Link Analysis,
agencies with current information on possible threats and volume 23, AAAI Press Menlo Park, CA, 1998.
criminal activity. This allows them to respond faster and [5] C. M. Fuller, D. P. Biros, D. Delen, An investigation of data and text
more effectively to emerging situations. mining methods for real world deception detection, Expert systems
In conclusion, the application of big data in law en- with applications 38 (2011) 8392–8398.
[6] D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, L. Edwards,
forcement has made significant strides, and its usefulness Detection of harassment on web 2.0, Proceedings of the Content
will only continue to grow with advancements in technology Analysis in the WEB 2 (2009) 1–7.
and data analytics. However, it is critical that ethical and [7] M. W. McGreevy, Using Perilog to Explore" Decision Making at
legal considerations are made to ensure responsible and NASA", Technical Report, 2005.
accountable use of big data in law enforcement. [8] C. Billings, J. Lauber, H. Funkhouser, E. Lyman, E. Huff, NASA
aviation safety reporting system, Technical Report, 1976.
[9] M. Strano, A neural network applied to criminal psychological
4.5. Problems Faced profiling: An italian initiative, International Journal of Offender
Working with big data in law enforcement comes with Therapy and Comparative Criminology 48 (2004) 495–503.
several challenges that need to be addressed to ensure re- [10] T. M. Li, M. Chau, P. W. Wong, P. S. Yip, A hybrid system for
sponsible and effective use of the technology. The following online detection of emotional distress, in: Intelligence and Security
Informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur,
are some of the problems that law enforcement agencies face Malaysia, May 29, 2012. Proceedings, Springer, 2012, pp. 73–80.
when working with big data: [11] J. J. Xu, H. Chen, Fighting organized crimes: using shortest-path
- Privacy concerns: The collection and use of large algorithms to identify associations in criminal networks, Decision
amounts of personal data, such as information from social Support Systems 38 (2004) 473–487.
media and surveillance cameras, raise privacy concerns. [12] K. Dahbur, T. Muscarello, Classification system for serial criminal
patterns, Artificial Intelligence and Law 11 (2003) 251–269.
Law enforcement agencies must balance the need for public
safety with individual privacy rights.
- Accuracy and reliability of data: The accuracy and
reliability of big data are crucial to its effectiveness in A. IPR Certificate
law enforcement. Errors in data collection, processing, or We, [Your Name] and [Your Partner Name], with this
analysis could lead to false positives, which can have severe certify that the project work submitted by us entitled [Project
consequences. Title] to our supervisors, Dr. Alok Kumar and Dr. Utsav
- Data security: The vast amount of data collected by Upadhyay, in partial fulfillment of the requirements for the
law enforcement agencies needs to be kept secure to protect course is a bonafide work carried out by us and has not been
against data breaches or unauthorized access. previously submitted to any other course. We further certify
- Bias and discrimination: There is a risk that big data that no part of this work shall be published, reproduced,
analysis could lead to profiling or discrimination against or distributed in any form without the prior permission of
certain groups based on factors such as race or gender. our supervisors. We understand that any such unauthorized
- Technological limitations: Law enforcement agencies use of the project work may be considered a violation of
may face technological limitations in terms of infrastructure, academic ethics and result in severe penalties. We also affirm
data processing, and data storage capacity. that the project work has been carried out under the ethical
- Legal and ethical considerations: The use of big data standards and guidelines set forth by our supervisors. We
in law enforcement also raises legal and ethical considera- acknowledge that our supervisor has the right to make any
tions, such as data privacy, transparency, and accountability. modifications or revisions to the project work that may be
Overall, the use of big data in law enforcement presents deemed necessary. We also agree to abide by any additional
significant challenges that must be addressed to ensure that terms and conditions as stipulated by our supervisor.
its use is responsible, ethical, and effective. Law enforcement
agencies need to implement policies and procedures that Date: 20th May, 2023
address these challenges and ensure that the use of big data
is transparent and accountable. Signature of Student:
Chitra Lakhani
References 2020BTECHCSE024
JK Lakshmipat University, Jaipur
[1] R. Al-Zaidy, B. C. Fung, A. M. Youssef, Towards discovering
criminal communities from textual data, in: Proceedings of the 2011
ACM Symposium on Applied Computing, 2011, pp. 172–177. Signature of Student:
[2] Y.-H. Tseng, Z.-P. Ho, K.-S. Yang, C.-C. Chen, Mining term networks Vikas Janu
from text collections for crime investigation, Expert Systems with 2020BTECHCSE083
Applications 39 (2012) 10082–10090.
JK Lakshmipat University, Jaipur
[3] J. Poelmans, M. M. Van Hulle, S. Viaene, P. Elzinga, G. Dedene, Text
mining with emergent self organizing maps and multi-dimensional