Skip to main content

2021 | OriginalPaper | Buchkapitel

Text Mining for Cybercrime in Registrations of the Dutch Police

verfasst von : André M. van der Laan, Nikolaj Tollenaar

Erschienen in: Cybercrime in Context

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Aim: Surveys mention substantial rates of cybercrime victimization. However, little is known about the number of police registrations that refer to cybercrime. The aim of this study was to estimate the number of police registrations referring to cybercrime in the Netherlands based on text fields within the police registration system. We focused on cyber-dependent crime (hacking, ransomware and DDoS attacks), as well as on cyber-enabled crime (online threats, stalking, libel, identity fraud and buying and selling fraud). Method: A random sample of Dutch police registrations from 2016 (n = 100.000) was selected, to estimate the number of cybercrime referrals. A machine-learning classifier was developed using text, in order to classify police registrations as referring to a type of cybercrime. Results: In 2016, between 0.10% and 0.62% of all registrations refer to cyber-dependent crime and between 3.33% and 7.41% were related to cyber-enabled crime. These estimates fall in between the rate of police-reported victimization of cybercrime and the number of cybercrimes based on the police’s uniform crime registration. Conclusion: Estimates of the rate of police-registered cybercrime based on textual fields of the police registrations were found to be relatively low but in absolute numbers substantial.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Whereas algorithms are increasingly used in police practice such as predictive policing or with regard to classifying court decisions, see Završnik (2019).
 
2
The choice for these eight types of cybercrime is based on literature and conversations with experts and police officers. We chose not to apply the UCR format, given that it is rather limited with regard to distinguishing different types of cybercrime.
 
3
In Dutch police practice, the use of a query for estimating cybercrimes is common at the moment (see Boekhoorn, 2019), but less accurate compared to a PTM approach.
 
4
A classification model can predict a confidence score for new data that lies between 0 and 1. Classification is determined by the decision rule that the confidence score is greater than the cut-off score, the classification threshold. This value is usually 0.5.
 
Literatur
Zurück zum Zitat Bischl, B., Lang, M., Kotthoff, L., Schiffner, J., Richter, J., Studerus, E., … Jones, Z. (2016). MLR: Machine learning in R. Journal of Machine Learning Research, 17(170), 1–5. Bischl, B., Lang, M., Kotthoff, L., Schiffner, J., Richter, J., Studerus, E., … Jones, Z. (2016). MLR: Machine learning in R. Journal of Machine Learning Research, 17(170), 1–5.
Zurück zum Zitat Boekhoorn, P. (2019). De aanpak van cybercrime door regionale eenheden van de politie. Van intake van cybercrime naar opsporing en vervolging. Den Haag: Politie en Wetenschap. Boekhoorn, P. (2019). De aanpak van cybercrime door regionale eenheden van de politie. Van intake van cybercrime naar opsporing en vervolging. Den Haag: Politie en Wetenschap.
Zurück zum Zitat Bosch, A., Busser, G. J., Daelemans, W., & Canisius, S. (2007). An efficient memory-based morphosyntactic tagger and parser for Dutch. Paper presented at the 17th Computational Linguistics Meeting, Leuven. Bosch, A., Busser, G. J., Daelemans, W., & Canisius, S. (2007). An efficient memory-based morphosyntactic tagger and parser for Dutch. Paper presented at the 17th Computational Linguistics Meeting, Leuven.
Zurück zum Zitat Brandenburg, M. (2017). Text classification of Dutch police records (Masterthesis). Utrecht: University of Utrecht. Brandenburg, M. (2017). Text classification of Dutch police records (Masterthesis). Utrecht: University of Utrecht.
Zurück zum Zitat CBS. (2018). Cybersecuritymonitor 2018. Den Haag: CBS. CBS. (2018). Cybersecuritymonitor 2018. Den Haag: CBS.
Zurück zum Zitat Chawla, N. V., Japkowicz, N., & Kolcz, A. (2004). Editorial: Special issue on learning from imbalanced data sets. Sigkdd Explorations, 6(1), 1–6.CrossRef Chawla, N. V., Japkowicz, N., & Kolcz, A. (2004). Editorial: Special issue on learning from imbalanced data sets. Sigkdd Explorations, 6(1), 1–6.CrossRef
Zurück zum Zitat Dodge, C., & Burruss, G. (2020). Policing cybercrime. Responding to the growing problem and considering future solutions. In E. R. Leukfeldt & T. J. Holt (Eds.), The human factor of cybercrime (pp. 339–358). London: Routledge. Dodge, C., & Burruss, G. (2020). Policing cybercrime. Responding to the growing problem and considering future solutions. In E. R. Leukfeldt & T. J. Holt (Eds.), The human factor of cybercrime (pp. 339–358). London: Routledge.
Zurück zum Zitat Domenie, M. M. L., Leukfeldt, E. R., Toutenhoofdt-Visser, M. A., & Stol, W. P. (2009). Werkaanbod cybercrime bij de politie. Een verkennend onderzoek naar de omvang van het geregistreerde werkaanbod cybercrime. Leeuwarden: Lectoraat cybersafety Nederlandse Hogeschool. Domenie, M. M. L., Leukfeldt, E. R., Toutenhoofdt-Visser, M. A., & Stol, W. P. (2009). Werkaanbod cybercrime bij de politie. Een verkennend onderzoek naar de omvang van het geregistreerde werkaanbod cybercrime. Leeuwarden: Lectoraat cybersafety Nederlandse Hogeschool.
Zurück zum Zitat Domenie, M. M. L., Leukfeldt, E. R., van van Wilsem, J., Jansen, J., & Stol, W. P. (2012). Slachtofferschap in een gedigitaliseerde samenleving. Een onderzoek onder burgers naar e-fraude, hacken en andere veelvoorkomende criminaliteit. Den Haag: Bju. Domenie, M. M. L., Leukfeldt, E. R., van van Wilsem, J., Jansen, J., & Stol, W. P. (2012). Slachtofferschap in een gedigitaliseerde samenleving. Een onderzoek onder burgers naar e-fraude, hacken en andere veelvoorkomende criminaliteit. Den Haag: Bju.
Zurück zum Zitat Feldman, R., & Sanger, J. (2007). The textmining handbook: Advanced approaches in analyzing unstructured data. Cambridge: University Press. Feldman, R., & Sanger, J. (2007). The textmining handbook: Advanced approaches in analyzing unstructured data. Cambridge: University Press.
Zurück zum Zitat Friedman, J. H. (1999). Stochastic gradient boosting. Computational Statistics and Data Analysis, 38(4), 367–378.CrossRef Friedman, J. H. (1999). Stochastic gradient boosting. Computational Statistics and Data Analysis, 38(4), 367–378.CrossRef
Zurück zum Zitat Hanley, J., & McNeil, B. (1982). The meaning and use of the area under a receiver operating characteristic (roc) curve. Radiology, 143, 29–36.CrossRef Hanley, J., & McNeil, B. (1982). The meaning and use of the area under a receiver operating characteristic (roc) curve. Radiology, 143, 29–36.CrossRef
Zurück zum Zitat Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.CrossRef Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.CrossRef
Zurück zum Zitat Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress. Theory and prevention of technology-enabled offenses. London: Routledge. Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress. Theory and prevention of technology-enabled offenses. London: Routledge.
Zurück zum Zitat Kessels, R. J., & Visser, W. T. (2017). Misdrijven en opsporing. In S. N. Kalidien (Ed.), Criminaliteit en rechtshandhaving 2016 (pp. 51–56). Den Haag: Boomcriminologie. Kessels, R. J., & Visser, W. T. (2017). Misdrijven en opsporing. In S. N. Kalidien (Ed.), Criminaliteit en rechtshandhaving 2016 (pp. 51–56). Den Haag: Boomcriminologie.
Zurück zum Zitat Leukfeldt, E. R., Veenstra, R., & Stol, W. P. (2013). High volume cyber crime and the organization of the police: The results of two emperical studies in the Netherlands. International Journal of Cyber Criminology, 7(1), 1–17. Leukfeldt, E. R., Veenstra, R., & Stol, W. P. (2013). High volume cyber crime and the organization of the police: The results of two emperical studies in the Netherlands. International Journal of Cyber Criminology, 7(1), 1–17.
Zurück zum Zitat Lui, M., & Cook, P. (2013). Classifying English documents by national dialect. Melbourne, VIC: Paper presented at the Proceedings of Australian Language Technology Association Workshop. Lui, M., & Cook, P. (2013). Classifying English documents by national dialect. Melbourne, VIC: Paper presented at the Proceedings of Australian Language Technology Association Workshop.
Zurück zum Zitat Maguire, M., & McVie, S. (2017). Crime data and criminal statistics: A critical reflection. In A. Liebling, S. Maruna, & L. McAra (Eds.), The Oxford handbook of criminology (pp. 163–189). Oxford: University Press. Maguire, M., & McVie, S. (2017). Crime data and criminal statistics: A critical reflection. In A. Liebling, S. Maruna, & L. McAra (Eds.), The Oxford handbook of criminology (pp. 163–189). Oxford: University Press.
Zurück zum Zitat Mazowita, B., & Vézina, M. (2014). Police-reported cybercrime in Canada 2012. Ottawa, ON: Juristat Statistics Canada. Mazowita, B., & Vézina, M. (2014). Police-reported cybercrime in Canada 2012. Ottawa, ON: Juristat Statistics Canada.
Zurück zum Zitat McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. London: Home Office. McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. London: Home Office.
Zurück zum Zitat R Core Team (2016). R: A language and environment for statistical computing: R foundation for statistical computing. Wenen: Z.uitg. www.R-project.org R Core Team (2016). R: A language and environment for statistical computing: R foundation for statistical computing. Wenen: Z.uitg. www.​R-project.​org
Zurück zum Zitat Read, J., Pfahringer, B., Holmes, G., & Frank, E. (2011). Classifier chains for multi-label classification. Machine Learning, 85(3), 333–359.CrossRef Read, J., Pfahringer, B., Holmes, G., & Frank, E. (2011). Classifier chains for multi-label classification. Machine Learning, 85(3), 333–359.CrossRef
Zurück zum Zitat Segal, M., & Xiao, Y. (2011). Multivariate random forests. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 1(1), 80–87. Segal, M., & Xiao, Y. (2011). Multivariate random forests. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 1(1), 80–87.
Zurück zum Zitat Stol, W. P., Leukfeldt, E. R., & Klap, H. (2013). Policing in a digitized society. The state of affairs in the Netherlands in 2013. In W. P. Stol & J. Janssen (Eds.), Cybercrime and the police (pp. 31–74). The Hague: Eleven. Stol, W. P., Leukfeldt, E. R., & Klap, H. (2013). Policing in a digitized society. The state of affairs in the Netherlands in 2013. In W. P. Stol & J. Janssen (Eds.), Cybercrime and the police (pp. 31–74). The Hague: Eleven.
Zurück zum Zitat Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890–911.CrossRef Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890–911.CrossRef
Zurück zum Zitat Tibshirani, R. (1996). Regression shrinkage and selection via the LASSO. Journal of the Royal Statistical Society Series B-Methodological, 58(1), 267–288. Tibshirani, R. (1996). Regression shrinkage and selection via the LASSO. Journal of the Royal Statistical Society Series B-Methodological, 58(1), 267–288.
Zurück zum Zitat Tollenaar, N., Rokven, J., Macro, D., Beerthuizen, M. G. C. J., & van der Laan, A. M. (2019). Predictieve textmining in politiedossiers. Cyber- en gedigitaliseerde criminaliteit. Den Haag: WODC. Tollenaar, N., Rokven, J., Macro, D., Beerthuizen, M. G. C. J., & van der Laan, A. M. (2019). Predictieve textmining in politiedossiers. Cyber- en gedigitaliseerde criminaliteit. Den Haag: WODC.
Zurück zum Zitat Tonry, M. (2014). Why crime rates are falling throughout the Western world. In M. Tonry (Ed.), Why crime rates fall and why they don’t. Crime and justice (Vol. 43, pp. 1–64). Chicago, IL: The university of Chicago press. Tonry, M. (2014). Why crime rates are falling throughout the Western world. In M. Tonry (Ed.), Why crime rates fall and why they don’t. Crime and justice (Vol. 43, pp. 1–64). Chicago, IL: The university of Chicago press.
Zurück zum Zitat UNODC. (2013). Comprehensive study on cybercrime. New York, NY: United Nations Office on Drugs and Crime. UNODC. (2013). Comprehensive study on cybercrime. New York, NY: United Nations Office on Drugs and Crime.
Zurück zum Zitat Wolpert, D. H., & Macready, W. G. (1997). No fee lunch theorems for optimization. IEE Transactions on Evolutionary Computation, 1(1), 67–82.CrossRef Wolpert, D. H., & Macready, W. G. (1997). No fee lunch theorems for optimization. IEE Transactions on Evolutionary Computation, 1(1), 67–82.CrossRef
Zurück zum Zitat Zhang, M. L., Peña, J. M., & Robles, V. (2009). Feature selection for multi-label naive Bayes classification. Information Science, 179(19), 3218–3229.CrossRef Zhang, M. L., Peña, J. M., & Robles, V. (2009). Feature selection for multi-label naive Bayes classification. Information Science, 179(19), 3218–3229.CrossRef
Zurück zum Zitat Zhang, C., Wu, W., Niu, Z., & Ding, W. (2014). Autorship identification from unstructured texts. Knowledge-Based Systems, 66, 99–111. Zhang, C., Wu, W., Niu, Z., & Ding, W. (2014). Autorship identification from unstructured texts. Knowledge-Based Systems, 66, 99–111.
Metadaten
Titel
Text Mining for Cybercrime in Registrations of the Dutch Police
verfasst von
André M. van der Laan
Nikolaj Tollenaar
Copyright-Jahr
2021
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-60527-8_18