Preface |
|
xv | |
|
PART I: FOUNDATIONS OF CRIME ANALYSIS |
|
|
1 | (54) |
|
Crime Analysis and the Profession |
|
|
3 | (20) |
|
Definition of Crime Analysis |
|
|
3 | (3) |
|
Definitions of GIS and Crime Mapping |
|
|
6 | (1) |
|
History of Crime Analysis |
|
|
7 | (4) |
|
Beginnings of Crime Analysis |
|
|
8 | (1) |
|
|
8 | (1) |
|
United States: 1970 to Present |
|
|
9 | (2) |
|
|
11 | (4) |
|
Beginnings of Crime Mapping |
|
|
12 | (1) |
|
|
12 | (1) |
|
United States: 1970 to Present |
|
|
13 | (2) |
|
Crime Analysis as a Career Track |
|
|
15 | (5) |
|
Crime Analyst Qualifications and Job Descriptions |
|
|
16 | (1) |
|
|
16 | (1) |
|
Crime Analysis Assistant/Technician |
|
|
17 | (1) |
|
Entry-Level Crime Analyst |
|
|
17 | (1) |
|
Experienced Crime Analyst |
|
|
17 | (1) |
|
|
18 | (1) |
|
Crime Analysis Supervisor |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
Theoretical Foundations of Crime Analysis |
|
|
23 | (16) |
|
Environmental Criminology |
|
|
24 | (6) |
|
Problem Analysis Triangle |
|
|
24 | (3) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Routine Activities Theory |
|
|
28 | (2) |
|
Situational Crime Prevention |
|
|
30 | (2) |
|
Repeat Victimization and the 80/20 Rule |
|
|
32 | (2) |
|
Displacement and Diffusion of Benefits |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
Effectiveness of Police in Reducing Crime and the Role of Crime Analysis |
|
|
39 | (16) |
|
Police Effectiveness on Preventing and Controlling Crime |
|
|
39 | (5) |
|
Standard Model of Policing |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
Problem-Oriented Policing |
|
|
42 | (1) |
|
Conclusions About Police Effectiveness |
|
|
43 | (1) |
|
The Role of Crime Analysis |
|
|
44 | (1) |
|
Problem Definitions and Literature |
|
|
45 | (5) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (3) |
|
PART II: CRIME ANALYSIS PROCESS, DATA, AND TECHNOLOGY |
|
|
55 | (78) |
|
Crime Analysis Process and Application |
|
|
57 | (12) |
|
The Crime Analysis Process |
|
|
57 | (5) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Data Modification Subcycle |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (5) |
|
|
62 | (1) |
|
Criminal Investigative Analysis |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Administrative Crime Analysis |
|
|
65 | (1) |
|
Crime Mapping by Type of Analysis |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
69 | (22) |
|
|
69 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Databases Used in Crime Analysis |
|
|
71 | (8) |
|
|
71 | (1) |
|
|
72 | (2) |
|
|
74 | (2) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
79 | (3) |
|
|
82 | (6) |
|
|
82 | (1) |
|
Local and Federal Crime Data Standards |
|
|
82 | (3) |
|
Using Calls-for-Service Data to Study Crime Problems |
|
|
85 | (1) |
|
Using Arrest Data to Study Crime Problems and Offenders |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (2) |
|
Crime Analysis Technology |
|
|
91 | (10) |
|
|
91 | (1) |
|
Data Collection and Storage |
|
|
92 | (2) |
|
Computer-Aided Dispatch System |
|
|
92 | (1) |
|
Records Management System |
|
|
93 | (1) |
|
|
93 | (1) |
|
Data Collation and Analysis |
|
|
94 | (2) |
|
Database Management Software |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Geographic Information System Software |
|
|
95 | (1) |
|
Global Positioning System |
|
|
96 | (1) |
|
|
96 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Specialized Crime Analysis Software |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Geographic Data and Descriptive Crime Mapping |
|
|
101 | (32) |
|
|
101 | (9) |
|
|
101 | (4) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (3) |
|
Descriptive Crime Mapping |
|
|
110 | (19) |
|
Types of Descriptive Crime Mapping |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
|
114 | (1) |
|
Interactive Crime Mapping |
|
|
115 | (2) |
|
Methods for Descriptive Crime Mapping |
|
|
117 | (1) |
|
|
117 | (1) |
|
By Statistical Classification |
|
|
117 | (9) |
|
|
126 | (1) |
|
Classification Guidelines and Summary |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
130 | (3) |
|
PART III: TACTICAL CRIME ANALYSIS |
|
|
133 | (88) |
|
Repeat Incidents and Tactical Data Collection |
|
|
135 | (18) |
|
|
135 | (3) |
|
|
136 | (1) |
|
Repeat Incident Location Report |
|
|
137 | (1) |
|
|
138 | (1) |
|
Collection and Collation of Tactical Crime Analysis Data |
|
|
138 | (12) |
|
|
140 | (2) |
|
|
142 | (1) |
|
Persons Involved in the Crime |
|
|
143 | (3) |
|
Vehicle Involved in the Crime |
|
|
146 | (2) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (2) |
|
Pattern Identification Process |
|
|
153 | (16) |
|
Pattern Identification Methodology |
|
|
153 | (10) |
|
|
153 | (2) |
|
|
155 | (1) |
|
Initial Pattern Identification |
|
|
156 | (1) |
|
|
157 | (3) |
|
|
160 | (2) |
|
|
162 | (1) |
|
Identifying the Principal Case |
|
|
162 | (1) |
|
Identifying Other Key Cases in the Pattern |
|
|
162 | (1) |
|
Identifying Additional Related Cases |
|
|
162 | (1) |
|
Identifying Investigative Leads |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (3) |
|
Identifying Meaningful and Useful Patterns |
|
|
169 | (24) |
|
Persons Crime and Property Crime |
|
|
169 | (3) |
|
Potential Responses to Patterns by Police |
|
|
172 | (3) |
|
|
173 | (1) |
|
|
174 | (1) |
|
Identifying Meaningful Patterns |
|
|
175 | (14) |
|
Persons Crime Pattern Key Characteristics and Examples |
|
|
176 | (1) |
|
|
176 | (2) |
|
Sexual Crime-Related Patterns |
|
|
178 | (1) |
|
Property Crime Pattern Key Characteristics and Examples |
|
|
179 | (1) |
|
Theft From Vehicle Patterns |
|
|
180 | (3) |
|
|
183 | (1) |
|
Residential Burglary Patterns |
|
|
184 | (1) |
|
Commercial Burglary Patterns |
|
|
185 | (3) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (2) |
|
|
191 | (2) |
|
Describing and Disseminating Known Patterns |
|
|
193 | (28) |
|
Describing Known Patterns |
|
|
193 | (18) |
|
|
193 | (1) |
|
Suspect and Vehicle Descriptions |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (2) |
|
|
197 | (1) |
|
Exact Time of Day and Day of Week |
|
|
198 | (3) |
|
Exact Date: Intervals Between Events |
|
|
201 | (2) |
|
Weighted Time Span Analysis |
|
|
203 | (3) |
|
Spatial Analysis of Patterns |
|
|
206 | (1) |
|
|
206 | (3) |
|
Describing and Understanding a Pattern |
|
|
209 | (2) |
|
Tactical Crime Analysis Products |
|
|
211 | (7) |
|
|
218 | (1) |
|
|
219 | (2) |
|
PART IV: STRATEGIC CRIME ANALYSIS |
|
|
221 | (78) |
|
Analyzing Problems: Process and Statistics |
|
|
223 | (18) |
|
Methodology: SARA Process |
|
|
223 | (7) |
|
Scanning and Identifying a Problem |
|
|
224 | (2) |
|
|
226 | (1) |
|
Research Related to the Problem |
|
|
227 | (1) |
|
Local Context of the Problem: Agency and Community |
|
|
227 | (1) |
|
Developing and Testing Hypotheses |
|
|
228 | (1) |
|
Response: Role of Analysis |
|
|
229 | (1) |
|
|
229 | (1) |
|
Basic Statistics Used in Crime Analysis |
|
|
230 | (7) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (2) |
|
|
233 | (2) |
|
|
235 | (1) |
|
Mean and Standard Deviation |
|
|
235 | (2) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (2) |
|
Analyzing Problems: Application of Techniques, Part I |
|
|
241 | (24) |
|
What Is the Nature of the Problem? |
|
|
242 | (2) |
|
How Frequently Is the Problem Occurring? |
|
|
244 | (8) |
|
|
244 | (3) |
|
|
247 | (3) |
|
Mean and Standard Deviation |
|
|
250 | (2) |
|
Has the Problem Increased or Decreased? |
|
|
252 | (6) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
When Is the Problem Happening? |
|
|
258 | (3) |
|
|
258 | (2) |
|
Time of Day and Day of Week |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (3) |
|
Analyzing Problems: Application of Techniques, Part II |
|
|
265 | (22) |
|
Where Is the Problem Occurring? |
|
|
265 | (8) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (2) |
|
|
269 | (1) |
|
|
270 | (3) |
|
Summary of Hot Spot Identification Methods |
|
|
273 | (3) |
|
|
273 | (3) |
|
Who Are the Victims and Does Repeat Victimization Exist? |
|
|
276 | (5) |
|
Victim Characteristics Patterns |
|
|
276 | (1) |
|
Repeat Victimization Analysis |
|
|
277 | (4) |
|
Who Are the Offenders and Does Repeat Offending Exist? |
|
|
281 | (1) |
|
Why Is the Problem Occurring? |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (3) |
|
Strategic Crime Analysis Results and Dissemination |
|
|
287 | (12) |
|
Choosing Analysis Information to Disseminate |
|
|
287 | (4) |
|
|
288 | (1) |
|
|
288 | (3) |
|
Strategic Crime Analysis Products |
|
|
291 | (6) |
|
|
291 | (1) |
|
Guidelines for Product Contents |
|
|
292 | (1) |
|
Guidelines for Table and Chart Contents |
|
|
293 | (2) |
|
Guidelines for Map Contents |
|
|
295 | (2) |
|
Templates and Practical Examples |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
PART V: ADMINISTRATIVE CRIME ANALYSIS AND CONCLUSIONS |
|
|
299 | (28) |
|
Administrative Crime Analysis |
|
|
301 | (18) |
|
Guidelines for Conducting Administrative Crime Analysis |
|
|
302 | (4) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Audience: Police Management |
|
|
304 | (1) |
|
|
304 | (1) |
|
Audience: Community Group |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
Administrative Crime Analysis and the Internet |
|
|
306 | (8) |
|
|
308 | (1) |
|
|
308 | (2) |
|
|
310 | (1) |
|
Privacy and Confidentiality |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
Finding Crime Analysis Examples on the Internet |
|
|
314 | (1) |
|
Risk Analysis for Homeland Security |
|
|
314 | (3) |
|
|
317 | (1) |
|
|
318 | (1) |
|
Conclusions, Challenges, and Future Issues |
|
|
319 | (8) |
|
Current State of Crime Analysis With Crime Mapping |
|
|
319 | (1) |
|
Current Challenges for Crime Analysis |
|
|
320 | (2) |
|
|
322 | (3) |
|
|
325 | (2) |
References |
|
327 | (8) |
Glossary |
|
335 | (12) |
Index |
|
347 | (10) |
About the Author |
|
357 | |