Advertisement

Crime and Fraud Detection Using Clustering Techniques

  • Santhosh Maddila
  • Somula Ramasubbareddy
  • K. Govinda
Chapter
  • 30 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 103)

Abstract

Criminal attacks have drastically increased over the years which make its detection increasingly vital. Fraud detection is a technique of identifying fraudulent activities. We intend to apply clustering techniques in order to analyze and detect fraud or crime patterns from a large set of data. By using various clustering techniques, distinct areas or clusters can be generated by mapping crime instances (i.e., by identifying the factors that lead to fraud). These are areas which have high probability of criminal occurrences which are derived based on historical crime records. Thus, with the help of results obtained based on clustering analysis of the crime data, crime trends today can be identified. Crime can be divided into different types such as location-based crimes, theft, murder, kidnap, fraud, etc., and slums, residential areas, commercial areas, etc., are different types of areas where criminal activities may occur. Primary database is collected based on the types of crimes, the location, and the physical description of the suspects and also the time period in which felony has taken place including the other available data relevant to the analysis. The available data is then processed and clustered, thereby revealing a general crime pattern which in turn helps detect frauds.

Keywords

Data mining K-means Prediction Classification Clustering 

References

  1. 1.
    Renuga D, Rabiyathul B, Kamaladevi M (2014) Fraud detection in card not present transactions based on behavioral pattern. J Theor Appl Info Technol 61(3)Google Scholar
  2. 2.
    Thakur V, Chaudhary R, Sharma RK (2012) Performance appraisal of economic offence wing of Chandigarh police: an analytical study. ACADEMICIA: Int Multidiscipl Res J 2(5):210–227Google Scholar
  3. 3.
    Yadav S, Jha S (2001) A framework for authorship identification of questioned documents: forensic and linguistic convergence. MJAL 3(1):1–7Google Scholar
  4. 4.
    Mundhe SV (2016) Critical analysis of white collar criminality highlighting judicial precedents in maharashtraGoogle Scholar
  5. 5.
    Dorminey J, Fleming AS, Kranacher MJ, Riley RA Jr (2012) The evolution of fraud theory. Issues Account Edu 27(2):555–579CrossRefGoogle Scholar
  6. 6.
    Dhami S (2015) Forensic accounting: signaling practicing accountants to improve skill set and forming regulatory body for forensic accountants In India. Global J Res Anal Int 4(5)Google Scholar
  7. 7.
    Shekhar C, Showkat G (2014) White-collar crimes in Kashmir. J&K-A Syst Rev Stud White-collar Crime, Crim Behav Consequences 2:602Google Scholar
  8. 8.
    Wadhwa L, Pal V (2012) Forensic accounting and fraud examination in India. Int J Appl Eng Res 7(11):2006–2009Google Scholar
  9. 9.
    Pangaria M, Shrivastava V Need of ethical hacking in online world. Int J Sci Res (IJSR), India Online ISSN, 2319-7064Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Santhosh Maddila
    • 1
  • Somula Ramasubbareddy
    • 2
  • K. Govinda
    • 3
  1. 1.Information TechnologyGVPCEWVisakhapatnamIndia
  2. 2.Information TechnologyVNRVJIETHyderabadIndia
  3. 3.SCOPEVIT UniversityVelloreIndia

Personalised recommendations