Dr. Rado Kotorov Technical Director Strategic Product Mgt. BI Applications For Crime Intelligence : Data Mining & Predictive Modeling.

Slides:



Advertisements
Similar presentations
Public Health Essential Service #2
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
RStat: Release 1.2 Ali-Zain Rahim, Strategic Product Manager March 18, 2010.
2014 Annual Policing Plan – Q1 Results Edmonton Police Service Presented to the Edmonton Police Commission May 22,
2014 Annual Policing Plan – Q4 Results Edmonton Police Service Presented to the Edmonton Police Commission Feb 19,
THE STRATEGIC COUNCIL LEADERSHIP TRUST AND ENGAGEMENT NEW FUNDING SOURCES AND NEW DELIVERY VEHICLES Appendix 1 NEW FUNDING SERVOURCES AND NEW DELIVERY.
CAS: Crime Anticipation System Predictive Policing in Amsterdam.
IS6833 – Sauter – Spring 2012 Kuo-Luen (Alan) Chang Curt Rozycki Kristopher Turner.
Stephen Hollifield, CIO City of Richmond Police, Virginia Visual Predictive Analytics in Law Enforcement.
In Search of Insights and Better Analytics Prepared for: St. Louis Metropolitan Police Department 1 Nikolay Filipets / Ankit Patel / Melis Yilmaz / Divya.
Bruce Kolodziej Analytics Sales Manager Predictive Analytics and WebFOCUS RStat Overview April 14, 2011.
Geospatial Intelligence Applications in Law Enforcement Analysis Gregory Thomas.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
2009 Strategic Highway Safety Plan Peer Exchange – SCOHTS Annual Meeting Kenneth L. Morckel National Outreach Rep. - NHTSA.
SAS solutions SAS ottawa platform user society nov 20th 2014.
Group A: Dan Diecker, Uzair Bhatti, Puji Bandi, Latoya Lewis.
Assessing firm risk September 2012 Andrew Garbutt Director of Risk, SRA.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Agency records Content analysis Secondary data
Forecasting.
Copyright © 2008 Pearson Education Canada Inc Criminology and Social Policy Chapter 11.
Police Technology Chapter Twelve
IBM Digital Communities Solutions Wireless Clouds Connecting Our Communities Riz Khaliq Business Area Leader Community Broadband, IBM Global Government.
Query, Analysis and Reporting Tools Brian BALSER Lamia BENKIRANE Jeralyn PASINABO Dave WILSON MBA 664 April, the 13 th, 2009.
Business Intelligence in Crime Ji Zhang Lucas Matecki Lamont Davis Jenny Brunnert.
8 Managing Risk Teaching Strategies
Bruce Kolodziej Analytics Sales Manager May 15, 2012 Predictive Analytics and WebFOCUS RStat Overview Montreal User Group Meeting.
MIS 420: Predictive Analytics & Making Statistical Conclusions.
The National Intelligence Model (NIM)
Police Administration: Structures, Processes, and Behavior
SME based in Dublin, Ireland. Data Analytics solutions deriving actionable insights for government SMI2G brokerage event, January DS
Highline Class, BI 348 Basic Business Analytics using Excel, Chapter 01 Intro to Business Analytics BI 348, Chapter 01.
MICHIGAN PRISONERS, VIOLENT CRIME and PUBLIC SAFETY: A PROSECUTOR’S REPORT.
Information Builders’ Teradata User Group Adam Cohen Eric Greisdorf.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Banking on Analytics Dr A S Ramasastri Director, IDRBT.
Geoprofiling and other geo-spatial methods against metal theft CONFIDENTIAL SNCF London, September 15th, 2015.
Instant Information Access With Magnify Search Dr. Rado Kotorov Technical Director Strategic Product Mgt.
Public Health Preventive Medicine and Epidemiology Prof. Ashry Gad Mohammed MB, ChB. MPH, Dr P.H Prof. of Epidemiology College of Medicine King Saud University.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
Network security Product Group 2 McAfee Network Security Platform.
© 2010 IBM Corporation Business Analytics software Business Analytics Editable Text Editable Text Editable Text.
WebFOCUS Magnify: Search Based Applications Dr. Rado Kotorov Technical Director of Strategic Product Management.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
Independent Organizations  No two exactly alike  Hierarchical  Chain of command Potential Problems?  Personnel changes  Internal reorganization.
Big Data – Big Opportunity Mohammad Khansari ITRC President Jan 2015 ITRC, Tehran, Iran.
RICKY MASON COMMUNITIES INSPECTOR THE NATIONAL INTELLIGENCE MODEL L DIVISION.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
1 Copyright © 2012 by Mosby, an imprint of Elsevier Inc. Copyright © 2008 by Mosby, Inc., an affiliate of Elsevier Inc. Chapter 24 Public Health Surveillance.
SME based in Dublin, Ireland. Data Analytics solutions deriving actionable insights for government SMI2G brokerage event, January FCT
Advanced Analytics Turin April, Index 2 ■ Advanced Analytics Approach –Architecture Overview –Methodology –Professional Skills ■ Impacted Areas.
Cognos BI. What is Cognos? Cognos (Cognos Incorporated) was an Ottawa, Ontario-based company that makes Business Intelligence (BI) and Performance Management.
Application of Criminological Theory to Terrorism Prevention Detective Eric Paull Planning Research and Development Akron, OH Police Department.
”Research intelligence led community policing” - a swedish development of ILP to manage and prevent the impact of social risks, organized crime and radicalization.
PUBLIC HEALTH APPROACH. PUBLIC HEALTH APPROACH-Step 1 Define the problem -How many deaths, injuries, violence related behaviors - Frequency -Trends -
IOT – Firefighting Example
What makes crime newsworthy?
Viewing Data-Driven Success Through a Capability Lens
Risk Management Basics
Domestic Violence & Trauma
INVESTIGATION PROCESS AND TECHNIQUE
CJA 394 Competitive Success/snaptutorial.com
CJA 394 Enthusiastic Study/snaptutorial.com
CJA 394 Education for Service/snaptutorial.com
CJA 394 GUIDE Education for Service-- cja394guide.com.
CJA 394 Teaching Effectively-- snaptutorial.com
Building Relationships & Solving Problems
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Chapter 2 The Incidence of Crime
Presentation transcript:

Dr. Rado Kotorov Technical Director Strategic Product Mgt. BI Applications For Crime Intelligence : Data Mining & Predictive Modeling

Forward Looking BI with Predictive Analytics Past Events Reporting & Analysis Future Events Predictive Modeling Re-active Actions Events have occurred Analyze cause Adjust processes to prevent Pro-active Actions Events have not occurred Expect when & where Allocate resources to prevent

Forward Looking BI: Answer a Different Set of Questions Degree of Intelligence Standard Reports Ad Hoc Reports Query/Drill Down KPIs/Alerts What happened? How many, how often, where? Where exactly is the problem? What actions are needed? Rear View Statistical Analysis Forecasting/Extrapolation Predictive Modeling Optimization Why is this happening? What of these trends continue? What will happen next? What is the best that can happen? Forward View Note: Adapted from “Competing on Analytics”

Copyright 2007, Information Builders. Slide 4 How Does Predictive Analytics Help You Make Better Decisions: Issue 1  Situation: Large volumes of historical data  Issue: How do you determine what the right pattern is

Copyright 2007, Information Builders. Slide 5 How Does Predictive Analytics Help You Make Better Decisions: Issue 2  Situation: Large number of variables for analysis  Issue: How do you determine which variables are more important.  Not all factors have equal weights  The more factors the harder to determine their weights Number of Crimes Number of Officers Weather Conditions Unknown Economic Factors Crime Community Events Demographics

Copyright 2007, Information Builders. Slide 6 Predictive Modeling and Scoring Applications Predictive Modeling: Predictive modeling is a process that: (1) takes as input historical data, (2) evaluates it statistically to detect hidden patterns in it, and (3) derives a formula or set of rules that describe the uncovered patterns, referred to also as a model. -- A pattern can be a relationship or an outcome Scoring Application: A scoring application automates the use of the model on new records in order to predict relationships and outcome probabilities. -- Relationship: higher unemployment rates increase crimes in lower income areas -- Outcome: There is a high probability of aggravated assault occurring in dispatch zone X

Copyright 2007, Information Builders. Slide 7  It is useful where operational users have to make decisions that involve uncertainty and risk.  It estimates the probabilities associated with the expected events, i.e., the likelihood that the event will occur.  The probability estimates help managers make better decisions than guessing. When Is a Scoring Application Useful?

Everyone Makes Decisions Abut the Future Copyright 2007, Information Builders. Slide 8 When? Where? Correlated Events? Correlated Events? Dispatch Patrol Cars Dispatch Patrol Cars Gut feeling or science?

Copyright 2007, Information Builders. Slide 9 Predicting Crime

Copyright 2007, Information Builders. Slide 10  Time and location of future incidence in a crime pattern or series  Identify individuals who are likely to reoffend  Inmate radicalization risk assessment (i.e., identify inmates who are in danger)  Drug market displacement (i.e., where next open air drug market will pop up)  Disorder and environmental variables  Likely impact of specific operations.  Disruption of criminal organization (criminal leadership)  Prediction of criminal adaptation (not only law enforcement efforts but also media, etc.)  Data analysis and support of crime suppression analysis  Patrol staffing and resources allocation  Localized crime spikes  Identify juveniles likely to be involved in violent crime  Risk assessment of sex offending in juveniles  Early identifications of career criminals  Identify victims of unreported crimes  Evaluation of interventions  Impact of drug enforcement on markets and allied crimes  Identification and analysis of crime-prone events and locations  Individual-specific analysis  Travel of serial offenders Possible Use & Value of Predictive Policing From 1 st Annual NIJ Predictive Policing Symposium

Copyright 2007, Information Builders. Slide 11  Analysis of predatory patterns  Correlation of environmental factors outside of crime like weather  Threat and vulnerability assessment  Prioritization of sources  Unstructured data extraction (police reports, blogs, incident reports and social networks)  Predicting acts of terror  Predicting riots  Social network analysis  Video analytics (including behavioralistics)  Use of NIBRS to help prediction  Wide-area surveillance for video fusion  Precursors and leading indicators to crime (including non-obvious predictors)  City/neighborhood planning  Design of spaces; economic development; security resource allocation; infrastructure protection  Offender monitoring, predicting behavior, endpoint sentencing  Traffic management, crowd control  Management of police personnel  Professional development, recruitment  Risk for excessive use-of-force, discipline Possible Use & Value of Predictive Policing From 1 st Annual NIJ Predictive Policing Symposium

Process For Building And Deploying Predictive Applications Copyright 2007, Information Builders. Slide 12 CRISP-DM Process Model ( )

Copyright 2007, Information Builders. Slide 13 RStat: Differentiators & Benefits  Based on R-Project  Open Source  Maintained by world wide consortium of universities, scientists, government funded research organizations, statisticians.  Over 2000 packages  RStat is a GUI to R  Intuitive guided approach to modeling  Simple model evaluation  Intended both for business analysts and advanced modelers  Single BI and Predictive Modeling Environment  Re-use metadata and queries  Perform data manipulation and sampling  Build scoring applications  Unique Deployment Method for Scoring Solutions  Scoring models are built directly into WF metadata  Deployment on any platform and operating system - Windows, Unix, Linux, Z/OS, and i Series.

Copyright 2007, Information Builders. Slide 14 Thank you