SlideShare una empresa de Scribd logo
1 de 13
Casinos

    Stores and that gallon of milk

    The notion of physical design to control

    behavior, particularly criminal behavior, is
    also not new
Environmental design is to

    guide, manipulate, and/or encourage people
    to behave in a desirable manner in a given
    situation
    Encourages informal social control efforts

    Physical properties of a space should allow

    for maximum visibility
    Signs (physical and psychological) that committing

    crimes in this place would be risky and
    unprofitable
Crime prevention through environmental design

    Newman’s defensible space model argues that

    physical space can be structured in a way that
    fosters and reinforces a social structure that
    defends itself
    ◦ Territoriality
       Legitimate users protect space
    ◦ Natural surveillance
       Legitimate users can observe because of design
    ◦ Image
       “Image” that neighborhood is well-cared for
    ◦ Milieu
       Your neighborhood and nearby neighborhoods have
        territoriality, natural surveillance and image and are crime
        free as well
Public spaces

    ◦ These are areas that are open to the general public and
      serve a variety of uses, such as a public street.
    Semipublic spaces

    ◦ These are areas, such as an apartment lobby, that are
      limited in their use but are still open to everyone. They are
      used more often by residents and their friends or families.
    Semiprivate spaces

       These include areas that are more restricted in use, such as
        an apartment hallway or stairwell, which are open to
        nonresidents but are most often used by residents and their
        friends or families.
    Private spaces

       Most notably the apartments themselves, these are areas
        that are not open to the public and are restricted to the use
        of residents and their friends or families.
All human space has some designated purpose.

    All human space has social, cultural, legal, or

    physical definitions that prescribe the desired
    and accepted behaviors.
    All human space is designed to support and

    control the desired behaviors
    Kaplan et al. (1978) propose that

    opportunity, target, risk, effort, and payoff
    (OTREP) explain variations in crime across people
    and places
    ◦ This model assumes that offenders are rational and that
      if physical design changes limit opportunities by
      increasing the risk and effort and reducing the
      payoff, crime will decrease
    Target hardening

Rational Choice Theory

    ◦ perceived risk and effort of crime is low
    ◦ perceived payout is high
    Routine Activities Theory

    ◦ Offenders and victims play a role in the criminal
      event
    Crime Pattern Theory (Combines rational

    choice, routine actvities, and environmental
    criminology)
    ◦ Awareness space
    ◦ Activity space
    ◦ Nodes
    ◦ Paths
School




       Home                   Friends




Work

              Entertainment
Victims often place themselves in situations that

    increase their risk of victimization
    Dimensions of victimization risk

    ◦ Attractiveness
      Risk vs Reward potential
    ◦ Proximity
      Victim with same rewards closer to suspect more likely
       victimized
    ◦ Defiant place
      Location can increase risk (topless bar, larger group
       events, etc.)
    ◦ Vulnerability
      Can victim resist an attack?
Victim facilitation

    ◦ behavior was negligent in making themselves a
      more attractive or vulnerable target
    Victim precipitation

    ◦ burglar getting assaulted by an awakened home
      owner
    Victim provocation

    ◦ the crime would not have occurred if it was not for
      the victim’s behavior
      Victim dressed “sexy” and goes to strip club for “the
       excitement”
Risk heterogeneity

    ◦ What made them attractive the first time, made
      them attractive the second time
    Event dependency

    ◦ Location was successful the last time, so offender
      goes there again
    Virtual repeats

    ◦ Other targets chosen because they were similar to
      locations or victims where success was gained in
      the past
Types of Displacement

    ◦ Spatial
      Crime moves from an area (typically outward)
    ◦ Temporal
      Same area – different times
    ◦ Target
      Target hardening and chooses new target or type
    ◦ Tactical
      New methods to commit same crime (Video on TV)
    ◦ Functional
      Forced to commit a different crime
      Benign – commits lesser offenses
      Malign – commits more serious offenses
    ◦ Perpretrator
      Traded one criminal for another (drug dealers and markets)
The spread of the beneficial influence of an intervention beyond the

    places which are directly targeted, the individuals who are the
    subject of control, the crimes which are the focus of intervention or
    the time periods in which an intervention is bought
    Deterrence

    ◦ Avoidance of targets due to increased enforcement at similar locations or times
    Discouragement

    ◦ Perceived higher risk of being caught

Más contenido relacionado

La actualidad más candente

Biological Theories of Crime
Biological Theories of CrimeBiological Theories of Crime
Biological Theories of Crime
knoxmodernstudies
 
Intersections between Violence Against Children and Women: Prevention and Res...
Intersections between Violence Against Children and Women: Prevention and Res...Intersections between Violence Against Children and Women: Prevention and Res...
Intersections between Violence Against Children and Women: Prevention and Res...
UNICEF Office of Research - Innocenti
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
Jim Gilmer
 
3. Who Watches Crime Dramas and Why?
3. Who Watches Crime Dramas and Why?3. Who Watches Crime Dramas and Why?
3. Who Watches Crime Dramas and Why?
latymermedia
 
Gender Based Violence
Gender Based ViolenceGender Based Violence
Gender Based Violence
guestecdedb
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
Jwooten2
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
Diana Dianot
 

La actualidad más candente (20)

Theories of gender inequality
Theories of gender inequalityTheories of gender inequality
Theories of gender inequality
 
Gender and crime SOCIOLOGY
Gender and crime SOCIOLOGYGender and crime SOCIOLOGY
Gender and crime SOCIOLOGY
 
Introduction to chiminology
Introduction to chiminologyIntroduction to chiminology
Introduction to chiminology
 
Biological Theories of Crime
Biological Theories of CrimeBiological Theories of Crime
Biological Theories of Crime
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in india
 
Labelling theories of Crime
Labelling theories of CrimeLabelling theories of Crime
Labelling theories of Crime
 
Criminology Theories
Criminology TheoriesCriminology Theories
Criminology Theories
 
Intersections between Violence Against Children and Women: Prevention and Res...
Intersections between Violence Against Children and Women: Prevention and Res...Intersections between Violence Against Children and Women: Prevention and Res...
Intersections between Violence Against Children and Women: Prevention and Res...
 
Left Realism
Left RealismLeft Realism
Left Realism
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
GENDER ISSUES
GENDER ISSUESGENDER ISSUES
GENDER ISSUES
 
3. Who Watches Crime Dramas and Why?
3. Who Watches Crime Dramas and Why?3. Who Watches Crime Dramas and Why?
3. Who Watches Crime Dramas and Why?
 
Criminology in the future cja 314
Criminology in the future cja 314Criminology in the future cja 314
Criminology in the future cja 314
 
Gender Based Violence
Gender Based ViolenceGender Based Violence
Gender Based Violence
 
Qualitative methods in Psychology Research
Qualitative methods in Psychology ResearchQualitative methods in Psychology Research
Qualitative methods in Psychology Research
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
Ppt made on gender related issue ('women in crime')
Ppt made on gender related issue ('women in crime')Ppt made on gender related issue ('women in crime')
Ppt made on gender related issue ('women in crime')
 
GENDER ROLES & STEREOTYPES
GENDER ROLES & STEREOTYPESGENDER ROLES & STEREOTYPES
GENDER ROLES & STEREOTYPES
 
“Differential association theory is a part of social learning theory which is...
“Differential association theory is a part of social learning theory which is...“Differential association theory is a part of social learning theory which is...
“Differential association theory is a part of social learning theory which is...
 

Destacado

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Destacado (19)

81564773 kimia-organik
81564773 kimia-organik81564773 kimia-organik
81564773 kimia-organik
 
Fundamentalsof Crime Mapping 5
Fundamentalsof Crime Mapping 5Fundamentalsof Crime Mapping 5
Fundamentalsof Crime Mapping 5
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2
 
Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping Geocoding
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis Tables
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8
 
Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis Concepts
 
Fundamentalsof Crime Mapping 6
Fundamentalsof Crime Mapping 6Fundamentalsof Crime Mapping 6
Fundamentalsof Crime Mapping 6
 
C05811524
C05811524C05811524
C05811524
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Último

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Fundamentalsof Crime Mapping 3

  • 1.
  • 2. Casinos  Stores and that gallon of milk  The notion of physical design to control  behavior, particularly criminal behavior, is also not new
  • 3. Environmental design is to  guide, manipulate, and/or encourage people to behave in a desirable manner in a given situation Encourages informal social control efforts  Physical properties of a space should allow  for maximum visibility Signs (physical and psychological) that committing  crimes in this place would be risky and unprofitable
  • 4. Crime prevention through environmental design  Newman’s defensible space model argues that  physical space can be structured in a way that fosters and reinforces a social structure that defends itself ◦ Territoriality  Legitimate users protect space ◦ Natural surveillance  Legitimate users can observe because of design ◦ Image  “Image” that neighborhood is well-cared for ◦ Milieu  Your neighborhood and nearby neighborhoods have territoriality, natural surveillance and image and are crime free as well
  • 5. Public spaces  ◦ These are areas that are open to the general public and serve a variety of uses, such as a public street. Semipublic spaces  ◦ These are areas, such as an apartment lobby, that are limited in their use but are still open to everyone. They are used more often by residents and their friends or families. Semiprivate spaces   These include areas that are more restricted in use, such as an apartment hallway or stairwell, which are open to nonresidents but are most often used by residents and their friends or families. Private spaces   Most notably the apartments themselves, these are areas that are not open to the public and are restricted to the use of residents and their friends or families.
  • 6. All human space has some designated purpose.  All human space has social, cultural, legal, or  physical definitions that prescribe the desired and accepted behaviors. All human space is designed to support and  control the desired behaviors Kaplan et al. (1978) propose that  opportunity, target, risk, effort, and payoff (OTREP) explain variations in crime across people and places ◦ This model assumes that offenders are rational and that if physical design changes limit opportunities by increasing the risk and effort and reducing the payoff, crime will decrease Target hardening 
  • 7. Rational Choice Theory  ◦ perceived risk and effort of crime is low ◦ perceived payout is high Routine Activities Theory  ◦ Offenders and victims play a role in the criminal event Crime Pattern Theory (Combines rational  choice, routine actvities, and environmental criminology) ◦ Awareness space ◦ Activity space ◦ Nodes ◦ Paths
  • 8. School Home Friends Work Entertainment
  • 9. Victims often place themselves in situations that  increase their risk of victimization Dimensions of victimization risk  ◦ Attractiveness  Risk vs Reward potential ◦ Proximity  Victim with same rewards closer to suspect more likely victimized ◦ Defiant place  Location can increase risk (topless bar, larger group events, etc.) ◦ Vulnerability  Can victim resist an attack?
  • 10. Victim facilitation  ◦ behavior was negligent in making themselves a more attractive or vulnerable target Victim precipitation  ◦ burglar getting assaulted by an awakened home owner Victim provocation  ◦ the crime would not have occurred if it was not for the victim’s behavior  Victim dressed “sexy” and goes to strip club for “the excitement”
  • 11. Risk heterogeneity  ◦ What made them attractive the first time, made them attractive the second time Event dependency  ◦ Location was successful the last time, so offender goes there again Virtual repeats  ◦ Other targets chosen because they were similar to locations or victims where success was gained in the past
  • 12. Types of Displacement  ◦ Spatial  Crime moves from an area (typically outward) ◦ Temporal  Same area – different times ◦ Target  Target hardening and chooses new target or type ◦ Tactical  New methods to commit same crime (Video on TV) ◦ Functional  Forced to commit a different crime  Benign – commits lesser offenses  Malign – commits more serious offenses ◦ Perpretrator  Traded one criminal for another (drug dealers and markets)
  • 13. The spread of the beneficial influence of an intervention beyond the  places which are directly targeted, the individuals who are the subject of control, the crimes which are the focus of intervention or the time periods in which an intervention is bought Deterrence  ◦ Avoidance of targets due to increased enforcement at similar locations or times Discouragement  ◦ Perceived higher risk of being caught