SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Often difficult with crime data

    If your analysis or crime map seeks to

    understand robbery motivated homicides
    within city limits for a given time period, all
    known robbery-motivated homicides must be
    included in the analysis
    If any are excluded, the analysis will be

    limited in its power to explain or predict
    these crimes.
Fixing the problems in your data that can be

    done without diminishing the data quality or
    inserting error
    Repair errors due to “commission”

    ◦ Error upon entry of data element
    Repair errors due to “omission”

    ◦ This committed by lack of entry for a field or fields
    Something most analysts do daily

    Being “intimate” with your data helps to

    correct these issues
Kind of the “Big Picture” of crime mapping

    Large scale analysis (citywide), yields large scale

    assumptions and cannot be reduced to say a block level
    and vice versa
    Will control the accuracy needed in the data, both

    spatial and attribute accuracy
    ◦ Eg; If we wanted to do an analysis of tornado damage along the
      coast, the coast line graphic would not need to include every
      single cove and jut of the coastline, but if our analysis was of one
      small bay, then each rock, pier, and beach area might need to be
      drawn.
    Units of analysis should be useful in the analysis being

    performed
Official Crime Data

    ◦ Persons
       Arrestees
       Parolees
       Traffic units
    ◦ Places
       Schools
       Businesses
    ◦ Things
       Evidence
       Vehicles
    ◦ Incidents
       Calls for service
       Reported crimes
       Traffic crashes
FBI (http://www.fbi.gov/ucr/ucr.htm)

    Weaknesses:

        Only reports most serious crime at a location
    ◦
        Definitions may not be the same as state statutes
    ◦
        Voluntary compliance and reporting
    ◦
        UCR counts some crimes by number of victims instead of incidents
    ◦
        Was developed in 1930
    ◦
        Only crime reported to police are captured – self reporting not included
    ◦
    Strengths:

    ◦ Most states do report
    ◦ Allows comparison with like-sized agencies across the country
    ◦ Provides a general picture of crime reported to police
FBI (http://www.fbi.gov/ucr/ucr.htm)

    Weaknesses:

    ◦ Reports all crimes occurring at location
    ◦ Only a few states report NIBRS data
    Strengths:

    ◦ Reports all crimes occurring at location
    ◦ More robust definitions
Citizen generated requests for police services

    Officer initiated activity

    ◦ Location citizen gave for call, may not be where
      incident actually happened
    ◦ Location may be an intersection and not a specific
      address
    ◦ Depending on how it is captured it may not
      geocode and can thus, not be mapped
    ◦ What the call came in as, may not be what the
      officer determines was the real problem
    ◦ Not necessarily a picture of “crime” but of citizen
      desire for police presence only
Official Crime Data

    ◦ Persons
       Arrestees, or persons listed in police reports
        (victim, witnesses, suspects)
       Parolees/probationers
       Traffic units/passengers
    ◦ Places
       Schools, hotels, police stations, massage parlors
       Businesses, etc
    ◦ Things
       Evidence
       Vehicles, guns, etc
    ◦ Incidents
       Calls for service
       Reported crimes
       Traffic crashes
Can capture crime data not reported to police

    (much is not)
    ◦ There is no way to verify if a respondent is
      providing truthful and accurate information
    ◦ Information on homicides is not collected. (“Dead
      men can tell no tales”)
    ◦ Crime victims under the age of 12 years are
      unaccounted for Victimless crime is unaccounted
      for
Data not collected by police departments, but

    that can be used for crime mapping
      US Census
    ◦
      City sales tax and licensing
    ◦
      Google, Yahoo, US West Dex Yellow Pages
    ◦
      Political boundaries from local, county and state
    ◦
      Local social agencies like Department of Economic
    ◦
      Security
    ◦ GIS data at local universities
    ◦ Other city departments
    ◦ Etc.
Microsoft

        Access – database
    ◦
        Excel – spreadsheet
    ◦
        Word – word processor
    ◦
        Powerpoint – presentation of information
    ◦
    Statistical Packages

    ◦ Excel add-in Analysis toolpak
    ◦ SPSS
    ◦ SAS
    CrimeStat III

    ◦ Spatial statistics
Off the shelf additional programs

        Crime View
    ◦
        Crime Analysis Tools
    ◦
        Hawthe’s Tools
    ◦
        Curve expert (regression curve analysis software)
    ◦
        Coplink
    ◦
        Oracle spatial
    ◦
        SQL Server
    ◦
        ATAC
    ◦
        Etc
    ◦
Criminals do not care about imaginary borders

    along the roads dividing adjacent cities – why
    should we?
    Data sharing has increased since 911, but still

    have a way to go
    Biggest problem is politics not technology right

    now
    Data sharing systems are inter-agency and can

    be expensive
    We need more privacy impact assessments on all

    the data that is being shared
    Movement toward NIEM

    ◦ http://www.niem.gov/
Knowing which data sources to use and how

    to share the completed analysis (whether in
    report or map form) is diverse and complex.
    Understanding and clearly articulating the

    limitations of the data used is also
    necessary
    Understanding the legal and ethical issues

    involved with distributing crime
    maps, data, and analysis is imperative for
    crime analysts

Weitere ähnliche Inhalte

Was ist angesagt?

PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol, Inc
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredPol, Inc
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 
Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Noah Turner
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tellArchit Sharma
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoMatthew Gulino
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysisSameer Darekar
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime AnalysisRohit Dandona
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesRamdharan Donda
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesRamdharan
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project reportsarthakkhare3
 
Crimedata 2012 15
Crimedata 2012 15Crimedata 2012 15
Crimedata 2012 15Ramdharan
 
Lizette Lancaster - Institute for Security Studies (Annex)
 Lizette Lancaster - Institute for Security Studies (Annex) Lizette Lancaster - Institute for Security Studies (Annex)
Lizette Lancaster - Institute for Security Studies (Annex)Geneva Declaration
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORMaureen Kenney
 
Crime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSCrime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSAzavea
 
The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...Azavea
 

Was ist angesagt? (20)

PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
 
San Francisco Crime
San Francisco CrimeSan Francisco Crime
San Francisco Crime
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tell
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - Gulino
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysis
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime Analysis
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los Angeles
 
Crime prediction and strategy detection in data mining
Crime prediction and strategy detection in data miningCrime prediction and strategy detection in data mining
Crime prediction and strategy detection in data mining
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los Angeles
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project report
 
Crimedata 2012 15
Crimedata 2012 15Crimedata 2012 15
Crimedata 2012 15
 
Lizette Lancaster - Institute for Security Studies (Annex)
 Lizette Lancaster - Institute for Security Studies (Annex) Lizette Lancaster - Institute for Security Studies (Annex)
Lizette Lancaster - Institute for Security Studies (Annex)
 
Itech 7407 report
Itech 7407 reportItech 7407 report
Itech 7407 report
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, OR
 
Masters Defense 2013
Masters Defense 2013Masters Defense 2013
Masters Defense 2013
 
Crime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSCrime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMS
 
The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...
 

Andere mochten auch

Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsOsokop
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysisjangyoung
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisNeil Ryan
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 

Andere mochten auch (7)

Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis Concepts
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime Analysis
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 

Ähnlich wie Fundamentalsof Crime Mapping 6

Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1CAMT
 
Analyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyAnalyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyCOGS Presentations
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalAashri Tandon
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalatorLassonde Institute
 
01 basic concepts
01 basic concepts01 basic concepts
01 basic conceptsJim Gilmer
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
Final business project
Final business projectFinal business project
Final business projectJakeBehnken
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesNeo4j
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Laura Po
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
Hack jersey 2 final
Hack jersey 2 finalHack jersey 2 final
Hack jersey 2 finalErinMRoll
 
InnoConnect: Big data analysis
InnoConnect: Big data analysisInnoConnect: Big data analysis
InnoConnect: Big data analysisJiri Bouchal
 
The Chicago Police Department’s Information Collection for Automated Mapping...
 The Chicago Police Department’s Information Collection for Automated Mapping... The Chicago Police Department’s Information Collection for Automated Mapping...
The Chicago Police Department’s Information Collection for Automated Mapping...Daniel X. O'Neil
 

Ähnlich wie Fundamentalsof Crime Mapping 6 (16)

Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1
 
Bcs 20080228 Ku
Bcs 20080228 KuBcs 20080228 Ku
Bcs 20080228 Ku
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Analyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyAnalyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis County
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalator
 
report
reportreport
report
 
01 basic concepts
01 basic concepts01 basic concepts
01 basic concepts
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Final business project
Final business projectFinal business project
Final business project
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Hack jersey 2 final
Hack jersey 2 finalHack jersey 2 final
Hack jersey 2 final
 
InnoConnect: Big data analysis
InnoConnect: Big data analysisInnoConnect: Big data analysis
InnoConnect: Big data analysis
 
The Chicago Police Department’s Information Collection for Automated Mapping...
 The Chicago Police Department’s Information Collection for Automated Mapping... The Chicago Police Department’s Information Collection for Automated Mapping...
The Chicago Police Department’s Information Collection for Automated Mapping...
 

Mehr von Osokop

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingOsokop
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesOsokop
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Osokop
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Osokop
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Osokop
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Osokop
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Osokop
 

Mehr von Osokop (7)

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping Geocoding
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis Tables
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2
 

Kürzlich hochgeladen

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Kürzlich hochgeladen (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Fundamentalsof Crime Mapping 6

  • 1.
  • 2. Often difficult with crime data  If your analysis or crime map seeks to  understand robbery motivated homicides within city limits for a given time period, all known robbery-motivated homicides must be included in the analysis If any are excluded, the analysis will be  limited in its power to explain or predict these crimes.
  • 3. Fixing the problems in your data that can be  done without diminishing the data quality or inserting error Repair errors due to “commission”  ◦ Error upon entry of data element Repair errors due to “omission”  ◦ This committed by lack of entry for a field or fields Something most analysts do daily  Being “intimate” with your data helps to  correct these issues
  • 4. Kind of the “Big Picture” of crime mapping  Large scale analysis (citywide), yields large scale  assumptions and cannot be reduced to say a block level and vice versa Will control the accuracy needed in the data, both  spatial and attribute accuracy ◦ Eg; If we wanted to do an analysis of tornado damage along the coast, the coast line graphic would not need to include every single cove and jut of the coastline, but if our analysis was of one small bay, then each rock, pier, and beach area might need to be drawn. Units of analysis should be useful in the analysis being  performed
  • 5. Official Crime Data  ◦ Persons  Arrestees  Parolees  Traffic units ◦ Places  Schools  Businesses ◦ Things  Evidence  Vehicles ◦ Incidents  Calls for service  Reported crimes  Traffic crashes
  • 6. FBI (http://www.fbi.gov/ucr/ucr.htm)  Weaknesses:  Only reports most serious crime at a location ◦ Definitions may not be the same as state statutes ◦ Voluntary compliance and reporting ◦ UCR counts some crimes by number of victims instead of incidents ◦ Was developed in 1930 ◦ Only crime reported to police are captured – self reporting not included ◦ Strengths:  ◦ Most states do report ◦ Allows comparison with like-sized agencies across the country ◦ Provides a general picture of crime reported to police
  • 7. FBI (http://www.fbi.gov/ucr/ucr.htm)  Weaknesses:  ◦ Reports all crimes occurring at location ◦ Only a few states report NIBRS data Strengths:  ◦ Reports all crimes occurring at location ◦ More robust definitions
  • 8. Citizen generated requests for police services  Officer initiated activity  ◦ Location citizen gave for call, may not be where incident actually happened ◦ Location may be an intersection and not a specific address ◦ Depending on how it is captured it may not geocode and can thus, not be mapped ◦ What the call came in as, may not be what the officer determines was the real problem ◦ Not necessarily a picture of “crime” but of citizen desire for police presence only
  • 9. Official Crime Data  ◦ Persons  Arrestees, or persons listed in police reports (victim, witnesses, suspects)  Parolees/probationers  Traffic units/passengers ◦ Places  Schools, hotels, police stations, massage parlors  Businesses, etc ◦ Things  Evidence  Vehicles, guns, etc ◦ Incidents  Calls for service  Reported crimes  Traffic crashes
  • 10. Can capture crime data not reported to police  (much is not) ◦ There is no way to verify if a respondent is providing truthful and accurate information ◦ Information on homicides is not collected. (“Dead men can tell no tales”) ◦ Crime victims under the age of 12 years are unaccounted for Victimless crime is unaccounted for
  • 11.
  • 12. Data not collected by police departments, but  that can be used for crime mapping US Census ◦ City sales tax and licensing ◦ Google, Yahoo, US West Dex Yellow Pages ◦ Political boundaries from local, county and state ◦ Local social agencies like Department of Economic ◦ Security ◦ GIS data at local universities ◦ Other city departments ◦ Etc.
  • 13. Microsoft  Access – database ◦ Excel – spreadsheet ◦ Word – word processor ◦ Powerpoint – presentation of information ◦ Statistical Packages  ◦ Excel add-in Analysis toolpak ◦ SPSS ◦ SAS CrimeStat III  ◦ Spatial statistics
  • 14. Off the shelf additional programs  Crime View ◦ Crime Analysis Tools ◦ Hawthe’s Tools ◦ Curve expert (regression curve analysis software) ◦ Coplink ◦ Oracle spatial ◦ SQL Server ◦ ATAC ◦ Etc ◦
  • 15. Criminals do not care about imaginary borders  along the roads dividing adjacent cities – why should we? Data sharing has increased since 911, but still  have a way to go Biggest problem is politics not technology right  now Data sharing systems are inter-agency and can  be expensive We need more privacy impact assessments on all  the data that is being shared Movement toward NIEM  ◦ http://www.niem.gov/
  • 16. Knowing which data sources to use and how  to share the completed analysis (whether in report or map form) is diverse and complex. Understanding and clearly articulating the  limitations of the data used is also necessary Understanding the legal and ethical issues  involved with distributing crime maps, data, and analysis is imperative for crime analysts