Crime Analysis For Problem Solvers
Crime Analysis For Problem Solvers
Crime Analysis For Problem Solvers
Department of Justice
Office of Community Oriented Policing Services
COPS
COMMUNITY ORIENTED POLICING SERVICES
U.S. DEPARTMENT OF JUSTICE
This project was supported by cooperative agreement #2003CKWXK048 by the Office of Community Oriented
Policing Services, U.S. Department of Justice. The opinions contained herein are those of the authors and do not
necessarily represent the official position of the U.S. Department of Justice. References to specific companies,
products, or services should not be considered an endorsement of the product by the author or the U.S. Department
of Justice. Rather, the references are illustrations to supplement discussion of the issues.
en
de
ler
Off
Ha
nd
Target/Victim
Guardian
Ronald V. Clarke
John E. Eck
ce
ge
na
Ma
Pla
CRIME
Solving Crime Analyst, that we wrote for the Jill Dando Institute of Crime
Science at University College London, with financial support from the
Home Office. We are most grateful to the Institute and to the Home Office
for allowing us to produce this version for the United States. We are also
grateful to the Office of Community Oriented Policing Services for
commissioning the work. In the Acknowledgements page of the earlier
version we thanked many colleagues and friends on whose work we had
freely drawn. Those who have materially assisted us in completing this
version by supplying material for inclusion, commenting on drafts, or in
other ways, include: Stacy Belledin, Rachel Boba, Karen Bullock, Barbie
Brookover, Christopher Bruce, Andy Brumwell, Graham Farrell, Rob
Guerette, Samantha Gwinn, Shane Johnson, Johannes Knutsson, Gloria
Laycock, Nancy Leach, Deborah Loewen, Tamara Madensen, Mangai
Natarajan, Cynthia Pappas, Ken Pease, Nanci Plouffe, Barry Poyner, Jerry
Ratcliffe, George Rengert, Nick Ross, Kim Rossmo, Rana Sampson,
Matthew Scheider, Karin Schmerler, Michael Scott, Nick Tilley, Susan
Wernicke, Matt White, and Deborah Lamm Weisel. We thank all of them.
ACKNOWLEDGEMENTS
JOHN E. ECK
John Eck is professor of criminal justice at the University of Cincinnati. He has
contributed to the development of problem-oriented policing since 1984 when he
studied the first full-scale attempt to implement the concept in the United States
at Newport News, Virginia. He helped to develop a number of now standard
techniques in problem-oriented policing, including the SARA model and the
problem analysis triangle. Dr. Eck is an affiliate member of the Center for
Problem-Oriented Policing. He is a judge for the Tilley Award for Excellence in
Problem-Oriented Policing. Dr. Eck was a member of the Committee to Review
Research on Police Policy and Practice (2000-2003) of the National Academy of
Sciences. He can be reached at: [email protected].
AUTHORS
RONALD V. CLARKE
foreword
foreword
FOREWORD
TABLE OF CONTENTS
60 small steps
Acknowledgements
Authors
Foreword
Read This First
Prepare Yourself
1.
Rethink your job
2.
Be the local crime expert
3.
Know what is effective (and not) in policing
Learn About Problem-Oriented Policing
4.
Become a POP expert
5.
Be true to POP
6.
Be very crime specific
7.
Be guided by SARA - not led astray!
Study Environmental Criminology
8.
Use the problem analysis triangle
9.
Know that opportunity makes the thief
10. Put yourself in the offender's shoes
11. Expect offenders to react
12. Don't be discouraged by the displacement doomsters
13. Expect diffusion of benefits
Scan for Crime Problems
14. Use the CHEERS test when defining problems
15. Know what kind of problem you have
16. Study the journey to crime
17. Know how hot spots develop
18. Learn if the 80-20 rule applies
Analyze in Depth
19. Research your problem
20. Formulate hypotheses
21. Collect your own data
22. Examine your data distributions
23. Diagnose your hot spot
24. Know when to use high-definition maps
25. Pay attention to daily and weekly rhythms
26. Take account of long-term change
TABLE OF CONTENTS
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
PREPARE YOURSELF
Read More:
Braga, Anthony (2002). Problem-Oriented Policing and
Crime Prevention, Monsey, NY: Criminal Justice Press.
Unsuccessful Attempts
Effective?*
28%
29%
No
Indoor light on
26%
29%
No
9%
11%
No
28%
25%
No
15%
29%
Yes
23%
36%
Yes
Radio/TV left on
9%
18%
Yes
19%
36%
Yes
*"Yes" means present in a larger proportion of unsuccessful attempts than completed burglaries.
PREPARE YOURSELF
Women's
Diversity of Approaches
Great:
Apply a diverse array of
approaches, including
law enforcement
Little:
Rely almost exclusively
on law enforcement
Community Policing
Problem-oriented Policing
Little or no evidence of
effectiveness
Impersonal community policing (e.g.,
newsletters)
Weak to moderate evidence
Personal contacts in community policing
Respectful police-citizen contacts
Improving legitimacy of police
Foot patrols (fear reduction only)
Standard Model
Focused Policing
Little or no evidence of
effectiveness
Adding more police
General patrol
Rapid response
Follow-up investigation
Undifferentiated arrest for domestic
violence
Low
Inconsistent or weak
Repeat offender investigations
Moderate to strong evidence of
effectiveness
Focused intensive enforcement
Hot-spots patrols
Focus
High
Adapted from National Research Council (2003), Fairness and Effectiveness in Policing: The Evidence.
Committee to Review Research on Police Policy and Practice. Edited by Wesley Skogan and Kathleen Frydl.
Washington, DC: The National Academies Press. Figure 6.1 and Table 6.1, pp. 248-249.
PREPARE YOURSELF
Read More:
Goldstein, Herman (1979). "Improving Policing: A
Problem-Oriented Approach." Crime & Delinquency April:
234-58.
Goldstein, Herman (1990). Problem-Oriented Policing.
New York: McGraw Hill.
Goldstein, Herman (2003). "On Further Developing
Problem-Oriented Policing. In Problem-Oriented Policing.
From Innovation to Mainstream." Crime Prevention
Studies, Volume 15, edited by Johannes Knutsson.
Monsey, NY: Criminal Justice Press.
Objective
Rationale
Method
First Steps
Problem-oriented
policing
Prevention is more
effective than
enforcement
Undertake focused
action-research (SARA)
Identify problems
requiring attention
Community policing
Public-police relations,
organizational changes,
problem-solving
Proactive prevention of
crime and social
disorder and increased
public confidence in and
support of police
Appoint a community
officer for the
neighborhood, identify
problems requiring
attention, identify
organizational changes
necessary to support
efforts
Broken windows
Deteriorating
neighborhoods
Halt slide of
neighborhood into
serious crime
Policing incivilities/order
maintenance
Identify a deteriorating
neighborhood
Intelligence-led
policing
The process of
collecting, analyzing,
and disseminating
intelligence
Development of data
gathering, processing,
and dissemination
CompStat
Barry Poyner and Barry Webb have argued that preventing residential burglaries targeted on electronic goods
requires quite different measures from those to prevent burglaries targeted on cash or jewelry. This is because they
found many differences between these two sorts of burglaries in the city they studied. When the targets were cash or
jewelry, burglaries occurred mostly in older homes near to the downtown area and were apparently committed by
offenders on foot. When the targets were electronic goods such as TVs and VCRs, the burglaries generally took place
in newer, more distant suburbs and were committed by offenders with cars. The cars were needed to transport the
stolen goods and had to be parked near to the house, but not so close as to attract attention. The layout of housing
in the newer suburbs allowed these conditions to be met, and Poyner and Webb's preventive suggestions consisted
principally of means to counter the lack of natural surveillance of parking places and roadways. Their suggestions to
prevent inner city burglaries focused more on improving security and surveillance at the point of entry.
Source: Poyner, Barry and Barry Webb (1991). Crime Free Housing. Oxford: Butterworth-Architecture.
Some serious crimes, such as school shootings, are so rare
that they cannot be properly addressed at the local level
by problem-oriented policing. This is because the
methodology depends upon a certain level of repetition to
permit underlying causes to be identified. For these kinds
of crimes, police forces must ensure that routine security
measures are in place and that they have a well-worked
out plan for responding to incidents.
While one should avoid beginning with a solution, some
solutions for specific crimes are so promising that they
might help define the focus of a POP project. To return to
the example of robbery at corner stores, there is good
research showing that having at least two members of
staff on duty can reduce late night robberies of these
stores. You could therefore take a look at how many
VANDALISM TO
ELEVATORS
THEFTS
OF/FROM CARS
BURGLARIES OF
APARTMENTS
**
*
**
*
****
****
**
****
**
****
***
****
**
*
****
* Predicted effectiveness
Crime Analysis for Problem Solvers in 60 Small Steps
ASSESSMENT
RESPONSE
de
en
Ha
nd
le
Off
Target/Victim
Guardian
CRIME
ge
ce
Pla
na
Ma
Year
1958
1960
1962
1964
1966
1968
1970
1972
1974
1976
Total
Suicides
5,298
5,112
5,588
5,566
4,994
4,584
3,940
3,770
3,899
3,816
Suicides by Percent of
Domestic Gas
Total
2,637
2,499
2,469
2,088
1,593
988
511
197
50
14
49.8
48.9
44.2
37.5
31.9
21.6
13.0
5.2
1.3
0.4
Read More:
Decker, Scott (2004). Using Offender Interviews to Inform
Police Problem-Solving Guide No. 3. Problem-Oriented
Guides for Police, Problem Solving Tool Series.
Washington, D.C.: Office of Community Oriented Policing
Services, U.S. Department of Justice. (Accessible at
www.popcenter.org and www.cops.usdoj.gov).
Michael Levi and his colleagues have described how a partnership between the police, the British Home Office
(similar to the U.S. Department of Justice), and the credit card issuers led to successful action in the mid-1990s to
reduce credit card frauds. The measures introduced included new lower limits for retailers for seeking authorization
of transactions and more secure methods of delivering new credit cards to consumers via the mail. As the figure
shows, there was a resulting marked reduction in fraud losses (total, lost & stolen, and mail non-receipt). In recent
years, however, credit card losses have begun to climb again. This is due principally to a growth in losses resulting
from "card not present frauds" (due to the rapid expansion of Internet sales) and in counterfeiting of cards (said to
be the work of organized gangs in East Asia).
Credit Card Fraud Losses, UK
300-
millions
250200150-
Total
Lost & Stolen
Mail Non-Receipt
Card Not Present
Counterfeit Card
Application Fraud
1005001991 1992 1993 1994 1995 1996 1997 1998 1999 2000
When
Read More:
Hesseling, Rene (1994). "Displacement: A Review of the
Empirical Literature." Crime Prevention Studies, volume
3, edited by Ronald Clarke. Monsey, NY: Criminal Justice
Press (accessible at www.popcenter.org).
As
Definition
Displacement
Diffusion
Geographical
Geographic change
Time switch
Temporal
Target
Tactical
Crime Type
Switching crimes
At a practical level, diffusion is important as a counterargument to displacement from those resisting the
introduction of preventive measures. And you will certainly
CCTV
2
3
Parking Lots
University Buildings
It might have been expected, therefore, that if the camera had any value in preventing crime this would only be for
the parking lots it covered adequately. It might also have been expected that crime would be displaced by the
camera from these parking lots to the one not given proper surveillance. In fact, in the year following the
introduction of the camera, incidents of theft and vandalism in the lots were cut in half, from 138 in the year prior to
65 in the year after. Incidents declined just as much in parking lot 1, not covered by the cameras, as in the other
three lots. This diffusion of the benefits of the video surveillance probably resulted from potential offenders being
aware that it had been introduced at the university, but not knowing its limitations. Many probably decided that it
was no longer worth the risk and effort of going to the university parking lots to commit crime.
Source: Poyner, Barry (1997). "Situational Prevention in Two Parking Facilities". Situational Crime Prevention:
Successful Case Studies, edited by Ronald V. Clarke. Monsey, NY: Criminal Justice Press.
Crime Analysis for Problem Solvers in 60 Small Steps
Agricultural
Transport
Predatory
Consensual
Conflicts
Incivilities
Endangerment
Misuse of Police
A
C
Residence
Crime Sites
Buffer Zone
Work
Activity Space
Target Areas
Recreation
Kim Rossmo prepared this diagram to represent the Brantinghams' theory. It shows an offender's activity space (residence, work, recreation, and the
travel routes between them), the buffer zone close to the home in which offenders do not usually commit crimes, and five potential target areas (for
example, parking lots). Where an offender's activity space intersects a target area, this is where crimes happen (crosses). Note that in this example no
crimes occur around the offender's workplace, because there are no suitable targets there. Also, there are two target areas with no crimes in them
because this offender is not aware of those places.
Source: Rossmo, Kim (2000). Geographic Profiling. Boca Raton, FL: CRC Press.
Crime Analysis for Problem Solvers in 60 Small Steps
Place
Crimes
Targets
Rate
Per 100
targets
A
B
C
D
341
148
117
28
898
1,795
243
638
.350
.082
.481
.044
35
8
48
4
Number
Rate
Crime Attractors
High
High
Crime Generators
High
Low
Crime Enabler
Low (High)
High
Crime Neutral
Low
Low
Cause
Type of Response
Questions to Answer
Crime Generator
Increase protection
Crime Attractor
Attracts offenders
What is attracting
offenders?
How can this be changed?
Crime Enabler
Erosion of controls
Restore guardianship,
handling or place
management
Percentage Of
Incidents
4
Cumulative
Percentage Of
Incidents
5
Cumulative
Percentage Of
Builders
15.5%
10.1%
9.8%
8.8%
8.8%
8.0%
7.5%
6.7%
4.9%
2.9%
2.1%
1.8%
1.8%
1.6%
1.3%
3.0%
2.4%
0.5%
2.3%
0.0%
100%
15.5%
25.7%
35.5%
44.3%
53.1%
61.1%
68.7%
75.4%
80.3%
83.2%
85.2%
87.1%
88.9%
90.4%
91.7%
94.8%
97.2%
97.7%
100.0
100.0
100%
1.8%
3.6%
5.5%
7.3%
9.1%
10.9%
12.7%
14.6%
16.4%
18.2%
20.0%
21.8%
23.7%
25.5%
27.3%
32.7%
38.2%
40.0%
56.4%
100.00
100%
Home Builder
Incidents
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
3 Builders, 4 Incidents
3 Builders, 3 Incidents
1 Builders, 2 Incidents
9 Builders, 1 Incident
24 Builders, 0 Incidents
55 builders
60
39
38
34
34
31
29
26
19
11
8
7
7
6
5
12
9
2
9
0
386
Useful Websites
Identifying responses
Summarize the responses you identify by constructing a table like that found in the POP
Guides, with one row for each response and five columns as below:
Response
Source
How It Works
Considerations
1
2
ANALYZE IN DEPTH
If, after you collected the relevant data, you found that
your city has an abnormally high number of problem bars,
you might ask the question, "What is common to most
bars in the city that produces a large number of
assaults?" One hypothesis is that it is the way liquor
licenses are dispensed and bars regulated. Another
hypothesis is that there is something about the nature of
bar customers in your city. Testing each would require you
to collect relevant data and assess the validity of
the hypothesis.
Example Hypothesis
Possible Test
ANALYZE IN DEPTH
Source: White, Matt and Charles Dean (2004). "Abuse of Temporary License Tags in North Carolina". Understanding
and Preventing Car Theft, Crime Prevention Studies, Volume 17, edited by Michael Maxfield and Ronald Clarke,
Monsey, NY: Criminal Justice Press.
Crime Analysis for Problem Solvers in 60 Small Steps
ANALYZE IN DEPTH
Number of Neighborhoods
Range 0 to 27 homicides
14
Mode=0 homicides
12
10
Median=2 homicides
Mean=3.7 homicides
4
2
0
Number of Homicides
10
14
22
27
Read More:
Names categories
Ordinal
Ratio
Example
0= not victim
0= no crime
Number of crimes: 0, 1, 2,
1= victim
1= one crime
(0= no crimes)
is as valid as
0= victim
1= not victim
Scales to the right have all the properties of those to their left, plus their own properties (e.g., anything you can do with nominal and
ordinal data you can do with ratio data, plus more).
Allowable Math
Allowable Average
Mode
Allowable Spread
Range
Comments
measures.
ANALYZE IN DEPTH
2323.
Action level
Action examples
Places - at specific
addresses, corners, or
facilities
Dots
Victims
Dots
Victims' addresses
Lines
Creating cul-de-sacs,
changing traffic patterns,
altering parking regulations.
Shaded areas
Read More:
ANALYZE IN DEPTH
Types of Hotspots
In many cases, these problems will simply rule out highdefinition mapping, but they can be overcome, as George
Rengert and his colleagues showed in their study of crime
on Temple University's campus in Philadelphia. They
developed a high-definition GIS by combining mapping
software with AutoCAD drawings of the campus. Features
such as water pipes and electrical wiring were eliminated,
and the maps were altered so that streets were
represented as lines (with lines on either side representing
pavements), while polygons were used to represent the
footprints of buildings and the shapes of athletic fields
and parking lots. Shrubbery, fences, lighting, and other
physical features were also represented on the maps.
Crimes recorded by the campus police were then plotted
exactly where they occurred, allowing them to be related
to environmental features such as poor lighting or a blind
corner allowing the attacker to lie in wait.
High Definition
Geographic
Information
System
Crime Projected
on Building Footprint
Figure 2: Locations of Robberies and Snatches on the Walkway System on the Lisson Green Estate
Before Entry Phones
Key
Housing blocks
Blocks fitted
with entry
phones
Walkways
Robbery or
snatch
Elevator and
stair towers
ANALYZE IN DEPTH
Read More:
Hours
1
2
3
4
5
6
7
8
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Mean
7
3
6
9
9 11 10 17 16 17
5
6 12
7
9
5 20 18 16
8
7 10
8
7 10.1
10
9 10 11
7
6 13 15 15 18
6 12
7
7
8
5 16 18 17 12
5 11 10
4 10.5
4 11 12
6
8
3 18 17 24 14 10
7
4
2
4
9 23 24 24
7
5 12
3
4 10.6
8
8
7
9
4 10 17 21 20 11 10
5
4
3
9
6 17 24 18
4
5
4 10
6 10.0
3 12
6
7
9 12 13 19 20 19
3
4
3
4
9
3 15 16 17
8 10 18 12 13 10.6
10 12
3
1
1
1
1
1
2
3
4
3
4
5
6
4
7
8
7
5 10 21 24 23
6.9
21 22 10
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
3.1
9.0 11.0 7.7 6.4 5.6 6.3 10.4 13.0 14.0 11.9 5.6 5.4 5.0 4.1 6.6 4.7 14.1 15.6 14.3 6.4 6.1 11.0 9.7 8.3
ANALYZE IN DEPTH
Events
12
10
8
6
4
2
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Hours
B. Percent of Week's Events
Mon
Tues
Wed
Thur
Fri
Sat
Sun
.0
5.0
Percent
10.0
15.0
20-25
15-20
10-15
5-10
0-5
Hours
Crime Analysis for Problem Solvers in 60 Small Steps
The
18.0
Trend
16.0
Smoothed
14.0
Homicides
12.0
10.0
8.0
6.0
4.0
2.0
t0
1
Ja
n
02
Ap
r0
2
Ju
l0
2
Oc
t0
2
Ja
n
03
Ap
r0
3
Ju
l0
3
Oc
t0
3
Ja
n
04
Ap
r0
4
Ju
l0
4
Oc
t0
4
Oc
l0
r0
Ju
01
Ap
Ja
n
t0
Oc
l0
r0
Ju
Ap
00
0.0
Ja
n
Number of homicides
20.0
120
100
80
2001
2002
2003
60
40
20
0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
ANALYZE IN DEPTH
Location
Apartment buildings
Shoplifting
Retail stores
Motorcycle Theft
Neighborhood
Graffiti
Commercial areas
Taxi robberies
Company
Motels
Rate
Burglaries per apartment, or per
household
Thefts per item on shelves, or per
square foot of retail space
Motorcycle thefts per registered
motorcycle
Graffiti per square foot
Comments
Burglaries per resident places too much emphasis on
large families.
Thefts per customer gives an offending rate.
Problematic for areas cyclists use but do not live in.
Difficult to measure.
Robberies per cab, or per driver, or Hours of exposure is preferable, but data may not be
driver-hours
available.
Disorder calls per guest or per
Might also look at numbers of non-guest visitors.
room
Uptown Study
Area and Analysis
Legend
Parking Areas
1999 LFA by block
Lower
Higher
Read More:
Clarke, Ronald and Herman Goldstein (2003). Thefts from
Cars in Center City Parking Facilities. From Innovation to
Mainstream. Crime Prevention Studies, vol. 15, Monsey,
New York: Criminal Justice Press. (available at:
www.popcenter.org)
ANALYZE IN DEPTH
Store*
Shopliftings
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
7 stores with 2 incidents
28 stores with 1 incident
26 stores with 0 incidents
Total stores = 78
78
42
28
16
15
12
11
11
9
7
5
5
4
4
3
3
3
14
28
0
298
Shopliftings per
1000 Sq. Ft.
1.54
0.70
0.22
0.24
0.28
0.31
0.09
0.16
0.28
2.82
0.16
0.10
0.35
0.12
3.32
0.90
0.02
0.08
0.06
0.00
0.15
* The top 17 stores were (in alphabetical order): Best Buy, Boater's World, Circuit City, Costco, CVS Pharmacy, Galyan's, Home Depot,
Kohl's, Linens & Things, Lowe's, Marshall's, Old Navy, Radio Shack, Stop & Shop, Target, and Wal-Mart
Year
No. of Units
Acquired
4
1977
15
1982
8
1983
8
1985
10
1985
16
1986
6/8
1986
5
1987
12
1987
6
1988
10
1991
10+
1991
4+
1992
4
1992
Post-Owning
1.6
16.9
2.3
4.5
6
27.9
3.4
8.3
11.3
8.1
9.3
21.8
0.7
10.7
Source: Clarke, Ronald and Gisela Bichler-Robertson (1998). "Place Managers, Slumlords and Crime in Low Rent Apartment Buildings".
Security Journal, 11: 11-19.
Read More:
Eck, John, Ronald Clarke and Rob Guerette,
"Risky Facilities: Crime Concentration in Homogeneous
Sets of Facilities." Crime Prevention Studies, in press.
Crime Analysis for Problem Solvers in 60 Small Steps
ANALYZE IN DEPTH
Read More:
Weisel, Deborah (2004) Analyzing Repeat Victimization,
Problem Solving Tool Series, No. 2. Washington, D.C.:
Office of Community Oriented Policing Services, U.S.
Department of Justice. (accessible at www.popcenter.org
and www.cops.usdoj.gov).
Johnson, Shane and Kate Bowers (2004). "The Burglary
as Clue to the Future: The Beginnings of Prospective HotSpotting." European Journal of Criminology, 1(2),
237-255.
Neighbor Beware!
Repeat victimization tells of an elevated risk that the same victim will suffer again, most often in the immediate days
or weeks following the preceding crime. But risk can be communicated to nearby places. Kate Bowers and Shane
Johnson of the Jill Dando Institute of Crime Science have shown how burglary risk is communicated down a street.
This is illustrated in the graph. A home is burgled, which we will call the reference burglary. The numbers at the
bottom are a measure of distance from the reference burglary. A distance of one tells of a home next to a burglary
location on the same side of the street, or the home immediately opposite. A distance of two refers to homes two
doors down on the same side of the street, or diagonally opposite, and so on. The ordinate shows the number of
burglaries following reference burglaries. The data come from Merseyside Police in the UK. You can see that the risk
of another burglary declines the further the distance from the reference burglary. For any given distance, the risk is
greater for homes on the same side of the street. This shows which homes one should seek to protect in the wake of
a burglary. Priority should be given to homes close to the burgled home and especially on the same side of the street.
4500
number of burglaries
4000
same side equivalent
opposite side
3500
3000
2500
2000
3 4 5 6 7 8 9 10
house numbers apart
ANALYZE IN DEPTH
ANALYZE IN DEPTH
Useful as these data are, they do not show which cars are
most at risk from specific forms of theft. However,
research undertaken in the 1980s found that the models
preferred by joyriders were "muscle" cars with powerful
acceleration, such as the Chevrolet Camaro. Those most
often stolen and never recovered were expensive cars
such as Lincolns and Mercedes, and those most often
broken into and stripped of contents were European
models, such as Volkswagens, with good radios that fit a
variety of models. Domestic station wagons, the staples of
family transport, were not at risk of any form of theft.
These were inexpensive, had terrible radios, and joyriders
wouldn't be seen dead in them.
Surveys undertaken by the Loss Prevention Research
Council show that shoplifters consistently choose CDs,
cigarettes, liquor, and fashion items such as Hilfiger jeans
and Nike sneakers. Many of these things can readily be
sold on the street or door-to-door in some places. Police
have paid little attention to the fencing of stolen goods
because it is difficult to prove and attracts relatively light
sentences, but many departments now receive regular
electronic reports on pawnshop transactions. Scanning
these reports will help you keep informed about what
burglars and others are stealing in your area. It will also
help you think about how stolen goods are sold and ways
of disrupting the market.
Claim Frequency
20.2
17.0
10.2
8.3
7.9
0.5
0.5
0.5
0.7
0.7
2.5
Read More:
Clarke, Ronald (1999). Hot Products. Police Research
Series. Paper 112. London: Home Office. (Accessible
at: www.popcenter.org).
Jun- 99
Dec- 99
Jun- 98
Dec- 98
Dec- 97
Jun- 97
Jun- 96
Dec- 96
Dec- 95
Jun- 95
Dec- 94
Jun- 94
Jun- 93
Dec- 93
Dec- 92
Jun- 92
ANALYZE IN DEPTH
8.00
Controls
6.00
compare
4.00
2.00
0.00
D E
Bars
ANALYZE IN DEPTH
3333.
Measure association
No (0)
C
D
Total
A+C
B+D
Unlocked Gates
16
8
Locked Gates
33
13
On-site Manager
14
24
Odds Ratio
1.857
Odds Ratio
3.452
Odds Ratio
0.305
ANALYZE IN DEPTH
Increase Effort
Reduce Rewards
Remove Excuses
Reduce Provocations
Measures to Prevent Use of Public Phones by
Drug Dealers in U.S. Cities
Before cell phones became widely available, drug dealers
often relied on the use of public phones to make contact
with suppliers and customers. Many ways to stop them
were tried, including:
City
Security Provisions for Bank Cash Machines in New York City and Los Angeles
New York City
Enclosed cash machine within a secured vestibule
Increased lighting
Transparent windows in facility enclosure.
Elevated mirrors for users
Reduced vegetation near machine
Surveillance cameras
Safety reminders to users
Security provisions notice to potential offenders
Crime assessment prior to installation of cash machine
Security guard personnel
Reduced cash machine operational hours based on temporal crime patterns in area
Los
Angeles
Required by legislation.
Not required under legislation, but commonly implemented at bank's discretion.
* Required only during non-banking hours for ATMs located inside bank buildings open for customer use.
Source: Guerette, Rob and Ronald Clarke (2003). "Product Life Cycles and Crime Automated Teller Machines and
Robbery." Security Journal 16: 7-18.
ANALYZE IN DEPTH
Entering setting
Enabling conditions
Selecting target
Completing the theft
STEPS
Get tools (e.g., screwdriver, duplicate keys, slidehammer, short steel tube)
Select co-offender
Enter parking lot
Loiter unobtrusively
Reject alarmed cars
Choose suitable vehicle
Enter car (duplicate keys, use screwdriver)
Break ignition lock (tube or slide-hammer)
Hot wire ignition and start car
Leave parking lot
Use car to joyride
Abandon car on wasteland
Set fire to car
RESPONSES
Control sales of equipment such as hand scanners and
duplicate keys
Parking lot barriers; attendants; few entrances
CCTV and/or regular patrols to deter loiterers
Visible protection of tempting vehicles
CCTV to monitor suspicious behavior; improve natural
surveillance of lot; vehicle alarm to alert security;
vehicle immobilizer
Attendants or other exit barriers
Vehicle-tracking system activated; vehicle curfew
program; surveillance of dumping sites
Source: Cornish, Derek (1994). "The Procedural Analysis of Offending and its Relevance for Situational Prevention." Crime Prevention Studies,
volume 3. Monsey, NY: Criminal Justice Press
Coyote
Environment
Migrant
ANALYZE IN DEPTH
3636. Be sure to answer the five "W" (and one "H") questions
Note that all these solutions are outside the normal remit
of the police. Officers rarely consider that their role
involves, for example, redesigning bus stops. But as a
problem-solving crime analyst your job is to cut crime, and
you may need gently to persuade police colleagues that,
in the widest sense, it is their job, too.
ANALYZE IN DEPTH
A. Accurate
True Positives
C. False Positives
Accuracy Rate
False Negative Rate
False Positive Rate
B. False
Negatives
D. Accurate
True Negatives
(A+D)/(A+B+C+D)
B/(A+B+C+D)
C/(A+B+C+D)
YES
35
35
35
35
70
Accuracy Rate
False Negative Rate
False Positive Rate
NO
Total
10
496
506
45
531
576
92.2%
1.7%
6.1%
ANALYZE IN DEPTH
Reduce Provocations
Remove Excuses
1. Target harden
2. Control access to facilities
3. Screen exits
4. Deflect offenders
5. Control tools/weapons
6. Extend guardianship
7. Assist natural surveillance
8. Reduce anonymity
9. Use place managers
10. Strengthen formal surveillance
11. Conceal targets
12. Remove targets
13. Identify property
14. Disrupt markets
15. Deny benefits
16. Reduce frustrations and stress
17. Avoid disputes
18. Reduce arousal and temptation
19. Neutralize peer pressure
20. Discourage imitation
21. Set rules
22. Post instructions
23. Alert conscience
24. Assist compliance
25. Control drugs and alcohol
1.
2.
3.
4.
5.
6.
7.
Criticism
It is simplistic and atheoretical.
Rebuttal
It is based on three crime opportunity theories: routine
activity, crime pattern, and rational choice. It also draws
on social psychology.
Many dozens of case studies show that it can reduce
crime, usually with little displacement.
It achieves immediate results and allows time for finding
longer-term solutions to crime.
It promises no more than it can deliver. It requires that
solutions be economic and socially acceptable.
It provides as much protection to the poor as to the rich.
The democratic process protects society from these
dangers. People are willing to endure inconvenience and
small infringements of liberty when these protect them
from crime.
It empowers victims by providing them with information
about crime risks and how to avoid them.
Harden targets
Steering column locks and ignition immobilisers
Anti-robbery screens in banks and post offices
Bullet-resistant shields for cab drivers
Control access to facilities
Entry phones for apartment complexes
Electronic card access to garages and offices
Defensible space designs for public housing
Screen exits
Ticket needed to exit
Export documents
Electronic tags for stores and libraries
Deflect offenders
Separation of rival fans in stadium
Street closures
Separate bathrooms for women
Control tools and weapons
Safer guns
Toughened beer glasses
Stop incoming payphone calls to foil drug dealers
Photos on credit cards and thumbprints on checks
Number of supporting
studies*
10
8
6
5
5
5
5
4
4
3
3
3
2
2
Extend guardianship
Promote routine precautions such as leaving signs of
occupancy when away from the house, carrying a cell
phone and going out at night in a group
"Cocoon" neighborhood watch
Assist natural surveillance
Improved street lighting
Defensible space design
Neighborhood watch and informant hotlines
Reduce anonymity
Cab driver IDs
"How's my driving?" decals
School uniforms
Use place managers
Train employees to prevent crime
Reward vigilance
Support whistleblowers
Strengthen formal surveillance
Speed cameras and random breath testing
Video surveillance of downtowns
Focused bike patrols in parking lots
Read More:
Sutton, Mike and colleagues (2001). Tackling Stolen
Goods with the Market Reduction Approach. Crime
Reduction Research Series Paper 8. London: Home Office.
Reduce Rewards
Conceal targets
Off-street parking for cars attractive to joyriders
Gender-neutral phone directories
Unmarked armored trucks
Remove targets
Removable car radios
Women's shelters
Pre-paid cards for payphones
Identify property
Property marking
Vehicle licensing and parts marking
Cattle branding
Disrupt markets
Checks on pawn shops
Controls on classified ads
License street vendors
Deny benefits
Ink merchandise tags
Graffiti cleaning
Disable stolen cell phones
1984
400
1985
1720
1915
Clean Cars
1986
1987
3434
4707
3454
4839
1988
5946
6077
1989
6221
6245
Source: Sloan-Howitt, Maryalice and George Kelling (1997) "Subway Graffiti in New York City: Gettin up vs. Meanin
it and Cleanin it." Situational Crime Prevention: Successful Case Studies, Ronald Clarke, Monsey, NY: Criminal Justice
Press.
Read More:
Wortley, Richard (2001). "A Classification of Techniques
for Controlling Situational Precipitators of Crime." Security
Journal, 14: 63-82.
Reduce Provocations
Remove Excuses
Set rules
Rental agreements
Harassment codes
Hotel registration
Post instructions
"No Parking"
"Private Property"
"Extinguish camp fires"
Alert conscience
Roadside speed display boards
Signatures for customs declarations
"Shoplifting is stealing"
Assist compliance
Easy library checkout
Public lavatories
Litter bins
Control drugs and alcohol
Blood alcohol self-testing in bars
Server intervention
Alcohol-free events
Source: Shearing, Clifford and Phillip Stenning (1997). "From the Panopticon to Disney World: The Development of
Discipline". Situational Crime Prevention: Successful Case Studies (2nd ed.), Ronald V. Clarke. Monsey, NY: Criminal
Justice Press.
Who
So, at last your worries are over and you can relax, right?
Wrong! Even more difficult than agreeing on a good
response is to make sure that it is actually implemented.
You cannot ensure this on your own, but if you know the
pitfalls of implementation, you can steer the partnership
away from choosing responses that can fall prey to these.
Tim Hope and Dan Murphy identified these pitfalls when
studying a vandalism prevention project in eleven schools
in Manchester, England.
The responses to be implemented at each school were
selected by groups of local government officials, school
staff and police. Much of the damage was more careless
than malicious. This suggested two different solutions:
situational responses to protect the buildings or providing
recreational activities to divert children into less harmful
activities. Only one of the eleven groups recommended
improved leisure provision. The situational responses
recommended were mostly basic target-hardening
(window grills, toughened glass and high fences), though
proposals also included a plan to encourage local
residents to keep an eye on two adjacent schools and a
plan to move a playground to a less vulnerable area.
At only two schools were all the recommendations
implemented. In three, none was put in place and at the
remaining six schools one or more recommendations
failed to materialize. These failures to implement meant
there was little impact on vandalism. Hope and Murphy
identified five main obstacles to implementation, all of
which have been encountered in U.S. problem-solving
projects:
Will
RESULTS
arrests
people trained
barriers installed
other tasks accomplished
OUTCOMES
crimes reduced
fear abated
accidents reduced
other reductions in problems
Impact
Evaluation
Results
Response implemented
as planned
Problem declined
and no other likely
cause
Problem did
not decline
D. Little is learned
Others
6 Months After
Change
20
-21
Occupied Units
83
73
-10
Burglaries/
Occupied Unit
.494
.286
-.208
Burglaries
40
30
20
10
03
c.
e.
0
De
Ju
n
02
De
c.
2
e0
Ju
n
Ja
n.
02
Response
Control
Response begins
40
Nov.02-Jan 30
Aug-Oct, 02
16.3
30
Control
20
10
5.7
8.3
03
c.
De
3
ne
.0
Ju
02
c.
De
2
e0
Ju
n
Ja
n.
0
Treatment
Adjacent Area
Distant Area
Before
100
100
100
After
75
110
100
Difference
-25
+10
0
Treatment
Adjacent Area
Distant Area
Days of week
Before
After
Difference
100
100
100
75
110
100
-25
+10
0
Estimated
Net effect
-35
-25
Read More:
Ekblom, Paul (1987). Preventing Robberies at Sub-Post
Offices: An Evaluation of a Security Initiative. Crime
Prevention Unit Paper 9. London: Home Office.
Webb, Barry (1994). "Steering Column Locks and Motor
Vehicle Theft: Evaluations from Three Countries". Crime
Prevention Studies, volume 2, Ronald Clarke. Monsey, NY:
Criminal Justice Press. (Accessible at: www.popcenter.org).
A study of target displacement: helmet laws and the reduction in motorcycle theft
In Germany (as elsewhere) the enactment of helmet laws was followed by large reductions in thefts of motorcycles.
After the laws were brought into place in 1980, offenders wanting to steal a motorbike had to bring a helmet or
they would be spotted quickly. The figure shows that by 1986 thefts of motorbikes had dropped to about one-third
of their level in 1980, from about 150,000 to about 50,000. (The gradual decline probably reflects stronger
enforcement and growing knowledge about the requirement.) This fact suggests that motorbike theft has a much
larger opportunistic component than anyone would have thought. The existence of excellent theft data in Germany
allowed researchers to investigate whether the drop in motorcycle theft had resulted in target displacement to theft
of cars or bikes, other forms of personal transportation.
The other two lines show the national totals for car and bike thefts during the same years. These provide some
limited evidence of displacement in that thefts of cars increased by nearly 10 percent between 1980 and 1986, from
about 64,000 to 70,000. Thefts of bicycles also increased between 1980 and 1983, but by the end of the period had
declined again to a level below that for 1980. Altogether, it is clear that at most only a small proportion of the
100,000 motorbike thefts saved by the helmet laws were displaced to thefts of other vehicles.
A little thought shows why this may not be surprising. Motorbikes may be particularly attractive to steal. They are
much more fun to ride than bikes for the young men who comprise most of the thieves. Even if the intention is
merely to get home late at night, a motorbike offers significant advantages, especially if the distance is more than a
few miles. Motorbikes may also be easier to steal than cars since the latter have to be broken into before they can
be started. Like bikes, cars also offer less excitement than motorcycles and they may require more knowledge
to operate.
500,000
Motorcyles
Cars
Bicycles
Number of Thefts
450,000
400,000
350,000
300,000
250,000
200,000
150,000
100,000
50,000
0
1980
1981
1982
1983
1984
1985
1986
Source: Mayhew, Pat and colleagues (1989). Motorcycle Theft, Helmet Legislation and Displacement. Howard Journal
of Criminal Justice 28:1-8.
Crime Analysis for Problem Solvers in 60 Small Steps
You cannot find displacement unless you look for it. This
means that you should examine a problem closely and
imagine the most likely forms of displacement. Are there
other opportunities for crime or disorder that are similar
to the opportunities your efforts are trying to block? Will
your offenders easily discover these opportunities?
Looking for displacement opportunities prior to finalizing
a response gives you two advantages. First, you can
develop measures for detecting it should it appear. More
important, you may be able to develop counter-measures
that prevent displacement.
Read More:
Rb
Cb
Ra
Ca
Read More:
Bowers, Kate and Shane Johnson (2003). "Measuring the
Geographical Displacement and Diffusion of Benefit
Effects of Crime Prevention Activity." Journal of
Quantitative Criminology 19(3):275-301.
Selecting Control and Diffusion/
Displacement Sites
Diffusion/Displacement
Sites
Response Site
Control Sites
Legend
Lower
Parking Areas
1999 LFA by block
Higher
25
Pubilicity
campaign begins
20
15
10
5
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Two week periods: Aug. 1 94- Aug. 31, 95
Source: Barclay, Paul and colleagues (1996) "Preventing Auto Theft in Suburban Vancouver Commuter Lots: Effects of a
Bike Patrol." Crime Prevention Studies, volume 6, Monsey, NY: Criminal Justice Press.
Proportion of of Crimes
0.200
0.100
0.050
0.000
Proportion of of Crimes
A. Clear Difference
0.150
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Number of Crimes
0.120
0.100
B. Ambiguous Difference
0.080
0.060
0.040
0.020
0.000
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Number of Crimes
0.50
0.40
0.30
0.20
0.10
0.00
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Number of Crimes
Proportion of of Crimes
0.60
What
D. Summary.
3: What should be done about this problem?
A. Organizing framework for response - e.g., situational
crime prevention:
Offenders.
Targets/victims.
Places.
B. Systematic description of response strategy:
Increasing risk or effort.
Decreasing reward, excuses, or provocations.
Who will carry out actions, when, and where?
Additional resources required.
C. Implications and anticipated outcomes:
Direct results.
Displacement.
Diffusion.
Other side effects.
How evaluation should be conducted.
D. Summary.
COMMUNICATE EFFECTIVELY
1.
2.
3.
4.
5.
6.
Know what information your audience will find useful (and what information is confusing).
Keep maps simple. Eliminate all features that do not contribute to understanding the problem.
Avoid graphics that draw more attention to themselves than the data.
Include details that help the viewer understand the problem, even if that means adding this information by hand.
Include a scale and, if needed, a compass orientation (usually North is to the top).
Use meaningful gradations to show intensity of hot spots. For example show colors becoming increasingly hot
(yellow to red) as the problem worsens.
7. Apply the correct dimension of crime concentration: dots for places (and sometimes victims); lines for
concentrations along streets and highways; and areas for neighborhoods.
8. Make use of tables and figures along with maps.
HIGHWAY
closed section
Tnsberg downtown
area - 30 bars,
taverns etc
Figure 1:
Locating The Problem And
Showing Its Setting
Barriers
P =parking lot
P =no admission
HIGHWAY
closed section
HIGHWAY
closed section
Cab Stand
Figure 2:
Analyzing The Problem and
Showing Response
Section of highway
temporarily closed
off during weekend
nights
Cab Stand
New Cab
Stand
GYPSY CABS
Kiosk
Moved Barriers
Bus Stand
P =parking lot
P =no admission
Moved Bus
Stand
P =parking lot
P =no admission
Description of response
COMMUNICATE EFFECTIVELY
ables are effective tools for telling a compelling story two causes. The basic principles of table construction
if they are made simple. But the software used to
remain the same:
create tables adds unnecessary and distracting
packaging - the lines and labels used to interpret the data All the causes go in the same direction
(usually columns).
- and analysts do not always organize tables in a way that
Summation goes in the direction of the cause
makes intuitive sense.
(down columns).
Comparison of causes goes in the opposite direction
Assume that you are trying to show that the way beer is
(across rows, if causes are in columns).
displayed facilitates beer thefts from stores. Some stores
display the beer near the front entrance and some at the
Table 3 is called a three-dimensional table because three
rear. You are trying to show that rear display stores have
things are examined (the earlier tables were two
fewer incidents of beer thefts than those where the
dimensional). Table 3 answers the question: is the
display is in the front. Table 1 gets in the way of this
relationship between display location and theft different
message. The data are poorly organized and the
for two different store chains (Drink-Lots and Tippers). The
packaging is distracting.
answer is that it is not. There is the same basic pattern for
both chains that we saw in Table 2. In both cases, we sum
Table 2 properly organizes the data. The percentages are
the column and compare front-display stores to rearmade central to the story. Because the raw numbers do
not tell the main story, but may be useful to a reader who display stores. This implies that any store that displays
wants to look more closely, they are made subservient by beer at the rear will experience less theft, regardless of
which chain it belongs to.
enclosing them in brackets. Finally, instead of row
percentages (as in the first table), Table 2 uses
In effect, Table 3 holds constant the type of store. Other
column percentages.
factors can be held constant if we think they are
Whenever we examine a relationship in which something important. For example, we could group stores by size
may be causing something else, it is best to put the cause (small, medium and large), and separately analyze the
relationship between display location and theft for each
in the columns and use column percentages. Then, make
size category. This would require three panels, but
comparisons across the rows. Here, we see immediately
otherwise the same principles apply.
that 29 percent of the front-display stores had no thefts
compared to almost 83 percent of the rear-display stores.
Take note of several other features of Table 3:
At the opposite extreme, almost 46 percent of the frontdisplay stores had three or more thefts, but none of the
If you add the raw numbers (in brackets) in the Drinkrear-display stores did.
Lots cells to their corresponding cells under Tippers, you
get the raw numbers in Table 2. In other words, Table 2
Table 2 has less packaging. The bold borders have been
is a summary of Table 3. But you cannot derive Table 3
removed and replaced by thin lines. Inside, the only
from Table 2.
remaining line separates the title from the content.
Because Table 3 contains two possible causes of the
Instead of lines, space is used to guide the reader's eye
problem, we have added a vertical line to draw
across rows and down columns. By informing the reader
attention to the two types of stores.
in the title that the important numbers are percentages
(and the raw numbers are in brackets), there was no need The row labels apply to both store types, so there was
no need to duplicate them.
to include a percent symbol in each cell. Only the column
total remains. This tells the reader that the important sum Because of rounding in the percentages, they sometimes
add to over 100. In some instances these sums can be
is vertical. Finally, all percentages are rounded to one
just under 100, usually 99.9. Such small deviations are
decimal place, thus allowing the column figures to line up,
seldom of much concern.
making interpretation easier. With all of these changes,
most of the content of the table is data rather
If you routinely produce the same tables for the same
than packaging.
decision-makers, show them several different table
formats with the same data. Determine which format
A problem often has multiple causes. Though tables can
be constructed to show large numbers of causes, a single helps them the most, and then use this standard format.
table communicates poorly when you examine more than
Location of display
Number of theft reports
0
1-2
3 or more
Total
Front
Rear
Total
7 (17.5%)
6 (46.15%)
11 (100%)
24 (37.5%)
33 (82.5%)
7 (53.85%)
0 (0%)
40 (62.5%)
40
13
11
64
Front
29.2 (7)
25.0 (6)
45.8 (11)
100.0 (24)
Rear
82.5 (33)
29.2 (7)
0.0 (0)
100.1 (40)
COMMUNICATE EFFECTIVELY
60
front door
rear door
50
40
31
30
20
rear window
front window
unknown
other
10
0
20
16
rear
front
window window
front
door
rear
door
other unknown
Number of Burglaries
%
45.0
40.0
35.0
30.0
25.0
20.0
15.0
10.0
5.0
0.0 front
door
40
30
20
10
rear
door
other
window unknown
front
window
0 April
May
June
July
August
Sept
COMMUNICATE EFFECTIVELY
Undertaken
sources used
the data was organized
Why we have this problem
Possible responses
6-13
Data
How
Pla
ers
nag
ces
Ma
Ha
n
Off dlers
end
ers
Targets
Gaurdians
15
Inconsistent Responses
Consistent Responses
16
Targets and Handlers
a.
b.
Places and Managers
a.
b.
Offenders and Handlers
a.
b.
Crime Analysis for Problem Solvers in 60 Small Steps
COMMUNICATE EFFECTIVELY
High
Projector
Modern presentation equipment is both complex and
failure-prone. Be sure you know how it works and have
backup plans. If time permits, we always conduct a trial
run with the equipment in the room. And during this trial
run, we have found it useful to sit in different parts of the
room and view the most complex slides. Even if you
cannot make adjustments, you can forewarn your
audience later. (For example, "Those of you on the left
might want to move to the center as there are some
graphics that are hard to see from the left-most seats.")
1. Locate the projector in the best position for the
audience and yourself.
2. Make sure it does not block the view of the screen.
3. If necessary, get help with presenting slides.
4. Make sure slides can be read from the back of
the room.
5. Draw curtains or blinds if necessary.
6. Never assume things will work as planned!
Presentation style
Though knowing your material is critical, you need to
have a style the audience appreciates. At minimum, make
sure your audience does not have to work to overcome
your style to understand your presentation. Treating your
audience with respect is absolutely critical.
1. Do not read your paper even if you have supplied a
written version.
2. Speak from notes (using cards prevents you from
losing your place).
3. Begin politely (thank chair, introduce yourself, greet
audience, etc.).
4. If possible, stand up and speak (this helps keep
control of the audience).
5. For lengthy presentations, you can vary where you
stand (but don't walk about restlessly).
6. Do not block the audience's view of the slide images.
7. Make sure you can be heard.
8. Don't speak too fast (about 120 words per minute
is good).
9. Maintain eye contact with the audience (but not just
one person!).
10. Make sure your audience knows when it is
appropriate to ask questions - during the presentation
or after.
Presentation Software
PowerPoint and other similar presentation software allow
the audience to receive the information simultaneously in
two modes: visually and aurally. They are therefore more
likely to understand and remember key points. There are
four dangers from electronic presentations. First, they can
result in standardized presentations that quickly become
boring for more sophisticated audiences. Second, they
can become so complex that the audience pays more
attention to the media than the message. Three,
breakdowns become more common with greater
complexity. Four, they can stifle questions from the
audience. Watching you fix a multimedia extravaganza
bores your audience and wastes there time. Remember
the KIS principle: Keep It Simple.
1. Don't read your slides - your talk should not just be a
repetition of the slides.
2. Look at the audience - not at your slides!
3. Begin with the title of the presentation, your name
and affiliation (but not your qualifications).
4. Use only one form of slide transition throughout, and
only use a simple transition that does not distract the
audience from your main points.
Individual PowerPoint Slides
Keep each slide simple, too. Lots of text on a slide is hard
to read. Your objective is to make each slide telegraphic.
Each slide should focus attention on a critical point and
avoid distractions from that point. So make them easy to
read and understand.
1. Make only one point.
2. Present just enough detail to address the point and
no more.
3. Avoid distracting sound effects, animation, type fonts,
and transitions.
4. Use dark background (e.g., deep blue) and light colors
for text (e.g., yellow).
COMMUNICATE EFFECTIVELY
2. New Analytical
Technique
Why old technique is
limited
3. New Response
Exploration of what
is different
III. Evidence
Comparison of old
problem to new
problem
IV. Conclusions
Systematic
comparison of old
technique to new
based on objective
criteria
Circumstances where
new technique is
particularly helpful
Systematic
comparison of old
response to new
based on objective
criteria
Circumstances where Circumstances where
response should be
new response is
used and expected
particularly helpful
results
Outline
1. New Problem
I. Dissatisfaction
Discovery of an
anomalous situation
II. Search
COMMUNICATE EFFECTIVELY
Term
60 small steps
Definition
Step
3-D Mapping
24
80-20 rule
23
25
Acute troubles
14
Adaptation
11, 46
Analysis
Anticipatory benefits
52
Aoristic analysis
25
11, 46, 52
Definition
Step
Assessment
Attractors, Crime
Behaviors
15
Boost accounts
29
Broad-spectrum treatments
49
Buffer zone
16, 51
Case-control study
A systematic comparison of
troublesome persons, places, times,
or events to untroublesome ones
to find out the characteristics that
might cause the problem. This
type of study is particularly useful
when troublesome cases are a very
small proportion of all cases
17, 32, 33
17, 28
Term
Term
60 small steps
Definition
Step
Cases
CHEERS
14, 15, 54
23
Chronic problems
14
Community policing
1, 3, 4, 5
CompStat
3, 4, 5
Content
56, 57
Definition
Step
Control group
47, 49, 51
32, 33
Correlation
33
Costs
CPTED
Term
Term
60 small steps
Definition
Step
CRAVED
28, 31
Crime Mapping/Maps
24
Crime triangle
Crime-neutral areas
17
Cycles
Defiance
11
Problem characterized by
substantial involvement of repeat
places (see Problem analysis
triangle, place). Occurs when new
potential offenders and new
potential targets encounter each
other in a place where
management is weak
8, 15
8, 35, 54, 58
25
Definition
Step
Diffusion contamination
51
Diffusion of benefits
13
Diffusion of benefits,
geographical
13
13
13
13
Diffusion-Displacement sites
51
Displacement
Displacement contamination
Displacement, geographical
Displacement, tactical
48, 49
48
12, 13, 49
12, 13, 46, 48
12, 13, 49
Term
Term
60 small steps
Definition
Step
Displacement, target
Displacement, temporal
Distribution
22
Problems characterized by
substantial involvement of repeat
victims (see Crime triangle). Occurs
when victims continually interact
with potential offenders at
different places, but the victims do
not increase their precautionary
measures and their guardians are
either absent or ineffective
8, 15
Edges
16
Enablers, crime
17
Environments
15, 28, 30
Facilitators
34
Facilitators, chemical
34
Facilitators, physical
34
12, 13, 49
12, 13, 48, 49
Definition
Step
Facilitators, social
34
Facilities
Facilities, risky
False Negative
37, 53
False Positive
37, 53
Flag accounts
29
25
Framework, story
54, 58
Generators, crime
17
Geographic Information
System
See GIS
Term
Term
60 small steps
Definition
Step
GIS
2, 24, 29
Graded response
29
Handler
25, 28
Home Office
Hot areas
23
Hot dots
23
Hot lines
23
Hot products
Hot spots
Geographic concentrations
of crime
Definition
Step
Hypothesis
20, 50
Impact evaluation
46
22
Input
46
Intervention
Manager
Mean
22
Median
22
Mode
22
Moving average
26, 52
Near repeats
29
Term
Term
60 small steps
Definition
Step
Nodes
16
Nominal Scale
22
Odds Ratio
33
Offender
Offenders, repeat
3, 18, 30
Opportunity
Ordinal Scale
22
Outcome
Packaging
Paths
Perceptions, offenders'
16
11, 34
Definition
Step
Place
POP
4, 5, 6, 8, 14, 19, 46
POP Guides
3, 19
8, 16
Problem-Oriented Policing
Process evaluation
Provocations
p-value
53
Random fluctuations
26, 53
Range
22, 25
46, 47, 55
Term
Term
60 small steps
Definition
Step
Rates, crime
Ratio Scale
22
47, 52
Response
Response group
47
Results
Activities accomplished in
a response
46
Risk, crime
SARA
Scanning
7, 21
Definition
Step
Scripts
35, 36
Significance level
53
Significance test
53
Smoothing
26, 52
Standard Deviation
22, 53
Standard model
Target
Targets at risk
26, 27
Temporal clustering
25
Time-window effect
29
Term
Term
60 small steps
Definition
Step
Treatment
Treatment area
48, 51
Treatment group
49, 51
Trend
A comparison of troublesome
persons, places, times, or events
without examining similar
untroublesome ones. The results of
such a study are often
highly misleading.
32
Victim
Victim, repeat
Victimization, repeat
Virtual repeats
29
Problems characterized by
substantial involvement of repeat
offenders (see Crime triangle).
Occurs when offenders are able to
locate temporarily vulnerable
targets and places
8, 15
48, 49, 51
e01052683
ISBN: 1-932582-52-5