International Journal of Advanced and Applied Sciences

Int. j. adv. appl. sci.

EISSN: 2313-3724

Print ISSN: 2313-626X

Volume 4, Issue 10  (October 2017), Pages:  58-63


Original Research Paper

Title: Text analysis framework for understanding cyber-crimes

Author(s): Clinton Cardoza *, Rupali Wagh

Affiliation(s):

Department of Computer Science, Christ University, Bengaluru-560029, India

https://doi.org/10.21833/ijaas.2017.010.010

Full Text - PDF          XML

Abstract:

The magnitude of impact of cyber-crimes is much greater as compared to other crimes and can be felt at personal, societal, national as well as global level. According to studies, developing countries are at a greater risk due to such crimes. Fight against cyber-crime requires a strategic and intelligent framework. This paper discusses text analysis framework using Natural Language Processing (NLP) and text mining techniques to extract crime related information which can be used for educating and spreading awareness and for further knowledge based analysis. News articles crawled from a leading newspaper website in India is used as the source of cyber-crime data. Parts of Speech (POS) tagging is used to extract important terms/concepts related to cybercrimes. Term association analysis on the other hand is used to understand the relationship of extracted terms of the data. 

© 2017 The Authors. Published by IASE.

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Keywords: Natural language processing, POS tagging, Cybercrime, Text analysis, Term association analysis

Article History: Received 17 February 2017, Received in revised form 11 August 2017, Accepted 19 August 2017

Digital Object Identifier: 

https://doi.org/10.21833/ijaas.2017.010.010

Citation:

Cardoza C and Wagh R (2017). Text analysis framework for understanding cyber-crimes. International Journal of Advanced and Applied Sciences, 4(10): 58-63

Permanent Link:

http://www.science-gate.com/IJAAS/V4I10/Cardoza.html


References (14)

  1. Alsuhaibani RS, Christian D, Newman, Collard ML, and Maletic JI (2015). Heuristic-based part-of-speech tagging of source code identifiers and comments. In the 5th IEEE Workshop on Mining Unstructured Data, IEEE, Bremen, Germany: 1-6. https://doi.org/10.1109/MUD.2015.7327960 
  2. Arulanandam R, Savarimuthu BTR, and Purvis MA (2014). Extracting crime information from online newspaper articles. In the 2nd Australasian Web Conference, Australian Computer Society, Auckland, New Zealand, 155: 31-38.     
  3. Aubin S and Hamon T (2006). Improving term extraction with terminological resources. In: Salakoski T, Ginter F, Pyysalo S, and Pahikkala T (Eds.), Advances in Natural Language Processing, 4139: 380-387. Lecture Notes in Computer Science, Springer Berlin Heidelberg, Heidelberg, Germany. https://doi.org/10.1007/11816508_39 
  4. Barclay C (2014). Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM 2). In the ITU Kaleidoscope Academic Conference on Living in a Converged World-Impossible without Standards?, IEEE, Saint Petersburg, Russia: 275-282. https://doi.org/10.1109/Kaleidoscope.2014.6858466 
  5. Chakravorty S, Daripa S, Saha U, Bose S, Goswami S, and Mitra S (2015). Data mining techniques for analyzing murder related structured and unstructured data. American Journal of Advanced Computing, 2(2): 47-54.     
  6. Chen H, Chung W, Xu JJ, Wang G, Qin Y, and Chau M (2004). Crime data mining: A general framework and some examples. Computer, 37(4): 50-56. https://doi.org/10.1109/MC.2004.1297301 
  7. IACA (2014). Definition and types of crime analysis (White Paper 2014-02). International Association of Crime Analysts, University of Maryland, College Park, USA.     
  8. Jayaweera I, Sajeewa C, Liyanage S, Wijewardane T, Perera I, and Wijayasiri A (2015). Crime analytics: Analysis of crimes through newspaper articles. In the Moratuwa Engineering Research Conference, IEEE, Moratuwa, Sri Lanka: 277-282. https://doi.org/10.1109/MERCon.2015.7112359 
  9. Nath SV (2006). Crime pattern detection using data mining. In the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops, IEEE, Hong Kong, China: 41-44. https://doi.org/10.1109/WI-IATW.2006.55 
  10. Omar N, Hanna JRP, and McKevitt P (2004). Heuristic-based entity-relationship modelling through natural language processing. In: the 15th Conference of Artificial Intelligence and Cognitive Science (AICS'04), Galway-Mayo Institute of Technology (GMIT), Castlebar, Ireland: 302-313.     
  11. Park KSO (2008). Exploring crime analysis. International Association of Crime Analysts, BookSurge, South Carolina, USA.     
  12. Tayal DK, Jain A, Arora S, Agarwal S, Gupta T, and Tyagi N (2015). Crime detection and criminal identification in India using data mining techniques. AI and Society, 30(1): 117-127. https://doi.org/10.1007/s00146-014-0539-6 
  13. Tian Y and Lo D (2015). A comparative study on the effectiveness of part-of-speech tagging techniques on bug reports. In the IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering, IEEE, Montreal, Canada: 570-574. https://doi.org/10.1109/SANER.2015.7081879 
  14. Wang T, Rudin C, Wagner D, and Sevieri R (2013). Learning to detect patterns of crime. In the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer Berlin Heidelberg, Heidelberg, Germany: 515-530. https://doi.org/10.1007/978-3-642-40994-3_33