SlideShare una empresa de Scribd logo
1 de 16
Often difficult with crime data

    If your analysis or crime map seeks to

    understand robbery motivated homicides
    within city limits for a given time period, all
    known robbery-motivated homicides must be
    included in the analysis
    If any are excluded, the analysis will be

    limited in its power to explain or predict
    these crimes.
Fixing the problems in your data that can be

    done without diminishing the data quality or
    inserting error
    Repair errors due to “commission”

    ◦ Error upon entry of data element
    Repair errors due to “omission”

    ◦ This committed by lack of entry for a field or fields
    Something most analysts do daily

    Being “intimate” with your data helps to

    correct these issues
Kind of the “Big Picture” of crime mapping

    Large scale analysis (citywide), yields large scale

    assumptions and cannot be reduced to say a block level
    and vice versa
    Will control the accuracy needed in the data, both

    spatial and attribute accuracy
    ◦ Eg; If we wanted to do an analysis of tornado damage along the
      coast, the coast line graphic would not need to include every
      single cove and jut of the coastline, but if our analysis was of one
      small bay, then each rock, pier, and beach area might need to be
      drawn.
    Units of analysis should be useful in the analysis being

    performed
Official Crime Data

    ◦ Persons
       Arrestees
       Parolees
       Traffic units
    ◦ Places
       Schools
       Businesses
    ◦ Things
       Evidence
       Vehicles
    ◦ Incidents
       Calls for service
       Reported crimes
       Traffic crashes
FBI (http://www.fbi.gov/ucr/ucr.htm)

    Weaknesses:

        Only reports most serious crime at a location
    ◦
        Definitions may not be the same as state statutes
    ◦
        Voluntary compliance and reporting
    ◦
        UCR counts some crimes by number of victims instead of incidents
    ◦
        Was developed in 1930
    ◦
        Only crime reported to police are captured – self reporting not included
    ◦
    Strengths:

    ◦ Most states do report
    ◦ Allows comparison with like-sized agencies across the country
    ◦ Provides a general picture of crime reported to police
FBI (http://www.fbi.gov/ucr/ucr.htm)

    Weaknesses:

    ◦ Reports all crimes occurring at location
    ◦ Only a few states report NIBRS data
    Strengths:

    ◦ Reports all crimes occurring at location
    ◦ More robust definitions
Citizen generated requests for police services

    Officer initiated activity

    ◦ Location citizen gave for call, may not be where
      incident actually happened
    ◦ Location may be an intersection and not a specific
      address
    ◦ Depending on how it is captured it may not
      geocode and can thus, not be mapped
    ◦ What the call came in as, may not be what the
      officer determines was the real problem
    ◦ Not necessarily a picture of “crime” but of citizen
      desire for police presence only
Official Crime Data

    ◦ Persons
       Arrestees, or persons listed in police reports
        (victim, witnesses, suspects)
       Parolees/probationers
       Traffic units/passengers
    ◦ Places
       Schools, hotels, police stations, massage parlors
       Businesses, etc
    ◦ Things
       Evidence
       Vehicles, guns, etc
    ◦ Incidents
       Calls for service
       Reported crimes
       Traffic crashes
Can capture crime data not reported to police

    (much is not)
    ◦ There is no way to verify if a respondent is
      providing truthful and accurate information
    ◦ Information on homicides is not collected. (“Dead
      men can tell no tales”)
    ◦ Crime victims under the age of 12 years are
      unaccounted for Victimless crime is unaccounted
      for
Data not collected by police departments, but

    that can be used for crime mapping
      US Census
    ◦
      City sales tax and licensing
    ◦
      Google, Yahoo, US West Dex Yellow Pages
    ◦
      Political boundaries from local, county and state
    ◦
      Local social agencies like Department of Economic
    ◦
      Security
    ◦ GIS data at local universities
    ◦ Other city departments
    ◦ Etc.
Microsoft

        Access – database
    ◦
        Excel – spreadsheet
    ◦
        Word – word processor
    ◦
        Powerpoint – presentation of information
    ◦
    Statistical Packages

    ◦ Excel add-in Analysis toolpak
    ◦ SPSS
    ◦ SAS
    CrimeStat III

    ◦ Spatial statistics
Off the shelf additional programs

        Crime View
    ◦
        Crime Analysis Tools
    ◦
        Hawthe’s Tools
    ◦
        Curve expert (regression curve analysis software)
    ◦
        Coplink
    ◦
        Oracle spatial
    ◦
        SQL Server
    ◦
        ATAC
    ◦
        Etc
    ◦
Criminals do not care about imaginary borders

    along the roads dividing adjacent cities – why
    should we?
    Data sharing has increased since 911, but still

    have a way to go
    Biggest problem is politics not technology right

    now
    Data sharing systems are inter-agency and can

    be expensive
    We need more privacy impact assessments on all

    the data that is being shared
    Movement toward NIEM

    ◦ http://www.niem.gov/
Knowing which data sources to use and how

    to share the completed analysis (whether in
    report or map form) is diverse and complex.
    Understanding and clearly articulating the

    limitations of the data used is also
    necessary
    Understanding the legal and ethical issues

    involved with distributing crime
    maps, data, and analysis is imperative for
    crime analysts

Más contenido relacionado

La actualidad más candente

PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol, Inc
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredPol, Inc
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 
Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Noah Turner
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tellArchit Sharma
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoMatthew Gulino
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysisSameer Darekar
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime AnalysisRohit Dandona
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesRamdharan Donda
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesRamdharan
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project reportsarthakkhare3
 
Crimedata 2012 15
Crimedata 2012 15Crimedata 2012 15
Crimedata 2012 15Ramdharan
 
Lizette Lancaster - Institute for Security Studies (Annex)
 Lizette Lancaster - Institute for Security Studies (Annex) Lizette Lancaster - Institute for Security Studies (Annex)
Lizette Lancaster - Institute for Security Studies (Annex)Geneva Declaration
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORMaureen Kenney
 
Crime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSCrime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSAzavea
 
The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...Azavea
 

La actualidad más candente (20)

PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
 
San Francisco Crime
San Francisco CrimeSan Francisco Crime
San Francisco Crime
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)Georgetown Data Analytics Project (Team DC)
Georgetown Data Analytics Project (Team DC)
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tell
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - Gulino
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysis
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime Analysis
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los Angeles
 
Crime prediction and strategy detection in data mining
Crime prediction and strategy detection in data miningCrime prediction and strategy detection in data mining
Crime prediction and strategy detection in data mining
 
Crime rate data analysis in Los Angeles
Crime rate data analysis in Los AngelesCrime rate data analysis in Los Angeles
Crime rate data analysis in Los Angeles
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project report
 
Crimedata 2012 15
Crimedata 2012 15Crimedata 2012 15
Crimedata 2012 15
 
Lizette Lancaster - Institute for Security Studies (Annex)
 Lizette Lancaster - Institute for Security Studies (Annex) Lizette Lancaster - Institute for Security Studies (Annex)
Lizette Lancaster - Institute for Security Studies (Annex)
 
Itech 7407 report
Itech 7407 reportItech 7407 report
Itech 7407 report
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, OR
 
Masters Defense 2013
Masters Defense 2013Masters Defense 2013
Masters Defense 2013
 
Crime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMSCrime Early Warning: Automated Data Mining of CAD and RMS
Crime Early Warning: Automated Data Mining of CAD and RMS
 
The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...The Real-time Police Force: Publishing Analytic Information to the Field with...
The Real-time Police Force: Publishing Analytic Information to the Field with...
 

Destacado

Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsOsokop
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysisjangyoung
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisNeil Ryan
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 

Destacado (7)

Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis Concepts
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime Analysis
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 

Similar a Fundamentalsof Crime Mapping 6

Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1CAMT
 
Analyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyAnalyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyCOGS Presentations
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalAashri Tandon
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalatorLassonde Institute
 
01 basic concepts
01 basic concepts01 basic concepts
01 basic conceptsJim Gilmer
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
Final business project
Final business projectFinal business project
Final business projectJakeBehnken
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesNeo4j
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Laura Po
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
Hack jersey 2 final
Hack jersey 2 finalHack jersey 2 final
Hack jersey 2 finalErinMRoll
 
InnoConnect: Big data analysis
InnoConnect: Big data analysisInnoConnect: Big data analysis
InnoConnect: Big data analysisJiri Bouchal
 
The Chicago Police Department’s Information Collection for Automated Mapping...
 The Chicago Police Department’s Information Collection for Automated Mapping... The Chicago Police Department’s Information Collection for Automated Mapping...
The Chicago Police Department’s Information Collection for Automated Mapping...Daniel X. O'Neil
 

Similar a Fundamentalsof Crime Mapping 6 (16)

Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1Understanding Where in the Arts - Part 1
Understanding Where in the Arts - Part 1
 
Bcs 20080228 Ku
Bcs 20080228 KuBcs 20080228 Ku
Bcs 20080228 Ku
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Analyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis CountyAnalyzing the Spatial Distribution of Crime in Annapolis County
Analyzing the Spatial Distribution of Crime in Annapolis County
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalator
 
report
reportreport
report
 
01 basic concepts
01 basic concepts01 basic concepts
01 basic concepts
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Final business project
Final business projectFinal business project
Final business project
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Hack jersey 2 final
Hack jersey 2 finalHack jersey 2 final
Hack jersey 2 final
 
InnoConnect: Big data analysis
InnoConnect: Big data analysisInnoConnect: Big data analysis
InnoConnect: Big data analysis
 
The Chicago Police Department’s Information Collection for Automated Mapping...
 The Chicago Police Department’s Information Collection for Automated Mapping... The Chicago Police Department’s Information Collection for Automated Mapping...
The Chicago Police Department’s Information Collection for Automated Mapping...
 

Más de Osokop

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingOsokop
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesOsokop
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Osokop
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Osokop
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Osokop
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Osokop
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Osokop
 

Más de Osokop (7)

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping Geocoding
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis Tables
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Fundamentalsof Crime Mapping 6

  • 1.
  • 2. Often difficult with crime data  If your analysis or crime map seeks to  understand robbery motivated homicides within city limits for a given time period, all known robbery-motivated homicides must be included in the analysis If any are excluded, the analysis will be  limited in its power to explain or predict these crimes.
  • 3. Fixing the problems in your data that can be  done without diminishing the data quality or inserting error Repair errors due to “commission”  ◦ Error upon entry of data element Repair errors due to “omission”  ◦ This committed by lack of entry for a field or fields Something most analysts do daily  Being “intimate” with your data helps to  correct these issues
  • 4. Kind of the “Big Picture” of crime mapping  Large scale analysis (citywide), yields large scale  assumptions and cannot be reduced to say a block level and vice versa Will control the accuracy needed in the data, both  spatial and attribute accuracy ◦ Eg; If we wanted to do an analysis of tornado damage along the coast, the coast line graphic would not need to include every single cove and jut of the coastline, but if our analysis was of one small bay, then each rock, pier, and beach area might need to be drawn. Units of analysis should be useful in the analysis being  performed
  • 5. Official Crime Data  ◦ Persons  Arrestees  Parolees  Traffic units ◦ Places  Schools  Businesses ◦ Things  Evidence  Vehicles ◦ Incidents  Calls for service  Reported crimes  Traffic crashes
  • 6. FBI (http://www.fbi.gov/ucr/ucr.htm)  Weaknesses:  Only reports most serious crime at a location ◦ Definitions may not be the same as state statutes ◦ Voluntary compliance and reporting ◦ UCR counts some crimes by number of victims instead of incidents ◦ Was developed in 1930 ◦ Only crime reported to police are captured – self reporting not included ◦ Strengths:  ◦ Most states do report ◦ Allows comparison with like-sized agencies across the country ◦ Provides a general picture of crime reported to police
  • 7. FBI (http://www.fbi.gov/ucr/ucr.htm)  Weaknesses:  ◦ Reports all crimes occurring at location ◦ Only a few states report NIBRS data Strengths:  ◦ Reports all crimes occurring at location ◦ More robust definitions
  • 8. Citizen generated requests for police services  Officer initiated activity  ◦ Location citizen gave for call, may not be where incident actually happened ◦ Location may be an intersection and not a specific address ◦ Depending on how it is captured it may not geocode and can thus, not be mapped ◦ What the call came in as, may not be what the officer determines was the real problem ◦ Not necessarily a picture of “crime” but of citizen desire for police presence only
  • 9. Official Crime Data  ◦ Persons  Arrestees, or persons listed in police reports (victim, witnesses, suspects)  Parolees/probationers  Traffic units/passengers ◦ Places  Schools, hotels, police stations, massage parlors  Businesses, etc ◦ Things  Evidence  Vehicles, guns, etc ◦ Incidents  Calls for service  Reported crimes  Traffic crashes
  • 10. Can capture crime data not reported to police  (much is not) ◦ There is no way to verify if a respondent is providing truthful and accurate information ◦ Information on homicides is not collected. (“Dead men can tell no tales”) ◦ Crime victims under the age of 12 years are unaccounted for Victimless crime is unaccounted for
  • 11.
  • 12. Data not collected by police departments, but  that can be used for crime mapping US Census ◦ City sales tax and licensing ◦ Google, Yahoo, US West Dex Yellow Pages ◦ Political boundaries from local, county and state ◦ Local social agencies like Department of Economic ◦ Security ◦ GIS data at local universities ◦ Other city departments ◦ Etc.
  • 13. Microsoft  Access – database ◦ Excel – spreadsheet ◦ Word – word processor ◦ Powerpoint – presentation of information ◦ Statistical Packages  ◦ Excel add-in Analysis toolpak ◦ SPSS ◦ SAS CrimeStat III  ◦ Spatial statistics
  • 14. Off the shelf additional programs  Crime View ◦ Crime Analysis Tools ◦ Hawthe’s Tools ◦ Curve expert (regression curve analysis software) ◦ Coplink ◦ Oracle spatial ◦ SQL Server ◦ ATAC ◦ Etc ◦
  • 15. Criminals do not care about imaginary borders  along the roads dividing adjacent cities – why should we? Data sharing has increased since 911, but still  have a way to go Biggest problem is politics not technology right  now Data sharing systems are inter-agency and can  be expensive We need more privacy impact assessments on all  the data that is being shared Movement toward NIEM  ◦ http://www.niem.gov/
  • 16. Knowing which data sources to use and how  to share the completed analysis (whether in report or map form) is diverse and complex. Understanding and clearly articulating the  limitations of the data used is also necessary Understanding the legal and ethical issues  involved with distributing crime maps, data, and analysis is imperative for crime analysts