DOI QR코드

DOI QR Code

Predicting Reports of Theft in Businesses via Machine Learning

  • JungIn, Seo (Dept. of Information Statistics, Andong National., Univ.) ;
  • JeongHyeon, Chang (Contents Convergence Software Research Center, Kyonggi, Univ.)
  • Received : 2022.11.26
  • Accepted : 2022.12.09
  • Published : 2022.12.31

Abstract

This study examines the reporting factors of crime against business in Korea and proposes a corresponding predictive model using machine learning. While many previous studies focused on the individual factors of theft victims, there is a lack of evidence on the reporting factors of crime against a business that serves the public good as opposed to those that protect private property. Therefore, we proposed a crime prevention model for the willingness factor of theft reporting in businesses. This study used data collected through the 2015 Commercial Crime Damage Survey conducted by the Korea Institute for Criminal Policy. It analyzed data from 834 businesses that had experienced theft during a 2016 crime investigation. The data showed a problem with unbalanced classes. To solve this problem, we jointly applied the Synthetic Minority Over Sampling Technique and the Tomek link techniques to the training data. Two prediction models were implemented. One was a statistical model using logistic regression and elastic net. The other involved a support vector machine model, tree-based machine learning models (e.g., random forest, extreme gradient boosting), and a stacking model. As a result, the features of theft price, invasion, and remedy, which are known to have significant effects on reporting theft offences, can be predicted as determinants of such offences in companies. Finally, we verified and compared the proposed predictive models using several popular metrics. Based on our evaluation of the importance of the features used in each model, we suggest a more accurate criterion for predicting var.

Keywords

Acknowledgement

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. 2020R1A6A1A03040583).

References

  1. E. P. Baumer and J. L.Lauritsen, "Reporting crime to the police, 1973-2005: A multivariate analysis of long-term trends in the National Crime Survey (NCS) and National Crime Victimization Survey (NCVS),". Criminology. vol. 48, no. 1, pp. 131-185, 2010. https://doi.org/10.1111/j.1745-9125.2010.00182.x 
  2. W. G. Skogan, "Concern about crime and confidence in the police: Reassurance or accountability?" Police Quarterly, vol. 12, no. 3, pp. 301-318, 2009. https://doi.org/10.1177/1098611109339893 
  3. M. S. Kim and S. H. Kim, "An analysis of the conditions and problems of cooperative policing in Korea," Korean Police Studies Association, vol. 3, pp. 3-30, 2004. 
  4. D. M. Gottfredson, "Prediction and classification in criminal justice decision making," Crime and justice, vol. 9, pp. 1-20, 1987. https://doi.org/10.1086/449130 
  5. J. Y. Tak, "Reporting theft and fraud victimization in Korea," Korean Police Studies Association, vol. 83, pp. 53-75, 2010. 
  6. W. G. Skogan, "Reporting crimes to the police: The status of world research," Journal of research in crime and delinquency, vol. 21, no. 2, pp. 113-137, 1984. https://doi.org/10.1177/0022427884021002003 
  7. R. Bowles, M. G. Reyes, and N. Garoupa, "Crime reporting decisions and the costs of crime," European journal on criminal policy and research, vol. 15, no. 4, pp. 365-377, 2009. https://doi.org/10.1007/s10610-009-9109-8 
  8. R. B. Felson, S. F. Messner, A.W. Hoskin, G. Deane, "Reasons for reporting and not reporting domestic violence to the police," Criminology, vol. 40m no. 3, pp. 617-648, 2002. https://doi.org/10.1111/j.1745-9125.2002.tb00968.x 
  9. L. Zhang, S. F. Messner, J. A. Liu, "A multilevel analysis of the risk of household burglary in the city of Tianjin, China," The British Journal of Criminology, vol. 47, no. 6, pp. 918-937, 2007. https://doi.org/10.1093/bjc/azm026 
  10. T. R. Tyler and C. J. Wakslak, "Profiling and police legitimacy: Procedural justice, attributions of motive, and acceptance of police authority," Criminology, vol. 42, no. 3, pp. 253-282, 2004. https://doi.org/10.1111/j.1745-9125.2004.tb00520.x 
  11. F. Black, "The dividend puzzle," J Portfolio Manag, vol. 2, pp. 5-8, 1976. https://doi.org/10.1515/9781400829408-003 
  12. C. H. Park, B.H. Ghu, "Victim-offender relationships and the reporting of crime: D. Black vs. feminist," Journal of the Korean Criminology Assocciation, vol. 12, pp. 121-137, 2018. https://doi.org/10.29095/jkca.12.2.6 
  13. H. Goudriaan, K. Wittebrood, P. Nieuwbeerta, "Neighbourhood characteristics and reporting crime: Effects of social cohesion, confidence in police effectiveness and socio-economic disadvantage," The British Journal of Criminology, vol. 46, no. 4, pp. 719-742m 2006. 
  14. J. R. Lasley, B. J. Palombo, "When crime reporting goes high-tech: An experimental test of computerized citizen response to crime," Journal of criminal justice, vol. 23, no. 6, pp. 519-529, 1995. https://doi.org/10.1016/0047-2352(95)00043-7 
  15. D. Young, "See no evil," Orca Book Publishers, 2006. https://www.orcabook.com/See-No-Evil-P2781. 
  16. H. Goudriaan, P. Nieuwbeerta, "Contextual determinants of juveniles' willingness to report crimes," Journal of experimental criminology, vol. 3, no. 2, pp. 89-111, 2007. https://doi.org/10.1007/s11292-007-9030-4 
  17. R. B. Felson, P. P. Pare, "The reporting of domestic violence and sexual assault by nonstrangers to the police," Journal of marriage and family, vol. 67, no. 3, pp. 597-610, 2005. https://doi.org/10.1037/e535952006-001 
  18. LEE, Soochang, KIM, Daechan, "Relationship between Change of Demographic Composition and Crime: Comparing Areas with Growth in Population to Areas with Decline," International Journal of Advanced Culture Technology (IJACT), 2022, 10.3: 63-70. https://doi.org/10.17703/IJACT.2022.10.3.63 
  19. W. G. Skogan, "Chicago since 1840: A time-series data handbook," IL: Institute of Government and Public Affairs, University of Illinois, Urbana, USA, 1976. 
  20. P. Campoy-Torrente, A. A. Chelini, C. Soto-Urpina, "Evaluacion de la policia de proximidad en la ciudad de Santa Fe," Urvio, Revista Latinoamericana de Estudios de Seguridad, vol. 19, pp. 70-89, 2016. https://doi.org/10.17141/urvio.19.2016.2392 
  21. A. Blumstein, "Seriousness weights in an index of crime," American Sociological Review, vol. 39, pp. 854-864, 1974.  https://doi.org/10.2307/2094158
  22. R. Broadhurst, J. Bacon-Shone, B. Bouhours, T. Bouhours, L. Kingwa, "Business and the Risk of Crime in China," ANU Press. 2011. https://doi.org/10.22459/brcc.12.2011 
  23. A. A. D. Frate, "The international crime business survey: findings from nine central-eastern European citie," European Journal on Criminal Policy and Research, vol. 10, no. 2, pp. 137-161, 2004. https://doi.org/10.1007/s10610-004-4122-4 
  24. D. R. Cox, "The regression analysis of binary sequences," Journal of the Royal Statistical Society: Series B (Methodological), vol. 20, no. 2, pp. 215-232, 1958.  https://doi.org/10.1111/j.2517-6161.1958.tb00292.x
  25. Hoerl, A. "Ridge regression: Biased estimation for nonorthogonal problems," Technometrics, vol. 12, no. 1, pp. 55-67, 1970.  https://doi.org/10.1080/00401706.1970.10488634
  26. R. Tibshirani, "Regression shrinkage and selection via the lasso," Journal of the Royal Statistical Society: Series B (Methodological), vol. 58, no. 1, pp. 267-288, 1996. https://doi.org/10.1111/j.2517-6161.1996.tb02080.x 
  27. H. Zou, T. Hastie, "Regularization and variable selection via the ElasticNet," Journal of the royal statistical society: series B (statistical methodology), vol. 67, no. 2, pp. 301-320, 2005. https://doi.org/10.1111/j.1467-9868.2005.00503.x 
  28. C. Cortes, V. Vapnik, "Support-vector networks Mach," Machine learning, vol. 20, no. 3, pp. 273-297, 1995. https://doi.org/10.1007/bf00994018 
  29. L. Breiman, "Random forests," Machine learning, vol. 45, no. 1, pp. 5-32, 2001. https://doi.org/10.1023/a:1010933404324 
  30. Y. F. R. Schapire, "Adaptive game playing using multiplicative weights," Games and Economic Behavior, vol. 29, no. 1-2, pp. 79-103, 1999. https://doi.org/10.1006/game.1999.0738 
  31. J. Friedman, "Greedy boosting approximation: A gradient boosting machine," Annals of statistics, vol. 29, pp. 1189-1232, 2001. https://doi.org/10.1214/aos/1013203451 
  32. T. Chen, C. Guestrin, "Xgboost: A scalable tree boosting system," in Procc. SIG KDD, San Francisco, CA, USA, New York: ACM, pp. 785-794, 2016. https://doi.org/10.1145/2939672.2939785 
  33. D. H. Wolpert, "Stacked generalization," Neural networks, vol. 5, no. 2, pp. 241-259, 1992. https://doi.org/10.1016/s0893-6080(05)80023-1 
  34. M. Kuhn, K. Johnson, "Applied Predictive Modeling," New York, NY, USA, Springer, 2013. https://doi.org/10.1007/978-1-4614-6849-3 
  35. N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. Kegelmeyer, "SMOTE: synthetic minority over-sampling technique," Journal of artificial intelligence research, vol. 16, pp. 321-357, 2002. https://doi.org/10.1613/jair.953 
  36. I. Tomek, "Two modifications of CNN," IEEE Transactions on Systems, Man, and Cybernetics, pp. 769-772, 1976. https://doi.org/10.1109/tsmc.1976.4309452