Crime Prediction and Citizen Security Plans using Big Data in Metropolitan Lima

Crime Prediction and Citizen Security Plans using Big Data in Metropolitan Lima

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-10
Year of Publication : 2022
Authors : Rosa Perez-Siguas, Hernan Matta-Solis, Eduardo Matta-Solis, Anika Remuzgo Artezano, Diana Matta-Solis, Segundo Millones-Gomez, Roberto Cumpén-Vidaurre
DOI : 10.14445/22315381/IJETT-V70I10P215

How to Cite?

Rosa Perez-Siguas, Hernan Matta-Solis, Eduardo Matta-Solis, Anika Remuzgo Artezano, Diana Matta-Solis, Segundo Millones-Gomez, Roberto Cumpén-Vidaurre, "Crime Prediction and Citizen Security Plans using Big Data in Metropolitan Lima," International Journal of Engineering Trends and Technology, vol. 70, no. 10, pp. 144-154, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I10P215

Abstract
Currently, all citizens feel very insecure due to the amount of robbery in the streets because it does not matter if you are alone or accompanied, and they will still rob you. In addition, citizens try not to go out in the streets at very late hours for fear of something happening to them. But the police are taking measures to make the country safer and prevent crime, improving citizen security. The design of the Application will be able to help prevent people who are nearby and to show the police the places that are too dangerous in real time since it will have the interconnection of police cameras so that they can detect assaults or crimes that may occur during that time and will also allow you to put together the strategies that you are going to require. In this work, the SEMMA methodology was used for the development and the Adobe XD tool for the design of the prototype. The results obtained from the investigation will be to know and predict which places there are more robberies to make better decisions.

Keywords
Crime Prediction, Citizen security, Big Data, SEMMA, Prototype.

Reference
[1] F. A. P. Quiroz, “INEI: Only 15.5% of the Victims of a Criminal Act File a Complaint,” [Online]. Available: https://elperuano.pe/noticia/123704-inei-solo-el-155-de-las-victimas-de-un-hecho-delictivo-hacen-la-denuncia
[2] Anonymous, “A Total of 2,803 Murders, More than 137 Thousand Robberies and 18,582 Sexual Violations were Committed in 2019,” [Online]. Available: https://peru21.pe/peru/peru-un-total-de-2803-asesinatos-mas-de-137-mil-robos-y-18582l-violaciones-sexuales-secometieron-en-el-2019-noticia/?ref=p21r
[3] S. Perez, “Fight Crime and Trust to Fight Crime You Have to Increase Trust,” [Online]. Available: https://blogs.iadb.org/seguridadciudadana/es/para-combatir-el-delito-hay-que-incrementar-la-confianza/
[4] F. G. Cafferata and C. Scartascini, “How to Fight Crime in Latin America,” pp. 68, 2021.
[5] “Big Data and Business Intelligence are Emerging as the Main Engines of Digital Transformation,” [Online]. Available: https://directivosygerentes.es/innovacion/como-abordar-un-proyecto-data-intelligence
[6] N. Marquez, “How to Fight Crime with Big Data?,” [Online]. Available: https://www.tuataratech.com/2016/08/como-combatir-elcrimen-con-big-data.html
[7] M. Á. J. Hernández, “Final Degree Project Big Data as a Prevention Tool,” 2021.
[8] M. J. Baldárrago Torreblanca, A. L. Durán Huamantinco, O. I. Lévano Muñante, and D. M. Silva Cumpa, “Factors that Prevent the Adoption of Emerging Technologies to Improve Citizen Security,” 2017.
[9] Z. Milagros and H. Julian, “Implementation of an Electronic Security Management System with Machine Learning Aimed at Prosegur Peru for Security Management in Homes in Metropolitan Lima,” Technological University of Peru, pp. 1–47, 2020, [Online]. Available:https://repositorio.utp.edu.pe/bitstream/handle/20.500.12867/2842/ZulyHuaman_TrabajodeInvestigacion_Bachiller_2020.pd f?sequence=1&isAllowed=y.
[10] I. Juan, M. Moine, D. S. Gordillo, D. Ana, and S. Haedo, “Data Mining Projects,” Comparative Analysis of Methodologies for Data Mining Project Management, pp. 931–938, 2011.
[11] Anonymous, “Python: What it is and Why you Should Learn to Use it,” 2020. [Online]. Available: https://www.becas-santander.com/es/blog/python-que-es.html
[12] Satvik Shukla, Hari Purnapatre, Gitalee Jadhav, Rasika Gohokar, "Improving Women’s Safety by Accelerating Spatio Temporal Crime Prediction of Hotspots," International Journal of Computer Trends and Technology, vol. 68, no. 12, pp. 34-39, 2020. Crossref, 10.14445/22312803/IJCTT-V68I12P108
[13] Anonymous, “What is Weka and what does it have to do with Big Data?,” [Online]. Available: https://agenciab12.pe/noticia/que-esweka-que-tiene-que-ver-big-data
[14] Anonymous, “TeamGantt: Project Management and Creation of Gantt Charts,” [Online]. Available: https://www.appvizer.es/organizacion-planificacion/gestion-proyectos/teamgantt
[15] Anonymous, “Android Studio,” [Online]. Available: https://www.ecured.cu/Android_Studio
[16] R. D. E. S. Ciudadana and D. E. L. Metropolitana, “Proposal for a Regional Action Plan for Citizen Security in Metropolitan Lima,” 2022. [Online]. Available: https://www.munlima.gob.pe/images/PROPUESTA-PLAN-DE-ACCION-REGIONAL-DE-SEGURIDADCIUDADANA-2022.pdf
[17] National Institute of Statistics and Informatics, “Citizen Security Statistics,” 2021. [Online]. Available: https://www.inei.gob.pe/biblioteca-virtual/boletines/estadisticas-de-seguridad-ciudadana/1/
[18] V. Gutierrez, “Police Load Distribution System through Crime Prediction,” 2018.
[19] Anonymous, "Crime Alters the Activities of Almost a Quarter of the Inhabitants of the Cities of Peru," [Online]. Available: https://gestion.pe/peru/la-delincuencia-altera-actividades-de-casi-la-cuarta-parte-de-los-habitantes-de-las-ciudades-del-peru-noticia/
[20] Anonymous, “Lima: Criminal Acts in the Cercado were Reduced 16% in 2019.” [Online]. Available: https://andina.pe/agencia/noticialima-actos-delictivos-el-cercado-se-redujeron-16-2019-785102.aspx
[21] C. Cobos, J. Zuñiga, J. Guarin, E. León, and M. Mendoza, “CMIN - A CRISP-DM-based Case Tool for Supporting Data Mining Projects | CMIN - Case Tool based on CRISP-DM to Support Data Mining Projects,” 2010.
[22] Anonymous, “What is MySQL Workbench? Concept and Characteristics Title,” [Online]. Available: http://xtmiporti.blogspot.com/2016/04/que-es-my-sql-workbench-concepto-y.html