collective intelligence in law enforcement–the wikicrimes system

14
UNCORRECTED PROOF 1 2 Collective intelligence in law enforcement – The WikiCrimes system 3 Vasco Furtado a,d, * , Leonardo Ayres a , Marcos de Oliveira c , Eurico Vasconcelos b , Carlos Caminha a , 4 Johnatas D’Orleans a , Mairon Belchior a 5 a Universidade de Fortaleza – UNIFOR, Av. Washington Soares, 1321, Fortaleza-CE, Brazil 6 b Pontifícia Universidade Católica – PUC-Rio, Rua Marquês de São Vicente, 225, Gávea, Rio de Janeiro-RJ, Brazil 7 c University of Otago, P.O. Box 56, Dunedin 9054, New Zealand 8 d ETICE – Empresa de Tecnologia do Ceará, Av. Pontes Vieira 220, Fortaleza-CE, Brazil 9 11 article info 12 Article history: 13 Received 1 October 2008 14 Received in revised form 2 July 2009 15 Accepted 4 August 2009 16 Available online xxxx 17 Keywords: 18 Web 2.0 19 Collaborative systems 20 Law enforcement 21 Agents 22 Reputation 23 24 abstract 25 Collaboration is on the rise, primordially leveraged by the Web 2.0 in which the difference 26 between information producer and consumer decreases significantly. In this paper we 27 describe WikiCrimes, an example of a Web 2.0 application that offers a collaborative envi- 28 ronment based on the use and direct manipulation of maps, in order to register and 29 research criminal events. WikiCrimes is driven by three goals: (i) to give more transparency 30 and publicity to criminal information, (ii) to provide means for citizen prevention, and (iii) 31 to reduce the phenomenon of under-reporting (crimes that are not notified to authorities). 32 In the paper we pay particular attention to the fact that in this context, finding the equilib- 33 rium between people’s participation and information credibility is crucial. Anonymous 34 mass collaboration is the easiest way to receive information; however, the credibility of 35 the received information is depreciated, because the source of information is unknown. 36 We particularly concentrate on the ways we have created to keep the ‘‘participation vs. 37 reliability of information” trade-off at good level. The reputation model is the main compo- 38 nent created with this purpose. The experiences and the obstacles we are facing in the 39 implementation of the project are the subjects of discussion and analyses. 40 Ó 2009 Published by Elsevier Inc. 41 42 43 1. Introduction 44 The general public is making ever greater use of collaborative systems. This momentum of collaboration is primordially 45 leveraged by the Web 2.0 [18], in which the difference between information producers and consumers decreases signifi- 46 cantly, since several applications emphasize the production of information by any Internet user. A culture of sharing induces 47 people to externalize their feelings, opinions, experiences and even their goods. With the mass production of content, col- 48 laboration mechanisms such as Wikipedia (http://www.wikipedia.org) came almost naturally. 49 Despite the huge success of Wikipedia, finding good and useful causes that are capable of involving thousands or even 50 millions of people operating with little or no coordination is still a big challenge. A slight variation of the wiki concept illus- 51 trated by Wikipedia has been dubbed crowd sourcing [10]. In that context, mass collaboration occurs via human resource 52 outsourcing based on awards (often financial) or even punishments that ‘‘motivate” people’s participation in large cam- 53 paigns. In the context of public and government areas – where social problems would be a potential target to be treated 54 by means of mass collaboration – crowd sourcing is particularly difficult, since few investments are available to leverage 55 people’s participation. 0020-0255/$ - see front matter Ó 2009 Published by Elsevier Inc. doi:10.1016/j.ins.2009.08.004 * Corresponding author. Address: Universidade de Fortaleza – UNIFOR, Av. Washington Soares, 1321, Fortaleza-CE, Brazil. E-mail address: [email protected] (V. Furtado). Information Sciences xxx (2009) xxx–xxx Contents lists available at ScienceDirect Information Sciences journal homepage: www.elsevier.com/locate/ins INS 8393 No. of Pages 14, Model 3G 19 August 2009 ARTICLE IN PRESS Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement – The WikiCrimes system, Inform. Sci. (2009), doi:10.1016/j.ins.2009.08.004

Upload: truongnhan

Post on 07-Jan-2017

228 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Collective intelligence in law enforcement–The WikiCrimes system

1

2

3

4

5678

9

1 1

1213141516

17181920212223

2 4

42

43

44

45

46

47

48

49

50

51

52

53

54

55

Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

Contents lists available at ScienceDirect

Information Sciences

journal homepage: www.elsevier .com/locate / ins

OO

FCollective intelligence in law enforcement – The WikiCrimes system

Vasco Furtado a,d,*, Leonardo Ayres a, Marcos de Oliveira c, Eurico Vasconcelos b, Carlos Caminha a,Johnatas D’Orleans a, Mairon Belchior a

a Universidade de Fortaleza – UNIFOR, Av. Washington Soares, 1321, Fortaleza-CE, Brazilb Pontifícia Universidade Católica – PUC-Rio, Rua Marquês de São Vicente, 225, Gávea, Rio de Janeiro-RJ, Brazilc University of Otago, P.O. Box 56, Dunedin 9054, New Zealandd ETICE – Empresa de Tecnologia do Ceará, Av. Pontes Vieira 220, Fortaleza-CE, Brazil

a r t i c l e i n f o a b s t r a c t

252627282930313233343536

Article history:Received 1 October 2008Received in revised form 2 July 2009Accepted 4 August 2009Available online xxxx

Keywords:Web 2.0Collaborative systemsLaw enforcementAgentsReputation

U

37383940

0020-0255/$ - see front matter � 2009 Published bdoi:10.1016/j.ins.2009.08.004

* Corresponding author. Address: Universidade dE-mail address: [email protected] (V. Furtado).

Please cite this article in press as: V. Furtado etdoi:10.1016/j.ins.2009.08.004

CTED

PR

Collaboration is on the rise, primordially leveraged by the Web 2.0 in which the differencebetween information producer and consumer decreases significantly. In this paper wedescribe WikiCrimes, an example of a Web 2.0 application that offers a collaborative envi-ronment based on the use and direct manipulation of maps, in order to register andresearch criminal events. WikiCrimes is driven by three goals: (i) to give more transparencyand publicity to criminal information, (ii) to provide means for citizen prevention, and (iii)to reduce the phenomenon of under-reporting (crimes that are not notified to authorities).In the paper we pay particular attention to the fact that in this context, finding the equilib-rium between people’s participation and information credibility is crucial. Anonymousmass collaboration is the easiest way to receive information; however, the credibility ofthe received information is depreciated, because the source of information is unknown.We particularly concentrate on the ways we have created to keep the ‘‘participation vs.reliability of information” trade-off at good level. The reputation model is the main compo-nent created with this purpose. The experiences and the obstacles we are facing in theimplementation of the project are the subjects of discussion and analyses.

� 2009 Published by Elsevier Inc.

E

41

NC

OR

R1. Introduction

The general public is making ever greater use of collaborative systems. This momentum of collaboration is primordiallyleveraged by the Web 2.0 [18], in which the difference between information producers and consumers decreases signifi-cantly, since several applications emphasize the production of information by any Internet user. A culture of sharing inducespeople to externalize their feelings, opinions, experiences and even their goods. With the mass production of content, col-laboration mechanisms such as Wikipedia (http://www.wikipedia.org) came almost naturally.

Despite the huge success of Wikipedia, finding good and useful causes that are capable of involving thousands or evenmillions of people operating with little or no coordination is still a big challenge. A slight variation of the wiki concept illus-trated by Wikipedia has been dubbed crowd sourcing [10]. In that context, mass collaboration occurs via human resourceoutsourcing based on awards (often financial) or even punishments that ‘‘motivate” people’s participation in large cam-paigns. In the context of public and government areas – where social problems would be a potential target to be treatedby means of mass collaboration – crowd sourcing is particularly difficult, since few investments are available to leveragepeople’s participation.

y Elsevier Inc.

e Fortaleza – UNIFOR, Av. Washington Soares, 1321, Fortaleza-CE, Brazil.

al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),

Original text:
Inserted Text
the wikicrimes
Original text:
Inserted Text
UNIFOR
Original text:
Inserted Text
Fortaleza-CE
Original text:
Inserted Text
Pontifıcia
Original text:
Inserted Text
PUC-Rio
Original text:
Inserted Text
Janeiro-RJ
Original text:
Inserted Text
Otago PO
Original text:
Inserted Text
Dunedin,
Original text:
Inserted Text
Ceara
Original text:
Inserted Text
Fortaleza, CE
Original text:
Inserted Text
i)
Original text:
Inserted Text
ii)
Original text:
Inserted Text
iii)
Original text:
Inserted Text
areas—where
Original text:
Inserted Text
collaboration—crowd
Page 2: Collective intelligence in law enforcement–The WikiCrimes system

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

2 V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

UN

CO

RR

EC

TED

PR

OO

F

In the Law Enforcement domain, besides the aforementioned difficulties, another particular challenge must be faced. Inthat context, finding the equilibrium between people’s participation and information credibility is crucial. Anonymous masscollaboration is the easiest way to receive information; however, the credibility of the received information is depreciated,because the source of information is unknown.

It is in that particularly complex domain that we have initiated a project called WikiCrimes (http://www.wikicrimes.org),which is driven by three goals: (i) to give more transparency and publicity to criminal information, (ii) to provide means forcitizen crime prevention, and (iii) to reduce the phenomenon of crime under-reporting (crimes that are not notified toauthorities). These goals have been on the political agenda of several countries around the world, particularly those in whichthe population suffers with high rates of violence.

WikiCrimes aims to offer a common interaction space among the public in general, so that they are able to notify criminalfacts as well as keep track of the locations where they occur. The goal is to obtain collaborative individual participation forgenerating useful information for everyone. It is based on the principle that the ones who hold information about crimes arethe citizens. If they want to make such information public, they can. Here, we are appealing to the feeling of sharing that is sousual in victims of violence. When someone is a victim of any type of crime, it is usual to tell someone about the fact. Typ-ically, those who are close to the victim are the first to be informed. What we intend with WikiCrimes is to provide an envi-ronment to be that ‘‘global blackboard” of stories told by people about crimes, in order to help alert other people on a scalelarger than their closest social contacts. In other words, if there is active participation, crime mapping starts to be done col-laboratively, and everyone will benefit from having access to information about where crimes occur.

In this article we describe the main goals, motivations and challenges we face during the development and implementa-tion of WikiCrimes. We particularly concentrate on the ways we have created to keep the ‘‘participation vs. reliability ofinformation” trade-off at good level. We also discuss and analyze our experiences and the obstacles that we face.

2. Collaborative systems

We understand collaborative systems as computer tools that support the interaction (direct or indirect) among a certainnumber of people with individual and/or collective goals. Research into collaborative systems is divided into several areasand assumes different yet inter-related terminologies such as Groupware, Computer-Mediated-Communication (CMC), Com-puter-Support Cooperative Work and Learning (CSCW/CSCL) [7]. ‘‘Computer-Mediated Communication” can be seen as thevast area that encompasses computer-mediated communication research, including collaborative systems. ‘‘Groupware” re-fers to technology applied to computers and networks designed to enable work in groups. This technology can be used tocommunicate, cooperate, coordinate, troubleshoot, compete and/or negotiate. Examples of groupware technologies are e-mail, newsgroups, wikis, video conferences and chats [9]. CSCW and CSCL refer to the areas of study that will examinethe design, adoption and use of groupware tools in the context of working and learning.

All these kinds of collaborative systems have been strongly influenced by the recent trends of the Web. The Web can beseen in terms of two distinct phases, and one way to distinguish these phases is to look at the number of producers and con-sumers of information. In the traditional Web (or Web 1.0), there are few producers and many consumers. The main produc-ers are specialized persons (web designers), companies (both public and private), and traditional media. The typical Internetuser only accesses the information made available by these producers. In Web 2.0, the difference between producer and con-sumer of information decreases significantly, since several applications emphasize the production of information by anyInternet user. The recent wave of blogs, photologs, wikis, online communities, social networks, etc. is an example of this con-text. With the mass production of content, cooperation mechanisms such as Wikipedia came almost naturally. Another typeof application that is beginning to emerge is aimed at the integration of information from different sources (‘‘mashup”).

3. WikiCrimes: motivation and goals

The veracity and accuracy of information about where crimes occur, as well as the information on the characterization ofsuch crimes, has always been on the agenda of discussions about Public Safety in Brazil and in various other countries. Tra-ditionally, this information is monopolized by law enforcement agencies and is therefore characterized as a highly central-ized mechanism. This monopoly ultimately creates tension in the relationship between such agencies and society at large,because it is commonly opposed to the precept of disclosure and transparency of information required by a democratic re-gime. Allied to this context are the crises that have characterized the daily routines of law enforcement agencies as well astheir limitations to provide a quality public service, which tend to diminish citizens’ trust in those agencies. These factorsencompass some of the reasons for the growing problem of under-reporting – the low rate of reporting crimes – that hasoccurred [12]. It has become common for one to hear someone who has been mugged say that they did not file a police re-port because they thought it would not bring about any effect. Polls conducted with crime victims in several Brazilian statesshow that under-reporting may, in densely-populated areas, reach 60% for certain types of crimes. The result of this can bedisastrous in terms of formulation of public policies and particularly in the planning of police actions, since the official crimemapping may be reflecting a trend that is somewhat different than what is actually occurring in real life.

The idea behind WikiCrimes is to provide a common area of interaction among people so that they can report and monitorthe locations where crimes are occurring. It is based on the principle that the ones who hold information about crimes are

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Original text:
Inserted Text
i)
Original text:
Inserted Text
ii)
Original text:
Inserted Text
iii)
Original text:
Inserted Text
under-reporting—the
Original text:
Inserted Text
crimes—that
Original text:
Inserted Text
didn’t
Original text:
Inserted Text
wouldn’t
Page 3: Collective intelligence in law enforcement–The WikiCrimes system

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

138138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx 3

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

RO

OF

the citizens. If they want to make such information public, they can. Thus, individual participation, in a collaborative manner,can generate collective intelligence. In other words, if there is active participation, crime mapping starts being done collab-oratively, and everyone will benefit from having access to information about where crimes occur. WikiCrimes is a typicalWeb 2.0 application. It allows users to access and to register criminal events on the computer directly in a specific geographiclocation represented by a map. That is one of the phases of the crime mapping activity, in which an analyst collects, maps,visualizes, and analyzes crime incident patterns.

4. Main architecture

The open and participatory characteristics identified in WikiCrimes makes it susceptible to abuses or fraud attempts. It isimportant that as many people as possible collaborate with the system, contributing to the growth of its data records. But itis equally important that the information registered in the system be reliable, so that the system can become a trustworthysource of information. In saying this, our claim is that an open collaborative system must be viewed as a kind of open multi-agent system, where a number of human and/or artificial agents interoperate pursuing their individual or common goals[17]. These agents can contribute positively or negatively to the organization and goals of the system as a whole, and theagents are free to join and leave the system as they wish, as long as they obey certain rules that must be observed concerningthe management of the system.

The management of interoperation among agents is a complex task, and robust techniques and methodologies for thedevelopment of reliable and open Multi-Agent Systems (MAS) have been studied in academia [1,2,5,8,14,16,20,21,24]. Suchtechniques are aimed at the modeling and implementation of features that give openness to those agents, allowing them tohave the ultimate choice of obeying regulations or dealing with possible sanctions imposed by the MAS norms. After all,agents are autonomous entities and the biggest challenge is to have a coordination system where the agents can be freeto decide what to do, but at the same time be encouraged or enticed to obey the regulations of the artificial society theyare entering.

P

D4.1. WikiCrimes as a multi-agent system

We have therefore modeled WikiCrimes as an Open Collaborative System [17], which is comprised of the followingcomponents:

Pleasedoi:10

EWikiCrimes ¼ fAS;AC ;RE;OD;OS;OR; PI;Ng:

UN

CO

RR

EC

Twhere, AS, agents playing system roles; Ac, agents playing context roles; RE, a set of external roles that are played by agentsthat interact with the system; OD, domain ontology (here identified as crime ontology); OS, system ontology; OR, reputationontology; PI, Set of interaction protocols; N, set of norms represented as commitments among agent roles listed in RE.

Agents playing system roles (AS) are the Institutional Agent, the Monitor Agent and the Reputation Agent. The Institu-tional Agent is responsible for registration of agents playing external roles. This agent manages a workflow of the system,which defines the participation of every agent that is part of the system in the whole interactive process. The Monitor Agentis responsible for punishing or rewarding agents that break or follow the norms of the system, respectively. This agent man-ages the life cycle of commitments that represent the system norms defined in N.

The Reputation Agent is responsible for keeping updated a database of reputation owned by the agents registered in thesystem. The reputation is calculated based on the agent interactions and acceptance of the system norms defined in N.

Agents playing context roles (Ac) are the referral agents responsible for keeping a Social Network formed by agents thatplay the roles of Registered User, Invited User and Certifier Entity. The social network is formed when agents playing theRegistered User and Certifier Entity roles register a crime and indicate or refer another agent. The System Administratorand the Database Administrator Agents are responsible for managing administrative tasks and keeping the criminal factsupdated in the database, respectively.

The external roles played by the agents that interact with the system (RE) are basically the role of registered user thatrepresents a typical user of WikiCrimes, who is able to register, confirm and disconfirm crimes, browse the environment,denounce abuse, leave messages for the Institutional Agent about the system, and indicate other agents to confirm crimes.The Invited User Role is played by the agent that is indicated to confirm a crime. The Certifier Entity Role is a special kind ofrole played by agents that have a respected position in the system. Agents playing this role have the reputation of a SystemAgent, since they represent institutions with high credibility as sources of crime information. The Browser User Role isplayed by users that only browse the institutional environment, basically seeking information in the system. The InstitutionAgent will try to encourage this kind of user to assume the role of Registered User.

The main interaction protocols (PI) are registration, deregistration, assuming a role in the system, changing a role in thesystem, breaking a commitment, fulfilling a commitment, registering a criminal fact, indicating another agent to confirm acrime, confirming a crime positively, confirming a crime negatively, denouncing abuse, commenting on a registered criminalfact, leaving a comment for the system, registering an observation area, deregistering an observation area, sending alerts,receiving alerts, asking for a safe route, querying the criminal database, and querying the reputation data base. The set ofnorms N represents the following commitments between the agent roles listed in RE:

cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),.1016/j.ins.2009.08.004

Original text:
Inserted Text
Where:•
Original text:
Inserted Text
- Agents
Original text:
Inserted Text
System Roles•
Original text:
Inserted Text
- Agents
Original text:
Inserted Text
Context Roles•
Original text:
Inserted Text
- A
Original text:
Inserted Text
External Roles
Original text:
Inserted Text
system•
Original text:
Inserted Text
- Domain Ontology
Original text:
Inserted Text
Crime Ontology)•
Original text:
Inserted Text
- System Ontology•
Original text:
Inserted Text
- Reputation Ontology•
Original text:
Inserted Text
-
Original text:
Inserted Text
protocols•N - Set
Vasco Furtado
Cross-Out
Page 4: Collective intelligence in law enforcement–The WikiCrimes system

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

4 V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

� Registered Users accept registering criminal facts that will have positive confirmations and that won’t be denounced asabuse.

� Invited Users will register with the system and confirm positively or negatively criminal facts associated with theinvitation.

� Certifier Entities will exercise dominance over the registration of criminal facts in specific geographic areas.

The commitments are represented by objects that have a specific life cycle and will influence the rewarding or punish-ment of reputation points for the agents that fulfill or break (respectively) such commitments.

ED

PR

OO

F

4.2. Basic ontologies

Two ontologies are represented in WikiCrimes for the representation of crimes and reputations. The crime ontology isused by most WikiCrimes agents and is depicted in Fig. 1. Basically it represents two concepts: crime and report of crime.A crime has a type, a time, an address, and type of weapon used. The report of crime has information about the reportingitself, such as whether or not the fact was communicated to the police.

The reputation ontology was inspired by the work of [19]. However, we specialized some of the concepts to cope with theparticular features of WikiCrimes. Fig. 2 depicts the classes we have defined in WikiCrimes (isa relationship) and some in-stances in that context (the io relationship). Entity is any element of the system that is susceptible of being evaluated or hav-ing an active part in the generation or diffusion of evaluations. Entities being evaluated play the social role of Target, inWikiCrimes represented by all the agents playing the RE (External Roles). Entities evaluating or generating evaluation arerepresented by the Source class. In WikiCrimes. all the agents playing AS (System Roles) are seen as Source. The InstitutionalAgent and Monitor Agent are sources for the computation of the Acquired Reputation-AR (see Section 5 for details). The Insti-tutional Agent, Referral Agent, and the System Administrator Agent are sources for the computation of the Propagated Rep-utation-PR (also, see Section 5 for further details). The Reputation Agent is source for the computation of the combinedreputation of AR and PR. Agents that spread the evaluations play the role of Gossiper entities and are represented in Wiki-Crimes by the Reputation Agent. Agents that receive the evaluation and observe it for further interactions in the systemare represented by the agents that play ER (External Roles). The Focus class represents the context of the evaluation, the good-ness or badness of some Entity’s Evaluation is towards to a specific norm, standard or skill [19], see Fig. 2. The class Valuerepresents a value that express how good or bad is the target entity in the context represented by the Focus element andis generated by the Source entity. In WikiCrimes the norms represent a set of rules that must be obeyed by the agents whileinteracting in the system. The value of the reputation in WikiCrimes is represented by a real number belonging to the

UN

CO

RR

EC

T

Fig. 1. Crime ontology in WikiCrimes.

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Page 5: Collective intelligence in law enforcement–The WikiCrimes system

OO

F

197

198

199

200

201

202

203

204

205

206

207

208

Fig. 2. Reputation ontology.

V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx 5

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

TED

PRinterval [0,1], being 0 completely bad and 1 completely good. The Strength, represented by a real number belonging to the

interval [0,1], is a subjective measure set by the Source that indicates how reliable the evaluation is, 1 being the maximumreliability. This is an attempt to make the evaluations more accurate by including the element of reliability in the calcula-tions made by the Source. In WikiCrimes, the Strength it is identified when the reputation of agents – who are confirmingcrimes and denouncing abuse – influences the calculation of the Target’s AR. The class Voice includes the necessary elementsto represent the spreading of an evaluation; it is defined as a report on reputation. For example, ‘‘it was told that Agent X hasreputation 0.81 in WikiCrimes.” Therefore the class has, as elements: the evaluation itself; the teller of the evaluation (i.e.,the Gossiper); and the receiver of the evaluation (i.e., the Recipient).

4.3. General workflow

We have modeled the basic states of each one of the roles played by the agents, as well as the activities that represent thetransition between two states by means of a colored Petri net [11]. Fig. 3 depicts the general flow. Basically, it describes thethree roles that an agent can play: the Browser User, the Invited User and the Registered User. Both a Browser User and an

UN

CO

RR

EC

Fig. 3. Colored Petri net representing the different states and activities of agents and roles they can assume.

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Original text:
Inserted Text
[0,1],
Original text:
Inserted Text
agents—who
Original text:
Inserted Text
abuse—influences
Page 6: Collective intelligence in law enforcement–The WikiCrimes system

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

6 V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

Invited User Agent, after registering in the system, can change to the role of Registered User that, in turn, can register andconfirm crimes as well as denounce abuses. Another activity that brings about a change of state is the Registered User’sassuming the role of Certifier User.

DPR

OO

F

4.4. Interacting with WikiCrimes

The WikiCrimes interface was based on the eXtreme Communication-Centered Design [3,4] of Semiotic Engineering [22].The idea of semiotic engineering draws on concepts from semiotics and computer science to investigate the relationship be-tween user and designer. Semiotics is the study of signs, and the essence of semiotic engineering is the communication be-tween designers and users at interaction time; designers must tell the users, via the interface, how to use the signs that makeup a system or program. This approach, which builds on – but goes further than – the currently dominant user-centered ap-proach, allows designers to communicate their overall vision and therefore helps users understand designs, rather than sim-ply which icon to click. Doing so, we had the goal of improving designer-user communication and therefore avoidingmisunderstood communication and ‘‘mistaken” actions on the part of users.

The reflection of the application of this theory on the design of WikiCrimes was a clearer and more direct communication(designer-user), via interface, of how users could identify and meet their goals in the system (registering and commenting oncrimes and denouncements, researching areas and locations, ‘‘knowing where it is not safe,” and obtaining information aboutcrime and about the system). This communication was carried out by conceptually highlighting and clustering the featuresnecessary to meet the users’ main goals in a way as to permit the easy identification and execution thereof. Another impor-tant reflection of application of this theory is the communication of the designer to the user in the most direct manner,implemented in the system’s help function. In WikiCrimes, this help was developed on three levels:

� Contextual help, offered through ‘‘hints” that are displayed on the interface based on the position of the mouse pointerover certain items of the interface and areas of the system;

� Textual help, or system help, is offered based on a set of texts associated with images, providing information on ‘‘what itis,” ‘‘how to do it” and ‘‘where to find it” regarding the interface items, features, concepts and areas of the system. This helpis indexed alphabetically and by topic, and is located in the upper right corner of the interface;

� Online help via chat. This help is aimed at serving users who have not found answers to their questions through the otherforms of help offered, or who prefer direct interaction with the WikiCrimes team.

UN

CO

RR

EC

TE

Fig. 4. Overview of WikiCrimes main interface with the map of homicides in Fortaleza, with pin points and texts describing its main areas.

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Original text:
Inserted Text
on—but
Original text:
Inserted Text
than—the
Page 7: Collective intelligence in law enforcement–The WikiCrimes system

DPR

OO

F

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

Fig. 5. Hot spots map describing the dangerous areas, based on homicides, by means of different intensity of the color red.

V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx 7

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

UN

CO

RR

EC

TEFig. 4 depicts the main screen of WikiCrimes, which offers a crime search function (right side of the Figure) that enables

users to view the registers of crimes, filtered by crime type, date range and time range. The search can also be done by meansof a direct search on the map by querying and viewing a location on the map. To post a criminal occurrence, the user must beregistered and logged in to the system. Once logged in, the user must locate the exact address where the criminal fact oc-curred. Once the crime location is visible on the map, the selection of the type of crime can be done. The system currentlypermits the user to post the following types of crime:

� Robbery: robbery against the person, robbery against property, attempted robbery against the person and attempted rob-bery against property;

� Theft: theft against the person, theft against property, attempted theft against the person and attempted theft againstproperty;

� Violent Crime: homicide, attempted homicide, robbery followed by murder (aggravated robbery involving death of thevictim), brawls or fights, domestic violence, abuse of authority.

To obtain information about a crime, suffice it to click on the respective marker of the crime. Note that the completedescription of the crime is accessible only for those who are logged in. In Fig. 4, the map of crimes is also shown by meansof markers. There, the registers of homicides that occurred in Fortaleza from January to September, 2008 are depicted. Fig. 5shows another way to visualize the same records, in which the map of crimes is depicted by means of hot spots. An algorithmfor computing the map of Kernel [15] allows the identification of dangerous areas based on clusters represented by theintensity of a color in a given region.

5. Credibility of the information

In wiki-style open systems, there must be mechanisms for rewarding and/or punishing agents involved in the interoper-ation process. In these kinds of systems, there is a constant trade-off between diminishing the constraints imposed to theagents with the intention to increase the number of participants in the system, and the rigid control that can be imposedto avoid unwanted behavior, such as the report of fake information. One of the main concerns in WikiCrimes is the numberof hoaxes or, in our case, report of false criminal facts. How to prevent a person from spreading false information in the sys-tem? Why does that specific area have so many crimes? Is it really true or is someone trying to make a joke, to speculateabout the real estate market, or to diminish the image of the local police?

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Original text:
Inserted Text
Information
Page 8: Collective intelligence in law enforcement–The WikiCrimes system

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306307

308

309

310

311

312

313

314

315

316

317

318

319

8 V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

RR

EC

TED

PR

OO

F

5.1. Reputation model

In WikiCrimes, there are not many requisites to become a member of the system. The only personal questions asked are aname and valid e-mail address; no document identification is required so that people will not be afraid to post information inthe system. It is up to the user to provide the system with information that increases the credibility of the user reporting acrime. It is possible to add links to videos, newspapers, photos or any other document (such as a police report) that helps theusers to believe in the informant making the posted information more credible. Moreover, for every criminal fact registeredin the system, it is requested that there be an indication of at least one person who can confirm that the information posted istrue; this is to increase the credibility of the information, possibly making the system as a whole more reliable. The more theinformation is confirmed, the more it is considered trustworthy. These indications for the confirmation of information gen-erate a graph, where the vertices represent users of WikiCrimes and the edges represent the indication of others to confirmthe criminal fact registered. The graph represents a Social Network formed by the WikiCrimes users. Doing so, we are able tocreate a reputation model that plays a strong role in the matter of identifying ‘‘bad agents” in the institutional environment,and the social net of WikiCrimes users is a fundamental tool for that. By ‘‘reputation,” we mean a score that represents thecommunity’s view about a member of that community. Trust is a score that reflects the subjective view of an entity fromanother. Trust can be calculated upon the acknowledgement of a given reputation.

In WikiCrimes, reputation is built upon interaction of the agents, by the observation of breaking the commitments andconsequently the norms of the system. We have thus defined the concept of reputation for the source of information; i.e.,whoever registers the criminal fact. In other words, in WikiCrimes we have a social network formed by the users that areregistered in the system, forming the Social Network Layer, and the information that is posted in the system – the criminalfacts. The information posted in the system forms the Information Layer. The goal is to build a function that will calculatethe reputation of the users and reflect that reputation in the trustworthiness of the information that is posted in the Infor-mation Layer. Some entities, such as the press and governmental agencies, are labeled as certifier entities, and therefore con-sidered very well reputed. But that is not enough; the open characteristic of the system, in the sense that anyone could be auser, does not facilitate the task of knowing the reputation of all the users of the system. The attribution of reputation to theusers who are not qualified as certifier entities is fundamental. We can assume that an agent delegates a commitment toanother agent when the former indicates the latter to give an opinion about the a particular report. The act of acceptanceof the commitment by the agent indicates a relationship of trust between the agents. If the commitment is broken by thesecond agent, it will be penalized in reputation points. This relationship suggests the adoption of mechanisms to propagatetrust in the social network built in WikiCrimes. The Administrator and Certifier Entity roles have a very good reputation tostart with. These agents serve as a starting point for the propagation of trust to the agents indicated by them, then to theones indicated by those indicated, and so on, similar to the propagation of trust and distrust for demotion of web spam de-scribed in [24].

Basically the main steps of this process are the following:

1. Attribute initial reputation scores to the users (Propagation of Trust). A seed set of reputable users is selected and, fromthese users, the trust that the System has in them will be propagated to form a reputation of all in the system.

2. Once the initial reputation is calculated, the trustworthiness of the information posted by the users will be calculated,reflecting from the Social Layer to the Information Layer. This will give an idea of how credible the current posted infor-mation actually is.

3. In considering WikiCrimes as a Normative and Open MAS, the reputation and trust will be updated based on the inter-actions identified in the MAS, namely posting a crime, confirming a crime positively, confirming a crime negatively, anddenouncing abuse. Observing these interactions, there is a social norm that is difficult to maintain: the user commits itselfto register reliable information in the system. Agent interaction with the Information Layer will help to identify theagents that are breaking this social norm. These interactions will indicate how much trust the users of the system havein that information.

UN

CO

5.2. Acquired reputation

Two types of scores are considered in order to calculate the reputation based on the interaction activities performed bythe user and the social evaluation of the peers. The interaction activities that count positively are those related to providingadditional information in order to give credibility to report of crimes, such as posting videos, links to newspapers, officialdocuments and photos. The rate of confirmations (or disconfirmations) made is also calculated, since it measures howresponsive the user has been to others. The other type of score refers to the evaluation that others have of the crimes re-ported by the agent. The rate of confirmed and unconfirmed crimes and the rate of denouncement of abuses, as well asthe administrator’s evaluation, are seen as referrals from other users about the actions of a certain agent, which will reflecton the calculation of its reputation score. More precisely:

� the rate of confirmations made for each agent a, Rc is the number of confirmations made by a (NbConfirm) divided by thenumber of invitations to give opinion about reports received by a (NIR), ðRc ¼ NbConfirm=NIRÞ

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Original text:
Inserted Text
system—the
Original text:
Inserted Text
,
Vasco Furtado
Cross-Out
Vasco Furtado
Inserted Text
23
Vasco Furtado
Inserted Text
23
Vasco Furtado
Inserted Text
please, change to reference 23
Page 9: Collective intelligence in law enforcement–The WikiCrimes system

320

321

322

323

324

325

327327

328

329

330

331

333333

334

335

336

337

338

339

341341

342

344344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx 9

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

� the rate of additional information provided Radd is measured from the number of crime reports in which an additionalpiece of information was provided for a crime ðNaddÞ divided by the number of reports registered by the agent a (NbCrimes),Radd ¼ ðNadd=NbCrimesÞ

� the total rate of positive confirmations ðRtCþÞ is based on the number of positive confirmations made by the ‘‘guests” ginvited by agent a pondered by their reputation. Let fcði; gÞ be a function that represents an invitation made by a to g askingfor an opinion about the report of crime i and that assumes the following values,

Pleasedoi:10

fcði; gÞ1 if crime i is confirmed by g

0 otherwise

RtCþ ¼Xn

i¼1

Xm

g¼1

ðqðgÞÞ � fcði; gÞ=n�m

OFwhere, m is the number of invitations done by a and n is the number of crimes registered by a

� Conversely, the total rate of negative confirmations Rtc� made by the ‘‘guests” g invited by agent a is RtC� ¼Pn

i¼1Pmg¼1ðqðgÞÞ � fcði; gÞ=n�m

where,

Ofuði; gÞ1 if crime i is unconfirmed by g

0 otherwise

R� The total rate of qualified denouncements (RtQD) is based on the number of denouncements of abuse that other agentshave made on crimes registered by a pondered by the reputation of the one who has denounced qðsÞ

DPRtQD ¼ 1�

Xn

t¼1

ðqðsÞ � fdðiÞÞ=n where;

fdðiÞ1 if crime i is denounced as abuse by source s

0 otherwise

The final acquired reputation, AR, is computed from the aforementioned measures, as follows:

EAR ¼ Rc þ Radd þ RtCþ � RtC� � RtQD T

UN

CO

RR

EC5.3. Reputation from trust propagation

A complementary manner of computing the reputation is based on the propagation of the trust that the agents have ineach other while considering the reputation of the ones involved. For the sake of simplicity, we are going to call this mech-anism propagation of reputation, even though we are aware that the precise concept would refer to the calculus of a reputa-tion from the trust value that an agent has in another agent. In other words, when a friend receives an invitation to confirm acrime from someone with a good reputation, we assume that there is a strong indication that friend trusts the other. Thisallows one to compute the reputation of the agent who has been invited to confirm the occurrence from the reputationof the friend who has made the invitation. The propagation of reputation between agents is done at several iterations. Ateach iteration, the agent’s reputation score is divided by the number of its outgoing links (representing the indicated friends)and each of them gets an equal share. So, a friend’s overall reputation score is the sum of the shares from all its parentfriends. The score among the agent friends is divided depending on the number of friends and follows a logarithm function.More formally, an agent a with a reputation score qðaÞwho has invited g friends will give d � qðaÞ � logð1þ gÞ to each friend(d is the decay factor, which determines how much of the parent friends’ score is propagated to its friends). This logarithmstrategy takes into account the effect of the number of friends that an agent has indicated, giving more importance to crimereports in which the agent asks several confirmations from friends. For computing the overall scores, given the shares fromall its parent friends, a strategy called maximum parent [23] is adopted for summing the reputation values in such a way as tonever exceed the reputation score of the most reputed parent. In other words, the sum of reputation values from each parentis calculated and this sum is compared to the largest reputation score among each of its parents; the smaller of these twovalues is used as the child’s reputation score.

Finally, the score of reputation is then computed from the propagated reputation (PR) and the acquired reputation basedon the participation and social evaluation (AR). More formally the reputation of agent a, qðaÞ is qðaÞ ¼ w� PRþ ð1�wÞ � AR,where, w is a weight to ponder the importance of one type of reputation over another.

The reputation scores have been used in WikiCrimes only in background analysis. There is a management module that isexclusively available to the system administrators who are responsible for moderating the registers of crime made in thesystem, taking into account the reputation of the denouncer. Further versions of the system will provide a visual function-ality in which the user will be capable of visualizing the hot spots by varying the level of reputation of the informants.

cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),.1016/j.ins.2009.08.004

Page 10: Collective intelligence in law enforcement–The WikiCrimes system

371

372

373

374

375

376

377

378

379

380

10 V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

6. Putting WikiCrimes to work

6.1. Articulation with organized sectors of society

Articulation with society is fundamental for the success of WikiCrimes. In Brazil we have designed a plan to constantlyestablish partnerships with non-governmental organizations, news corporations, business representatives, municipal gov-ernments, and other organized sectors. In order to do this, different strategies have been tried, such as a marketing campaigncalled ‘‘WikiCrimes – I use it,” which involves distribution of ads via folders, informational pamphlets and bumper stickers.One good example of partnership was the one established with car insurance brokers. Insurance brokers are an importantfocus of the project, since they have information about crimes and may register them in the system. Besides examples ofbringing people to collaborate, we have defined three technological strategies to foster collaboration, which will be describedas follows.

UN

CO

RR

EC

TED

PR

OO

F

Fig. 6. Insertion of WikiCrimes in a local newspaper.

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Page 11: Collective intelligence in law enforcement–The WikiCrimes system

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx 11

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

UN

CO

RR

EC

TED

PR

OO

F

6.1.1. Providing alert servicesEven though the rationale behind WikiCrimes is founded on the notion of solidarity (registering crime to help other peo-

ple), providing services to the user is one of the main strategies to foster collaboration, because it gives a concrete product tothe user. It is thus easier to realize the common wealth that an individual action can bring. In WikiCrimes, we have defined aservice called ‘‘WikiCrimes Alert.” The user can receive alerts via e-mail of registers of crimes that have occurred within auser-defined geographic area. It is possible to draw a polygon representing the user’s residential area, for instance, andfor a pre-defined time (every day, week or month) to receive alerts about the situation in that area.

6.1.2. Integration in social networksAnother important strategy to foster collaboration and advertise the project was to create means to integrate it into a

social network application. In order to do that, we have defined a mini-application following Google’s proposal of an OpenSocial API to be used in Google’s Orkut (http://www.orkut.com) (the most popular social net application in Brazil). The idea isto provide a tool for users of Orkut to alert their friends about security problems faced in a particular region. The user canpinpoint a crime on the map, comment on it, and dispatch it to their friends to alert them about the fact. Their friends, inturn, can also comment on it and forward the message to their friends, and so on. Orkut’s mini-app was an opportunityto reach a wider audience and encourage more participation (mainly from youth). The use of WikiCrimes in Orkut is onlyin its early stages, and no precise stats can be extracted from such use yet.

6.1.3. Embedding in online newspapersEven though web applications follow a very specific way of advertising, the use of traditional media is fundamental for

advertising any public project. We have established cooperation with a local newspaper, Diário do Nordeste (DN) in Fortaleza,whereby we made it possible for the journalists themselves to generate a widget (an embedding of WikiCrimes) with a smallmap of crimes that can be inserted into online news displayed by the newspaper. Fig. 6 shows how this integration is per-ceived by the newspaper reader (see [6] for an example, in Portuguese). On average, the WikiCrimes widget is displayed inthe DN newspaper once a week. We have measured the effectiveness of this proposition by computing how many new userssubscribe to WikiCrimes when news is shown with the widget. That strategy was initially used in June, 2008 and two newsreports using the widget were produced every month (the decision of when to create the widget and for what period it refersdepends exclusively on the journalists). Overall there were nine insertions of the widget; on average, for these days, Wiki-Crimes had 150% more subscriptions of new users than on regular days (without that promotion).

6.2. Business model

The business model we have in mind for the project is based on the existence of a set of customized services that would beprovided to the user from mobile devices. These services would be charged either from revenue share with a cell phone oper-ator or via a monthly subscription fee; i.e., the user would subscribe to WikiCrimes in order to have the right to receive SMSalerts or other services. The idea is to provide information to citizens on their mobile phones; these services could be basedboth on contextual messaging (using GPS or other location service) as well as warning messages on demand of the citizen.These suggestions converge with two features that we have already described in this text: it will be possible to demarcateone or more areas of interest so any event that occurs within that area will generate an alert sent to the user by SMS. In par-allel, we are finishing the WikiCrimes version for mobile phones (S60 platform, in priority) that will enable the register ofcrimes from cell phones. Similar services for use in browsers in the automobile industry can also be envisioned throughcar navigators.

7. Evaluation and implementation issues

7.1. Comparing WikiCrimes data with official data

The ultimate goal of WikiCrimes is not to compete with law enforcement authorities or with their data collection systemsin terms of the number of crimes recorded. Evidently, the number of crimes in the official system tends to be higher than thenumber collected by WikiCrimes. However, WikiCrimes can be considered as an auxiliary system of data collection that addsmore quality to this process. It can be an excellent indicator of the locations where under-reporting is high, for example. Evenwithout the goal of having the same quantitative aspects, a qualitative analysis of WikiCrimes data may reflect a crime trendand dangerous areas. We performed a comparative analysis between the official data on homicides collected by the Police forthe region of Fortaleza with those recorded in WikiCrimes. We chose homicide because it is the most important crime, iswidely used around the world to classify the level of violence in cities, and due to the fact that we have several collaboratorswho participate actively in the registration of this type of crime. First, we obtained the surprising result that the number ofcrimes with the correct georeferencing in the official base was much lower than in WikiCrimes. The total number of homi-cides in the year 2008 in Fortaleza was over 800, but only 337 among those into the official database were georeferenced.The total number of georeferenced homicides for the same period in WikiCrimes was 572. This occurs because of deficienciesin the official data collection system, which is based on receiving the address of the occurrences over the telephone. These

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Page 12: Collective intelligence in law enforcement–The WikiCrimes system

OF

434

435

436

437

438

439

440

441

442

443

444

445

446

Fig. 7. Comparison between WikiCrimes and police records for homicides in Fortaleza during 2008.

12 V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

PR

O

addresses, in turn, are often not found by the Police dispatch system, which prevents georeferencing. Even with this differ-ence, we performed a comparison of data by applying kernel methods for estimating clustering between crimes. The resultsof this comparison can be seen in Fig. 7, where one can clearly see the same shape that appears between the clusters. There isa slight difference in the lower right portion of the kernel maps, which is explained by the difference in the quantity of data.Statistically, the two datasets can be considered as coming from the same distribution as the Ripley [21] test plotted in Fig. 8depicts. The Ripley technique is a distance-based global spatial statistics which can be adopted for evaluating the presence ofcrime hot spots. In Fig. 8 it is possible to see that both lines (official data and WikiCrimes data) share similar behavior beingover the line of complete randomness, what indicates the concentration of crimes.

D

TE7.2. Technical information

The entire architecture of WikiCrimes has followed certain design patterns that are already quite common in Web appli-cation development. The Model-View-Control (MVC) standard was implemented through the Java Server Faces (JSF) frame-work [13]. This is a framework for Java-based Web applications that simplifies the development of user interfaces. It uses acomponents-based approach whereby it is possible – through a set of pre-defined interface components – to create addi-

UN

CO

RR

EC

Fig. 8. Plot of the Ripley test for measuring existence of clustering data.

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Original text:
Inserted Text
JSF (Java
Original text:
Inserted Text
Faces)
Original text:
Inserted Text
it’s possible—through
Original text:
Inserted Text
components—to
Page 13: Collective intelligence in law enforcement–The WikiCrimes system

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491492493494495496497498499500501502503504

V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx 13

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

UN

CO

RR

EC

TED

PR

OO

F

tional customized components for a particular application. Furthermore, the framework manages the statuses of these com-ponents and links the events in a similar manner. Another interesting feature of JSF is the ability to integrate it with otherframeworks and thereby take advantage of some of the features of such other frameworks.

The Application was separated into three layers. The Presentation (or View) layer is responsible for the user’s interactionwith the system as well as the presentation of the results of such interactions. In addition to JSF components, it has severalJavaScript classes that are executed on the client side. These vary from simple validations to the complete interaction withthe maps, using the Google Maps API (http://maps.google.com). The Services layer has all of the WikiCrimes rules and logics.These range from services of user identify (registration, log in, log out) to the inclusion of crimes, comments, sending elec-tronic messages, confirmations and statistics. The Integration and Data Access layer uses Hibernate and the database; MySqlwas configured with triggers and stored procedures for calculating statistics (counters of the number of crimes per city, forexample). On the client side, we used the Google Maps API. It allows all the interaction and manipulation of the map throughJavascript classes. Moreover, we used some services offered by the Google Maps API, such as Geocoding and some XMLHttp-Request requests. Geocoding is the process of ‘‘translating” addresses, avenues or streets into numbers that locate them(more specifically: latitude and longitude). These services were used to facilitate the location of areas or specific pointson the map where the crimes are to be registered (or merely accessed). Viewing the push-pins (markers) that representthe crimes is done through XMLHttpRequest calls, responsible for loading the markers.

8. Conclusion and future work

WikiCrimes currently has around three thousand confirmed users. The project was initiated in January, 2008 and sincethen has had more than 100,000 visits from 156 countries. Most of the visits came from Brazil. The project was born in Fort-aleza, a city of 2.5 million inhabitants in the Northeast of Brazil. Therefore this is the place that has the majority of users andregisters of crime. More than half of the total number of crimes have been pinpointed there. Articulation with organized soci-ety, workshops, lectures and a diverse and consistent campaign of local advertising were particularly intense in the city.Expansion to other regions is gradually occurring, mainly by means of agreements with municipal governments of med-ium-sized cities and with collaborators who maintain blogs on a similar theme. In addition to the multifaceted technologicalcomponent that characterizes WikiCrimes, certain scientific challenges are imposed and deserve special attention. Three ofthem are currently objects of study by the WikiCrimes team. First, it is worth mentioning the studies aimed at making Wiki-Crimes available on mobile devices. The goal of such actions is to bring WikiCrimes closer to its users, leading them to jointhe WikiCrimes community at different times and to expand on mere access to the site. A prototype for operating as a mobileversion to run on Nokia’s S60 platform of cellular telephones is already being tested. The second topic of investigative re-search is in regard to the development of software capable of reading pages of online newspapers, describing news storiesabout crimes and registering such crimes automatically in WikiCrimes. This involves investigating semantic methods ofexploring web content as well as methods of processing natural languages. Finally, but no less important, we are makingefforts to develop an algorithm for rendering the geographic information around the place of crimes. By doing so, we canprepare a dataset to be mined regarding the patterns that can explain the reasons the crime occurred.

In parallel with the reputation assignment, in WikiCrimes it is important to identify malware by means of pattern iden-tification. The major damage that malware can produce is to induce wrong interpretations in terms of geographic patternsidentification; i.e., the tendency of crimes to be wrong. The basic strategy we are going to follow is to monitor the hot spotsfor a determined geographic area. On a daily basis, the reputation agent will compute the hot spots of the areas that havereceived crime registers. Those hot spot areas that had the number of crimes registered by the same person or group of per-sons above a pre-defined boundary are alerted to the institutional agent.

Acknowledgements

WikiCrimes is a work developed with the support of several people without whom its operation would be impossible. Inparticular, we would like to thank all of the members of the Knowledge Engineering group at UNIFOR and IVIA.

References

[1] H. Aldewereld, F. Dignum, A. Garcia-Camino, P. Noriega, J.A. Rodriguez-Aguilar, C. Sierra, Operationalisation of norms for usage in electronicinstitutions, in: AAMAS ’06: Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems, ACM Press, NewYork, NY, USA, 2006, pp. 223–225.

[2] J. Arcos, M. Esteva, P. Noriega, J. Rodrıguez-Aguilar, C. Sierra, Engineering open environments with electronic institutions, Engineering Applications ofArtificial Intelligence 18 (2) (2005) 191–204.

[3] V.C.O. Aureliano, B.S. Silva, S.D.J. Barbosa, Extreme designing: binding sketching to an interaction model in a streamlined HCI design approach. VIISimpósio Brasileiro sobre Fatores Humanos em Sistemas Computacionais (IHC’06), Natal, RN, Brazil, November, 2006.

[4] S.D.J. Barbosa, M.G. Paula, C.J.P. Lucena, Adopting a communication-centered design approach to support interdisciplinary design teams, in:Proceedings of ‘‘Bridging the Gaps II: Bridging the Gaps Between Software Engineering and Human–Computer Interaction,” Workshop at theInternational Conference of Software Engineering, ICSE 2004, Scotland, May 2004.

[5] M. Colombetti, N. Fornara, M. Verdicchio, The role of institutions in multiagent systems, in: Proceedings of the Workshop on Knowledge Based andReasoning Agents, VIII AIIA, 2002, pp. 67–75.

[6] N. Lobo, E. Rodrigues, F. Brito, Sete homicídios em seis dias. Retrieved September, 2008 from Diario do Nordeste, web site: <http://diariodonordeste.globo.com/materia.asp?codigo=555461>.

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004

Original text:
Inserted Text
predefined
Vasco Furtado
Inserted Text
The first author work was partially funded by CNPQ, grant DT 300253/2006.
Page 14: Collective intelligence in law enforcement–The WikiCrimes system

505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534

535

14 V. Furtado et al. / Information Sciences xxx (2009) xxx–xxx

INS 8393 No. of Pages 14, Model 3G

19 August 2009ARTICLE IN PRESS

RO

OF

[7] J.D. Fouss, Kai H. Chang, Classifying Groupware, in: Proceedings of the 38th ACM Southeast Conference, Clemson, 2000, pp. 117–124.[8] D. Grossi, H. Aldewedereld, J. Vázquez-Salceda, F. Dignum, Ontological aspects of the implementation of norms in agent-based electronic institutions.

Computational and Mathematical Organization Theory 12(2), 251–275.[9] J. Grudin, S. Poltrock, Computer supported cooperative work and groupware, in: Tutorial presented at CM SIGCHI Conference on Human Factors in

Computing Systems, ACM, New Orleans, LA, 1991.[10] J. Howe, Crowdsourcing: Why the Power of the Crowd Is Driving the Future of Business, August 2008.[11] K. Jensen, Coloured petri nets-basic concepts, analysis methods and practical use, vol. 1: basic concepts. Monographs in Theoretical Computer Science,

1997.[12] Tulio Kahn, Boletim de Ocorrência – prover para poder prever. Retrieved September, 2008 from Forum Brasileiro de Segurança Pública, web site:

<http://www.forumseguranca.org.br/artigos/>.[13] O.H. Mahmoud, Developing web applications with java server faces. Retrieved September, 3, 2008 from Sun Developer Network, web site: <http://

java.sun.com/developer/technicalArticles/GUI/JavaServerFaces>.[14] N. Minsky, V. Ungureanu, Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems, ACM Transactions

on Software Engineering and Methodology (TOSEM) 9 (3) (2000) 273–305.[15] J. Mollenkopf, V. Goldsmith, P. McGuire, McLafferty Sara, Identification, development and implementation of innovative crime mapping techniques

and spatial analysis, Washington, DC: US Department of Justice, 2000, p. 27.[16] M. De Oliveira, M. Purvis, Aspects of openness in multi-agent systems: coordinating the autonomy in agent societies, in: D. Krol, N.T. Nguyen (Eds.),

Intelligent Integration in Distributed Knowledge Management, New York, 2008, pp. 116–128.[17] M. De Oliveira, V. Furtado, S. Cranefield, M. Purvis, Open collaborative systems as institutions of agents, in: Proceedings of IEEE/WIC/ACM International

Conference on Intelligent Agent Technology (IAT 2008), IEEE Press, 2008.[18] Oreilly, Tim, What is Web 2.0: design patterns and business models for the next generation of software, Communications and Strategies 1 (2007) 17.[19] I. Pinyol, J. Sabater-Mir, G. Cuni, How to talk about reputation using a common ontology: from definition to implementation, in: Proceedings of the

Ninth Workshop on Trust in Agent Societies, Hawaii, USA, 2007, pp 90–101.[20] A. Ricci, A. Omicini, Supporting coordination in open computational systems with Tucson, in: Proceedings of WET ICE 2003, 2003, pp. 365–370.[21] B. Ripley, Spatial Statistics, John Wiley and Son, Cambridge, 1981.[22] C.S. de Souza, The Semiotic Engineering of Human–Computer Interaction, MIT Press, 2005.[23] B. Wu, V. Goel, B.D. Davison, Propagating trust and distrust to demote web spam, in: Proceedings of Models of Trust for the Web Workshop – MTW,

Edinburgh, Scotland, 2006.[24] F. Zambonelli, N. Jennings, M. Wooldridge, Organisational abstractions for the analysis and design of multi-agent systems, Agent-Oriented Software

Engineering, LNCS (2001) 98–114.

UN

CO

RR

EC

TED

P

Please cite this article in press as: V. Furtado et al., Collective intelligence in law enforcement –The WikiCrimes system, Inform. Sci. (2009),doi:10.1016/j.ins.2009.08.004