Preface |
|
xv | |
About the Author |
|
xx | |
Part I: Foundations Of Crime Analysis |
|
1 | (88) |
|
Chapter 1 Crime Analysis and the Profession |
|
|
3 | (36) |
|
Definition of Crime Analysis |
|
|
3 | (4) |
|
Foundation of the Definition |
|
|
3 | (1) |
|
Crime Analysis Definition |
|
|
4 | (3) |
|
Definitions of GIS and Crime Mapping |
|
|
7 | (1) |
|
History of Crime Analysis |
|
|
8 | (5) |
|
Beginnings of Crime Analysis |
|
|
9 | (1) |
|
United States: 1900 to 1970 |
|
|
10 | (1) |
|
United States: 1970 to 2000 |
|
|
10 | (3) |
|
|
13 | (3) |
|
Beginnings of Crime Mapping |
|
|
13 | (1) |
|
United States: 1900 to 1970 |
|
|
13 | (1) |
|
United States: 1970 to 2000 |
|
|
14 | (2) |
|
Research on Crime Analysis and Crime Mapping: 2000 to Present |
|
|
16 | (4) |
|
Crime Analysis as a Career Track |
|
|
20 | (5) |
|
Crime Analyst Qualifications and Job Descriptions |
|
|
21 | (4) |
|
|
21 | (1) |
|
Crime Analysis Assistant/Technician |
|
|
22 | (1) |
|
Entry-Level Crime Analyst |
|
|
22 | (1) |
|
Experienced Crime Analyst |
|
|
22 | (1) |
|
|
23 | (1) |
|
Crime Analysis Supervisor |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
Developing and Improving a Crime Analysis Unit |
|
|
25 | (3) |
|
|
28 | (4) |
|
Challenges and the Future of Crime Analysis |
|
|
32 | (2) |
|
|
34 | (3) |
|
|
37 | (2) |
|
Chapter 2 Theoretical Foundations of Crime Analysis |
|
|
39 | (22) |
|
Environmental Criminology |
|
|
39 | (7) |
|
Problem Analysis Triangle |
|
|
40 | (3) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Routine Activities Theory |
|
|
45 | (1) |
|
Law of Crime Concentration |
|
|
46 | (1) |
|
Repeat Victimization, Near Repeats, and the 80/20 Rule |
|
|
47 | (3) |
|
Situational Crime Prevention |
|
|
50 | (4) |
|
Displacement and Diffusion of Benefits |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (2) |
|
|
58 | (3) |
|
Chapter 3 Evidence-Based Policing and the Role of Crime Analysis |
|
|
61 | (28) |
|
Research on Crime Analysis and Crime Reduction |
|
|
61 | (24) |
|
Standard Model of Policing |
|
|
64 | (2) |
|
|
66 | (1) |
|
Problem-Oriented Policing |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
Intelligence-Led Policing |
|
|
73 | (1) |
|
|
73 | (1) |
|
Conclusions About Police Effectiveness and Crime Analysis |
|
|
74 | (2) |
|
Stratified Policing: Framework for Crime Analysis |
|
|
76 | (15) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (3) |
|
Stratification of Police Responsibility |
|
|
83 | (1) |
|
Stratification of Accountability and Evaluation |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
85 | (3) |
|
|
88 | (1) |
Part II: Crime Analysis Process, Data, And Purpose |
|
89 | (120) |
|
Chapter 4 Crime Analysis Process and Application |
|
|
91 | (20) |
|
The Crime Analysis Process |
|
|
91 | (6) |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
|
Data Modification Subcycle |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (12) |
|
Crime Intelligence Analysis |
|
|
97 | (3) |
|
|
100 | (1) |
|
|
101 | (2) |
|
Administrative Crime Analysis |
|
|
103 | (3) |
|
Not Types of Crime Analysis |
|
|
106 | (1) |
|
Crime Mapping by Type of Analysis |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Chapter 5 Crime Analysis Data and Technology |
|
|
111 | (38) |
|
|
111 | (7) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
Computer-Aided Dispatch System |
|
|
113 | (1) |
|
Records Management System |
|
|
113 | (2) |
|
|
115 | (1) |
|
Information-Sharing Platforms |
|
|
115 | (1) |
|
Jail Management System (JMS) |
|
|
116 | (1) |
|
Criminal Justice Information Services (CJIS) |
|
|
116 | (1) |
|
National Crime Information Center (NCIC) |
|
|
116 | (1) |
|
|
117 | (1) |
|
Databases Used in Crime Analysis |
|
|
118 | (10) |
|
|
118 | (1) |
|
|
119 | (2) |
|
|
121 | (2) |
|
|
123 | (3) |
|
|
126 | (2) |
|
|
128 | (3) |
|
|
131 | (13) |
|
|
131 | (1) |
|
Local and Federal Crime Data Standards |
|
|
132 | (9) |
|
Using Call for Service Data to Study Crime Problems |
|
|
141 | (1) |
|
Using Arrest Data to Study Crime Problems and Offenders |
|
|
141 | (1) |
|
|
142 | (2) |
|
Hardware and Software Considerations |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (2) |
|
Chapter 6 Geographic Data and Crime Mapping |
|
|
149 | (34) |
|
|
149 | (9) |
|
|
149 | (4) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (3) |
|
|
158 | (21) |
|
Types of Descriptive Crime Mapping |
|
|
159 | (4) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (2) |
|
|
162 | (1) |
|
Interactive Crime Mapping |
|
|
163 | (1) |
|
Methods for Descriptive Crime Mapping |
|
|
163 | (13) |
|
|
163 | (2) |
|
By Statistical Classification |
|
|
165 | (7) |
|
|
172 | (1) |
|
Classification Guidelines and Summary |
|
|
173 | (3) |
|
Analytical Mapping: Density Mapping |
|
|
176 | (3) |
|
|
179 | (2) |
|
|
181 | (2) |
|
Chapter 7 Crime Analysis Purpose and Audience |
|
|
183 | (26) |
|
|
183 | (4) |
|
|
183 | (1) |
|
|
184 | (1) |
|
Contrasting the Purposes of Crime Analysis Results |
|
|
184 | (3) |
|
|
187 | (1) |
|
|
188 | (1) |
|
Situational Awareness Examples |
|
|
189 | (6) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (2) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (3) |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (11) |
|
|
196 | (2) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (5) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
203 | (8) |
|
|
203 | (1) |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (2) |
Part III: Tactical Crime Analysis |
|
209 | (96) |
|
Chapter 8 Repeat Incidents and Tactical Data Collection |
|
|
211 | (18) |
|
|
211 | (4) |
|
|
212 | (1) |
|
Repeat Incident Location Report |
|
|
213 | (1) |
|
|
214 | (1) |
|
Collection and Collation of Tactical Crime Analysis Data |
|
|
215 | (11) |
|
|
216 | (7) |
|
|
218 | (2) |
|
Persons Involved in the Crime |
|
|
220 | (3) |
|
Vehicle Involved in the Crime |
|
|
223 | (1) |
|
|
223 | (3) |
|
|
226 | (1) |
|
|
227 | (2) |
|
Chapter 9 Pattern Identification Process |
|
|
229 | (16) |
|
Pattern Identification Methodology |
|
|
229 | (9) |
|
|
229 | (2) |
|
|
231 | (2) |
|
Initial Pattern Identification |
|
|
233 | (4) |
|
|
237 | (11) |
|
Identifying the Principal Case |
|
|
237 | (1) |
|
Identifying Other Key Cases in the Pattern |
|
|
237 | (1) |
|
Identifying Additional Related Cases |
|
|
237 | (1) |
|
Identifying Investigative Leads |
|
|
238 | (2) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (2) |
|
|
243 | (2) |
|
Chapter 10 Identifying Meaningful and Useful Patterns |
|
|
245 | (34) |
|
Persons Crime and Property Crime |
|
|
245 | (3) |
|
Potential Responses to Patterns by Police |
|
|
248 | (5) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Identifying Meaningful Patterns |
|
|
253 | (22) |
|
Persons Crime Pattern Key Characteristics and Examples |
|
|
254 | (8) |
|
|
255 | (5) |
|
Sexual Crime-Related Patterns |
|
|
260 | (2) |
|
Property Crime Pattern Key Characteristics and Examples |
|
|
262 | (17) |
|
Theft from Vehicle Patterns |
|
|
262 | (4) |
|
|
266 | (1) |
|
Residential Burglary Patterns |
|
|
267 | (3) |
|
Commercial Burglary Patterns |
|
|
270 | (3) |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
276 | (2) |
|
|
278 | (1) |
|
Chapter 11 Describing and Disseminating Known Patterns |
|
|
279 | (26) |
|
Describing Known Patterns |
|
|
279 | (16) |
|
|
279 | (2) |
|
Suspect and Vehicle Descriptions |
|
|
281 | (1) |
|
|
281 | (13) |
|
|
281 | (3) |
|
|
284 | (1) |
|
Exact Time of Day and Day of Week |
|
|
284 | (3) |
|
Exact Date: Intervals Between Events |
|
|
287 | (1) |
|
Weighted Time Span Analysis |
|
|
288 | (6) |
|
Spatial Analysis of Patterns |
|
|
294 | (1) |
|
|
295 | (6) |
|
|
301 | (1) |
|
|
302 | (3) |
Part IV: Strategic Crime Analysis |
|
305 | (94) |
|
Chapter 12 Analyzing Problems, Process and Statistics |
|
|
307 | (20) |
|
Methodology: SARA Process |
|
|
307 | (8) |
|
Scanning and Identifying a Problem |
|
|
308 | (4) |
|
|
312 | (2) |
|
Research Related to the Problem |
|
|
312 | (1) |
|
Local Context of the Problem: Agency and Community |
|
|
312 | (1) |
|
Developing and Testing Hypotheses |
|
|
313 | (1) |
|
Response: Role of Analysis |
|
|
314 | (1) |
|
|
314 | (1) |
|
Basic Statistics Used in Crime Analysis |
|
|
315 | (8) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (2) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
Mean and Standard Deviation |
|
|
321 | (2) |
|
|
323 | (1) |
|
|
323 | (2) |
|
|
325 | (2) |
|
Chapter 13 Analyzing Problems, Application of Techniques, Part I |
|
|
327 | (30) |
|
What Is the Nature of the Problem? |
|
|
328 | (2) |
|
How Frequently Is the Problem Occurring? |
|
|
330 | (10) |
|
|
331 | (3) |
|
|
334 | (4) |
|
Mean and Standard Deviation |
|
|
338 | (2) |
|
Has the Problem Increased or Decreased? |
|
|
340 | (7) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (2) |
|
|
346 | (1) |
|
When Is the Problem Happening? |
|
|
347 | (5) |
|
|
348 | (1) |
|
Time of Day and Day of Week |
|
|
348 | (4) |
|
|
352 | (1) |
|
|
353 | (4) |
|
Chapter 14 Analyzing Problems, Application of Techniques, Part II |
|
|
357 | (24) |
|
Where Is the Problem Occurring? |
|
|
357 | (12) |
|
Identifying and Analyzing Problem Locations |
|
|
358 | (6) |
|
Identifying Problem Areas |
|
|
364 | (4) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
Summary of Problem Area Identification Methods |
|
|
368 | (1) |
|
Who Are the Victims and Does Repeat Victimization Exist? |
|
|
369 | (2) |
|
Who Are the Offenders and Does Repeat Offending Exist? |
|
|
371 | (3) |
|
Why Is the Problem Occurring? |
|
|
374 | (3) |
|
|
377 | (1) |
|
|
378 | (3) |
|
Chapter 15 Strategic Crime Analysis Results and Dissemination |
|
|
381 | (18) |
|
Choosing Analysis Information to Disseminate |
|
|
381 | (4) |
|
|
381 | (1) |
|
|
382 | (3) |
|
Strategic Crime Analysis Products |
|
|
385 | (9) |
|
|
385 | (1) |
|
Using Email for Dissemination |
|
|
386 | (2) |
|
Guidelines for Product Contents |
|
|
388 | (2) |
|
Guidelines for Table and Chart Contents |
|
|
390 | (1) |
|
Guidelines for Map Contents |
|
|
391 | (3) |
|
|
394 | (1) |
|
|
394 | (2) |
|
|
396 | (3) |
Part V: Administrative Crime Analysis |
|
399 | (30) |
|
Chapter 16 Administrative Crime Analysis: Crime Analysis for Accountability |
|
|
401 | (28) |
|
Crime Reduction Accountability |
|
|
402 | (3) |
|
Crime Reduction Goal Development |
|
|
405 | (3) |
|
Crime Analysis for Weekly Action-Oriented Accountability Meetings |
|
|
408 | (3) |
|
Crime Analysis for Monthly Evaluation-Oriented Accountability Meetings |
|
|
411 | (6) |
|
Crime and Disorder Monthly Trend Charts |
|
|
411 | (2) |
|
|
413 | (3) |
|
|
416 | (1) |
|
Crime Analysis for Assessment of Agency Goals |
|
|
417 | (8) |
|
Performance Indicator (Output) Products |
|
|
417 | (2) |
|
Success Indicator (Outcome) Products |
|
|
419 | (6) |
|
Crime and Disorder Long-Term Trend Charts |
|
|
419 | (1) |
|
Crime Trend Comparison Charts |
|
|
420 | (3) |
|
|
423 | (2) |
|
|
425 | (2) |
|
|
427 | (2) |
Glossary |
|
429 | (12) |
References |
|
441 | (10) |
Index |
|
451 | |