全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach

DOI: 10.4236/jis.2021.124015, PP. 270-280

Keywords: Forensics, Terrorism, Nigeria, Apriori Algorithm

Full-Text   Cite this paper   Add to My Lib

Abstract:

Investigations towards studying terrorist activities have recently attracted a great amount of research interest. In this paper, we investigate the use of the Apriori algorithm on the Global Terrorism Database (GTD) for forensic investigation purposes. Recently, the Apriori algorithm, which could be considered a forensic tool, has been used to study terrorist activities and patterns across the world. As such, our motivation is to utilise the Apriori algorithm approach on the GTD to study terrorist activities and the areas/states in Nigeria with high frequencies of terrorist activities. We observe that the most preferred method of terrorist attacks in Nigeria is through armed assault. Again, our experiment shows that attacks in Nigeria are mostly successful. Also, we observe from our investigations that most terrorists in Nigeria are not suicidal. The main application of this work can be used by forensic experts to assist law enforcement agencies in decision making when handling terrorist attacks in Nigeria.

References

[1]  Agu, Z. (2018) Terrorism in Nigeria: Causes and Effects.
https://www.legit.ng/1210342-terrorism-nigeria-effects.html#:~:text=Terrorists%20in%20Nigeria%20create%20more%20unsafe%20places%2C%20that,tourism%20and%20reduces%20the%20rates%20of%20foreign%20investments
[2]  Global Conflict Tracker (2021) Boko Haram in Nigeria.
https://www.cfr.org/global-conflict-tracker/conflict/boko-haram-nigeria
[3]  Adedire, S.A., Ake, M. and Olowojolu, O. (2016) Combating Terrorism and Insurgency in Nigeria: An International Collaborations against Boko Haram. Fountain University Journal of Management and Social Sciences, 5, 67-74.
[4]  Varrella, S. (2021) Deaths Caused by Boko Haram in 2019, By State.
https://www.statista.com/statistics/1197570/deaths-caused-by-boko-haram-in-nigeria/
[5]  GOV.UK (2020) Foreign Travel Advice: Nigeria.
https://www.gov.uk/foreign-travel-advice/nigeria/terrorism
[6]  The Institute for Economics and Peace (IEP) (2020) Global Terrorism Index 2020: Measuring the Impact of Terrorism. Institute for Economics and Peace, New South Wales.
[7]  Khalifa, N.E.M., Taha, M.H.N., Taha, S.H.N. and Hassanien, A.E. (2019) Statistical Insights and Association Mining for Terrorist Attacks in Egypt. International Conference on Advanced Machine Learning Technologies and Applications, Cairo, 28-30 March 2019, 291-300.
https://doi.org/10.1007/978-3-030-14118-9_29
[8]  Li, Z., Li, X., Tang, R. and Zhang, L. (2020) Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules. Frontiers in Psychology, 11, Article No. 582480.
https://doi.org/10.3389/fpsyg.2020.582480
[9]  Atsa’am, D.D., Wario, R. and Alola, U.V. (2021) Why Do Terrorists Attack Other Terrorists? Knowledge Discovery from the Global Terrorism Database. The International Journal of Intelligence, Security, and Public Affairs, 23, 125-138.
https://doi.org/10.1080/23800992.2021.1953825
[10]  Iorliam, A., Dugeri, R.U., Akumba, B.O. and Otor, S. (2021) An Investigation and Insight into Terrorism in Nigeria. arXiv: 2109.11023.
[11]  Meuwly, D. and Veldhuis, R. (2012) Forensic Biometrics: From Two Communities to One Discipline. 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), Darmstadt, 6-7 September 2012, 1-12.
[12]  Iorliam, A. (2018) Fundamental Computing Forensics for Africa: A Case Study of the Science in Nigeria. Springer, Cham.
https://doi.org/10.1007/978-3-319-94499-9
[13]  Agrawal, R. and Srikant, R. (1994) Fast Algorithms for Mining Association Rules. Proceedings of the 20th International Conference on Very Large Data Bases (VLDB 94), Vol. 1215, Santiago, 12-15 September 1994, 487-499.
[14]  Pandya, P. (2018) Chasing The Trajectory of Terrorism: A Machine Learning Based Approach to Achieve Open Source Intelligence. Master’s Thesis, Hochschulbibliothek HWR, Berlin.
[15]  Singh, K., Chaudhary, A.S. and Kaur, P. (2019) A Machine Learning Approach for Enhancing Defence against Global Terrorism. 2019 12th International Conference on Contemporary Computing, Noida, 8-10 August 2019, 1-5.
https://doi.org/10.1109/IC3.2019.8844947
[16]  Ghalleb, A.E.K. and Amara, N.E.B. (2020) Terrorist Act Prediction Based on Machine Learning: Case Study of Tunisia. 2020 17th International Multi-Conference on Systems, Signals & Devices (SSD), Monastir, 20-03 July 2020, 398-403.
https://doi.org/10.1109/SSD49366.2020.9364114
[17]  Sathyavani, K. (2021) Machine Learning-Based Prediction of Terrorism and Threats. Journal of Advances in Computing and Information Technology, 1, 22-28.
[18]  LaFree, G. and Dugan, L. (2007) Introducing the Global Terrorism Database. Terrorism and Political Violence, 19, 181-204.
https://doi.org/10.1080/09546550701246817
[19]  GTD Codebook (2019) Codebook: Inclusion Criteria and Variables. National Consortium for the Study of Terrorism and Responses to Terrorism, College Park.
[20]  Okoye, I.E. (2018) Trends in Terrorism Incidents in Nigeria and the United States: Analysis of Data from 1980-2013. International Journal of Criminal Justice Sciences, 13, 200-211.
[21]  Sabri, A. and Schulze, G.G. (2021) Are Suicide Terrorists Different from “Regular Militants”? Public Choice, 188, 155-181.
https://doi.org/10.1007/s11127-020-00817-2
[22]  Iorliam, A. (2019) Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime. Springer, Cham.
https://doi.org/10.1007/978-3-030-15210-9
[23]  Akumba, B.O., Iorliam, A.A., Agber, S., Okube, E.O. and Kwaghtyo, K.D. (2021) Authentication of Video Evidence for Forensic Investigation: A Case of Nigeria. Journal of Information Security, 12, 163-176.
https://doi.org/10.4236/jis.2021.122008

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133