Details

Crime Mapping Case Studies


Crime Mapping Case Studies

Practice and Research
1. Aufl.

von: Spencer Chainey, Lisa Tompson

85,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 28.02.2008
ISBN/EAN: 9780470987186
Sprache: englisch
Anzahl Seiten: 184

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Crime Mapping Case Studies: From Research to Practice</b> provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis, intelligence development, monitoring performance, and crime detection and is written by practitioners for practitioners. <p>Leading researchers in the field describe how crime mapping is developing and exposing analytical methodologies and critiquing current practices. Including global case studies that demonstrate a particular application, analytical technique or new theoretical concept, this text offers a truly global overview of this rapidly growing area of interest.<br /> <br /> </p> <p>Unlike other texts on this topic, this book identifies mistakes and challenges in this field of enquiry to aid the reader in understanding the basics of this technique, giving them the opportunity to learn further.</p>
<b>List of contributors.</b> <p><b>Preface.</b></p> <p><b>Part I Developing crime mapping.</b></p> <p><b>1 Developing geographical information systems and crime mapping tools in New Zealand</b> (Andy Gilmour and Jill Barclay).</p> <p>1.1 The starting point.</p> <p>1.2 Developing a web-based GIS solution for New Zealand Police.</p> <p>1.3 Building on the map-based analytical policing system (MAPS).</p> <p><b>2 An analytical technique for addressing geographical referencing difficulties and monitoring crimes in Rio de Janeiro, Brazil  (</b>Ana Paula Mendes de Miranda and Marcus Ferreira).</p> <p>2.1 Introduction – developments in crime analysis in Rio de Janeiro.</p> <p>2.2 Analysis by space–time monitoring cells.</p> <p>2.3 Identifying crime patterns using paper maps.</p> <p>2.4 Identifying crime patterns in Rio de Janeiro using GIS and digital cartographic base maps.</p> <p>2.5 Crime analyses on bus routes in Rio de Janeiro.</p> <p>2.6 Conclusions.</p> <p>2.7 References.</p> <p><b>3 Methods for implementing crime mapping within a large law enforcement agency: experiences from Victoria, Australia (</b>Timothy Mashford).</p> <p>3.1 Introduction.</p> <p>3.2 A phased plan for development and delivery.</p> <p>3.3 Progress to date.</p> <p>3.4 Crime mapping projects – some examples.</p> <p>3.5 Conclusions.</p> <p>3.6 Reference.</p> <p><b>4 Automating briefings for police officers (</b>Tom Casady).</p> <p>4.1 Introduction.</p> <p>4.2 Automating crime mapping outputs in Lincoln Police Department.</p> <p>4.3 Developing the automation of tasks in Lincoln.</p> <p>4.4 Automating crime mapping in your agency.</p> <p><b>Part II Geographical investigative analysis.</b></p> <p><b>5 Geographic profiling analysis: principles, methods and applications (</b>D. Kim Rossmo and Lorie Velarde).</p> <p>5.1 Introduction.</p> <p>5.2 The theoretical principles behind geographic profiling.</p> <p>5.3 Geographic profiling methodology.</p> <p>5.4 Applying geographic profiling to ‘volume’ crime: the Irvine Chair burglaries.</p> <p>5.5 Measuring the effects of geographic profiling in Irvine.</p> <p>5.6 References.</p> <p><b>6 Geographic profiling in an operational setting: the challenges and practical considerations, with reference to a series of sexual assaults in Bath, England (</b>Clare Daniell).</p> <p>6.1 Introduction.</p> <p>6.2 Applying geographic profiling to a series of indecent assaults in Bath, England.</p> <p>6.3 Offender geography.</p> <p>6.4 Operational versus academic geographic profiling.</p> <p>6.5 Conclusions.</p> <p>6.6 References.</p> <p><b>7 The Hammer Gang: an exercise in the spatial analysis of an armed robbery series using the probability grid method (</b>Chris Overall and Gregory Day).</p> <p>7.1 Introduction.</p> <p>7.2 Background.</p> <p>7.3 Mapping the data and getting the picture.</p> <p>7.4 Predicting the next offence location.</p> <p>7.5 Results.</p> <p>7.6 Issues in application of the probability grid method.</p> <p>7.7 Conclusions.<br /> <br /> 7.8 Acknowledgements.</p> <p>7.9 References.</p> <p><b>8 ‘Rolling the Dice’: the arrest of Roosevelt Erving in Lincoln, Nebraska (</b>Tom Casady).</p> <p>8.1 Introduction.</p> <p>8.2 Erving’s series of bank robberies.</p> <p>8.3 Analysing Erving’s series.</p> <p>8.4 Project ‘Rolling the Dice’.</p> <p>8.5 The crucial role of geographical analysis.</p> <p><b>Part III Neighbourhood analysis.</b></p> <p><b>9 The strategic allocation of resources to effectively implement Neighbourhood Policing and the Community Safety Plan (</b>Alice O’Neill).</p> <p>9.1 Introduction.</p> <p>9.2 Alternative resource allocation model.</p> <p>9.3 What were the results, outcome and issues?</p> <p>9.4 The future.</p> <p>9.5 Reference.</p> <p><b>10 Priority neighbourhoods and the Vulnerable Localities Index in Wigan – a strategic partnership approach to crime reduction (</b>Ian Bullen).</p> <p>10.1 Introduction.</p> <p>10.2 An alternative Vulnerable Localities Index.</p> <p>10.3 Vulnerable localities in Wigan.</p> <p>10.4 Using the Vulnerable Localities Index to help understand offending patterns.</p> <p>10.5 Developing the Vulnerable Localities Index to support urban regeneration and Neighbourhood Policing.</p> <p>10.6 Acknowledgement.</p> <p>10.7 References.</p> <p><b>11 Reducing re-offending in local communities: geographical information system based strategic analysis of Greater Manchester’s offenders (</b>David Ottiwell).</p> <p>11.1 Context and introduction.</p> <p>11.2 Implementation, testing and analysis.</p> <p>11.3 Results, outcomes and issues.<br /> <br /> 11.4 References.</p> <p><b>Part IV Integrating visual audits and survey data into crime mapping.</b></p> <p><b>12 Community Safety Mapping Online System: mapping reassurance using survey data (</b>Steven Rose).</p> <p>12.1 Introduction.</p> <p>12.2 Community Safety Mapping Online System (COSMOS).</p> <p>12.3 Measuring reassurance.</p> <p>12.4 Environmental visual audit (EVA).</p> <p>12.5 Practical use of results.</p> <p>12.6 Evaluation and next steps.</p> <p>12.7 References.</p> <p><b>13 Mapping the fear of crime – a micro-approach in Merton, London (</b>Chris Williams).</p> <p>13.1 Introduction.</p> <p>13.2 Process.</p> <p>13.3 Methodology.</p> <p>13.4 Results.</p> <p>13.5 Methodological applications and considerations.</p> <p>13.6 References.</p> <p><b>14 NightVision – visual auditing of night-time economy related incidents in Bath and North-East Somerset (</b>Jon Poole).</p> <p>14.1 Introduction.</p> <p>14.2 Project design and implementation.</p> <p>14.3 Methodological considerations.</p> <p>14.4 Findings from the NightVision surveys.</p> <p>14.5 Generating action.</p> <p>14.6 Conclusions.</p> <p>14.7 Reference.</p> <p><b>Part V New techniques.</b></p> <p><b>15 The near-repeat burglary phenomenon (</b>Derek Johnson).</p> <p>15.1 Introduction.</p> <p>15.2 Near repeats in Bournemouth.</p> <p>15.3 A methodology for analysis and action.<br /> <br /> 15.4 Delivering a near-repeat intervention.</p> <p>15.5 The impact.</p> <p>15.6 Conclusions.</p> <p>15.7 References.</p> <p><b>16 Simulating crime to inform theory and practice (</b>Elizabeth Groff).</p> <p>16.1 Introduction.</p> <p>16.2 Agent-based modelling.</p> <p>16.3 Creating a theoretically based simulation model to test routine activity theory.</p> <p>16.4 Findings and significance of the research – comparing a simulated environment to the principles of routine activity theory.</p> <p>16.5 Comparing a simulated crime environment to reality.</p> <p>16.6 Implications for practice.</p> <p>16.7 References.</p> <p><b>17 A crime mapping technique for assessing vulnerable targets for terrorism in local communities (</b>Rachel Boba).</p> <p>17.1 Introduction.</p> <p>17.2 Assessing target vulnerabilities: two components.</p> <p>17.3 Assessing target vulnerabilities: a hypothetical case study.</p> <p>17.4 Considerations.</p> <p>17.5 References.</p> <p><b>18 Interactive Offender Profiling System (IOPS) (</b>David Canter and Donna Youngs).</p> <p>18.1 Introduction.</p> <p>18.2 An integrated operational system.</p> <p>18.3 The potential of the interactive offender profiling system.</p> <p>18.4 Acknowledgement.</p> <p>18.5 References.</p> <p><b>Index.</b></p>
<p>Spencer Chainey is the editor of Crime Mapping Case Studies: Practice and Research, published by Wiley. Lisa Tompson is the editor of Crime Mapping Case Studies: Practice and Research, published by Wiley.

Diese Produkte könnten Sie auch interessieren:

Hot-Melt Extrusion
Hot-Melt Extrusion
von: Dennis Douroumis
PDF ebook
136,99 €
Hot-Melt Extrusion
Hot-Melt Extrusion
von: Dennis Douroumis
EPUB ebook
136,99 €
Kunststoffe
Kunststoffe
von: Wilhelm Keim
PDF ebook
99,99 €