Preface |
|
xv | |
Acknowledgments |
|
xix | |
About the Author |
|
xxi | |
Part I: Foundations Of Crime Analysis |
|
1 | (84) |
|
Chapter 1 Crime Analysis and the Profession |
|
|
3 | (38) |
|
Definition of Crime Analysis |
|
|
3 | (2) |
|
Definitions of GIS and Crime Mapping |
|
|
5 | (1) |
|
History of Crime Analysis |
|
|
6 | (3) |
|
|
6 | (1) |
|
|
7 | (2) |
|
|
9 | (3) |
|
|
10 | (1) |
|
|
11 | (1) |
|
Research on Crime Analysis and Crime Mapping: 2000 to Present |
|
|
12 | (3) |
|
Key Challenges for Crime Analysis |
|
|
15 | (1) |
|
|
16 | (1) |
|
The Crime Analyst Profession |
|
|
17 | (5) |
|
Crime Analyst Qualifications and Job Descriptions |
|
|
18 | (3) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
Crime Analysis Supervisor |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
Positions Associated with Crime Analysis |
|
|
21 | (1) |
|
Crime Analysis Units and Staffing |
|
|
22 | (1) |
|
Crime Analysis Unit Strategic Planning |
|
|
23 | (2) |
|
Real-Time Crime and Fusion Centers |
|
|
25 | (3) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (4) |
|
|
38 | (3) |
|
Chapter 2 Theoretical Foundations of Crime Analysis |
|
|
41 | (20) |
|
Environmental Criminology |
|
|
41 | (9) |
|
Problem Analysis Triangle |
|
|
42 | (2) |
|
Rational Choice Perspective |
|
|
44 | (1) |
|
|
45 | (4) |
|
Routine Activity Approach |
|
|
49 | (1) |
|
Law of Crime Concentration |
|
|
50 | (1) |
|
Repeat Victimization, Near Repeats, and the 80/20 Rule |
|
|
51 | (2) |
|
Situational Crime Prevention |
|
|
53 | (2) |
|
Displacement and Diffusion of Benefits |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (2) |
|
|
59 | (2) |
|
Chapter 3 Evidence-Based Policing and Problem-Solving |
|
|
61 | (24) |
|
Link Between Crime Analysis and Crime Reduction |
|
|
61 | (1) |
|
Role of Crime Analysis in Proactive Policing |
|
|
62 | (12) |
|
Standard Model of Policing |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (3) |
|
|
70 | (3) |
|
|
73 | (1) |
|
Problem Stratification: A Framework for Crime Analysis |
|
|
74 | (4) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (2) |
|
The SARA Problem-Solving Process |
|
|
78 | (2) |
|
|
80 | (4) |
|
|
84 | (1) |
Part II: Crime Analysis Process, Data, And Products |
|
85 | (124) |
|
Chapter 4 Crime Analysis Process and Types |
|
|
87 | (22) |
|
The Crime Analysis Process |
|
|
87 | (6) |
|
Data Collection and Management |
|
|
88 | (2) |
|
Data Scanning and Querying |
|
|
90 | (1) |
|
|
90 | (1) |
|
Data Modification Subcycle |
|
|
91 | (1) |
|
Information Dissemination |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (12) |
|
Crime Intelligence Analysis |
|
|
93 | (7) |
|
|
100 | (3) |
|
|
103 | (1) |
|
Administrative Crime Analysis |
|
|
104 | (1) |
|
Crime Mapping by Type of Analysis |
|
|
105 | (1) |
|
|
106 | (2) |
|
|
108 | (1) |
|
Chapter 5 Crime Analysis Data and Technology |
|
|
109 | (38) |
|
|
109 | (2) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
Law Enforcements Systems and Technology |
|
|
111 | (5) |
|
Computer-Aided Dispatch System |
|
|
112 | (1) |
|
Records Management System |
|
|
112 | (1) |
|
|
112 | (1) |
|
Information-Sharing Platforms |
|
|
113 | (1) |
|
Jail Management System (JMS) |
|
|
113 | (1) |
|
Criminal Justice Information Services (CJIS) |
|
|
114 | (1) |
|
National Crime Information Center (NCIC) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
Other Software and Technology |
|
|
115 | (1) |
|
Crime Analysis Hardware and Software Considerations |
|
|
116 | (2) |
|
Data Used in Crime Analysis |
|
|
118 | (8) |
|
|
118 | (1) |
|
|
118 | (2) |
|
|
120 | (1) |
|
|
120 | (2) |
|
|
122 | (2) |
|
|
124 | (1) |
|
Government Agency Sources |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (11) |
|
|
126 | (1) |
|
Federal Crime Data Standards |
|
|
127 | (10) |
|
|
137 | (1) |
|
Data Integrity and Ethical Concerns |
|
|
138 | (3) |
|
|
141 | (3) |
|
|
144 | (3) |
|
Chapter 6 Geographic Data and Crime Mapping |
|
|
147 | (30) |
|
|
147 | (4) |
|
|
147 | (4) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (2) |
|
Descriptive Crime Mapping |
|
|
154 | (18) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (2) |
|
Interactive Crime Mapping |
|
|
158 | (1) |
|
Methods for Descriptive Crime Mapping |
|
|
159 | (9) |
|
|
159 | (1) |
|
By Statistical Classification |
|
|
160 | (6) |
|
|
166 | (2) |
|
Classification Guidelines and Summary |
|
|
168 | (1) |
|
Analytical Crime Mapping: Density Mapping |
|
|
168 | (4) |
|
|
172 | (2) |
|
|
174 | (3) |
|
Chapter 7 Crime Analysis Products and Communication |
|
|
177 | (32) |
|
Two Main Purposes of Crime Analysis Products |
|
|
177 | (3) |
|
Types of Crime Analysis Products |
|
|
180 | (9) |
|
Guidelines for Crime Analysis Products |
|
|
189 | (10) |
|
|
189 | (3) |
|
|
192 | (1) |
|
Guidelines for Tables and Charts |
|
|
193 | (3) |
|
|
196 | (2) |
|
Guidelines for Presentations |
|
|
198 | (1) |
|
Communication of Crime Analysis Results |
|
|
199 | (6) |
|
Audiences of Crime Analysis Products |
|
|
200 | (2) |
|
Disseminating Crime Analysis Products |
|
|
202 | (3) |
|
|
205 | (2) |
|
|
207 | (2) |
Part III: Tactical Crime Analysis |
|
209 | (118) |
|
Chapter 8 Calls-for-Service Data and Repeat Incident Analysis |
|
|
211 | (28) |
|
Calls-for-Service Data and Variables |
|
|
211 | (6) |
|
Using Calls-for-Service Data for Analysis |
|
|
217 | (3) |
|
|
220 | (17) |
|
Repeat Incident Analysis Components |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
224 | (6) |
|
Matthews, NC Police Department |
|
|
224 | (1) |
|
|
225 | (2) |
|
Washoe County, NV Sheriff's Office |
|
|
227 | (1) |
|
Port St. Lucie, FL Police Department |
|
|
228 | (2) |
|
Evaluation of Police Response to Repeat Incidents |
|
|
230 | (7) |
|
|
237 | (1) |
|
|
238 | (1) |
|
Chapter 9 Crime Data and Pattern Analysis |
|
|
239 | (32) |
|
Crime Pattern Data and Variables |
|
|
239 | (7) |
|
|
239 | (6) |
|
|
245 | (1) |
|
|
246 | (18) |
|
|
248 | (2) |
|
Initial Crime Pattern Identification |
|
|
250 | (5) |
|
Spatial Analysis of Patterns |
|
|
255 | (2) |
|
|
257 | (3) |
|
Identifying Investigative Leads and Using Field Intelligence |
|
|
260 | (3) |
|
|
263 | (1) |
|
|
264 | (3) |
|
|
267 | (4) |
|
Chapter 10 Persons and Property Crime Patterns |
|
|
271 | (34) |
|
Identifying Meaningful Crime Patterns |
|
|
271 | (1) |
|
Nature of Persons Crime Patterns |
|
|
272 | (10) |
|
|
274 | (3) |
|
Series, Pharmacy Robberies |
|
|
275 | (1) |
|
Series, Cell Phone Robberies |
|
|
276 | (1) |
|
Series, Home Invasion Robberies |
|
|
276 | (1) |
|
|
277 | (1) |
|
Nondomestic Aggravated Assault Crime Patterns |
|
|
277 | (2) |
|
Micro-Time Hot Spot, Aggravated Assaults and Shootings |
|
|
278 | (1) |
|
Sexual Crime-Related Patterns |
|
|
279 | (3) |
|
Series, Indecent Exposures |
|
|
280 | (1) |
|
Series, Lewd and Lascivious/Sexual Batteries |
|
|
281 | (1) |
|
Nature of Property Crime Patterns |
|
|
282 | (20) |
|
Residential Burglary Patterns |
|
|
283 | (4) |
|
Micro-Time Hot Spot, Residential Burglaries |
|
|
283 | (1) |
|
Micro-Time Hot Spot, Residential Burglaries |
|
|
284 | (1) |
|
Hot Setting, Burglaries of Sheds at Apartment Complexes |
|
|
284 | (2) |
|
Series, Residential Burglaries and Thefts from Vehicles |
|
|
286 | (1) |
|
Commercial Burglary Patterns |
|
|
287 | (2) |
|
Series, Commercial Burglaries |
|
|
287 | (1) |
|
Series, Commercial Burglaries at Restaurants |
|
|
288 | (1) |
|
Hot Setting, Commercial Burglaries at Churches |
|
|
289 | (1) |
|
Theft from Vehicle Patterns |
|
|
289 | (6) |
|
Micro-Time Hot Spot, Residential Thefts from Vehicles |
|
|
290 | (1) |
|
Micro-Time Hot Spot, Residential Thefts from Vehicles |
|
|
291 | (1) |
|
Series, Thefts from Vehicles at Retail Parking Lots |
|
|
291 | (1) |
|
Hot Setting, Thefts from Vehicles |
|
|
292 | (1) |
|
Micro-Time Hot Spot, Thefts of/from Vehicles |
|
|
293 | (1) |
|
Hot Place, Thefts from Vehicles at the YMCA |
|
|
293 | (1) |
|
Hot Setting, Thefts from Vehicles in Parks |
|
|
294 | (1) |
|
Motor Vehicle Theft Patterns |
|
|
295 | (1) |
|
Series, Auto Thefts of "Racing" Vehicles |
|
|
295 | (1) |
|
Hot Product, Motor Vehicle Thefts of ATVs |
|
|
296 | (1) |
|
Micro-Time Hot Spot, Motor Vehicle Thefts and Trailers |
|
|
296 | (1) |
|
|
296 | (18) |
|
Hot Product, Packages Left on Residential Doorsteps |
|
|
297 | (1) |
|
|
298 | (1) |
|
Series, Construction Site Burglaries and Thefts of Appliances |
|
|
298 | (1) |
|
Hot Product, Catalytic Converters from Buses |
|
|
299 | (1) |
|
Series, Graffiti of Stop Signs |
|
|
300 | (2) |
|
|
302 | (1) |
|
|
303 | (2) |
|
Chapter 11 Crime Pattern Bulletins, Response, and Evaluation |
|
|
305 | (22) |
|
Pattern Bulletin Components |
|
|
305 | (6) |
|
Evidence-Based Police Response |
|
|
311 | (2) |
|
Crime Pattern Response Evaluation Process |
|
|
313 | (1) |
|
Bulletin Examples and Police Response |
|
|
314 | (10) |
|
|
315 | (2) |
|
Armed Robberies: Dayton, OH Police Department Bulletin |
|
|
316 | (1) |
|
Robberies: Fort Myers, FL Police Department Bulletin |
|
|
317 | (1) |
|
|
317 | (12) |
|
Thefts from Vehicles: Putnam County, FL Sheriff's Office Bulletin |
|
|
319 | (1) |
|
Thefts from Vehicles: Washoe County, NV Sheriff's Office Bulletin |
|
|
319 | (3) |
|
Catalytic Converter Thefts: Port St. Lucie, FL Police Department Bulletin |
|
|
322 | (2) |
|
|
324 | (1) |
|
|
324 | (3) |
Part IV: Strategic Crime Analysis |
|
327 | (124) |
|
Chapter 12 Statistics and Trends |
|
|
329 | (42) |
|
Basic Statistics Used in Crime Analysis |
|
|
329 | (22) |
|
Frequency and Distribution |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
Cross-Tabulation Percentage |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (2) |
|
|
335 | (3) |
|
Mean and Standard Deviation |
|
|
338 | (2) |
|
|
340 | (11) |
|
Exact Time and Day of the Week |
|
|
340 | (7) |
|
Weighted Time Span Analysis |
|
|
347 | (4) |
|
Statistical Reporting and Trend Analysis |
|
|
351 | (15) |
|
|
353 | (1) |
|
Understanding Distributions |
|
|
353 | (2) |
|
|
355 | (1) |
|
|
355 | (17) |
|
|
356 | (7) |
|
|
363 | (3) |
|
|
366 | (2) |
|
|
368 | (3) |
|
Chapter 13 Long-Term Problem Analysis, Part I |
|
|
371 | (26) |
|
What Is the Nature of the Problem? |
|
|
372 | (6) |
|
The Problem Environment and Behavior |
|
|
373 | (3) |
|
Three Stages of Problem Events |
|
|
376 | (1) |
|
|
377 | (1) |
|
How Prevalent Is the Problem? |
|
|
378 | (6) |
|
Frequency, Distribution, and Percentage |
|
|
379 | (2) |
|
|
381 | (3) |
|
Mean and Standard Deviation |
|
|
384 | (1) |
|
When Is the Problem Happening? |
|
|
385 | (8) |
|
|
393 | (1) |
|
|
394 | (3) |
|
Chapter 14 Long-Term Problem Analysis, Part II |
|
|
397 | (30) |
|
Where Is the Problem Occurring? |
|
|
397 | (18) |
|
Identifying and Analyzing Problem Locations |
|
|
398 | (8) |
|
Identifying and Analyzing Problem Areas |
|
|
406 | (9) |
|
|
415 | (5) |
|
Problem Offender Identification |
|
|
415 | (4) |
|
Problem Offender Analysis |
|
|
419 | (1) |
|
Who Are the Victims and Targets? |
|
|
420 | (2) |
|
Why Is the Problem Occurring? |
|
|
422 | (3) |
|
|
425 | (1) |
|
|
425 | (2) |
|
Chapter 15 Evaluation of Long-Term Problems and Crime Reduction Goals |
|
|
427 | (24) |
|
Problem Response Development |
|
|
427 | (4) |
|
Assessment of Problem Responses |
|
|
431 | (7) |
|
|
432 | (3) |
|
Individual Problem Location/Area Assessment |
|
|
435 | (3) |
|
Multiple Problem Comparison |
|
|
438 | (1) |
|
Evaluation of Crime Reduction Goals |
|
|
438 | (9) |
|
Monthly Goal Evaluation and Monitoring |
|
|
441 | (3) |
|
Comparisons for Goal Evaluation |
|
|
444 | (3) |
|
|
447 | (1) |
|
|
448 | (3) |
Glossary |
|
451 | (12) |
References |
|
463 | (8) |
Index |
|
471 | |