A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions
Abstract
:1. Introduction
1.1. Survey Analysis
1.2. Mobile Phone Data Types (Levels)
2. Methodology
2.1. Research Questions, Explanations, and Motivations
- RQ1: What are the current state-of-the-art methods and techniques regarding the use of mobile phone data in crime applications, especially in identifying suspects and predicting crimes?
- RQ2: How can identifying empirical mobile phone data studies to predict human behavior and mobility patterns contribute to a clearer understanding of the dynamics of criminal behavior contexts from a people- and place-centric perspective?
2.2. Study Selection
2.3. Data Extraction and Synthesis Strategy
3. Results
3.1. Search Results
3.2. Publications Years
3.3. Publication Type
3.4. Mobile Phone Data Levels
3.5. Citation Count
3.6. Place of Publication
3.7. Mobile Phone Data Methods and Problems
3.8. Analysis and Perspectives
3.9. Network Visualization of the Co-Authorship Analysis by Country in Mobile Phone Data
3.10. Co-Occurrence Network Visualization of Keywords in Mobile Phone Data Studies
4. Study Taxonomy
4.1. Mobility Patterns (Main Category): The First Leg
4.1.1. First Application: Estimating and Mapping Population Distributions
4.1.2. Second Application: Investigating the Relationship between Human Mobility Patterns and Criminal Activity Patterns
4.1.3. Third Application: The Detection of Homes and Other Meaningful Locations
4.1.4. Fourth Application: Urban Hotspot Detection
4.2. Communication Behaviors and Mobility Patterns (Main Category): The Second Leg
4.2.1. Social Network Applications
4.2.2. First Application: Detecting Human Social Interaction Networks Based on Spatiotemporal Mobility Patterns
4.2.3. Second Application: Detecting Human Social Interaction Networks based on Human Communication Behaviors
4.2.4. Third Application: Inferring Social Network Based on Mobility Patterns and Social Interactions
4.2.5. Fourth Application: Suspect Identification
4.2.6. Fifth Application: Detecting Criminal Networks
5. Research Questions
5.1. RQ1: What Are the Current State-of-the-Art Methods and Techniques Regarding the Use of Mobile Phone Data to Identify Suspects and Predict Crimes?
5.1.1. The First Group of Applications Deals with Using Mobile Phone Data to Identify Suspects
5.1.2. Suspect Identification Models Can Be Divided into Unsupervised and Supervised Models
5.1.3. The Second Application Deals with the Detection of Criminal Relationships Based on Communication Behaviors and Mobility Patterns
5.1.4. The Construction of a Social Network from Mobile Phone Data
5.1.5. Detecting Criminal Networks Based on Communication Information
5.1.6. Detecting Criminals Based on Spatiotemporal Information
5.1.7. The Third Application Deals with Using Mobile Phone Data to Investigate Human Mobility Patterns and Spatial–Temporal Crime Patterns
5.1.8. Recent Advances in Method
5.2. RQ2: How Can Identifying Empirical Mobile Phone Data Studies to Predict Human Behavior and Mobility Patterns Contribute to a Clearer Understanding of the Dynamics of Criminal Behavior Contexts through a People- and Place-Centric Perspective?
5.2.1. Human Mobility Patterns in Urban Environments
5.2.2. Land Use Inference
5.2.3. Spatial Distribution of Mobile Phone Presence from Cell Towers to Census Spatial Units
6. Discussion
6.1. Privacy Concerns and Ethical Implications
6.2. Investment Behavior
6.3. Challenges
6.3.1. Data Acquisition Challenges
6.3.2. Data Analysis Challenges
6.3.3. Challenges Related to the Standardization of Mobile Phone Data Keywords (Terms)
7. Problem Definition and System Model
8. Future Research Directions, Conclusions, and Limitations
8.1. Data Collection
8.2. Pre-Processing Steps
8.2.1. Labeling Home and Other Meaningful Locations
8.2.2. Mapping Population Distribution
8.3. General Recommendations
8.3.1. Recommendations for Improving Interpretation and Justification
8.3.2. Recommendations for Considering Spatiotemporal Information
8.3.3. Recommendations to Build a Data-Driven Approach
8.3.4. Recommendations for Labeling Mobile Phone Data
8.4. Conclusions and Limitations
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Blondel, V.D.; Decuyper, A.; Krings, G. A survey of results on mobile phone datasets analysis. EPJ Data Sci. 2015, 4, 10. [Google Scholar] [CrossRef]
- Dobra, A.; Williams, N.E.; Eagle, N. Spatiotemporal detection of unusual human population behavior using mobile phone data. PLoS ONE 2015, 10, e0120449. [Google Scholar] [CrossRef] [PubMed]
- Calabrese, F.; Ferrari, L.; Blondel, V.D. Urban sensing using mobile phone network data: A survey of research. ACM Comput. Surv. Csur. 2014, 47, 1–20. [Google Scholar] [CrossRef]
- Okmi, M.; Por, L.Y.; Ang, T.F.; Ku, C.S. Mobile Phone Data: A Survey of Techniques, Features, and Applications. Sensors 2023, 23, 908. [Google Scholar] [CrossRef] [PubMed]
- Phithakkitnukoon, S.; Smoreda, Z. Influence of social relations on human mobility and sociality: A study of social ties in a cellular network. Soc. Netw. Anal. Min. 2016, 6, 42. [Google Scholar] [CrossRef]
- Deville, P.; Linard, C.; Martin, S.; Gilbert, M.; Stevens, F.R.; Gaughan, A.E.; Blondel, V.D.; Tatem, A.J. Dynamic population mapping using mobile phone data. Proc. Natl. Acad. Sci. USA 2014, 111, 15888–15893. [Google Scholar] [CrossRef]
- Park, S.; Xu, Y.; Jiang, L.; Chen, Z.; Huang, S. Spatial structures of tourism destinations: A trajectory data mining approach leveraging mobile big data. Ann. Tour. Res. 2020, 84, 102973. [Google Scholar] [CrossRef]
- Xu, Y.; Li, J.; Xue, J.; Park, S.; Li, Q. Tourism geography through the lens of time use: A computational framework using fine-grained mobile phone data. Ann. Am. Assoc. Geogr. 2021, 111, 1420–1444. [Google Scholar] [CrossRef]
- Gruber, A.; Ben-Gal, I. Using targeted Bayesian network learning for suspect identification in communication networks. Int. J. Inf. Secur. 2018, 17, 169–181. [Google Scholar] [CrossRef]
- Ferrara, E.; De Meo, P.; Catanese, S.; Fiumara, G. Detecting criminal organizations in mobile phone networks. Expert Syst. Appl. 2014, 41, 5733–5750. [Google Scholar] [CrossRef]
- Taha, K.; Yoo, P.D. SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization. IEEE Trans. Inf. Secur. 2015, 11, 811–822. [Google Scholar] [CrossRef]
- Griffiths, G.; Johnson, S.D.; Chetty, K. UK-based terrorists’ antecedent behavior: A spatial and temporal analysis. Appl. Geogr. 2017, 86, 274–282. [Google Scholar] [CrossRef]
- Bogomolov, A.; Lepri, B.; Staiano, J.; Oliver, N.; Pianesi, F.; Pentland, A. November. Once upon a crime: Towards crime prediction from demographics and mobile data. In Proceedings of the 16th International Conference on Multimodal Interaction, Istanbul, Turkey, 12–16 December 2014; pp. 427–434. [Google Scholar]
- Bogomolov, A.; Lepri, B.; Staiano, J.; Letouzé, E.; Oliver, N.; Pianesi, F.; Pentland, A. Moves on the street: Classifying crime hotspots using aggregated anonymized data on people dynamics. Big Data 2015, 3, 148–158. [Google Scholar] [CrossRef] [PubMed]
- Zhang, F.; Wu, L.; Zhu, D.; Liu, Y. Social sensing from street-level imagery: A case study in learning spatio-temporal urban mobility patterns. ISPRS J. Photogramm. Remote Sens. 2019, 153, 48–58. [Google Scholar] [CrossRef]
- Sekimoto, Y.; Sudo, A.; Kashiyama, T.; Seto, T.; Hayashi, H.; Asahara, A.; Ishizuka, H.; Nishiyama, S. Real-time people movement estimation in large disasters from several kinds of mobile phone data. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, Heidelberg, Germany, 12–16 September 2016; pp. 1426–1434. [Google Scholar]
- Lai, S.; Erbach-Schoenberg, E.Z.; Pezzulo, C.; Ruktanonchai, N.W.; Sorichetta, A.; Steele, J.; Li, T.; Dooley, C.A.; Tatem, A.J. Exploring the use of mobile phone data for national migration statistics. Palgrave Commun. 2019, 5, 1–10. [Google Scholar] [CrossRef] [PubMed]
- Hankaew, S.; Phithakkitnukoon, S.; Demissie, M.G.; Kattan, L.; Smoreda, Z.; Ratti, C. Inferring and modeling migration flows using mobile phone network data. IEEE Access 2019, 7, 164746–164758. [Google Scholar] [CrossRef]
- Thuillier, E.; Moalic, L.; Lamrous, S.; Caminada, A. Clustering weekly patterns of human mobility through mobile phone data. IEEE Trans. Mob. Comput. 2017, 17, 817–830. [Google Scholar] [CrossRef]
- Pei, T.; Sobolevsky, S.; Ratti, C.; Shaw, S.L.; Li, T.; Zhou, C. A new insight into land use classification based on aggregated mobile phone data. Int. J. Geogr. Inf. Sci. 2014, 28, 1988–2007. [Google Scholar] [CrossRef]
- Malleson, N.; Andresen, M.A. Exploring the impact of ambient population measures on London crime hotspots. J. Crim. Justice 2016, 46, 52–63. [Google Scholar] [CrossRef]
- Rummens, A.; Snaphaan, T.; Van de Weghe, N.; Van den Poel, D.; Pauwels, L.J.; Hardyns, W. Do mobile phone data provide a better denominator in crime rates and improve spatiotemporal predictions of crime? ISPRS Int. J. Geo-Inf. 2021, 10, 369. [Google Scholar] [CrossRef]
- Hanaoka, K. New insights on relationships between street crimes and ambient population: Use of hourly population data estimated from mobile phone users’ locations. Environ. Plan. B Urban Anal. City Sci. 2018, 45, 295–311. [Google Scholar] [CrossRef]
- Szocska, M.; Pollner, P.; Schiszler, I.; Joo, T.; Palicz, T.; McKee, M.; Asztalos, A.; Bencze, L.; Kapronczay, M.; Petrecz, P.; et al. Countrywide population movement monitoring using mobile devices generated (big) data during the COVID-19 crisis. Sci. Rep. 2021, 11, 5943. [Google Scholar] [CrossRef]
- Willberg, E.; Järv, O.; Väisänen, T.; Toivonen, T. Escaping from Cities during the COVID-19 Crisis: Using Mobile Phone Data to Trace Mobility in Finland. ISPRS Int. J. Geo-Inf. 2021, 10, 103. [Google Scholar] [CrossRef]
- Lanza, G.; Pucci, P.; Carboni, L.; Vendemmia, B. Impacts of the Covid-19 pandemic in inner areas. Remote work and near-home tourism through mobile phone data in Piacenza Apennine. TEMA 2022, 2, 73–89. [Google Scholar]
- Sakamanee, P.; Phithakkitnukoon, S.; Smoreda, Z.; Ratti, C. Methods for inferring route choice of commuting trip from mobile phone network data. ISPRS Int. J. Geo-Inf. 2020, 9, 306. [Google Scholar] [CrossRef]
- Taha, K.; Yoo, P.D. Using the spanning tree of a criminal network for identifying its leaders. IEEE Trans. Inf. Secur. 2016, 12, 445–453. [Google Scholar] [CrossRef]
- Agreste, S.; Catanese, S.; De Meo, P.; Ferrara, E.; Fiumara, G. Network structure and resilience of Mafia syndicates. Inf. Sci. 2016, 351, 30–47. [Google Scholar] [CrossRef]
- Bhattacharya, K.; Kaski, K. Social physics: Uncovering human behaviour from communication. Adv. Phys. X 2019, 4, 1527723. [Google Scholar] [CrossRef]
- Ghahramani, M.; Zhou, M.; Wang, G. Urban sensing based on mobile phone data: Approaches, applications, and challenges. IEEE/CAA J. Autom. Sin. 2020, 7, 627–637. [Google Scholar] [CrossRef]
- Kitchenham, B.; Brereton, O.P.; Budgen, D.; Turner, M.; Bailey, J.; Linkman, S. Systematic literature reviews in software engineering–a systematic literature review. Inf. Softw. Technol. 2009, 51, 7–15. [Google Scholar] [CrossRef]
- Liberati, A.; Altman, D.G.; Tetzlaff, J.; Mulrow, C.; Gøtzsche, P.C.; Ioannidis, J.P.; Clarke, M.; Devereaux, P.J.; Kleijnen, J.; Moher, D. The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: Explanation and elaboration. J. Clin. Epidemiol. 2009, 62, e1–e34. [Google Scholar] [CrossRef] [PubMed]
- Louail, T.; Lenormand, M.; Cantu Ros, O.G.; Picornell, M.; Herranz, R.; Frias-Martinez, E.; Ramasco, J.J.; Barthelemy, M. From mobile phone data to the spatial structure of cities. Sci. Rep. 2014, 4, 5276. [Google Scholar] [CrossRef] [PubMed]
- Kung, K.S.; Greco, K.; Sobolevsky, S.; Ratti, C. Exploring universal patterns in human home-work commuting from mobile phone data. PLoS ONE 2014, 9, e96180. [Google Scholar] [CrossRef] [PubMed]
- Schläpfer, M.; Bettencourt, L.M.; Grauwin, S.; Raschke, M.; Claxton, R.; Smoreda, Z.; West, G.B.; Ratti, C. The scaling of human interactions with city size. J. R. Soc. Interface 2014, 11, 20130789. [Google Scholar] [CrossRef] [PubMed]
- Ríos, S.A.; Muñoz, R. Land Use detection with cell phone data using topic models: Case Santiago, Chile. Comput. Environ. Urban Syst. 2017, 61, 39–48. [Google Scholar] [CrossRef]
- Furno, A.; El Faouzi, N.E.; Fiore, M.; Stanica, R. Fusing GPS probe and mobile phone data for enhanced land-use detection. In Proceedings of the 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), Naples, Italy, 26–28 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 693–698. [Google Scholar]
- Gabrielli, L.; Furletti, B.; Giannotti, F.; Nanni, M.; Rinzivillo, S. Use of mobile phone data to estimate visitors mobility flows. In Proceedings of the International Conference on Software Engineering and Formal Methods, York, UK, 7–11 September 2015; Springer: Cham, Switzerland, 2015; pp. 214–226. [Google Scholar]
- Gabrielli, L.; Furletti, B.; Trasarti, R.; Giannotti, F.; Pedreschi, D. City users’ classification with mobile phone data. In Proceedings of the 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, USA, 29 October–1 November 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1007–1012. [Google Scholar]
- Andrade, T.; Cancela, B.; Gama, J. Discovering locations and habits from human mobility data. Ann. Telecommun. 2020, 75, 505–521. [Google Scholar] [CrossRef]
- Bianchi, F.M.; Rizzi, A.; Sadeghian, A.; Moiso, C. Identifying user habits through data mining on call data records. Eng. Appl. Artif. Intell. 2016, 54, 49–61. [Google Scholar] [CrossRef]
- Taha, K.; Yoo, P.D. Shortlisting the influential members of criminal organizations and identifying their important communication channels. IEEE Trans. Inf. Secur. 2019, 14, 1988–1999. [Google Scholar] [CrossRef]
- Taha, K.; Yoo, P.D. A system for analyzing criminal social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Paris, France, 25–28 August 2015; pp. 1017–1023. [Google Scholar]
- Novović, O.; Brdar, S.; Mesaroš, M.; Crnojević, V.; Papadopoulos, A.N. Uncovering the relationship between human connectivity dynamics and land use. ISPRS Int. J. Geo-Inf. 2020, 9, 140. [Google Scholar] [CrossRef]
- Shi, L.; Chi, G.; Liu, X.; Liu, Y. Human mobility patterns in different communities: A mobile phone data-based social network approach. Ann. GIS 2015, 21, 15–26. [Google Scholar] [CrossRef]
- Hassan, S.U.; Shabbir, M.; Iqbal, S.; Said, A.; Kamiran, F.; Nawaz, R.; Saif, U. Leveraging deep learning and SNA approaches for smart city policing in the developing world. Int. J. Inf. Manag. 2019, 56, 102045. [Google Scholar] [CrossRef]
- Jia, Y.; Ge, Y.; Ling, F.; Guo, X.; Wang, J.; Wang, L.; Chen, Y.; Li, X. Urban land use mapping by combining remote sensing imagery and mobile phone positioning data. Remote Sens. 2018, 10, 446. [Google Scholar] [CrossRef]
- Pratesi, F.; Gabrielli, L.; Cintia, P.; Monreale, A.; Giannotti, F. PRIMULE: Privacy risk mitigation for user profiles. Data Knowl. Eng. 2020, 125, 101786. [Google Scholar] [CrossRef]
- Arfaoui, S.; Belmekki, A.; Mezrioui, A. Privacy increase on telecommunication processes. In Proceedings of the 2018 International Conference on Advanced Communication Technologies and Networking (CommNet), Marrakech, Morocco, 2–4 April 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–10. [Google Scholar]
- Feng, J.; Liu, L.; Long, D.; Liao, W. An examination of spatial differences between migrant and native offenders in committing violent crimes in a large Chinese city. ISPRS Int. J. Geo-Inf. 2019, 8, 119. [Google Scholar] [CrossRef]
- Haleem, M.S.; Do Lee, W.; Ellison, M.; Bannister, J. The ‘exposed’population, violent crime in public space and the night-time economy in Manchester, UK. Eur. J. Crim. Policy Res. 2020, 27, 335–352. [Google Scholar] [CrossRef]
- Liu, L.; Peng, Z.; Wu, H.; Jiao, H.; Yu, Y. Exploring urban spatial feature with dasymetric mapping based on mobile phone data and LUR-2SFCAe method. Sustainability 2018, 10, 2432. [Google Scholar] [CrossRef]
- Salat, H.; Smoreda, Z.; Schläpfer, M. A method to estimate population densities and electricity consumption from mobile phone data in developing countries. PLoS ONE 2020, 15, e0235224. [Google Scholar] [CrossRef]
- Peng, Z.; Wang, R.; Liu, L.; Wu, H. Fine-Scale Dasymetric Population Mapping with Mobile Phone and Building Use Data Based on Grid Voronoi Method. ISPRS Int. J. Geo-Inf. 2020, 9, 344. [Google Scholar] [CrossRef]
- Sakarovitch, B.; Bellefon, M.P.D.; Givord, P.; Vanhoof, M. Estimating the residential population from mobile phone data, an initial exploration. Econ. Stat. 2018, 505, 109–132. [Google Scholar] [CrossRef]
- Zhang, G.; Rui, X.; Poslad, S.; Song, X.; Fan, Y.; Ma, Z. Large-scale, fine-grained, spatial, and temporal analysis, and prediction of mobile phone users’ distributions based upon a convolution long short-term model. Sensors 2019, 19, 2156. [Google Scholar] [CrossRef]
- Järv, O.; Tenkanen, H.; Toivonen, T. Enhancing spatial accuracy of mobile phone data using multi-temporal dasymetric interpolation. Int. J. Geogr. Inf. Sci. 2017, 31, 1630–1651. [Google Scholar] [CrossRef]
- Liu, Z.; Ma, T.; Du, Y.; Pei, T.; Yi, J.; Peng, H. Mapping hourly dynamics of urban population using trajectories reconstructed from mobile phone records. Trans. GIS 2018, 22, 494–513. [Google Scholar] [CrossRef]
- Zhang, G.; Rui, X.; Poslad, S.; Song, X.; Fan, Y.; Wu, B. A method for the estimation of finely-grained temporal spatial human population density distributions based on cell phone call detail records. Remote Sens. 2020, 12, 2572. [Google Scholar] [CrossRef]
- Ricciato, F.; Lanzieri, G.; Wirthmann, A.; Seynaeve, G. Towards a methodological framework for estimating present population density from mobile network operator data. Pervasive Mob. Comput. 2020, 68, 101263. [Google Scholar] [CrossRef]
- Ricciato, F.; Widhalm, P.; Pantisano, F.; Craglia, M. Beyond the “single-operator, CDR-only” paradigm: An interoperable framework for mobile phone network data analyses and population density estimation. Pervasive Mob. Comput. 2017, 35, 65–82. [Google Scholar] [CrossRef]
- Shi, Y.; Yang, J.; Shen, P. Revealing the correlation between population density and the spatial distribution of urban public service facilities with mobile phone data. ISPRS Int. J. Geo-Inf. 2020, 9, 38. [Google Scholar] [CrossRef]
- Traunmueller, M.; Quattrone, G.; Capra, L. Mining mobile phone data to investigate urban crime theories at scale. In Proceedings of the International Conference on Social Informatics, Barcelona, Spain, 11–13 November 2014; Springer: Cham, Switzerland; pp. 396–411. [Google Scholar]
- He, L.; Páez, A.; Jiao, J.; An, P.; Lu, C.; Mao, W.; Long, D. Ambient population and larceny-theft: A spatial analysis using mobile phone data. ISPRS Int. J. Geo-Inf. 2020, 9, 342. [Google Scholar] [CrossRef]
- Lee, W.D.; Haleem, M.S.; Ellison, M.; Bannister, J. The influence of intra-daily activities and settings upon weekday violent crime in public spaces in Manchester, UK. Eur. J. Crim. Policy Res. 2020, 27, 375–395. [Google Scholar] [CrossRef]
- Song, G.; Bernasco, W.; Liu, L.; Xiao, L.; Zhou, S.; Liao, W. Crime feeds on legal activities: Daily mobility flows help to explain thieves’ target location choices. J. Quant. Criminol. 2019, 35, 831–854. [Google Scholar] [CrossRef]
- Tongsinoot, L.; Muangsin, V. Exploring home and work locations in a city from mobile phone data. In Proceedings of the 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Bangkok, Thailand, 18–20 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 123–129. [Google Scholar]
- Vanhoof, M.; Reis, F.; Ploetz, T.; Smoreda, Z. Assessing the Quality of Home Detection from Mobile Phone Data for Official Statistics. J. Off. Stat. 2018, 34, 935–960. [Google Scholar] [CrossRef]
- Yang, X.; Zhao, Z.; Lu, S. Exploring Spatial-Temporal Patterns of Urban Human Mobility Hotspots. Sustainability 2016, 8, 674. [Google Scholar] [CrossRef]
- Ghahramani, M.; Zhou, M.; Hon, C.T. Mobile phone data analysis: A spatial exploration toward hotspot detection. IEEE Trans. Autom. Sci. Eng. 2018, 16, 351–362. [Google Scholar] [CrossRef]
- Truică, C.O.; Novović, O.; Brdar, S.; Papadopoulos, A.N. Community detection in who-calls-whom social networks. In Proceedings of the International Conference on Big Data Analytics and Knowledge Discovery, Regensburg, Germany, 3–6 September 2018; Springer: Cham, Switzerland, 2018; pp. 19–33. [Google Scholar]
- Xu, K.; Zou, K.; Huang, Y.; Yu, X.; Zhang, X. Mining community and inferring friendship in mobile social networks. Neurocomputing 2016, 174, 605–616. [Google Scholar] [CrossRef]
- Lind, A.; Hadachi, A.; Piksarv, P.; Batrashev, O. Spatio-temporal mobility analysis for community detection in the mobile networks using CDR data. In Proceedings of the 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Munich, Germany, 6–8 November 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 250–255. [Google Scholar]
- Sumathi, V.P.; Kousalya, K.; Vanitha, V.; Cynthia, J. Crowd estimation at a social event using call data records. Int. J. Bus. Inf. Syst. 2018, 28, 246–261. [Google Scholar]
- Filipowska, A.; Mucha, M.; Perkowski, B.; Szczekocka, E.; Gromada, J. Towards social telco applications based on the user behaviour and relations between users. In Proceedings of the 2015 18th International Conference on Intelligence in Next Generation Networks, Paris, France, 17–19 February 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 95–102. [Google Scholar]
- Aledavood, T.; Lehmann, S.; Saramäki, J. Social network differences of chronotypes identified from mobile phone data. EPJ Data Sci. 2018, 7, 46. [Google Scholar] [CrossRef]
- Yu, C.; Wang, N.; Yang, L.T.; Yao, D.; Hsu, C.H.; Jin, H. A semi-supervised social relationships inferred model based on mobile phone data. Future Gener. Comput. Syst. 2017, 76, 458–467. [Google Scholar] [CrossRef]
- Gaito, S.; Quadri, C.; Rossi, G.P.; Zignani, M. Urban communications and social interactions through the lens of mobile phone data. Online Soc. Netw. Media 2017, 1, 70–81. [Google Scholar] [CrossRef]
- Deville, P.; Song, C.; Eagle, N.; Blondel, V.D.; Barabási, A.L.; Wang, D. Scaling identity connects human mobility and social interactions. Proc. Natl. Acad. Sci. USA 2016, 113, 7047–7052. [Google Scholar] [CrossRef]
- Morales, A.J.; Creixell, W.; Borondo, J.; Losada, J.C.; Benito, R.M. Characterizing ethnic interactions from human communication patterns in Ivory Coast. Netw. Heterog. Media 2015, 10, 87. [Google Scholar] [CrossRef]
- Chemello, N. Correlating CDR with other data sources. In Proceedings of the 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Vancouver, BC, Canada, 12–14 June 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
- Kumar, M.; Hanumanthappa, M.; Kumar, T.S. Crime investigation and criminal network analysis using archive call detail records. In Proceedings of the 2016 Eighth International Conference on Advanced Computing (ICoAC), Chennai, India, 19–21 January 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 46–50. [Google Scholar]
- Khan, E.S.; Azmi, H.; Ansari, F.; Dhalvelkar, S. Simple implementation of criminal investigation using call data records (CDRs) through big data technology. In Proceedings of the 2018 International Conference on Smart City and Emerging Technology (ICSCET), Mumbai, India, 5 January 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–5. [Google Scholar]
- Khan, S.; Ansari, F.; Dhalvelkar, H.A.; Computer, S. Criminal investigation using call data records (CDR) through big data technology. In Proceedings of the 2017 International Conference on Nascent Technologies in Engineering (ICNTE), Vashi, India, 27–28 January 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–5. [Google Scholar]
- Hoyos, I.; Esposito, B.; Nunez-del-Prado, M. DETECTOR: Automatic Detection System for Terrorist Attack Trajectories. In Proceedings of the Annual International Symposium on Information Management and Big Data, Lima, Peru, 4–6 September 2018; Springer: Cham, Switzerland, 2018; pp. 160–173. [Google Scholar]
- Abba, E.; Aibinu, A.M.; Alhassan, J.K. Development of multiple mobile networks call detailed records and its forensic analysis. Digit. Commun. Netw. 2019, 5, 256–265. [Google Scholar] [CrossRef]
- Marshall, A.M.; Miller, P. CaseNote: Mobile phone call data obfuscation & techniques for call correlation. Digit. Investig. 2019, 29, 82–90. [Google Scholar]
- Zhang, A.; Bradford, B.; Morgan, R.M.; Nakhaeizadeh, S. Investigating the uses of mobile phone evidence in China criminal proceedings. Sci. Justice 2022, 62, 385–398. [Google Scholar] [CrossRef]
- Lenormand, M.; Picornell, M.; Cantú-Ros, O.G.; Louail, T.; Herranz, R.; Barthelemy, M.; Frías-Martínez, E.; San Miguel, M.; Ramasco, J.J. Comparing and modelling land use organization in cities. R. Soc. Open Sci. 2015, 2, 150449. [Google Scholar] [CrossRef] [PubMed]
- Cavallaro, L.; Ficara, A.; De Meo, P.; Fiumara, G.; Catanese, S.; Bagdasar, O.; Song, W.; Liotta, A. Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia. PLoS ONE 2020, 15, e0236476. [Google Scholar] [CrossRef] [PubMed]
- Mao, H.; Shuai, X.; Ahn, Y.Y.; Bollen, J. Quantifying socio-economic indicators in developing countries from mobile phone communication data: Applications to Côte d’Ivoire. EPJ Data Sci. 2015, 4, 15. [Google Scholar] [CrossRef]
- Andrea, C.; Lehmann, S.; Larsen, J.E. Inferring human mobility from sparse low accuracy mobile sensing data. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, Seattle, DC, USA, 13–17 September 2014; pp. 995–1004. [Google Scholar]
- Ficara, A.; Cavallaro, L.; Curreri, F.; Fiumara, G.; De Meo, P.; Bagdasar, O.; Song, W.; Liotta, A. Criminal networks analysis in missing data scenarios through graph distances. PLoS ONE 2021, 16, e0255067. [Google Scholar] [CrossRef]
- Dileep, G.K.; Sajeev, G.P. A Graph Mining Approach to Detect Sandwich Calls. In Proceedings of the 2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Bangalore, India, 8–10 July 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
- Wu, J.; Abrar, S.M.; Awasthi, N.; Frias-Martinez, E.; Frias-Martinez, V. Enhancing short-term crime prediction with human mobility flows and deep learning architectures. EPJ Data Sci. 2022, 11, 53. [Google Scholar] [CrossRef]
- Long, D.; Liu, L.; Xu, M.; Feng, J.; Chen, J.; He, L. Ambient population and surveillance cameras: The guardianship role in street robbers’ crime location choice. Cities 2021, 115, 103223. [Google Scholar] [CrossRef]
- Long, D.; Liu, L. Do Migrant and Native Robbers Target Different Places? ISPRS Int. J. Geo-Inf. 2021, 10, 771. [Google Scholar] [CrossRef]
- Hu, X.; Chen, H.; Liu, S.; Jiang, H.; Chu, G.; Li, R. BTG: A Bridge to Graph machine learning in telecommunications fraud detection. Future Gener. Comput. Syst. 2022, 137, 274–287. [Google Scholar] [CrossRef]
- Xing, J.; Yu, M.; Wang, S.; Zhang, Y.; Ding, Y. Automated fraudulent phone call recognition through deep learning. Wirel. Commun. Mob. Comput. 2020, 2020, 8853468. [Google Scholar] [CrossRef]
- Chu, G.; Wang, J.; Qi, Q.; Sun, H.; Tao, S.; Yang, H.; Liao, J.; Han, Z. Exploiting Spatial-Temporal Behavior Patterns for Fraud Detection in Telecom Networks. IEEE Trans. Dependable Secur. Comput. 2022, 1–13. [Google Scholar] [CrossRef]
- Hilas, C.S.; Mastorocostas, A.; Rekanos, I.T. Clustering of telecommunications user profiles for fraud detection and security enhancement in large corporate networks: A case study. Appl. Math. Inf. Sci. 2015, 9, 1709–1718. [Google Scholar]
- Jabbar, M.A. Fraud Detection Call Detail Record Using Machine Learning in Telecommunications Company. Adv. Sci. Technol. Eng. Syst. J. 2020, 5, 63–69. [Google Scholar] [CrossRef]
- Kilinc, H.H. Anomaly Pattern Analysis Based on Machine Learning on Real Telecommunication Data. In Proceedings of the 2022 7th International Conference on Computer Science and Engineering (UBMK), Diyarbakir, Turkey, 14–16 September 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 43–48. [Google Scholar]
- Yang, X.; Fang, Z.; Yin, L.; Li, J.; Lu, S.; Zhao, Z. Revealing the relationship of human convergence–divergence patterns and land use: A case study on Shenzhen City, China. Cities 2019, 95, 102384. [Google Scholar] [CrossRef]
- Mao, H.; Ahn, Y.Y.; Bhaduri, B.; Thakur, G. Improving land use inference by factorizing mobile phone call activity matrix. J. Land Use Sci. 2017, 12, 138–153. [Google Scholar] [CrossRef]
- Liu, Y.; Fang, F.; Jing, Y. How urban land use influences commuting flows in Wuhan, Central China: A mobile phone signaling data perspective. Sustain. Cities Soc. 2020, 53, 101914. [Google Scholar] [CrossRef]
- Arcolezi, H.H.; Couchot, J.-F.; Al Bouna, B.; Xiao, X. Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates. Digit. Commun. Netw. 2022, in press. [Google Scholar] [CrossRef]
- Gramaglia, M.; Fiore, M.; Furno, A.; Stanica, R. GLOVE: Towards privacy-preserving publishing of record-level-truthful mobile phone trajectories. ACM/IMS Trans. Data Sci. (TDS) 2021, 2, 1–36. [Google Scholar] [CrossRef]
- Vespe, M.; Iacus, S.M.; Santamaria, C.; Sermi, F.; Spyratos, S. On the use of data from multiple mobile network operators in Europe to fight COVID-19. Data Policy 2021, 3, e8. [Google Scholar] [CrossRef]
- Cinnamon, J.; Jones, S.K.; Adger, W.N. Evidence and future potential of mobile phone data for disease disaster management. Geoforum 2016, 75, 253–264. [Google Scholar] [CrossRef]
- Boenig-Liptsin, M.; Tanweer, A.; Edmundson, A. Data Science Ethos Lifecycle: Interplay of ethical thinking and data science practice. J. Stat. Data Sci. Educ. 2022, 30, 228–240. [Google Scholar] [CrossRef]
- Peter, K. Government surveillance, privacy, and legitimacy. Philos. Technol. 2022, 35, 8. [Google Scholar]
- Qiu, F.; Wu, F.; Chen, G. Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Trans. Mob. Comput. 2014, 14, 1287–1300. [Google Scholar] [CrossRef]
- Jin, H.; Su, L.; Ding, B.; Nahrstedt, K.; Borisov, N. Enabling privacy-preserving incentives for mobile crowd sensing systems. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS); IEEE: Piscataway, NJ, USA, 2016; pp. 344–353. [Google Scholar]
- Li, H.; Li, T.; Wang, W.; Wang, Y. Dynamic participant selection for large-scale mobile crowd sensing. IEEE Trans. Mob. Comput. 2018, 18, 2842–2855. [Google Scholar] [CrossRef]
- Guo, B.; Yu, Z.; Zhou, X.; Zhang, D. From participatory sensing to mobile crowd sensing. In Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), Budapest, Hungary, 24–28 March 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 593–598. [Google Scholar]
- Xu, S.; Chen, X.; Pi, X.; Joe-Wong, C.; Zhang, P.; Noh, H.Y. ilocus: Incentivizing vehicle mobility to optimize sensing distribution in crowd sensing. IEEE Trans. Mob. Comput. 2019, 19, 1831–1847. [Google Scholar] [CrossRef]
- Capponi, A.; Fiandrino, C.; Kantarci, B.; Foschini, L.; Kliazovich, D.; Bouvry, P. A survey on mobile crowdsensing systems: Challenges, solutions, and opportunities. IEEE Commun. Surv. Tutor. 2019, 21, 2419–2465. [Google Scholar] [CrossRef]
- Gisdakis, S.; Giannetsos, T.; Papadimitratos, P. Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J. 2016, 3, 839–853. [Google Scholar] [CrossRef]
- Agir, B.; Papaioannou, T.G.; Narendula, R.; Aberer, K.; Hubaux, J.-P. User-side adaptive protection of location privacy in participatory sensing. GeoInformatica 2014, 18, 165–191. [Google Scholar] [CrossRef]
- Jin, W.; Xiao, M.; Li, M.; Guo, L. If you do not care about it, sell it: Trading location privacy in mobile crowd sensing. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1045–1053. [Google Scholar]
- Chen, Z.; Gul, O.M.; Kantarci, B. Practical Byzantine Fault Tolerance-based Robustness for Mobile Crowdsensing. Distrib. Ledger Technol. Res. Pract. 2023. [Google Scholar] [CrossRef]
- Chen, S.; Li, Z. Research on Enterprise Innovation Behavior Based on the Regression Analysis Under Big Data Technology. In Proceedings of the 2022 3rd International Conference on Big Data and Social Sciences (ICBDSS 2022), Hulunbuir, China, 19–21 August 2022; Atlantis Press: Amsterdam, The Netherlands, 2022; pp. 665–673. [Google Scholar]
- Jiang, H.; Wang, X.; Xiao, Q.; Li, S. Investment Behavior Related to Automated Machines and Biased Technical Change: Based on Evidence from Listed Manufacturing Companies in China. Front. Psychol. 2022, 13, 874820. [Google Scholar] [CrossRef] [PubMed]
- Ungar, W.J. Next generation sequencing and health technology assessment in autism spectrum disorder. J. Can. Acad. Child Adolesc. Psychiatry 2015, 24, 123. [Google Scholar] [PubMed]
- Zhang, Z.; Nagrath, S. Microfluidics and cancer: Are we there yet? Biomed. Microdevices 2013, 15, 595–609. [Google Scholar] [CrossRef] [PubMed]
- Liu, S.; Yin, X.; Zhao, H. Dual-function photonic spin Hall effect sensor for high-precision refractive index sensing and graphene layer detection. Opt. Express 2020, 30, 31925–31936. [Google Scholar] [CrossRef]
- Sui, J.-Y.; Liao, S.-Y.; Li, B.; Zhang, H.-F. High sensitivity multitasking non-reciprocity sensor using the photonic spin Hall effect. Opt. Lett. 2022, 47, 6065–6068. [Google Scholar] [CrossRef]
- Wang, S.; Tian, Y.; Liu, X.; Foley, M. How Farmers Make Investment Decisions: Evidence from a Farmer Survey in China. Sustainability 2020, 12, 247. [Google Scholar] [CrossRef]
- Cheng, Y.; Kuang, Y.; Shi, X.; Dong, C. Sustainable investment in a supply chain in the big data era: An information updating approach. Sustainability 2018, 10, 403. [Google Scholar] [CrossRef]
- Raguseo, E.; Vitari, C. Investments in big data analytics and firm performance: An empirical investigation of direct and mediating effects. Int. J. Prod. Res. 2018, 56, 5206–5221. [Google Scholar] [CrossRef]
- De Montjoye, Y.A.; Gambs, S.; Blondel, V.; Canright, G.; De Cordes, N.; Deletaille, S.; Engø-Monsen, K.; Garcia-Herranz, M.; Kendall, J.; Kerry, C.; et al. On the privacy-conscientious use of mobile phone data. Sci. Data 2018, 5, 180286. [Google Scholar] [CrossRef]
- Zinman, O.; Lerner, B. Utilizing digital traces of mobile phones for understanding social dynamics in urban areas. Pers. Ubiquitous Comput. 2020, 24, 535–549. [Google Scholar] [CrossRef]
- Sultan, K.; Ali, H.; Zhang, Z. Call detail records driven anomaly detection and traffic prediction in mobile cellular networks. IEEE Access 2018, 6, 41728–41737. [Google Scholar] [CrossRef]
- Xu, Y.; Belyi, A.; Bojic, I.; Ratti, C. How friends share urban space: An exploratory spatiotemporal analysis using mobile phone data. Trans. GIS 2017, 21, 468–487. [Google Scholar] [CrossRef]
- Hoteit, S.; Chen, G.; Viana, A.; Fiore, M. Filling the gaps: On the completion of sparse call detail records for mobility analysis. In Proceedings of the Eleventh ACM Workshop on Challenged Networks, New York, NY, USA, 3–7 October 2016; pp. 45–50. [Google Scholar]
Research Questions | Explanation |
---|---|
RQ1 | Several studies have employed mobile phone data to predict crimes and criminal behaviors and to identify criminals and suspects. The present review offers a new and deeper insight into the advanced methods used nowadays in crime applications based on mobile phone data and the benefits of using such data to predict crimes and identify suspects. |
RQ2 | Mobile phone data have been used in a variety of studies to understand human behaviors and mobility patterns. More precisely, the spatiotemporal information provided by mobile phone data can provide clearer insights into human movements in various applications and academic fields. For instance, mobile phone data has been used to explore human mobility patterns and detect certain types of behaviors in cities and urban zones where criminal activities are much more likely to occur. Mobile phone data have thus been used in different crime and urban sensing applications to serve different purposes, such as defining the actual populations at risk, investigating the relationship between human dynamics and crimes, and inferring land use types based on human dynamics and interactions. For all the above reasons, the defined research question stimulated this investigation of mobile phone data usage in urban sensing, and the results should enable researchers to create more effective methods for extracting useful information from mobile phone data. |
Phases in the Selection of Papers | Database | Number of Returned Articles | Timespan | Content Type | Search Within |
---|---|---|---|---|---|
Identification Phase | Scopus (SCP) | n = 753 | 2014–2022 | Article, Review Article | Title, Abstract, and Keywords |
Elsevier ScienceDirect (SD) | n = 183 | 2014–2022 | Article, Review Article | Title, Abstract, and Keywords | |
Web of Science (WoS) | n = 588 | 2014–2022 | Article, Review article | Topic (Title, Abstract, and Keywords) | |
IEEE Xplore (IEEE) | n = 731 | 2014–2022 | Article, Conference paper | Metadata (Title, Abstract, and keywords) | |
SpringerLink (SL) | n = 1371 | 2014–2022 | Article, Conference paper | Abstract | |
Multidisciplinary Digital Publishing Institute (MDPI) | n = 62 | 2014–2022 | Article, Review Article | Abstract | |
ACM Digital Library (ACM) | n = 83 | 2014–2022 | Article | Title, Abstract | |
Science And Geography Education (SAGE) | n = 25 | 2014–2022 | Article | Abstract | |
Total | Papers identified in the identification phase (n = 3796) |
Inclusion Criteria (IC) | Exclusion Criteria (EC) |
---|---|
Studies that present novel scientific contributions regarding the use of mobile phone data in detecting and identifying suspects and criminals. | Articles using mobile phone data in the context of smart marketing; the transportation sector (such as transportation planning, transport mode detection, and traffic prediction); economic forecasting; and health sciences research. |
Studies that incorporate mobile phone data to predict crimes, perform spatial–temporal crime analysis, or have any other bearing on criminological research. | Studies using mobile phone data to measure human mobility in relation to the epidemiology of infectious diseases. |
Studies that investigate the use of mobile phone data in home and work location detection; mapping human population density; classifying land use types; detecting social interaction networks; and others. | Publications that are not written in the English language. |
Reference | Domain/application | Citation Count | Year |
---|---|---|---|
[6] | Mapping human population density | 786 | 2014 |
[1] | Constructing social networks from mobile phone data | 574 | 2015 |
[34] | Detecting cities’ hotspots | 397 | 2014 |
[20] | Classifying urban land uses | 347 | 2014 |
[13] | Predicting crime | 325 | 2014 |
[3] | Developing urban sensing applications based on mobile phone data | 306 | 2014 |
[35] | Inferring home and work locations | 292 | 2014 |
[36] | Mapping society-wide interaction networks of two European countries | 268 | 2014 |
[10] | Detecting criminal networks | 181 | 2014 |
[21] | Investigating correlations between human mobility patterns and crime rates (i.e., crime statistics) | 112 | 2016 |
Reference | Features | Description |
---|---|---|
[82] | Spatiotemporal features | This study aimed to identify the most probable suspects in a given case by correlating CDRs with other data sources, such as digital video recorders (DVRs) and base transceiver station (BTS) log files to help investigators with otherwise insufficient evidence pinpoint hidden details about their suspects and gather further digital evidence to show how a crime is committed. The author extracted spatiotemporal information, such as the suspects’ various trajectories, from CDR data and cell tower IDs that showed each suspect’s home cell tower location along with other visited cell tower locations, to prove involvement in the crime. |
[83] | Call features | This study aimed to identify suspects based on their calling characteristics, including any phone calls made or received by the suspects at the crime scene, in conjunction with archived CDRs data drawn from a central database that contained details on previously convicted criminals whose names had been recorded in older cases. |
[84,85] | Call and spatiotemporal features | These studies aimed to improve the identification performance of suspects in terms of efficiency, effort, and scalability. To achieve this, they proposed a system-based big data analytic process to extract communication and mobility information from CDRs data, including aspects such as the most frequent caller, the number of times the suspect called other suspects, call frequency, suspect trajectories, and the most visited location based on the most frequently used cell tower. |
[86] | Spatiotemporal features | This study proposed a terrorist detection system that aims to detect suspicious activities based on user trajectories. |
[87] | Call and spatiotemporal features | This study aimed to investigate additional details by identifying suspects and their accomplices. To achieve this, the authors extracted calling and spatiotemporal information from the CDRs, such as calls made and received by suspects and suspects’ trajectories near crime locations, then applied MariaDB, an open-source relational database management system (RDBMS), to analyze the CDRs data. |
[9,47] | Call features | Rather than applying traditional methods, these studies proposed machine learning methods to tackle the identification process. They applied classification algorithms that aimed to separate suspects from non-suspects based on communication behaviors. |
[88] | Call features | Going one step further, some studies discussed the challenges associated with analyzing CDRs to identify suspects. Marshall and Miller [88] aimed to present different techniques and scenarios suspects might use to avoid recording of their communication and mobility activities, such as stealth SIM, voice changing, roaming callback, and call obfuscation. |
Reference | Analysis Perspective | Analysis Approach | Algorithm/Measure | Network Metrics/ Parameter | Limitation |
---|---|---|---|---|---|
[28] | Communication behaviors | SNA | Detection algorithm (Prim’s Minimum Spanning Tree Algorithm) | Edge-centric | Missing location data, greedy algorithm |
[10] | Communication behaviors | SNA | Detection algorithm (Girvan–Newman and Fruchterman–Reingold) | Edge-betweenness centrality | Complex network, detection only based on communication information, greedy algorithm |
[11] | Communication behaviors | SNA | The concept space approach (space algorithm) | Vertex-centric | Suitable for small networks, detection only based on communication information |
[51] | Mobility patterns | Regression and Correlation Analysis | Akaike information criterion (AIC), spatial autocorrelation (SA) using Pearson’s Correlation, and negative binomial regression model (NBM) | Offender anchor points. | Detection only based on spatiotemporal information |
[12] | Mobility patterns | Statistical and Correlation Analysis | Spearman’s rank coefficient (ρ) statistics, Pearson’s correlations, and the cumulative distribution function | Offender anchor points. | Detection only based on spatiotemporal information |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Okmi, M.; Por, L.Y.; Ang, T.F.; Al-Hussein, W.; Ku, C.S. A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions. Sensors 2023, 23, 4350. https://doi.org/10.3390/s23094350
Okmi M, Por LY, Ang TF, Al-Hussein W, Ku CS. A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions. Sensors. 2023; 23(9):4350. https://doi.org/10.3390/s23094350
Chicago/Turabian StyleOkmi, Mohammed, Lip Yee Por, Tan Fong Ang, Ward Al-Hussein, and Chin Soon Ku. 2023. "A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions" Sensors 23, no. 9: 4350. https://doi.org/10.3390/s23094350
APA StyleOkmi, M., Por, L. Y., Ang, T. F., Al-Hussein, W., & Ku, C. S. (2023). A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions. Sensors, 23(9), 4350. https://doi.org/10.3390/s23094350