Crime Mapping Case Studies: Practice and Research / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $63.14
Usually ships in 1-2 business days
(Save 42%)
Other sellers (Hardcover)
  • All (8) from $63.14   
  • New (4) from $92.38   
  • Used (4) from $63.14   

Overview

Crime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis, intelligence development, monitoring performance, and crime detection and is written by practitioners for practitioners.

Leading researchers in the field describe how crime mapping is developing and exposing analytical methodologies and critiquing current practices. Including global case studies that demonstrate a particular application, analytical technique or new theoretical concept, this text offers a truly global overview of this rapidly growing area of interest.

Unlike other texts on this topic, this book identifies mistakes and challenges in this field of enquiry to aid the reader in understanding the basics of this technique, giving them the opportunity to learn further.

Read More Show Less

Product Details

  • ISBN-13: 9780470516089
  • Publisher: Wiley
  • Publication date: 4/11/2008
  • Edition number: 1
  • Pages: 180
  • Product dimensions: 6.81 (w) x 9.53 (h) x 0.64 (d)

Meet the Author

Anyone intimidated by physics who wants to understand How Everything Works.
Read More Show Less

Read an Excerpt

Click to read or download

Read More Show Less

Table of Contents

List of contributors.

Preface.

Part I Developing crime mapping.

1 Developing geographical information systems and crime mapping tools in New Zealand (Andy Gilmour and Jill Barclay).

1.1 The starting point.

1.2 Developing a web-based GIS solution for New Zealand Police.

1.3 Building on the map-based analytical policing system (MAPS).

2 An analytical technique for addressing geographical referencing difficulties and monitoring crimes in Rio de Janeiro, Brazil  (Ana Paula Mendes de Miranda and Marcus Ferreira).

2.1 Introduction – developments in crime analysis in Rio de Janeiro.

2.2 Analysis by space–time monitoring cells.

2.3 Identifying crime patterns using paper maps.

2.4 Identifying crime patterns in Rio de Janeiro using GIS and digital cartographic base maps.

2.5 Crime analyses on bus routes in Rio de Janeiro.

2.6 Conclusions.

2.7 References.

3 Methods for implementing crime mapping within a large law enforcement agency: experiences from Victoria, Australia (Timothy Mashford).

3.1 Introduction.

3.2 A phased plan for development and delivery.

3.3 Progress to date.

3.4 Crime mapping projects – some examples.

3.5 Conclusions.

3.6 Reference.

4 Automating briefings for police officers (Tom Casady).

4.1 Introduction.

4.2 Automating crime mapping outputs in Lincoln Police Department.

4.3 Developing the automation of tasks in Lincoln.

4.4 Automating crime mapping in your agency.

Part II Geographical investigative analysis.

5 Geographic profiling analysis: principles, methods and applications (D. Kim Rossmo and Lorie Velarde).

5.1 Introduction.

5.2 The theoretical principles behind geographic profiling.

5.3 Geographic profiling methodology.

5.4 Applying geographic profiling to ‘volume’ crime: the Irvine Chair burglaries.

5.5 Measuring the effects of geographic profiling in Irvine.

5.6 References.

6 Geographic profiling in an operational setting: the challenges and practical considerations, with reference to a series of sexual assaults in Bath, England (Clare Daniell).

6.1 Introduction.

6.2 Applying geographic profiling to a series of indecent assaults in Bath, England.

6.3 Offender geography.

6.4 Operational versus academic geographic profiling.

6.5 Conclusions.

6.6 References.

7 The Hammer Gang: an exercise in the spatial analysis of an armed robbery series using the probability grid method (Chris Overall and Gregory Day).

7.1 Introduction.

7.2 Background.

7.3 Mapping the data and getting the picture.

7.4 Predicting the next offence location.

7.5 Results.

7.6 Issues in application of the probability grid method.

7.7 Conclusions.

7.8 Acknowledgements.

7.9 References.

8 ‘Rolling the Dice’: the arrest of Roosevelt Erving in Lincoln, Nebraska (Tom Casady).

8.1 Introduction.

8.2 Erving’s series of bank robberies.

8.3 Analysing Erving’s series.

8.4 Project ‘Rolling the Dice’.

8.5 The crucial role of geographical analysis.

Part III Neighbourhood analysis.

9 The strategic allocation of resources to effectively implement Neighbourhood Policing and the Community Safety Plan (Alice O’Neill).

9.1 Introduction.

9.2 Alternative resource allocation model.

9.3 What were the results, outcome and issues?

9.4 The future.

9.5 Reference.

10 Priority neighbourhoods and the Vulnerable Localities Index in Wigan – a strategic partnership approach to crime reduction (Ian Bullen).

10.1 Introduction.

10.2 An alternative Vulnerable Localities Index.

10.3 Vulnerable localities in Wigan.

10.4 Using the Vulnerable Localities Index to help understand offending patterns.

10.5 Developing the Vulnerable Localities Index to support urban regeneration and Neighbourhood Policing.

10.6 Acknowledgement.

10.7 References.

11 Reducing re-offending in local communities: geographical information system based strategic analysis of Greater Manchester’s offenders (David Ottiwell).

11.1 Context and introduction.

11.2 Implementation, testing and analysis.

11.3 Results, outcomes and issues.

11.4 References.

Part IV Integrating visual audits and survey data into crime mapping.

12 Community Safety Mapping Online System: mapping reassurance using survey data (Steven Rose).

12.1 Introduction.

12.2 Community Safety Mapping Online System (COSMOS).

12.3 Measuring reassurance.

12.4 Environmental visual audit (EVA).

12.5 Practical use of results.

12.6 Evaluation and next steps.

12.7 References.

13 Mapping the fear of crime – a micro-approach in Merton, London (Chris Williams).

13.1 Introduction.

13.2 Process.

13.3 Methodology.

13.4 Results.

13.5 Methodological applications and considerations.

13.6 References.

14 NightVision – visual auditing of night-time economy related incidents in Bath and North-East Somerset (Jon Poole).

14.1 Introduction.

14.2 Project design and implementation.

14.3 Methodological considerations.

14.4 Findings from the NightVision surveys.

14.5 Generating action.

14.6 Conclusions.

14.7 Reference.

Part V New techniques.

15 The near-repeat burglary phenomenon (Derek Johnson).

15.1 Introduction.

15.2 Near repeats in Bournemouth.

15.3 A methodology for analysis and action.

15.4 Delivering a near-repeat intervention.

15.5 The impact.

15.6 Conclusions.

15.7 References.

16 Simulating crime to inform theory and practice (Elizabeth Groff).

16.1 Introduction.

16.2 Agent-based modelling.

16.3 Creating a theoretically based simulation model to test routine activity theory.

16.4 Findings and significance of the research – comparing a simulated environment to the principles of routine activity theory.

16.5 Comparing a simulated crime environment to reality.

16.6 Implications for practice.

16.7 References.

17 A crime mapping technique for assessing vulnerable targets for terrorism in local communities (Rachel Boba).

17.1 Introduction.

17.2 Assessing target vulnerabilities: two components.

17.3 Assessing target vulnerabilities: a hypothetical case study.

17.4 Considerations.

17.5 References.

18 Interactive Offender Profiling System (IOPS) (David Canter and Donna Youngs).

18.1 Introduction.

18.2 An integrated operational system.

18.3 The potential of the interactive offender profiling system.

18.4 Acknowledgement.

18.5 References.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted January 4, 2013

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)