SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Fundamentalsof Crime Mapping 6
Often difficult with crime data

    If your analysis or crime map seeks to

    understand robbery motivated homicides
    within city limits for a given time period, all
    known robbery-motivated homicides must be
    included in the analysis
    If any are excluded, the analysis will be

    limited in its power to explain or predict
    these crimes.
Fixing the problems in your data that can be

    done without diminishing the data quality or
    inserting error
    Repair errors due to “commission”

    ◦ Error upon entry of data element
    Repair errors due to “omission”

    ◦ This committed by lack of entry for a field or fields
    Something most analysts do daily

    Being “intimate” with your data helps to

    correct these issues
Kind of the “Big Picture” of crime mapping

    Large scale analysis (citywide), yields large scale

    assumptions and cannot be reduced to say a block level
    and vice versa
    Will control the accuracy needed in the data, both

    spatial and attribute accuracy
    ◦ Eg; If we wanted to do an analysis of tornado damage along the
      coast, the coast line graphic would not need to include every
      single cove and jut of the coastline, but if our analysis was of one
      small bay, then each rock, pier, and beach area might need to be
      drawn.
    Units of analysis should be useful in the analysis being

    performed
Official Crime Data

    ◦ Persons
       Arrestees
       Parolees
       Traffic units
    ◦ Places
       Schools
       Businesses
    ◦ Things
       Evidence
       Vehicles
    ◦ Incidents
       Calls for service
       Reported crimes
       Traffic crashes
FBI (http://www.fbi.gov/ucr/ucr.htm)

    Weaknesses:

        Only reports most serious crime at a location
    ◦
        Definitions may not be the same as state statutes
    ◦
        Voluntary compliance and reporting
    ◦
        UCR counts some crimes by number of victims instead of incidents
    ◦
        Was developed in 1930
    ◦
        Only crime reported to police are captured – self reporting not included
    ◦
    Strengths:

    ◦ Most states do report
    ◦ Allows comparison with like-sized agencies across the country
    ◦ Provides a general picture of crime reported to police
FBI (http://www.fbi.gov/ucr/ucr.htm)

    Weaknesses:

    ◦ Reports all crimes occurring at location
    ◦ Only a few states report NIBRS data
    Strengths:

    ◦ Reports all crimes occurring at location
    ◦ More robust definitions
Citizen generated requests for police services

    Officer initiated activity

    ◦ Location citizen gave for call, may not be where
      incident actually happened
    ◦ Location may be an intersection and not a specific
      address
    ◦ Depending on how it is captured it may not
      geocode and can thus, not be mapped
    ◦ What the call came in as, may not be what the
      officer determines was the real problem
    ◦ Not necessarily a picture of “crime” but of citizen
      desire for police presence only
Official Crime Data

    ◦ Persons
       Arrestees, or persons listed in police reports
        (victim, witnesses, suspects)
       Parolees/probationers
       Traffic units/passengers
    ◦ Places
       Schools, hotels, police stations, massage parlors
       Businesses, etc
    ◦ Things
       Evidence
       Vehicles, guns, etc
    ◦ Incidents
       Calls for service
       Reported crimes
       Traffic crashes
Can capture crime data not reported to police

    (much is not)
    ◦ There is no way to verify if a respondent is
      providing truthful and accurate information
    ◦ Information on homicides is not collected. (“Dead
      men can tell no tales”)
    ◦ Crime victims under the age of 12 years are
      unaccounted for Victimless crime is unaccounted
      for
Fundamentalsof Crime Mapping 6
Data not collected by police departments, but

    that can be used for crime mapping
      US Census
    ◦
      City sales tax and licensing
    ◦
      Google, Yahoo, US West Dex Yellow Pages
    ◦
      Political boundaries from local, county and state
    ◦
      Local social agencies like Department of Economic
    ◦
      Security
    ◦ GIS data at local universities
    ◦ Other city departments
    ◦ Etc.
Microsoft

        Access – database
    ◦
        Excel – spreadsheet
    ◦
        Word – word processor
    ◦
        Powerpoint – presentation of information
    ◦
    Statistical Packages

    ◦ Excel add-in Analysis toolpak
    ◦ SPSS
    ◦ SAS
    CrimeStat III

    ◦ Spatial statistics
Off the shelf additional programs

        Crime View
    ◦
        Crime Analysis Tools
    ◦
        Hawthe’s Tools
    ◦
        Curve expert (regression curve analysis software)
    ◦
        Coplink
    ◦
        Oracle spatial
    ◦
        SQL Server
    ◦
        ATAC
    ◦
        Etc
    ◦
Criminals do not care about imaginary borders

    along the roads dividing adjacent cities – why
    should we?
    Data sharing has increased since 911, but still

    have a way to go
    Biggest problem is politics not technology right

    now
    Data sharing systems are inter-agency and can

    be expensive
    We need more privacy impact assessments on all

    the data that is being shared
    Movement toward NIEM

    ◦ http://www.niem.gov/
Knowing which data sources to use and how

    to share the completed analysis (whether in
    report or map form) is diverse and complex.
    Understanding and clearly articulating the

    limitations of the data used is also
    necessary
    Understanding the legal and ethical issues

    involved with distributing crime
    maps, data, and analysis is imperative for
    crime analysts

Contenu connexe

Tendances

PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol, Inc
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredPol, Inc
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 
Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Noah Turner
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tellArchit Sharma
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoMatthew Gulino
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysisSameer Darekar
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime AnalysisRohit Dandona
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesRamdharan Donda
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesRamdharan
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project reportsarthakkhare3
 
Crimedata 2012 15
Crimedata 2012 15Crimedata 2012 15
Crimedata 2012 15Ramdharan
 
Lizette Lancaster - Institute for Security Studies (Annex)
 Lizette Lancaster - Institute for Security Studies (Annex) Lizette Lancaster - Institute for Security Studies (Annex)
Lizette Lancaster - Institute for Security Studies (Annex)Geneva Declaration
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORMaureen Kenney
 
Crime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSCrime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSAzavea
 
The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...Azavea
 

Tendances (20)

PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
 
San Francisco Crime
San Francisco CrimeSan Francisco Crime
San Francisco Crime
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tell
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - Gulino
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysis
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime Analysis
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los Angeles
 
Crime prediction and strategy detection in data mining
Crime prediction and strategy detection in data miningCrime prediction and strategy detection in data mining
Crime prediction and strategy detection in data mining
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los Angeles
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project report
 
Crimedata 2012 15
Crimedata 2012 15Crimedata 2012 15
Crimedata 2012 15
 
Lizette Lancaster - Institute for Security Studies (Annex)
 Lizette Lancaster - Institute for Security Studies (Annex) Lizette Lancaster - Institute for Security Studies (Annex)
Lizette Lancaster - Institute for Security Studies (Annex)
 
Itech 7407 report
Itech 7407 reportItech 7407 report
Itech 7407 report
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, OR
 
Masters Defense 2013
Masters Defense 2013Masters Defense 2013
Masters Defense 2013
 
Crime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSCrime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMS
 
The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...
 

En vedette

Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsOsokop
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysisjangyoung
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisNeil Ryan
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 

En vedette (7)

Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis Concepts
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime Analysis
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 

Similaire à Fundamentalsof Crime Mapping 6

Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1CAMT
 
Although analyzing statistical data can be challenging, it is eq.docx
Although analyzing statistical data can be challenging, it is eq.docxAlthough analyzing statistical data can be challenging, it is eq.docx
Although analyzing statistical data can be challenging, it is eq.docxgreg1eden90113
 
Although analyzing statistical data can be challenging, it is equall
Although analyzing statistical data can be challenging, it is equallAlthough analyzing statistical data can be challenging, it is equall
Although analyzing statistical data can be challenging, it is equallAzaleeRutledge285
 
Assignment DescriptionAlthough analyzing statistical data can be.docx
Assignment DescriptionAlthough analyzing statistical data can be.docxAssignment DescriptionAlthough analyzing statistical data can be.docx
Assignment DescriptionAlthough analyzing statistical data can be.docxlesleyryder69361
 
Analyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyAnalyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyCOGS Presentations
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalAashri Tandon
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalatorLassonde Institute
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
Final business project
Final business projectFinal business project
Final business projectJakeBehnken
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesNeo4j
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Laura Po
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
Hack jersey 2 final
Hack jersey 2 finalHack jersey 2 final
Hack jersey 2 finalErinMRoll
 
InnoConnect: Big data analysis
InnoConnect: Big data analysisInnoConnect: Big data analysis
InnoConnect: Big data analysisJiri Bouchal
 
The Chicago Police Department’s Information Collection for Automated Mapping...
 The Chicago Police Department’s Information Collection for Automated Mapping... The Chicago Police Department’s Information Collection for Automated Mapping...
The Chicago Police Department’s Information Collection for Automated Mapping...Daniel X. O'Neil
 

Similaire à Fundamentalsof Crime Mapping 6 (18)

Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1
 
Although analyzing statistical data can be challenging, it is eq.docx
Although analyzing statistical data can be challenging, it is eq.docxAlthough analyzing statistical data can be challenging, it is eq.docx
Although analyzing statistical data can be challenging, it is eq.docx
 
Although analyzing statistical data can be challenging, it is equall
Although analyzing statistical data can be challenging, it is equallAlthough analyzing statistical data can be challenging, it is equall
Although analyzing statistical data can be challenging, it is equall
 
Assignment DescriptionAlthough analyzing statistical data can be.docx
Assignment DescriptionAlthough analyzing statistical data can be.docxAssignment DescriptionAlthough analyzing statistical data can be.docx
Assignment DescriptionAlthough analyzing statistical data can be.docx
 
Bcs 20080228 Ku
Bcs 20080228 KuBcs 20080228 Ku
Bcs 20080228 Ku
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Analyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyAnalyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis County
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalator
 
report
reportreport
report
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Final business project
Final business projectFinal business project
Final business project
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Hack jersey 2 final
Hack jersey 2 finalHack jersey 2 final
Hack jersey 2 final
 
InnoConnect: Big data analysis
InnoConnect: Big data analysisInnoConnect: Big data analysis
InnoConnect: Big data analysis
 
The Chicago Police Department’s Information Collection for Automated Mapping...
 The Chicago Police Department’s Information Collection for Automated Mapping... The Chicago Police Department’s Information Collection for Automated Mapping...
The Chicago Police Department’s Information Collection for Automated Mapping...
 

Plus de Osokop

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingOsokop
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesOsokop
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Osokop
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Osokop
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Osokop
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Osokop
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Osokop
 

Plus de Osokop (7)

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping Geocoding
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis Tables
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2
 

Dernier

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 

Dernier (20)

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 

Fundamentalsof Crime Mapping 6

  • 2. Often difficult with crime data  If your analysis or crime map seeks to  understand robbery motivated homicides within city limits for a given time period, all known robbery-motivated homicides must be included in the analysis If any are excluded, the analysis will be  limited in its power to explain or predict these crimes.
  • 3. Fixing the problems in your data that can be  done without diminishing the data quality or inserting error Repair errors due to “commission”  ◦ Error upon entry of data element Repair errors due to “omission”  ◦ This committed by lack of entry for a field or fields Something most analysts do daily  Being “intimate” with your data helps to  correct these issues
  • 4. Kind of the “Big Picture” of crime mapping  Large scale analysis (citywide), yields large scale  assumptions and cannot be reduced to say a block level and vice versa Will control the accuracy needed in the data, both  spatial and attribute accuracy ◦ Eg; If we wanted to do an analysis of tornado damage along the coast, the coast line graphic would not need to include every single cove and jut of the coastline, but if our analysis was of one small bay, then each rock, pier, and beach area might need to be drawn. Units of analysis should be useful in the analysis being  performed
  • 5. Official Crime Data  ◦ Persons  Arrestees  Parolees  Traffic units ◦ Places  Schools  Businesses ◦ Things  Evidence  Vehicles ◦ Incidents  Calls for service  Reported crimes  Traffic crashes
  • 6. FBI (http://www.fbi.gov/ucr/ucr.htm)  Weaknesses:  Only reports most serious crime at a location ◦ Definitions may not be the same as state statutes ◦ Voluntary compliance and reporting ◦ UCR counts some crimes by number of victims instead of incidents ◦ Was developed in 1930 ◦ Only crime reported to police are captured – self reporting not included ◦ Strengths:  ◦ Most states do report ◦ Allows comparison with like-sized agencies across the country ◦ Provides a general picture of crime reported to police
  • 7. FBI (http://www.fbi.gov/ucr/ucr.htm)  Weaknesses:  ◦ Reports all crimes occurring at location ◦ Only a few states report NIBRS data Strengths:  ◦ Reports all crimes occurring at location ◦ More robust definitions
  • 8. Citizen generated requests for police services  Officer initiated activity  ◦ Location citizen gave for call, may not be where incident actually happened ◦ Location may be an intersection and not a specific address ◦ Depending on how it is captured it may not geocode and can thus, not be mapped ◦ What the call came in as, may not be what the officer determines was the real problem ◦ Not necessarily a picture of “crime” but of citizen desire for police presence only
  • 9. Official Crime Data  ◦ Persons  Arrestees, or persons listed in police reports (victim, witnesses, suspects)  Parolees/probationers  Traffic units/passengers ◦ Places  Schools, hotels, police stations, massage parlors  Businesses, etc ◦ Things  Evidence  Vehicles, guns, etc ◦ Incidents  Calls for service  Reported crimes  Traffic crashes
  • 10. Can capture crime data not reported to police  (much is not) ◦ There is no way to verify if a respondent is providing truthful and accurate information ◦ Information on homicides is not collected. (“Dead men can tell no tales”) ◦ Crime victims under the age of 12 years are unaccounted for Victimless crime is unaccounted for
  • 12. Data not collected by police departments, but  that can be used for crime mapping US Census ◦ City sales tax and licensing ◦ Google, Yahoo, US West Dex Yellow Pages ◦ Political boundaries from local, county and state ◦ Local social agencies like Department of Economic ◦ Security ◦ GIS data at local universities ◦ Other city departments ◦ Etc.
  • 13. Microsoft  Access – database ◦ Excel – spreadsheet ◦ Word – word processor ◦ Powerpoint – presentation of information ◦ Statistical Packages  ◦ Excel add-in Analysis toolpak ◦ SPSS ◦ SAS CrimeStat III  ◦ Spatial statistics
  • 14. Off the shelf additional programs  Crime View ◦ Crime Analysis Tools ◦ Hawthe’s Tools ◦ Curve expert (regression curve analysis software) ◦ Coplink ◦ Oracle spatial ◦ SQL Server ◦ ATAC ◦ Etc ◦
  • 15. Criminals do not care about imaginary borders  along the roads dividing adjacent cities – why should we? Data sharing has increased since 911, but still  have a way to go Biggest problem is politics not technology right  now Data sharing systems are inter-agency and can  be expensive We need more privacy impact assessments on all  the data that is being shared Movement toward NIEM  ◦ http://www.niem.gov/
  • 16. Knowing which data sources to use and how  to share the completed analysis (whether in report or map form) is diverse and complex. Understanding and clearly articulating the  limitations of the data used is also necessary Understanding the legal and ethical issues  involved with distributing crime maps, data, and analysis is imperative for crime analysts