Skip to main content

Towards Designing a Knowledge Graph-Based Framework for Investigating and Preventing Crime on Online Social Networks

  • Conference paper
  • First Online:
E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age (e-Democracy 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1111))

Included in the following conference series:

Abstract

Online Social Networks (OSNs) have fundamentally and permanently altered the arena of digital and classical crime. Recently, law enforcement agencies (LEAs) have been using OSNs as a data source to collect Open Source Intelligence for fighting and preventing crime. However, most existing technological developments for LEAs to fight and prevent crime rely on conventional database technology, which poses problems. As social network usage is increasing rapidly, storing and querying data for information retrieval is critical because of the characteristics of social networks, such as unstructured nature, high volumes, velocity, and data interconnectivity. This paper presents a knowledge graph-based framework, an outline of a framework designed to support crime investigators solve and prevent crime, from data collection to inferring digital evidence admissible in court. The main component of the proposed framework is a hybrid ontology linked to a graph database, which provides LEAs with the possibility to process unstructured data and identify hidden patterns and relationships in the interconnected data of OSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.statista.com/topics/1164/social-networks/.

  2. 2.

    https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.

  3. 3.

    https://www.idc.com/.

References

  1. Abdalla, A., Yayilgan, S.Y.: A review of using online social networks for investigative activities. In: Meiselwitz, G. (ed.) SCSM 2014. LNCS, vol. 8531, pp. 3–12. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07632-4_1

    Chapter  Google Scholar 

  2. Ali, M.M., Mohammed, K.M., Rajamani, L.: Framework for surveillance of instant messages in instant messengers and social networking sites using data mining and ontology. In: Proceedings of the 2014 IEEE Students Technology Symposium (2014)

    Google Scholar 

  3. Almaatouq, A., et al.: If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int. J. Inf. Secur. 15, 1–17 (2016)

    Article  Google Scholar 

  4. Almanie, T., Mirza, R., Lor, E.: Crime prediction based on crime types and using spatial and temporal criminal hotspots. Int. J. Data Min. Knowl. Manag. Process 5(4), 01–19 (2015)

    Article  Google Scholar 

  5. Alsubaiee, S., Carey, M.J., Li, C.: LSM-based storage and indexing: an old idea with timely benefits. In: ACM Workshop on Managing and Mining Enriched Geo-Spatial Data - GeoRich 2015, pp. 1–6 (2015)

    Google Scholar 

  6. Appel, A.P., Moyano, L.G.: Link and graph mining in the big data era. In: Zomaya, A., Sakr, S. (eds.) Handbook of Big Data Technologies, pp. 583–616. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-49340-4_17

    Chapter  Google Scholar 

  7. Arshad, H., Jantan, A., Hoon, G., Butt, A.: A multilayered semantic framework for integrated forensic acquisition on social media. Digit. Invest. 29, 147–158 (2019)

    Article  Google Scholar 

  8. Breslin, J., Bojars, U., Passant, A., Fernandez, S., Decker, S.: SIOC: content exchange and semantic interoperability between social networks. In: W3C Workshop on the Future of Social Networking, pp. 15–16 (2009)

    Chapter  Google Scholar 

  9. Brusa, G., Caliusco, M.L., Chiotti, O.: A process for building a domain ontology: an experience in developing a government budgetary ontology. In: 2nd Australasian Workshop on Advances in Ontologies, Hobart, TAS, Australia, 72, pp. 7–15 (2006)

    Google Scholar 

  10. Burnap, P., et al.: Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Soc. Netw. Anal. Min. 4, 206 (2014)

    Article  Google Scholar 

  11. Caviglione, L., Wendzel, S., Mazurczyk, W.: The future of digital forensics: challenges and the road ahead. In: IEEE Security and Privacy, vol. 6, pp. 12–17 (2017). Investigation, vol. 29, pp. 147–158 (2019)

    Google Scholar 

  12. Chen, H., Schroeder, J., Hauck, R.V., et al.: COPLINK connect: information and knowledge management for law enforcement. Decis. Support Syst. 34(3), 271–285 (2003)

    Article  Google Scholar 

  13. Chen, Y., Chen, Y.: Decomposing DAGs into spanning trees: a new way to compress transitive closures. In: 2011 IEEE 27th International Conference on Data Engineering, Hannover, pp. 1007–1018 (2011)

    Google Scholar 

  14. Cosic, J., Baca, M.: Leveraging DEMF to ensure and represent 5ws&1h in digital forensic domain. Int. J. Comput. Sci. Inf. Secur. 13(2), 7 (2015)

    Google Scholar 

  15. Dean, G., Fahsing, I.A., Gottschalk, P.: Profiling police investigative thinking: a study of police officers in Norway. Int. J. Sociol. Law 34, 221–228 (2006)

    Article  Google Scholar 

  16. Elbattah, M., Roushdy, M., Aref, M., Salem, A.M.: Large-scale ontology storage and query using graph database-oriented approach: the case of freebase, pp. 39–43 (2015)

    Google Scholar 

  17. Ericson, R.V., Haggerty, K.: Policing the Risk Society. University of Toronto Press, Toronto (1997)

    Google Scholar 

  18. Europol. Crime in the age of technology, Europol unclassified - Basic protection level, The Hague 12.10.207, EDOC#924156v7 (2017)

    Google Scholar 

  19. Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Int. J. Hum Comput. Stud. 43(5–6), 907–928 (1995)

    Article  Google Scholar 

  20. Gupta, A., Tyagi, S., Panwar, N., Sachdeva, S., Saxena, U.: NoSQL databases: critical analysis and comparison. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN) (2017)

    Google Scholar 

  21. Hart, G.: The five W’s: an old tool for the new task of task analysis. Tech. Commun. 43(2), 139–145 (1996)

    Google Scholar 

  22. Imran, M., Castillo, C., Diaz, F., Vieweg, S.: Processing social media messages in mass emergency: a survey. ACM Comput. Surv. 47(4), 67 (2015)

    Article  Google Scholar 

  23. Kalemi, E., Yildirim, S., Domnori, E., Elezaj, O.: SMONT: an ontology for crime solving through social media. Int. J. Metadata Semant. Ontol. 12(2/3), 71–81 (2017)

    Article  Google Scholar 

  24. Kastrati, Z., Imran, A.S., Yildirim-Yayilgan, S., Dalipi, F.: Analysis of online social networks posts to investigate suspects using SEMCON. In: Meiselwitz, G. (ed.) SCSM 2015. LNCS, vol. 9182, pp. 148–157. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20367-6_16

    Chapter  Google Scholar 

  25. Khan, S., Gani, A., Wahab, A.W., Shiraz, M., Ahmad, I.: Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66, 214–235 (2016)

    Article  Google Scholar 

  26. Kokkinos, C.M., Baltzidis, E., Xynogala, D.: Prevalence and personality correlates of Facebook bullying among university undergraduates. Comput. Hum. Behav. 55, 840–850 (2016)

    Article  Google Scholar 

  27. Lim, M., Abdullah, A., Jhanjhi, N., Supramaniam, M.: Hidden link prediction in criminal networks using the deep reinforcement learning technique. Computers 8(1), 8 (2019)

    Article  Google Scholar 

  28. Lomborg, S., Bechmann, A.: Using APIs for data collection on social media. Inf. Soc. 30(4), 256–265 (2014)

    Article  Google Scholar 

  29. Mason, S., et al.: Electronic Evidence, Elsevier (UK) Ltd. (2012). Currie, R.J., Coughlan, S.: Chapter 9, Canada, p. 293 (2012)

    Google Scholar 

  30. Mcdaniel, M., Sloan, E., Nick, W., Mayes, J., Esterline, A.: Ontologies for situation-based crime scene identities. In: SoutheastCon 2017, pp. 1–8 (2017)

    Google Scholar 

  31. Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann, Amsterdam (2003)

    Google Scholar 

  32. Moore, K.: Social media ‘at least half’ of calls passed to front-line police. BBC Radio 4’s Law in Action. (2014). http://www.bbc.co.uk/news/uk-27949674

  33. Murphy, J., Fontecilla, A.: Social media evidence in government investigations and criminal proceedings: a frontier of new legal issues. Rich JL Tech. XIX, 1–30 (2013)

    Google Scholar 

  34. Nouh, M., Nurse, J.R., Goldsmith, M.: Towards designing a multipurpose cybercrime intelligence framework. In: 2016 European Intelligence and Security Informatics Conference (EISIC) (2016)

    Google Scholar 

  35. Noy, N., McGuinness, D.: Ontology development 101: a guide to creating your first ontology. Stanford University (2000)

    Google Scholar 

  36. Oludare, A.I., Jantan, A., Omolara, A.E., Singh, M.M., Anbar, M., Zaaba, Z.F.: Forensic DNA profiling for identifying an individual crime. Int. J. Civil Eng. Technol. 9, 755–765 (2018)

    Google Scholar 

  37. Pramanik, M.I., Zhang, W., Lau, R.Y., Li, C.: A framework for criminal network analysis using big data. In: e-Business Engineering (ICEBE), pp. 17–23 (2016)

    Google Scholar 

  38. Protégé 5.5.0. https://protege.stanford.edu/. Accessed June 2019

  39. Recchia, M.: Court of Appeals Declares Facebook “Private Data” and Other Social Media Subject to Discovery, New York Law Journal. www.law.com

  40. Turnbull, B., Randhawa, S.: Automated event and social network extraction from digital evidence sources with ontological mapping. Digit. Invest. 13, 94–106 (2015)

    Article  Google Scholar 

  41. Weimann, G.: New Terrorism and New Media. Commons Lab of the Woodrow Wilson International Center for Scholars, Washington, DC (2014)

    Google Scholar 

  42. Williams, D.W., Huan, J., Wang, W.: Graph database indexing using structured graph decomposition. In: IEEE 23rd International Conference on Data Engineering, pp. 976–985 (2007)

    Google Scholar 

Download references

Acknowledgements

This work was carried out during the tenure of an ERCIM “Alain Bensoussan” Fellowship Programme.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ogerta Elezaj , Sule Yildirim Yayilgan , Edlira Kalemi , Linda Wendelberg , Mohamed Abomhara or Javed Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Elezaj, O., Yayilgan, S.Y., Kalemi, E., Wendelberg, L., Abomhara, M., Ahmed, J. (2020). Towards Designing a Knowledge Graph-Based Framework for Investigating and Preventing Crime on Online Social Networks. In: Katsikas, S., Zorkadis, V. (eds) E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age. e-Democracy 2019. Communications in Computer and Information Science, vol 1111. Springer, Cham. https://doi.org/10.1007/978-3-030-37545-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37545-4_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37544-7

  • Online ISBN: 978-3-030-37545-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics