Muutke küpsiste eelistusi

Crime Analysis with Crime Mapping 2nd Revised edition [Pehme köide]

  • Formaat: Paperback / softback, 376 pages, kõrgus x laius: 254x178 mm, Illustrations, maps
  • Ilmumisaeg: 05-Nov-2008
  • Kirjastus: SAGE Publications Inc
  • ISBN-10: 1412968585
  • ISBN-13: 9781412968584
Teised raamatud teemal:
  • Pehme köide
  • Hind: 78,85 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 376 pages, kõrgus x laius: 254x178 mm, Illustrations, maps
  • Ilmumisaeg: 05-Nov-2008
  • Kirjastus: SAGE Publications Inc
  • ISBN-10: 1412968585
  • ISBN-13: 9781412968584
Teised raamatud teemal:
"Crime Analysis with Crime Mapping, Second Edition" provides a basic introduction to crime analysis with crime mapping data and techniques for students and practitioners. Instead of focusing on specific technology or the use of it, the text focuses on concepts and practical examples of the concepts. As the only introductory core text book for crime analysis and mapping, this comprehensive text is one that every crime analyst should read and have on his or her shelf for review and reference.The second edition includes the following: A new preface - outlines the purpose and intended market for the book; a new chapter - links the previous theory chapter to the practice of crime prevention in policing and provides justification for the importance and role of crime analysis in policing; a new chapter - discusses how patterns can be used by police and uses those concepts to walk students through the identification of meaningful and useful patterns - a brief new chapter - concludes the text and provides a review of how crime analysis fits into policing and crime prevention, its importance, improvements that can be made, and the future of the profession; and, an expanded discussion of the various types of technology for crime analysis and additional examples of how they can be used. Also included in this title, will be a broader discussion of GIS and GPS. It provides: a discussion of the problem-solving process used in policing that provides more theoretical and practical context to the process of developing hypotheses and conducting analyses based on these hypotheses; a brief student study site that takes the place of the original bound-in CD-Rom, and provides a link to the ATAC Software, exercise files, police reports, and journal articles; and, an Instructor's Resource CD-Rom that will provide chapter outlines, PowerPoint slides for each chapter, a sample syllabus, sample exams, and a test bank of multiple-choice and true/false questions (all created by the author).

Arvustused

"An excellent, thorough discussion of crime analysis; friendly to instructors and students." -- Samantha Gwinn Adoption Reply Card 20090114

Preface xv
PART I: FOUNDATIONS OF CRIME ANALYSIS
1(54)
Crime Analysis and the Profession
3(20)
Definition of Crime Analysis
3(3)
Definitions of GIS and Crime Mapping
6(1)
History of Crime Analysis
7(4)
Beginnings of Crime Analysis
8(1)
United States: 1900-1970
8(1)
United States: 1970 to Present
9(2)
History of Crime Mapping
11(4)
Beginnings of Crime Mapping
12(1)
United States: 1900-1970
12(1)
United States: 1970 to Present
13(2)
Crime Analysis as a Career Track
15(5)
Crime Analyst Qualifications and Job Descriptions
16(1)
Interns/Volunteers
16(1)
Crime Analysis Assistant/Technician
17(1)
Entry-Level Crime Analyst
17(1)
Experienced Crime Analyst
17(1)
Specialty Crime Analyst
18(1)
Crime Analysis Supervisor
19(1)
CAU Organizational Chart
19(1)
Summary Points
20(1)
Exercises
21(2)
Theoretical Foundations of Crime Analysis
23(16)
Environmental Criminology
24(6)
Problem Analysis Triangle
24(3)
Rational Choice Theory
27(1)
Crime Pattern Theory
28(1)
Routine Activities Theory
28(2)
Situational Crime Prevention
30(2)
Repeat Victimization and the 80/20 Rule
32(2)
Displacement and Diffusion of Benefits
34(1)
Displacement of Crime
34(1)
Diffusion of Benefits
35(1)
Opportunity
35(1)
Summary Points
36(1)
Exercises
37(2)
Effectiveness of Police in Reducing Crime and the Role of Crime Analysis
39(16)
Police Effectiveness on Preventing and Controlling Crime
39(5)
Standard Model of Policing
40(1)
Community Policing
40(1)
Broken Windows Policing
41(1)
Hot Spots Policing
41(1)
Compstat
42(1)
Problem-Oriented Policing
42(1)
Conclusions About Police Effectiveness
43(1)
The Role of Crime Analysis
44(1)
Problem Definitions and Literature
45(5)
Levels of Activity
45(1)
Short-Term Problems
46(1)
Long-Term Problems
47(2)
Literature
49(1)
Conclusion
50(1)
Summary Points
50(2)
Exercises
52(3)
PART II: CRIME ANALYSIS PROCESS, DATA, AND TECHNOLOGY
55(78)
Crime Analysis Process and Application
57(12)
The Crime Analysis Process
57(5)
Collection
58(1)
Collation
59(1)
Analysis
60(1)
Data Modification Subcycle
60(1)
Dissemination
61(1)
Feedback
61(1)
Summary
62(1)
Types of Crime Analysis
62(5)
Intelligence Analysis
62(1)
Criminal Investigative Analysis
63(1)
Tactical Crime Analysis
63(1)
Strategic Crime Analysis
64(1)
Operations Analysis
65(1)
Administrative Crime Analysis
65(1)
Crime Mapping by Type of Analysis
66(1)
Summary Points
67(1)
Exercises
68(1)
Crime Analysis Data
69(22)
Key Terms
69(2)
Data Matrix
69(1)
Database
70(1)
Secondary Data
70(1)
Primary Data
71(1)
Geographic Data
71(1)
Tabular Data
71(1)
Databases Used in Crime Analysis
71(8)
Crime Incidents
71(1)
Arrests
72(2)
Calls for Service
74(2)
Accidents
76(2)
Other Databases
78(1)
Primary Data Collection
79(3)
Data Considerations
82(6)
``Reported'' Activity
82(1)
Local and Federal Crime Data Standards
82(3)
Using Calls-for-Service Data to Study Crime Problems
85(1)
Using Arrest Data to Study Crime Problems and Offenders
86(1)
Data Integrity
87(1)
Summary Points
88(1)
Exercises
89(2)
Crime Analysis Technology
91(10)
Computer Hardware
91(1)
Data Collection and Storage
92(2)
Computer-Aided Dispatch System
92(1)
Records Management System
93(1)
Geographic Data System
93(1)
Data Collation and Analysis
94(2)
Database Management Software
94(1)
Spreadsheet Software
94(1)
Statistical Software
95(1)
Geographic Information System Software
95(1)
Global Positioning System
96(1)
Dissemination
96(2)
Word Processing Software
96(1)
Spreadsheet Software
96(1)
Graphics Software
96(1)
Publishing Software
97(1)
Presentation Software
97(1)
Internet/Intranet
97(1)
Specialized Crime Analysis Software
98(1)
Summary Points
99(1)
Exercises
100(1)
Geographic Data and Descriptive Crime Mapping
101(32)
Geographic Data
101(9)
Vector Data
101(4)
Raster Data
105(1)
Projections
106(1)
Coordinate Systems
106(1)
Scale
107(1)
Geocoding
107(3)
Descriptive Crime Mapping
110(19)
Types of Descriptive Crime Mapping
110(1)
Single-Symbol Mapping
111(1)
Buffers
111(1)
Graduated Mapping
112(2)
Chart Mapping
114(1)
Interactive Crime Mapping
115(2)
Methods for Descriptive Crime Mapping
117(1)
By Category
117(1)
By Statistical Classification
117(9)
By Manual Method
126(1)
Classification Guidelines and Summary
127(2)
Summary Points
129(1)
Exercises
130(3)
PART III: TACTICAL CRIME ANALYSIS
133(88)
Repeat Incidents and Tactical Data Collection
135(18)
Repeat Incidents
135(3)
Repeat Incident Data
136(1)
Repeat Incident Location Report
137(1)
Summary
138(1)
Collection and Collation of Tactical Crime Analysis Data
138(12)
Crime Report Data
140(2)
Modus Operandi
142(1)
Persons Involved in the Crime
143(3)
Vehicle Involved in the Crime
146(2)
Field Information
148(2)
Summary Points
150(1)
Exercises
151(2)
Pattern Identification Process
153(16)
Pattern Identification Methodology
153(10)
Types of Patterns
153(2)
Deduction and Induction
155(1)
Initial Pattern Identification
156(1)
Query Method
157(3)
Trend Hunter Method
160(2)
Pattern Finalization
162(1)
Identifying the Principal Case
162(1)
Identifying Other Key Cases in the Pattern
162(1)
Identifying Additional Related Cases
162(1)
Identifying Investigative Leads
163(1)
Clearing Cases
164(1)
Conclusion
165(1)
Summary Points
165(1)
Exercises
166(3)
Identifying Meaningful and Useful Patterns
169(24)
Persons Crime and Property Crime
169(3)
Potential Responses to Patterns by Police
172(3)
Persons Crime
173(1)
Property Crime
174(1)
Identifying Meaningful Patterns
175(14)
Persons Crime Pattern Key Characteristics and Examples
176(1)
Robbery Patterns
176(2)
Sexual Crime-Related Patterns
178(1)
Property Crime Pattern Key Characteristics and Examples
179(1)
Theft From Vehicle Patterns
180(3)
Vehicle Theft Patterns
183(1)
Residential Burglary Patterns
184(1)
Commercial Burglary Patterns
185(3)
Other Patterns
188(1)
Conclusion
189(1)
Summary Points
189(2)
Exercises
191(2)
Describing and Disseminating Known Patterns
193(28)
Describing Known Patterns
193(18)
Modus Operandi Summary
193(1)
Suspect and Vehicle Descriptions
194(1)
Time Series Analysis
195(1)
Exact Time
195(2)
Exact Day of Week
197(1)
Exact Time of Day and Day of Week
198(3)
Exact Date: Intervals Between Events
201(2)
Weighted Time Span Analysis
203(3)
Spatial Analysis of Patterns
206(1)
Pattern Identification
206(3)
Describing and Understanding a Pattern
209(2)
Tactical Crime Analysis Products
211(7)
Summary Points
218(1)
Exercises
219(2)
PART IV: STRATEGIC CRIME ANALYSIS
221(78)
Analyzing Problems: Process and Statistics
223(18)
Methodology: SARA Process
223(7)
Scanning and Identifying a Problem
224(2)
Analysis
226(1)
Research Related to the Problem
227(1)
Local Context of the Problem: Agency and Community
227(1)
Developing and Testing Hypotheses
228(1)
Response: Role of Analysis
229(1)
Assessment
229(1)
Basic Statistics Used in Crime Analysis
230(7)
Frequency
230(1)
Cross-Tabulation
230(1)
Percent
231(1)
Cross-Tabulation Percent
231(2)
Percentile
233(2)
Rate
235(1)
Mean and Standard Deviation
235(2)
Conclusion
237(1)
Summary Points
238(1)
Exercises
239(2)
Analyzing Problems: Application of Techniques, Part I
241(24)
What Is the Nature of the Problem?
242(2)
How Frequently Is the Problem Occurring?
244(8)
Frequency and Percent
244(3)
Rate
247(3)
Mean and Standard Deviation
250(2)
Has the Problem Increased or Decreased?
252(6)
By Year
253(1)
By Month or Quarter
254(1)
By Week
255(1)
Percent Change
256(1)
Anticipatory Benefit
257(1)
When Is the Problem Happening?
258(3)
Seasonality
258(2)
Time of Day and Day of Week
260(1)
Summary Points
261(1)
Exercises
262(3)
Analyzing Problems: Application of Techniques, Part II
265(22)
Where Is the Problem Occurring?
265(8)
Identifying Hot Spots
266(1)
Manual Method
266(1)
Graduated Color Mapping
267(1)
Grid Mapping
267(2)
Ellipses
269(1)
Density Mapping
270(3)
Summary of Hot Spot Identification Methods
273(3)
Categorizing Hot Spots
273(3)
Who Are the Victims and Does Repeat Victimization Exist?
276(5)
Victim Characteristics Patterns
276(1)
Repeat Victimization Analysis
277(4)
Who Are the Offenders and Does Repeat Offending Exist?
281(1)
Why Is the Problem Occurring?
282(1)
Summary Points
283(1)
Exercises
284(3)
Strategic Crime Analysis Results and Dissemination
287(12)
Choosing Analysis Information to Disseminate
287(4)
Initial Analysis Results
288(1)
Problem Analysis Results
288(3)
Strategic Crime Analysis Products
291(6)
Types of Products
291(1)
Guidelines for Product Contents
292(1)
Guidelines for Table and Chart Contents
293(2)
Guidelines for Map Contents
295(2)
Templates and Practical Examples
297(1)
Summary Points
297(1)
Exercises
298(1)
PART V: ADMINISTRATIVE CRIME ANALYSIS AND CONCLUSIONS
299(28)
Administrative Crime Analysis
301(18)
Guidelines for Conducting Administrative Crime Analysis
302(4)
Audience
302(1)
Purpose
302(1)
Context
303(1)
Example
303(1)
Scenario
304(1)
Audience: Police Management
304(1)
Audience: City Council
304(1)
Audience: Community Group
305(1)
Audience: News Media
305(1)
Audience: General
306(1)
Administrative Crime Analysis and the Internet
306(8)
Audiences
308(1)
Types of Information
308(2)
Internet-Specific Issues
310(1)
Privacy and Confidentiality
311(1)
Disclaimers
312(1)
Interactive Mapping
313(1)
Finding Crime Analysis Examples on the Internet
314(1)
Risk Analysis for Homeland Security
314(3)
Summary Points
317(1)
Exercises
318(1)
Conclusions, Challenges, and Future Issues
319(8)
Current State of Crime Analysis With Crime Mapping
319(1)
Current Challenges for Crime Analysis
320(2)
Future of Crime Analysis
322(3)
Summary Points
325(2)
References 327(8)
Glossary 335(12)
Index 347(10)
About the Author 357
Rachel Boba Santos (PhD and MA in sociology from Arizona State University and a BA in English and sociology from California Lutheran University) is an assistant professor at Florida Atlantic University in the Criminology and Criminal Justice program. At FAU, she teaches methods of research, criminal justice systems, crime prevention, problem solving, and analysis in policing as well as conducts research in the areas of problem solving, problem analysis, crime analysis, regional data sharing, and technology in policing. From 2000 to 2003, Dr. Boba was Director of the Police Foundation's Crime Mapping Laboratory where she directed federally funded grants in the areas of crime analysis and crime mapping, problem analysis, and school safety. Prior to her position at the Police Foundation, she worked as a crime analyst at the Tempe, Arizona, Police Department for five years where she conducted a wide variety of crime analysis and crime mapping work as well as applied research and evaluation.