|
|
xiii | |
Preface |
|
xv | |
|
Part I Developing crime mapping |
|
|
|
Developing geographical information systems and crime mapping tools in New Zealand |
|
|
3 | (6) |
|
|
|
|
3 | (1) |
|
Developing a web-based GIS solution for New Zealand Police |
|
|
4 | (1) |
|
Building on the map-based analytical policing system (MAPS) |
|
|
5 | (4) |
|
An analytical technique for addressing geographical referencing difficulties and monitoring crimes in Rio de Janeiro, Brazil |
|
|
9 | (10) |
|
Ana Paula Mendes de Miranda |
|
|
|
Introduction - developments in crime analysis in Rio de Janeiro |
|
|
9 | (2) |
|
Analysis by space-time monitoring cells |
|
|
11 | (3) |
|
Identifying crime patterns using paper maps |
|
|
14 | (1) |
|
Identifying crime patterns in Rio de Janeiro using GIS and digital cartographic base maps |
|
|
15 | (3) |
|
Crime analyses on bus routes in Rio de Janeiro |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
Methods for implementing crime mapping within a large law enforcement agency: experiences from Victoria, Australia |
|
|
19 | (8) |
|
|
|
19 | (1) |
|
A phased plan for development and delivery |
|
|
20 | (4) |
|
|
24 | (1) |
|
Crime mapping projects - some examples |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Automating briefings for police officers |
|
|
27 | (8) |
|
|
|
27 | (1) |
|
Automating crime mapping outputs in Lincoln Police Department |
|
|
28 | (3) |
|
Developing the automation of tasks in Lincoln |
|
|
31 | (1) |
|
Automating crime mapping in your agency |
|
|
32 | (3) |
|
Part II Geographical investigative analysis |
|
|
|
Geographic profiling analysis: principles, methods and applications |
|
|
35 | (10) |
|
|
|
|
35 | (1) |
|
The theoretical principles behind geographic profiling |
|
|
35 | (1) |
|
Geographic profiling methodology |
|
|
36 | (2) |
|
Applying geographic profiling to `volume' crime: the Irvine Chair burglaries |
|
|
38 | (4) |
|
Measuring the effects of geographic profiling in Irvine |
|
|
42 | (1) |
|
|
42 | (3) |
|
Geographic profiling in an operational setting: the challenges and practical considerations, with reference to a series of sexual assaults in Bath, England |
|
|
45 | (10) |
|
|
|
45 | (1) |
|
Applying geographic profiling to a series of indecent assaults in Bath, England |
|
|
46 | (4) |
|
|
50 | (1) |
|
Operational versus academic geographic profiling |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (2) |
|
The Hammer Gang: an exercise in the spatial analysis of an armed robbery series using the probability grid method |
|
|
55 | (8) |
|
|
|
|
55 | (1) |
|
|
56 | (1) |
|
Mapping the data and getting the picture |
|
|
57 | (1) |
|
Predicting the next offence location |
|
|
58 | (2) |
|
|
60 | (1) |
|
Issues in application of the probability grid method |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
`Rolling the Dice': the arrest of Roosevelt Erving in Lincoln, Nebraska |
|
|
63 | (8) |
|
|
|
63 | (1) |
|
Erving's series of bank robberies |
|
|
64 | (1) |
|
Analysing Erving's series |
|
|
65 | (1) |
|
Project `Rolling the Dice' |
|
|
66 | (2) |
|
The crucial role of geographical analysis |
|
|
68 | (3) |
|
Part III Neighbourhood analysis |
|
|
|
The strategic allocation of resources to effectively implement Neighbourhood Policing and the Community Safety Plan |
|
|
71 | (4) |
|
|
|
71 | (1) |
|
Alternative resource allocation model |
|
|
72 | (1) |
|
What were the results, outcome and issues? |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Priority neighbourhoods and the Vulnerable Localities Index in Wigan - a strategic partnership approach to crime reduction |
|
|
75 | (8) |
|
|
|
75 | (1) |
|
An alternative Vulnerable Localities Index |
|
|
76 | (2) |
|
Vulnerable localities in Wigan |
|
|
78 | (2) |
|
Using the Vulnerable Localities Index to help understand offending patterns |
|
|
80 | (2) |
|
Developing the Vulnerable Localities Index to support urban regeneration and Neighbourhood Policing |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
Reducing re-offending in local communities: geographical information system based strategic analysis of Greater Manchester's offenders |
|
|
83 | (10) |
|
|
|
83 | (1) |
|
Implementation, testing and analysis |
|
|
84 | (5) |
|
Results, outcomes and issues |
|
|
89 | (1) |
|
|
90 | (3) |
|
Part IV Integrating visual audits and survey data into crime mapping |
|
|
|
Community Safety Mapping Online System: mapping reassurance using survey data |
|
|
93 | (10) |
|
|
|
93 | (1) |
|
Community Safety Mapping Online System (COSMOS) |
|
|
94 | (1) |
|
|
94 | (2) |
|
Environmental visual audit (EVA) |
|
|
96 | (1) |
|
|
97 | (3) |
|
Evaluation and next steps |
|
|
100 | (2) |
|
|
102 | (1) |
|
Mapping the fear of crime - a micro-approach in Merton, London |
|
|
103 | (8) |
|
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (4) |
|
Methodological applications and considerations |
|
|
109 | (1) |
|
|
109 | (2) |
|
NightVision - visual auditing of night-time economy related incidents in Bath and North-East Somerset |
|
|
111 | (12) |
|
|
|
111 | (1) |
|
Project design and implementation |
|
|
111 | (1) |
|
Methodological considerations |
|
|
112 | (4) |
|
Findings from the NightVision surveys |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (4) |
|
|
|
The near-repeat burglary phenomenon |
|
|
123 | (10) |
|
|
|
123 | (1) |
|
Near repeats in Bournemouth |
|
|
123 | (1) |
|
A methodology for analysis and action |
|
|
124 | (2) |
|
Delivering a near-repeat intervention |
|
|
126 | (1) |
|
|
127 | (2) |
|
|
129 | (3) |
|
|
132 | (1) |
|
Simulating crime to inform theory and practice |
|
|
133 | (10) |
|
|
|
133 | (1) |
|
|
134 | (2) |
|
Creating a theoretically based simulation model to test routine activity theory |
|
|
136 | (3) |
|
Findings and significance of the research - comparing a simulated environment to the principles of routine activity theory |
|
|
139 | (1) |
|
Comparing a simulated crime environment to reality |
|
|
140 | (1) |
|
Implications for practice |
|
|
140 | (1) |
|
|
141 | (2) |
|
A crime mapping technique for assessing vulnerable targets for terrorism in local communities |
|
|
143 | (10) |
|
|
|
143 | (1) |
|
Assessing target vulnerabilities: two components |
|
|
143 | (3) |
|
Assessing target vulnerabilities: a hypothetical case study |
|
|
146 | (4) |
|
|
150 | (1) |
|
|
151 | (2) |
|
Interactive Offender Profiling System (IOPS) |
|
|
153 | (8) |
|
|
|
|
153 | (1) |
|
An integrated operational system |
|
|
154 | (5) |
|
The potential of the interactive offender profiling system |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
Index |
|
161 | |