Skip to main navigation Skip to search Skip to main content

Towards discovering criminal communities from textual data

  • Rabeah Al-Zaidy*
  • , Benjamin C.M. Fung
  • , Amr M. Youssef
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

In many criminal cases, forensically collected data contain valuable information about a suspect's social networks. An investigator often has to manually extract information from the collected text documents and enter it into a police database for further investigation with criminal network analysis tools. In this paper, we propose a method to discover criminal communities, to analyze the closeness of the members in the communities, and to extract useful information for crime investigation directly from the text documents. The proposed method, together with the implemented software tool, has received positive feedbacks from the digital forensics team of a law enforcement unit in Canada.

Original languageEnglish
Title of host publication26th Annual ACM Symposium on Applied Computing, SAC 2011
Pages172-177
Number of pages6
DOIs
StatePublished - 2011
Externally publishedYes
Event26th Annual ACM Symposium on Applied Computing, SAC 2011 - TaiChung, Taiwan, Province of China
Duration: 21 Mar 201124 Mar 2011

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

Conference26th Annual ACM Symposium on Applied Computing, SAC 2011
Country/TerritoryTaiwan, Province of China
CityTaiChung
Period21/03/1124/03/11

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 16 - Peace, Justice and Strong Institutions
    SDG 16 Peace, Justice and Strong Institutions

Keywords

  • community discovery
  • crime investigation
  • data mining
  • forensic analysis

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Towards discovering criminal communities from textual data'. Together they form a unique fingerprint.

Cite this