Preprint Article Version 1 This version is not peer-reviewed

Dynamic Bayesian Networks, Elicitation and Data Embedding for Secure Environments

Version 1 : Received: 11 September 2024 / Approved: 12 September 2024 / Online: 12 September 2024 (11:39:18 CEST)

How to cite: Drury, K.; Smith, J. Q. Dynamic Bayesian Networks, Elicitation and Data Embedding for Secure Environments. Preprints 2024, 2024091004. https://doi.org/10.20944/preprints202409.1004.v1 Drury, K.; Smith, J. Q. Dynamic Bayesian Networks, Elicitation and Data Embedding for Secure Environments. Preprints 2024, 2024091004. https://doi.org/10.20944/preprints202409.1004.v1

Abstract

Serious crime modelling typically needs to be undertaken securely behind a firewall where police knowledge and capabilities can remain undisclosed. Data informing an ongoing incident is often sparse, with a large proportion of relevant data only coming to light after the incident culminates or after police intervene - by which point it is too late to make use of the data to aid real-time decision making for the incident in question. Much of the data that is available to police to support real-time decision making is highly confidential so cannot be shared with academics, and is therefore missing to them. In this paper, we describe the development of a formal protocol where a graphical model is used as a framework for securely translating a model designed by an academic team to a model for use by a police team. We then show, for the first time, how libraries of these models can be built and used for real-time decision support to circumvent the challenges of data missingness and tardiness seen in such a secure environment. The parallel development described by this protocol ensures that any sensitive information collected by police, and missing to academics, remains secured behind a firewall. The protocol nevertheless guides police so that they are able to combine the typically incomplete data streams that are open source with their more sensitive information in a formal and justifiable way. We illustrate the application of this protocol by describing how a new entry - a suspected vehicle attack - can be embedded into such a police library of criminal plots.

Keywords

Bayesian networks; dynamic Bayesian networks; decision support systems; expert judgement; elicitation; model libraries; missing data; crime intervention; causality

Subject

Computer Science and Mathematics, Probability and Statistics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.