<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Network Visualization of Criminal Co-offending Patterns Using GPT-4: Analysis of Social Connections in Organized Crime*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kovalchuk</string-name>
          <email>o.kovalchuk@wunu.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Banakh</string-name>
          <email>s.banakh@wunu.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Khoma</string-name>
          <email>n.khoma@wunu.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sofiia</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Chudyk</string-name>
          <email>sophichudyk@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Masonkova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Solomia Savrii</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kherson State Maritime Academy</institution>
          ,
          <addr-line>20 Ushakova Avenue, Kherson, 73009</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ukrainian Catholic University</institution>
          ,
          <addr-line>Ilariona Svjentsits'koho St, 17, L'viv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>West Ukrainian National University</institution>
          ,
          <addr-line>11 Lvivska str., Ternopil, 46009</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Crime continues to pose a significant threat to community stability and socioeconomic development in our global society. Artificial intelligence technologies are increasingly being deployed to predict potential criminal activity and analyze the structural patterns within criminal networks through data-driven approaches. This paper introduces a novel methodology utilizing GPT-4 tools to examine social connections within criminal networks through graph-based visualization techniques. We developed a graph visualization approach for criminal data that effectively identifies structural patterns within criminal organizations. Our research analyzed 2,113 criminal cases related to vehicle theft, robberies, and armed robberies between 2013 and 2024 in the Ternopil region, resulting in visual network models of criminal cooffenders. By leveraging GPT-4's multimodal capabilities, we processed criminal data and generated graph representations illuminating the social connection structures among offenders. Our findings reveal distinctive network patterns across different crime types: vehicle theft networks demonstrate complex, highly centralized structures with key coordinator roles; robbery networks typically feature small, stable groups of 2-3 individuals, reflecting the operational requirements of such crimes; and armed robbery networks exhibit larger (4-6 person), more structured organizations with clear role distribution, likely due to the need for violence coordination and victim control. This methodology offers law enforcement agencies an effective analytical tool for addressing organized crime in contemporary settings.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;graph-based criminal network analysis</kwd>
        <kwd>GPT-4 network visualization</kwd>
        <kwd>co-offending patterns</kwd>
        <kwd>organized crime structure</kwd>
        <kwd>law enforcement intelligence1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Crime represents an increasingly critical global challenge confronting the international community.
Deteriorating economic conditions and political instability, particularly exacerbated by armed
conflicts worldwide, create fertile ground for criminal activity proliferation. Military conflicts disrupt
established social orders while simultaneously fostering emergent criminal behaviors. Organized
criminal entities frequently develop within conflict zones, subsequently expanding their operations
into neighboring territories and establishing cross-border criminal networks. These socioeconomic
disruptions function as powerful accelerants for criminal environments.</p>
      <p>Criminal activity’s consequences penetrate society at multiple levels ‒ from individuals to
national institutions. Crime victims endure not only financial losses but also psychological damage
and diminished personal security. At the community level, crime results in property devaluation,
heightened collective anxiety, and general degradation of living standards. On the broader societal
scale, criminal activity erodes social cohesion and undermines public confidence in governmental
institutions. This phenomenon manifests through diverse expressions, ranging from minor
infractions to serious offenses, including violent crimes and organized criminal group operations.</p>
      <p>
        The year 2024 witnessed a documented increase in global crime rates. Global statistical analyses
indicate that within the past two years, approximately one in twenty individuals has experienced
violent victimization [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Forecasts suggest an additional annual crime rate increase of 4% through
2026, driven by expanding social disparities and continued destabilization of societal structures.
Regions experiencing political instability and active conflict, such as Ukraine, are projected to
maintain elevated levels of violent criminal activity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        According to Numbeo data from mid-2024, Ukraine ranked 69th among 146 countries in the Crime
Index by Country [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Crime in Ukraine is increasing, which can be attributed to the direct impact of
martial law circumstances. However, despite the serious challenges facing the criminal justice
system, crime clearance rates remain satisfactory (Fig. 1)
      </p>
      <p>Crime constitutes a complex social challenge with profound implications for individuals,
communities, and broader societal functioning. Developing effective prevention and response
strategies necessitates implementing robust counteraction mechanisms. A particularly valuable
approach involves detecting and analyzing the social connections and networks that emerge within
criminal environments.</p>
      <p>Criminal Network Analysis serves as a powerful methodology for comprehending organized
crime structures and dynamics. Contemporary artificial intelligence technologies provide
unprecedented capabilities for identifying concealed connections and patterns within extensive
criminal datasets. AI systems can effectively process substantial volumes of unstructured
information from diverse sources, ranging from police documentation to telecommunications
records and social media activity. These systems can uncover hidden relationships between criminal
collaborators that might remain undetectable through conventional investigative approaches. AI
tools demonstrate effectiveness in predicting potential criminal conspiracies and identifying pivotal
figures within criminal networks. They facilitate the creation of visual network representations that
enhance investigators' understanding of criminal organizational structures. Graph Neural Networks
specifically address the analysis of complex relational patterns among criminal group members.
These models can identify non-intuitive structural patterns within criminal networks while
predicting potential emerging connections. Developing sophisticated criminal network analysis
methodologies requires interdisciplinary collaboration, integrating law enforcement expertise with
advanced data analytics. Only through such comprehensive integration can truly effective tools for
detecting and countering modern organized crime be established.</p>
      <p>This article introduces an innovative approach to analyzing social connections among group
crime participants through the application of GPTChart technology for criminal network modeling
and visualization.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        Artificial intelligence demonstrates remarkable capabilities in identifying patterns and templates
within extensive datasets that would prove challenging to detect through manual examination [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
AI has evolved into a fundamental component of contemporary forensic investigation methodologies
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Researchers leverage this technological capability to analyze heterogeneous criminal datasets
[78], with particular emphasis on criminal network analysis [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. E. Cekic investigated AI applications
in developing psychological offender profiles, specifically examining its potential to uncover
complex patterns of criminal behavior and underlying motivational factors [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. J. Adkins and
colleagues developed an innovative digital forensics approach that integrates multiple Natural
Language Processing tools to generate potential suspect lists based on textual analysis. Their
proposed methodology functions to systematically reduce large suspect pools to more focused
groups of individuals demonstrating stronger connections to the investigated crime [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. N. Shoeibi
and team employed various AI methodologies to detect criminal activity on Twitter, utilizing Graph
network analysis techniques to visualize user relationship structures [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. H.V. Ribeiro and
colleagues explored the application of graph convolutional networks in identifying patterns between
connected criminal actors and predicting various criminal network characteristics [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Salcedo et al.
researched Machine Learning Model applications within Criminal Networks, examining both the
potential benefits and implementation challenges of advanced AI methodologies in Criminal
Network Analysis [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>Although individual studies exist in this domain, comprehensive scientific research specifically
addressing AI methodologies for criminal network analysis remains relatively scarce. This paper
introduces an innovative approach to analyzing criminal co-offending networks through the
integrated application of graph theory principles and Chart GPT tools.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology</title>
      <p>The research implemented a multifaceted methodological approach integrating several
complementary methods, including literature review, critical analysis, and case study examination,
alongside the proposed application of Graph Network Analysis and ChatGPT tools for detecting and
analyzing social connections within criminal co-offending networks.</p>
      <p>
        Organized crime manifests through covert groups operating through illicit channels, with
significant potential to adversely impact both social structures and economic systems [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Criminal
relationship patterns can be effectively analyzed through network theory principles, wherein these
connections are categorized as covert or dark networks [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. These networks, encompassing both
terrorist organizations and criminal enterprises, can be represented mathematically as graph
structures. The graph theoretical framework provides researchers with a systematic approach to
examine the structural characteristics of covert networks and derive meaningful insights regarding
criminal group behavioral patterns [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <sec id="sec-3-1">
        <title>3.1. Suggested Model for Crime Data</title>
        <p>Criminal data can be represented as a finite attributed bipartite hypergraph G containing X and U,
which represent the vertices and edges of G. The vertex set X is divided into two mutually exclusive
sets, O = {o1, o2, ..., op}, E = {e1, e2, ..., eq}, reflecting offenders and events referring to crime incidents of
a certain type.</p>
        <p>The set U consists of hyperedges such that each e u ∈ U is a subset of vertices {u1, u2, ..., ur} ⊆ U
with | u ∩ E | = 1 (each edge is connected to exactly one incident) and with | u ∩ O | ≥ 1 (at least
one offender).</p>
        <p>For any u, u’ ∈ U with u ∩ E = u’ ∩ E it follows that u = u’. It means that every edge u of G
identifies a subset of offenders   1,   2, … ,    with any crime event ek ∈ E, that is =
  ,   1,   2, … ,    . An example is shown in Figure 2.</p>
        <p>he suggested model does not consider the frequency of repeat offenses committed by the same
pair of accomplices. In the context of martial law, criminal networks are highly volatile. Our objective
is to uncover the presence of social ties between the offenders and assess the size of criminal groups.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. GPT-Based Chart for Graph Network</title>
        <p>GPT-4 comes with built-in features for creating and visualizing graphic elements, including the
ability to generate graphs of various complexities. The system can create structured graph
representations where nodes, edges, and their attributes can be defined. A key feature is the ability
to customize the visual style of graph elements, such as size, color, shape, and connection line types.</p>
        <p>When working with graphs, GPT-4 enables the creation of both simple tree structures and
intricate network diagrams with different connection types between nodes. It supports multiple
visualization formats, such as directed and undirected graphs, weighted graphs, and hierarchical
structures. Additionally, element positioning, labels, and legends can be customized to enhance
understanding of the data. These capabilities make GPT-4 a powerful tool for visualizing complex
relationships across various domains, from social network analysis to depicting organizational
structures and business processes.</p>
        <p>We used GPT-4 tools to visualize complex network structures to streamline the analysis of
criminal groups. Our goal was to generate structured graph representations with the following
elements:
•
•
nodes (or vertices) represent individual participants in criminal activity;
edges (or links) of a graph(or network) show connections between the offenders (nodes).</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Proposed approach</title>
        <p>This study presents a novel methodology for detecting and analyzing criminal networks using Graph
Network Analysis by the ChatGPT tool (Figure 3).</p>
        <p>Our dataset was developed from crime data through natural language generation processes
utilizing GPT-4 [18]. Through this advanced AI tool, we transformed factual criminal case
information into a structured table containing essential elements for criminal network graph
construction: comprehensive data regarding individual perpetrators, detailed classification of crime
types committed, and specific information about co-offending relationships [19].</p>
        <p>We employed the sophisticated large multimodal model GPT-4 to construct graphical
representations that visually depict the social connection networks existing between criminals who
participated in collaborative criminal activities [20]. These visual graph structures effectively
illuminate the relationship patterns and organizational structures within criminal co-offending
networks.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Data selection and description</title>
        <p>To detect and analyze criminal networks, we utilized data on actual crimes committed between 2013
and 2024 in the Ternopil region of Ukraine. With the help of ChatGPT-4, we generated datasets from
2,113 criminal cases involving vehicle theft, robberies, and larceny. These datasets contain
information about the offenders and the criminal incidents associated with these offenses. Using the
generated datasets, we constructed graphs illustrating the social connections within criminal
networks through GPT-4. The edges of the graph represent links between criminals who committed
crimes as part of the same group. The connections between offenders are indicated by the graph's
edges, showing those who committed crimes together. The steps of dataset generation and graph
network creation are depicted in Figure 4.</p>
        <p>Input Data Set records contain information about crimes committed by each perpetrator and have
the following attributes:
• offender;
• crime identifier;
• date of crime;
• settlement where the crime was committed;
• location of the incident;
• time of incident;
• lighting;
• crime committed in a group;
• type of crime;
• day of the week;</p>
        <p>For the generation Data Set, which was used to create co-offender network graphs, we used
ChatGPT-4. Using the prompt "Based on the given table, generate a new table with the following
attributes: crime identifier, offender, type of crime", a new table was created. If a crime was
committed with accomplices, for one crime identifier, it contains several records with different
values of the "offender" attribute. Based on the newly created table, ChatGPT-4 built co-offender
graphs for each of the analyzed types of crimes: illegal appropriation of a vehicle, theft, and robbery.
Figure 4 illustrates the workflow beginning with raw crime data, the formation of a new data table
containing the necessary attributes for a graphical representation of the criminal network, and the
creation of a co-offender graph. Its vertices represent criminals from the dataset; edges visualize
social connections between them (indicating the presence of crimes committed jointly by the
corresponding pair of offenders).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results and discussion</title>
      <p>Visualization can support the examination of social ties within criminal networks. It helps uncover
interaction patterns among offenders, recognize criminal groups, identify key organizers and their
roles, and reveal communication structures between individuals involved [20–21]. The visualization
of offender networks extends beyond mere image creation, offering potential for more in-depth
investigation and analysis of criminal relationships.</p>
      <p>Utilizing data from 2,113 actual criminal cases, including perpetrator and offense information, we
developed criminal network visualizations with ChatGPT technology. Separate visual models were
created for three crime categories (vehicle theft, general theft, and robbery) committed within
Ukraine's Ternopil region from 2013 to 2024. The multimodal GPT-4 system helped transform raw
crime data into structured tables containing essential attributes for visualizing criminal relationships
[19]. This processed information was then used to generate graphs depicting the network of criminal
associations using GPT-4 [20].</p>
      <p>Figure 5 displays a network graph illustrating interactions among vehicle theft offenders. In this
visualization, nodes represent individual criminals while connecting lines indicate co-participation
in crimes. Our analysis focused on identifying network structure patterns. The graph construction
considered the presence of criminal partnerships but not the frequency of repeated offenses within
groups. This visual representation reveals extensive interconnections between offenders and
suggests unstable criminal group dynamics, evidenced by numerous cross-connections between
different network participants.</p>
      <p>Notably, nodes with high centrality point to key individuals within the network who maintain
numerous connections with others, potentially serving as organizers or coordinators of criminal
operations. Additionally, the presence of tightly connected clusters suggests established criminal
groups, possibly specializing in vehicle theft. This is supported by the fact that professional car thefts
are often carried out by organized groups of 2–3 to 5–6 individuals, each fulfilling a specific role,
such as thief, driver, or reseller. Such a structure is essential due to the complexity of modern car
security systems and the logistical demands of quickly concealing stolen vehicles [23].</p>
      <p>Individuals who committed vehicle theft alone are depicted as isolated nodes in the graph. These
instances are typically associated with opportunistic thefts, such as when a vehicle is left with keys
in the ignition, older cars with less advanced security systems, or joyriding. The high number of
isolated nodes suggests that many offenders acted without accomplices. This trend may be attributed
to the dataset covering three years of martial law in Ukraine, during which the structure of criminal
activity changed significantly, and many connections were disrupted. Additionally, increased social
vulnerability and large-scale population displacement played a role. Despite this, the visual model of
social interactions among vehicle theft offenders still reveals the presence of extensive criminal
networks. However, determining the precise proportion of group versus solo thefts remains
challenging due to a significant number of unsolved cases.</p>
      <p>Figure 6 presents a visual model of criminal interactions among individuals involved in robberies.
The number of offenders committing this type of crime is notably lower compared to those involved
in vehicle appropriation. Robberies are typically carried out by small groups of 2–3 individuals,
particularly in cases involving attacks on pedestrians at night, public space robberies, assaults on
cash couriers or banks, and store hold-ups. Group assaults are more effective as they allow better
control over the situation and the victim, improve chances of overcoming resistance, and enable role
division, such as one offender threatening while another seizes valuables [24]. These groups tend to
be relatively stable, as successful robberies require coordinated action, mutual trust, and a clear
understanding of each participant’s role. Graph analysis reveals that a substantial portion of the
nodes are linked in stable 2 –3-member components, supporting the pattern of forming small,
consistent criminal groups for robbery offenses. Methods of presenting information in web format
are given in the work [25]. Approaches to data analysis using AI are presented in the works [26-27].</p>
      <p>Individual robberies are more commonly associated with assaults on elderly victims, impulsive
and unplanned acts, offenses committed under the influence of alcohol or drugs, and minor street
crimes such as bag or phone snatching. The large number of isolated nodes in th e graph depicting
robbery-related interactions suggests a considerable share of situational and uncoordinated crimes
within the broader robbery landscape. This pattern indicates that many of these offenses occur
spontaneously, without prior planning, and are not linked to organized criminal networks.</p>
      <p>Figure 7 illustrates a visual representation of criminal interactions among individuals involved in
robberies. The graph of co-offenders in this crime category reveals well-defined criminal groups,
which appear more frequently than in theft-related cases. This is primarily due to the nature of
robbery, which is commonly carried out by groups. Group robberies are particularly prevalent in
incidents such as home invasions, business or store robberies, attacks on cash couriers, and highway
heists. The dominance of group involvement can be attributed to the necessity of using or
threatening violence, managing multiple victims at once, increasing the chances of overcoming
resistance, and ensuring a swift escape and transportation of stolen items.</p>
      <p>The graph depicted in Figure 7 includes a notable number of isolated nodes, representing
offenders who carried out robberies individually. Such incidents typically involve attacks on lone
pedestrians, impulsive and unplanned crimes, assaults in sparsely populated areas, or offenses
committed by repeat offenders. In contrast to thefts, robberies exhibit more distinctly organized
criminal groups and a greater density of connections between co-offenders [28–29]. The visual model
highlights the coexistence of both large, structured criminal groups and a substantial number of solo
perpetrators. During the period of martial law, the structure of robbery-related crime has shifted
significantly. There has been a rise in armed robberies, particularly involving weapons obtained from
combat zones. Additionally, there is a growing trend of robberies targeting the homes of internally
displaced persons and temporarily abandoned properties near conflict areas. A notable development
is the emergence of criminal groups composed of former military personnel, who apply the skills
and knowledge acquired through their service.</p>
      <p>The analysis of visual models representing criminal networks for three crime categories (illegal
vehicle appropriation, thefts, and robberies) reveals notable differences in the structure of criminal
interactions and group formation patterns. The visual representation of network data enabled the
identification of distinct organizational patterns in criminal activities, ranging from complex
interconnected networks in vehicle theft to more organized group structures in robberies. A key
advantage is the ability to pinpoint central figures and stable criminal groups, which is of vital
importance for law enforcement agencies. The impact of martial law on the crime landscape is
evident, with a rise in isolated offenders and the emergence of new forms of group criminal behavior.
High-quality visualization and interpretation of the data bridge the gap between theoretical analysis
of criminal networks and practical law enforcement efforts, offering an effective tool for
understanding and combating organized crime in contemporary contexts.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>The article introduces an innovative method for analyzing social connections within criminal
networks by utilizing GPT-4 tools for data visualization and interpretation. A new methodology was
developed to represent criminal data as a finite, attributed bipartite hypergraph and to create visual
models of criminal interactions based on this representation. Using data from 2,113 criminal cases
involving vehicle theft, robberies, and larcenies committed in the Ternopil region between 2013 and
2024, co-offender network graphs for these crimes were generated and analyzed. By applying the
GPT-4 multimodal model, unstructured data from criminal cases was processed to create a structured
table with the necessary attributes for visualization. With this data, and utilizing ChatGPT tools,
graphs were constructed to illustrate the social connections between criminals, where vertices
represent individual offenders and edges depict instances of their criminal collaboration.</p>
      <p>The research conducted highlights the effectiveness of using GPT-4 tools for analyzing and
visualizing social connections within criminal networks. By applying the proposed methodology to
real crime data, significant variations in the structure of criminal interactions were observed across
different types of crimes.</p>
      <p>Visual models revealed that vehicle theft is associated with complex, interconnected networks
and key figures with a high degree of centralization. Robberies tend to involve smaller, more cohesive
groups of 2‒3 individuals, while armed robberies are characterized by the formation of larger, more
organized criminal groups. Notably, a significant number of isolated individuals were identified
across all crime types, which could be linked to the destabilization of the criminal environment due
to martial law conditions.</p>
      <p>The visual representation of network data offers investigators valuable insights into the structural
characteristics of criminal groups, especially under martial law conditions. The proposed
methodology, which integrates GPT-4’s capabilities for data processing and visualization, provides
a powerful tool for analyzing criminal networks. High-quality visualizations and detailed
interpretation of the results help bridge the gap between theoretical analysis and practical law
enforcement efforts, offering effective means for understanding and combating organized crime in
contemporary settings. Future research will focus on enhancing algorithms for detecting hidden
connections and predicting potential criminal conspiracies, employing more advanced graph
analysis techniques and machine learning methods. Specifically, the issue of repeat offenses by
established criminal groups will be explored.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>The authors express their sincere gratitude to the Armed Forces of Ukraine for providing security,
which made it possible to conduct our research.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used GPT-4 tools to generate a dataset from the
input table and to visualize complex network structures to simplify the analysis of criminal groups.
All processes are described in the research methodology. After using these tools, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s
content.
[18] O. Kovalchuk, R. Shevchuk, M. Masonkova, A. Banakh. Content Analysis of Court Decisions: A
GPT-4 Based Sentence-by-Sentence Data Generation and Association Rules Mining, in:
Proceedings of the I International Workshop of Young Scientists on Artificial Intelligence for
Sustainable Development 2024, pp. 56‒70. URL: https://ceur-ws.org/Vol-3716/paper5.pdf.
[19] D. Gewirtz. How to use ChatGPT's Advanced Data Analysis to create quality charts and tables.</p>
      <p>URL:
https://www.zdnet.com/article/how-to-use-chatgpt-to-make-charts-and-tables-withadvanced-data-analysis/.
[20] S. Lanoue. How to Use ChatGPT to Make Charts and Graphs. URL:
https://www.thebricks.com/resources/how-to-use-chatgpt-to-make-charts-and-graphs.
[21] E.K. Anastasiadis, I. Antoniou. Directed Criminal Networks: Temporal Analysis and</p>
      <p>Disruption. Information 15(2):84 (2024). doi:10.3390/info15020084.
[22] K. Zhao, H. Zhang, J. Li, Q. Pan, L. Lai, Y. Nie, Z. Zhang. Social Network Forensics Analysis Model</p>
      <p>Based on Network Representation Learning. Entropy 26(7):579 (2024). doi:10.3390/e26070579.
[23] A. Quinn Vehicle Crime, CPTED, and Offending under the Influence: A Qualitative Investigation
of Offender Perceptions. Social Sciences 8(3):88 (2019). doi:10.3390/socsci8030088.
[24] E. Kwon, S. Jung, J. Lee. Artificial Neural Network Model Development to Predict Theft Types in
Consideration of Environmental Factors. ISPRS International Journal of Geo-Information 10(2):99
(2021). doi:10.3390/ijgi10020099.
[25] M. Dyvak, A. Kovbasistyi, A. Melnyk, I. Shcherbiak and O. Huhul, "Recognition of Relevance of
Web Resource Content Based on Analysis of Semantic Components," 2019 9th International
Conference on Advanced Computer Information Technologies (ACIT), Ceske Budejovice, Czech
Republic, 2019, pp. 297-302, doi: 10.1109/ACITT.2019.8779897.
[26] H. Zhang, Y. Gao, D. Yao, J. Zhang. Interaction of Crime Risk across Crime Types in Hotspot
Areas. ISPRS International Journal of Geo-Information 12(4):176 (2023).
doi:10.3390/ijgi12040176.
[27] Bezobrazov, S., Sachenko, A., Komar, M., &amp; Rubanau, V. (2016). THE METHODS OF ARTIFICIAL
INTELLIGENCE FOR MALICIOUS APPLICATIONS DETECTION IN ANDROID OS.</p>
      <p>International Journal of Computing, 15(3), 184-190. https://doi.org/10.47839/ijc.15.3.851
[28] N. Ocheretnyuk, M. Dyvak, T. Dyvak and I. Voytyuk, "Structure identification of interval
difference operator for control the production process of drywall," 2013 12th International
Conference on the Experience of Designing and Application of CAD Systems in
Microelectronics (CADSM), Lviv, UKraine, 2013, pp. 262-264.
[29] M. Rasmusson, V. Helbich. The Relationship b etween Near-Repeat Street Robbery and the
Environment: Evidence from Malmö, Sweden. ISPRS International Journal of
GeoInformation 9(4):188 (2020). Doi:10.3390/ijgi9040188.
[30] Lytvyn, V., Vysotska, V., Shatskykh, V., Kohut, I., Petruchenko, O., Dzyubyk, L., Bobrivetc, V.,
Panasyuk, V., Sachenko, S., &amp; Komar, M. (2019). Design of a recommendation system based on
collaborative filtering and machine learning considering personal needs of the user.
EasternEuropean Journal of Enterprise Technologies, 4(2 (100), 6–28.
https://doi.org/10.15587/17294061.2019.175507</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[1] The Global Safety Report. Gallup</source>
          .
          <year>2024</year>
          . URL: https://insightcrime.org/wpcontent/uploads/2024/10/Gallup_
          <string-name>
            <surname>Global-Safety-</surname>
          </string-name>
          Report-2024.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Joshi</surname>
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Crime</surname>
          </string-name>
          <article-title>Statistics by Country Crime Index</article-title>
          and Facts.
          <year>2024</year>
          . URL: https://www.coolestgadgets.com/crime-statistics/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Crime</given-names>
            <surname>Index by C ountry 2024 Mid-Year</surname>
          </string-name>
          . Numbeo. URL: https://www.numbeo.com/crime/rankings_by_country.jsp.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Yagunov</surname>
          </string-name>
          ,
          <source>The Ukrainian Prison and Probation Policy</source>
          <volume>(</volume>
          <fpage>1991</fpage>
          - 2024): Modulations and
          <string-name>
            <given-names>Key</given-names>
            <surname>Indicators</surname>
          </string-name>
          .
          <article-title>Evropský časopis ekonomiky a management 10(4) (</article-title>
          <year>2024</year>
          )
          <fpage>17</fpage>
          -
          <lpage>86</lpage>
          . doi:
          <volume>10</volume>
          .46340/eujem.
          <year>2024</year>
          .
          <volume>10</volume>
          .
          <issue>4</issue>
          .2.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.P.</given-names>
            <surname>Bharadiya</surname>
          </string-name>
          .
          <article-title>Machine learning and AI in business intelligence: Trends and opportunities</article-title>
          .
          <source>Int. J. Comput</source>
          .
          <volume>48</volume>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          )
          <fpage>123</fpage>
          -
          <lpage>134</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jarrett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.K.R.</given-names>
            <surname>Choo</surname>
          </string-name>
          .
          <article-title>The impact of automation and artificial intelligence on digital forensics</article-title>
          .
          <source>Wiley Interdiscip. Rev. Forensic Sci</source>
          .
          <volume>3</volume>
          (
          <issue>6</issue>
          ):e1418 (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1002/wfs2.
          <fpage>1418</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Sarzaeim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.H.</given-names>
            <surname>Mahmoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Azim</surname>
          </string-name>
          , G. Bauer,
          <string-name>
            <surname>I. Bowles.</surname>
          </string-name>
          <article-title>A Systematic Review of Using Machine Learning and</article-title>
          <source>Natural Language Processing in Smart Policing. Computers</source>
          <volume>12</volume>
          (
          <issue>12</issue>
          ):
          <volume>255</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/computers12120255.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Rigano</surname>
          </string-name>
          .
          <article-title>Using Artificial Intelligence to Address Criminal Justice Needs</article-title>
          . National Institute of Justice.
          <source>NIJ Journal</source>
          <volume>280</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ficara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Curreri</surname>
          </string-name>
          , G. Fiumara,
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Liotta</surname>
          </string-name>
          . Covert NetwokrConstruction, Disruption, and
          <string-name>
            <surname>Resilience</surname>
          </string-name>
          : A Survey.
          <source>Mathematics</source>
          <volume>10</volume>
          (
          <issue>16</issue>
          ):
          <volume>2929</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/math10162929.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Cekic</surname>
          </string-name>
          .
          <source>The Impact of Artificial Intelligence Tools on Criminal Psychological Profiling</source>
          .
          <source>International Journal of Academic Research in Psychology</source>
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .46886/IJARP/v11-i1/
          <fpage>7405</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Adkins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Bataineh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khalaf</surname>
          </string-name>
          .
          <article-title>Identifying Persons of Interest in Digital Forensics Using NLP-Based AI</article-title>
          .
          <source>Future Internet</source>
          <volume>16</volume>
          (
          <issue>11</issue>
          ):
          <volume>426</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3390/fi16110426.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N.</given-names>
            <surname>Shoeibi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shoeibi</surname>
          </string-name>
          , G. Hernández,
          <string-name>
            <given-names>P.</given-names>
            <surname>Chamoso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.M.</given-names>
            <surname>Corchado. AI-Crime</surname>
          </string-name>
          <string-name>
            <surname>Hunter</surname>
          </string-name>
          :
          <article-title>An AI Mixture of Experts for Crime Discovery on Twitter</article-title>
          .
          <source>Electronics</source>
          <volume>10</volume>
          (
          <issue>24</issue>
          ):
          <volume>3081</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .3390/electronics10243081.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.V.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.D.</given-names>
            <surname>Lopes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.B.</given-names>
            <surname>Pessa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.F.</given-names>
            <surname>Martins</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.R.</surname>
          </string-name>
          da Cunha,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gonçalves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.K.</given-names>
            <surname>Lenzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.S.</given-names>
            <surname>Hanley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Perc</surname>
          </string-name>
          .
          <article-title>Deep learning criminal networks</article-title>
          .
          <source>Chaos, Solitons &amp; Fractals</source>
          <volume>172</volume>
          :
          <fpage>113579</fpage>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/j.chaos.
          <year>2023</year>
          .
          <volume>113579</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>E.</given-names>
            <surname>Salcedo-Albarán</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.J.G.</given-names>
            <surname>Salamanca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Cano-Melani</surname>
          </string-name>
          .
          <article-title>Machine Learning Models on Criminal Networks (MLMoCN): Artificial Intelligence to Disentangle Crime</article-title>
          .
          <source>SSRN Electronic Journal</source>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .2139/ssrn.4651714.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shynkaryk</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Masonkova</surname>
          </string-name>
          .
          <article-title>Econometric Models for Estimating the Financial Effect of Cybercrimes</article-title>
          ,
          <source>in: Proceedings of the 11th International Conference on Advanced Computer Information Technologies</source>
          , Deggendorf, Germany,
          <year>2021</year>
          , pp.
          <fpage>381</fpage>
          -
          <lpage>384</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACIT52158.
          <year>2021</year>
          .
          <volume>9548490</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Masonkova</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Banakh</surname>
          </string-name>
          . The Dark Web Worldwi de 2020:
          <article-title>Anonymous vs Safety</article-title>
          ,
          <source>in: Proceedings of the 11th International Conference on Advanced Computer Information Technologies</source>
          , Deggendorf, Germany,
          <year>2021</year>
          , pp.
          <fpage>526</fpage>
          -
          <lpage>530</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACIT52158.
          <year>2021</year>
          .
          <volume>9548578</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ficara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Saitta</surname>
          </string-name>
          , G. Fiumara, P. de Meo,
          <string-name>
            <given-names>A.</given-names>
            <surname>Liotta</surname>
          </string-name>
          . A.
          <article-title>Game of Thieves and WERW-Kpath: Two Novel Measures of Node and Edge Centrality for Mafia Networks</article-title>
          .
          <source>In Complex Networks XII</source>
          , Springer International Publishing: Cham, Switzerland,
          <year>2021</year>
          , pp.
          <fpage>12</fpage>
          -
          <lpage>23</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -81854-
          <issue>8</issue>
          _
          <fpage>2</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>