Browse > Article
http://dx.doi.org/10.17703/IJACT.2022.10.4.499

Predicting Reports of Theft in Businesses via Machine Learning  

JungIn, Seo (Dept. of Information Statistics, Andong National., Univ.)
JeongHyeon, Chang (Contents Convergence Software Research Center, Kyonggi, Univ.)
Publication Information
International Journal of Advanced Culture Technology / v.10, no.4, 2022 , pp. 499-510 More about this Journal
Abstract
This study examines the reporting factors of crime against business in Korea and proposes a corresponding predictive model using machine learning. While many previous studies focused on the individual factors of theft victims, there is a lack of evidence on the reporting factors of crime against a business that serves the public good as opposed to those that protect private property. Therefore, we proposed a crime prevention model for the willingness factor of theft reporting in businesses. This study used data collected through the 2015 Commercial Crime Damage Survey conducted by the Korea Institute for Criminal Policy. It analyzed data from 834 businesses that had experienced theft during a 2016 crime investigation. The data showed a problem with unbalanced classes. To solve this problem, we jointly applied the Synthetic Minority Over Sampling Technique and the Tomek link techniques to the training data. Two prediction models were implemented. One was a statistical model using logistic regression and elastic net. The other involved a support vector machine model, tree-based machine learning models (e.g., random forest, extreme gradient boosting), and a stacking model. As a result, the features of theft price, invasion, and remedy, which are known to have significant effects on reporting theft offences, can be predicted as determinants of such offences in companies. Finally, we verified and compared the proposed predictive models using several popular metrics. Based on our evaluation of the importance of the features used in each model, we suggest a more accurate criterion for predicting var.
Keywords
Evaluation Metric; Feature Importance; Machine Learning Algorithm; SMOTE and Tomek Link; Theft Report;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 E. P. Baumer and J. L.Lauritsen, "Reporting crime to the police, 1973-2005: A multivariate analysis of long-term trends in the National Crime Survey (NCS) and National Crime Victimization Survey (NCVS),". Criminology. vol. 48, no. 1, pp. 131-185, 2010. https://doi.org/10.1111/j.1745-9125.2010.00182.x    DOI
2 W. G. Skogan, "Concern about crime and confidence in the police: Reassurance or accountability?" Police Quarterly, vol. 12, no. 3, pp. 301-318, 2009. https://doi.org/10.1177/1098611109339893    DOI
3 M. S. Kim and S. H. Kim, "An analysis of the conditions and problems of cooperative policing in Korea," Korean Police Studies Association, vol. 3, pp. 3-30, 2004. 
4 D. M. Gottfredson, "Prediction and classification in criminal justice decision making," Crime and justice, vol. 9, pp. 1-20, 1987. https://doi.org/10.1086/449130    DOI
5 J. Y. Tak, "Reporting theft and fraud victimization in Korea," Korean Police Studies Association, vol. 83, pp. 53-75, 2010. 
6 W. G. Skogan, "Reporting crimes to the police: The status of world research," Journal of research in crime and delinquency, vol. 21, no. 2, pp. 113-137, 1984. https://doi.org/10.1177/0022427884021002003    DOI
7 R. Bowles, M. G. Reyes, and N. Garoupa, "Crime reporting decisions and the costs of crime," European journal on criminal policy and research, vol. 15, no. 4, pp. 365-377, 2009. https://doi.org/10.1007/s10610-009-9109-8    DOI
8 R. B. Felson, S. F. Messner, A.W. Hoskin, G. Deane, "Reasons for reporting and not reporting domestic violence to the police," Criminology, vol. 40m no. 3, pp. 617-648, 2002. https://doi.org/10.1111/j.1745-9125.2002.tb00968.x    DOI
9 L. Zhang, S. F. Messner, J. A. Liu, "A multilevel analysis of the risk of household burglary in the city of Tianjin, China," The British Journal of Criminology, vol. 47, no. 6, pp. 918-937, 2007. https://doi.org/10.1093/bjc/azm026    DOI
10 T. R. Tyler and C. J. Wakslak, "Profiling and police legitimacy: Procedural justice, attributions of motive, and acceptance of police authority," Criminology, vol. 42, no. 3, pp. 253-282, 2004. https://doi.org/10.1111/j.1745-9125.2004.tb00520.x    DOI
11 F. Black, "The dividend puzzle," J Portfolio Manag, vol. 2, pp. 5-8, 1976. https://doi.org/10.1515/9781400829408-003    DOI
12 C. H. Park, B.H. Ghu, "Victim-offender relationships and the reporting of crime: D. Black vs. feminist," Journal of the Korean Criminology Assocciation, vol. 12, pp. 121-137, 2018. https://doi.org/10.29095/jkca.12.2.6    DOI
13 H. Goudriaan, K. Wittebrood, P. Nieuwbeerta, "Neighbourhood characteristics and reporting crime: Effects of social cohesion, confidence in police effectiveness and socio-economic disadvantage," The British Journal of Criminology, vol. 46, no. 4, pp. 719-742m 2006. 
14 J. R. Lasley, B. J. Palombo, "When crime reporting goes high-tech: An experimental test of computerized citizen response to crime," Journal of criminal justice, vol. 23, no. 6, pp. 519-529, 1995. https://doi.org/10.1016/0047-2352(95)00043-7    DOI
15 D. Young, "See no evil," Orca Book Publishers, 2006. https://www.orcabook.com/See-No-Evil-P2781. 
16 H. Goudriaan, P. Nieuwbeerta, "Contextual determinants of juveniles' willingness to report crimes," Journal of experimental criminology, vol. 3, no. 2, pp. 89-111, 2007. https://doi.org/10.1007/s11292-007-9030-4    DOI
17 R. B. Felson, P. P. Pare, "The reporting of domestic violence and sexual assault by nonstrangers to the police," Journal of marriage and family, vol. 67, no. 3, pp. 597-610, 2005. https://doi.org/10.1037/e535952006-001    DOI
18 LEE, Soochang, KIM, Daechan, "Relationship between Change of Demographic Composition and Crime: Comparing Areas with Growth in Population to Areas with Decline," International Journal of Advanced Culture Technology (IJACT), 2022, 10.3: 63-70. https://doi.org/10.17703/IJACT.2022.10.3.63    DOI
19 W. G. Skogan, "Chicago since 1840: A time-series data handbook," IL: Institute of Government and Public Affairs, University of Illinois, Urbana, USA, 1976. 
20 P. Campoy-Torrente, A. A. Chelini, C. Soto-Urpina, "Evaluacion de la policia de proximidad en la ciudad de Santa Fe," Urvio, Revista Latinoamericana de Estudios de Seguridad, vol. 19, pp. 70-89, 2016. https://doi.org/10.17141/urvio.19.2016.2392    DOI
21 A. Blumstein, "Seriousness weights in an index of crime," American Sociological Review, vol. 39, pp. 854-864, 1974.    DOI
22 R. Broadhurst, J. Bacon-Shone, B. Bouhours, T. Bouhours, L. Kingwa, "Business and the Risk of Crime in China," ANU Press. 2011. https://doi.org/10.22459/brcc.12.2011    DOI
23 A. A. D. Frate, "The international crime business survey: findings from nine central-eastern European citie," European Journal on Criminal Policy and Research, vol. 10, no. 2, pp. 137-161, 2004. https://doi.org/10.1007/s10610-004-4122-4    DOI
24 D. R. Cox, "The regression analysis of binary sequences," Journal of the Royal Statistical Society: Series B (Methodological), vol. 20, no. 2, pp. 215-232, 1958.    DOI
25 Hoerl, A. "Ridge regression: Biased estimation for nonorthogonal problems," Technometrics, vol. 12, no. 1, pp. 55-67, 1970.    DOI
26 R. Tibshirani, "Regression shrinkage and selection via the lasso," Journal of the Royal Statistical Society: Series B (Methodological), vol. 58, no. 1, pp. 267-288, 1996. https://doi.org/10.1111/j.2517-6161.1996.tb02080.x    DOI
27 H. Zou, T. Hastie, "Regularization and variable selection via the ElasticNet," Journal of the royal statistical society: series B (statistical methodology), vol. 67, no. 2, pp. 301-320, 2005. https://doi.org/10.1111/j.1467-9868.2005.00503.x    DOI
28 Y. F. R. Schapire, "Adaptive game playing using multiplicative weights," Games and Economic Behavior, vol. 29, no. 1-2, pp. 79-103, 1999. https://doi.org/10.1006/game.1999.0738    DOI
29 C. Cortes, V. Vapnik, "Support-vector networks Mach," Machine learning, vol. 20, no. 3, pp. 273-297, 1995. https://doi.org/10.1007/bf00994018    DOI
30 L. Breiman, "Random forests," Machine learning, vol. 45, no. 1, pp. 5-32, 2001. https://doi.org/10.1023/a:1010933404324    DOI
31 J. Friedman, "Greedy boosting approximation: A gradient boosting machine," Annals of statistics, vol. 29, pp. 1189-1232, 2001. https://doi.org/10.1214/aos/1013203451    DOI
32 T. Chen, C. Guestrin, "Xgboost: A scalable tree boosting system," in Procc. SIG KDD, San Francisco, CA, USA, New York: ACM, pp. 785-794, 2016. https://doi.org/10.1145/2939672.2939785    DOI
33 D. H. Wolpert, "Stacked generalization," Neural networks, vol. 5, no. 2, pp. 241-259, 1992. https://doi.org/10.1016/s0893-6080(05)80023-1    DOI
34 M. Kuhn, K. Johnson, "Applied Predictive Modeling," New York, NY, USA, Springer, 2013. https://doi.org/10.1007/978-1-4614-6849-3    DOI
35 N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. Kegelmeyer, "SMOTE: synthetic minority over-sampling technique," Journal of artificial intelligence research, vol. 16, pp. 321-357, 2002. https://doi.org/10.1613/jair.953    DOI
36 I. Tomek, "Two modifications of CNN," IEEE Transactions on Systems, Man, and Cybernetics, pp. 769-772, 1976. https://doi.org/10.1109/tsmc.1976.4309452   DOI