skip to main content
10.1145/502512.502541acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Data mining case study: modeling the behavior of offenders who commit serious sexual assaults

Published:26 August 2001Publication History

ABSTRACT

This paper looks at the use of a Self Organizing Map (SOM), to link of records of crimes of serious sexual attacks. Once linked a profile can be derived of the offender(s) responsible.The data was drawn from the major crimes database at the National Crime Faculty of the National Police Staff College Bramshill UK. The data was encoded from text by a small team of specialists working to a well-defined protocol. The encoded data was analyzed using SOMs. Two exercises were conducted. These resulted in the linking of several offences in to clusters each of which were sufficiently similar to have possibly been committed by the same offender(s). A number of clusters were used to form profiles of offenders. Some of these profiles were confirmed by independent analysts as either belonging to known offenders or appeared sufficiently interesting to warrant further investigation.The prototype was developed over 10 weeks. This contrasts with an in-house study using a conventional approach, which took 2 years to reach similar results. As a consequence of this study the NCF intends to pursue an in-depth follow up study.

References

  1. 1.Adderley, R., Musgrove, P. B., (1999), Data mining at the West Midlands Police: A study of bogus official burglaries. BCS Special Group Expert Systems, ES99, London, Springer-Verlag, pp191-203Google ScholarGoogle Scholar
  2. 2.Adderley, R., Musgrove, P.B, (2001), Police crime recording and investigation systems, a user's view. Policing An International Journal of Police Strategies and Management, 24(1), ppl00-114.Google ScholarGoogle ScholarCross RefCross Ref
  3. 3.Brantingham, P.L., Brantingham, P.L,. (1991), Notes on the geometry of crime, in Environmental Criminology, USA: Wavelend Press Inc.Google ScholarGoogle Scholar
  4. 4.Canter, D., Heritage, R., (1990), A multivariate model of sexual offence behaviour: Developments in offender profiling I. The Journal of Forensic Psychiatry, 1(2), pp185-212.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.Canter, D., Larkin, P., (1993), Environmental range of serial rapists. Journal of Environmental Psychology, 13 pp63-69.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6.Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., Wirth, Rudiger (2000) CRISP-DM 1.0 Step-by-step data mining guide, USA: SPSS Inc. CRISPWP-0800 2000.Google ScholarGoogle Scholar
  7. 7.Davies, A., (1992), Rapists' behaviour: A three aspect model as a basis for analysis and the identification of serial crime. Forensic Science International, 55 pp173-194.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.Hazelwood, R. R., Reboussin, R., Warren, J. I. (1989), Series Rape: Correlates of increased aggression and the relationship of offender pleasure to victim resistance. Journal of lnterpersonal Violence 4 pp65- 78.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9.Kohonen, T. (1984), Self-organisation and associative memory, Springer series in information sciences, Vol 8. Springer Verlag, New York, USA, 1984 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.LeBeau, J.I., (1987), Patterns of stranger and serial rape offending: Factors distinguishing apprehended and at large offenders. Journal of Criminal Law and Criminology 78 pp309-326.Google ScholarGoogle ScholarCross RefCross Ref
  11. 11.Rhodes, W.M., Conly, C., (1991), The criminal commute: A theoretical perspective in Environmental Criminology, USA: Wavelend Press Inc.Google ScholarGoogle Scholar
  12. 12.Weiss, S.M., Indurkhya, N., (1998), Predictive data mining: a practical guide. San Francisco, USA: Morgan Kaufman Publishers Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Data mining case study: modeling the behavior of offenders who commit serious sexual assaults

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '01: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
      August 2001
      493 pages
      ISBN:158113391X
      DOI:10.1145/502512

      Copyright © 2001 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 August 2001

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      KDD '01 Paper Acceptance Rate31of237submissions,13%Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader