Open Access Open Access  Restricted Access Subscription Access

Machine Learning Methodologies for Crime Predictive Analytics and Hotspot Mapping: An In-depth Review

Aliya Farheen, Ananya MP, Hithashree NK, Kavana SR, Mr Vinay SK

Abstract


Increasing crime incidents in cities and towns have raised the demand for smart systems that help the police take proactive action against crime. This study reviews machine learning techniques applied to the domains of crime prediction and hotspot mapping. The paper has systematically drawn on existing literature, pointing out various algorithms that include decision trees, support vector machines, neural networks, and clustering methods employed toward analyzing historical crime data. It also discusses spatial and temporal data in determining criminal-prone areas, usually referred to as crime hotspots. Major issues faced, including data quality, model interpretability, and associated ethical concerns about predictive policing, have been analyzed. Finally, the study discusses the use of geographic information systems (GIS) integrated with machine learning models during the last years, with the goal of enhancing the accuracy and reliability of the forecast of crime incidents. Therefore, synthesizing current research trends, this paper tries to provide a comprehensive understanding of the capabilities and limitations of machine learning in criminal pattern analysis, coupled with directions for future research in developing robust, ethical, and effective systems for crime prediction.

 


Full Text:

PDF

References


Almorsy, M., Grundy, J., & Müller, I. (2020). An analysis of the cloud computing security problem. Journal of Cloud Computing, 9(1), 1- 25.

Gupta, P., Singh, R., & Kaur, H. (2025). Smart contracts and dynamic consent in blockchainenabled healthcare systems. Journal of Medical Internet Research, 27(2), e34215.

Kumar, S., & Tripathi, R. (2022). Centralized management in cloud-based EHR systems: Security and scalability issues. Health Informatics Journal, 28(3), 405-419.

Lee, J., Wang, H., & Zhang, Y. (2025). Real-time data processing challenges in IoMT-enabled cloud health networks. IEEE Internet of Things Journal, 12(5), 3456-3467.

Li, F., Chen, S., & Zhao, Q. (2025). A hybrid ECCAES encryption framework for secure and efficient cloud-based healthcare data protection. Scientific Reports, 15(1), 132-143

Patil, S. S., & Thampi, S. M. (2025). Securing electronic health records in cloud environment using homomorphic encryption. International Journal of Electronics and Communication Engineering, 24(2), 289-302.

Singh, J., Dhaliwal, S., & Kaur, A. (2025). Blockchain integration for secure electronic health record systems: A novel architecture. International Journal of Medical Informatics, 176, 104509.

Singh, J., & Dhaliwal, S. (2023). Algorithmic performance and optimization in secure cloud health systems. Computers in Biology and Medicine, 157, 106917.

Wang, H., Zhang, Y., & Li, J. (2021). Data security and privacy-preserving mechanisms for health records in the cloud. IEEE Transactions on Cloud Computing, 9(4), 1322-1333.

Zhang, X., Liu, C., & Li, M. (2018). Towards secure and interoperable cloud-based electronic health

record systems. Future Generation Computer Systems, 86, 70-85.


Refbacks

  • There are currently no refbacks.