13.07.2015 Views

Prospective crime mapping in operational context Final report

Prospective crime mapping in operational context Final report

Prospective crime mapping in operational context Final report

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

hence available nearby targets plentiful. Considerations of land use provide the mostplausible accounts of such area variation <strong>in</strong> pattern. Other possibilities exist.Predict<strong>in</strong>g the futureHav<strong>in</strong>g demonstrated that the risk of burglary is <strong>in</strong>deed communicable <strong>in</strong> the East Midlands,the next task was to determ<strong>in</strong>e whether it is sufficiently predictable to suggest that theproduction of predictive <strong>mapp<strong>in</strong>g</strong> software would aid <strong>operational</strong> polic<strong>in</strong>g. Thus, research wasconducted to compare the effectiveness of:1. Promap;2. what the police are currently do<strong>in</strong>g;3. a simple variant of retrospective hotspott<strong>in</strong>g; and4. what might be expected if areas were prioritised for <strong>crime</strong> reductive attentionrandomly.At the time of the research, none of the areas currently used retrospective <strong>mapp<strong>in</strong>g</strong>techniques per se. Instead, they generated p<strong>in</strong> maps on a fortnightly basis us<strong>in</strong>g two weeks’data. This simply <strong>in</strong>volved generat<strong>in</strong>g a map which shows the locations of all burglaries thatoccurred with<strong>in</strong> the previous two weeks. On the basis of these maps, <strong>operational</strong> resourcesmay be deployed. This is similar to retrospective hotspot <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> that both methodssummarise historic data, and hence <strong>in</strong> what follows the authors will use retrospectivehotspott<strong>in</strong>g as a proxy for what the analysts currently do. However, it should be noted thatproblems with p<strong>in</strong> <strong>mapp<strong>in</strong>g</strong> are well documented (e.g. Cha<strong>in</strong>ey & Ratcliffe, 2005) and thus theretrospective approach used here as an analogue is significantly superior to what the analystswere do<strong>in</strong>g.Item 2 <strong>in</strong> the list above has thus been elim<strong>in</strong>ated, be<strong>in</strong>g a sub-optimal type of retrospectivehotspott<strong>in</strong>g. As is <strong>in</strong>tuitively clear, random allocation of resources will be less efficient thaneither prospective or retrospective hotspott<strong>in</strong>g, so the choice of method comes down toprospective or retrospective. While necessarily technical, the rema<strong>in</strong>der of this section shouldbe read at least <strong>in</strong> a cursory way by the <strong>in</strong>terested practitioner, s<strong>in</strong>ce it identifies thecomputational differences between the two primary contend<strong>in</strong>g approaches.The technique most commonly used to identify hotspots <strong>in</strong>volves the generation of a twodimensionallattice to represent the area of <strong>in</strong>terest. As shown <strong>in</strong> Figure 2.2, a twodimensionallattice (Fig. 2.2(2)) is overla<strong>in</strong> upon a study area (Fig. 2.2(1)). This comprises aseries of (x*y) cells, each with identical proportions. The challenge of del<strong>in</strong>eat<strong>in</strong>g a hotspotlies <strong>in</strong> the derivation of a set of values, one per cell, that reflects the <strong>in</strong>tensity of <strong>crime</strong> risk ateach location. Thus, a methodology and mathematical algorithm is required that can generaterisk <strong>in</strong>tensity values for every cell. One technique commonly used to do this is called the‘mov<strong>in</strong>g w<strong>in</strong>dow’. Here, a circle with a predeterm<strong>in</strong>ed radius (referred to as the bandwidth) isdrawn from the midpo<strong>in</strong>t of each cell (Fig. 2.2(3)), and each of the events that falls with<strong>in</strong> thecircle is used to generate the risk <strong>in</strong>tensity value for that cell. The risk <strong>in</strong>tensity value for eachcell is determ<strong>in</strong>ed by the number of <strong>crime</strong> events (<strong>in</strong> Figure 2.2(1), four for the cellconsidered) that occurred with<strong>in</strong> the circle and how far away they are located from themidpo<strong>in</strong>t of the cell. Those closest to the midpo<strong>in</strong>t are typically assigned a greater weight<strong>in</strong>gthan those further away. To illustrate the method, three of the cells <strong>in</strong> Figure 2.2(3) have beenshaded to <strong>in</strong>dicate the <strong>in</strong>tensity of risk at those locations. Those shaded darkest exhibit thehighest risks. An example of a hotspot (quartic) function (Bailey & Gatrell, 1995) is describedby equation (1):223 ⎛ d ⎞( ) = 1 ⎟2 ⎜ −iλτs ∑(1)2di≤τπτ ⎝ τ ⎠Where, λτ(s)= risk <strong>in</strong>tensity value for cell s τ = bandwidthd i = distance of each po<strong>in</strong>t (i) with<strong>in</strong> the bandwidth from the centroid of the cell18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!