11,102 research outputs found

    Computational Criminology

    Get PDF
    In this report, we present our work done in spring 2011 on the UK crimes dataset. This dataset was first released in December 2010, and contains reports of crimes committed in England and Wales, with their type and location. We first perform some exploratory analysis on this data, by looking at the correlation of crime rates with some independent variables, such as the population density or the unemployment rate, as well as the relationship between different types of crimes. We also study the spatial autocorrelation of the crime rates. Then, we define a classification problem in which we are interested in identifying probable criminals from mobility traces and aggregated crimes reports. We first introduce a basic algorithm to try and solve this problem, and then reformulate our model to fit a probabilistic group testing setup

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Power of Criminal Attractors: Modeling the Pull of Activity Nodes

    Get PDF
    The spatial distribution of crime has been a long-standing interest in the field of criminology. Research in this area has shown that activity nodes and travel paths are key components that help to define patterns of offending. Little research, however, has considered the influence of activity nodes on the spatial distribution of crimes in crime neutral areas - those where crimes are more haphazardly dispersed. Further, a review of the literature has revealed a lack of research in determining the relative strength of attraction that different types of activity nodes possess based on characteristics of criminal events in their immediate surrounds. In this paper we use offenders' home locations and the locations of their crimes to define directional and distance parameters. Using these parameters we apply mathematical structures to define rules by which different models may behave to investigate the influence of activity nodes on the spatial distribution of crimes in crime neutral areas. The findings suggest an increasing likelihood of crime as a function of geometric angle and distance from an offender's home location to the site of the criminal event. Implications of the results are discussed.Crime Attractor, Directionality of Crime, Mathematical Modeling, Computational Criminology

    Spatial targeting of infectious disease control: identifying multiple, unknown sources

    Get PDF
    non compliant version, depositor contacte

    SOPHIA

    Get PDF
    The Iraqi Insurgency (2003–2011) has commonly been characterized as demonstrating the tendency for violence to cluster and diffuse at the local level. Recent research has demonstrated that insurgent attacks in Iraq cluster in time and space in a manner similar to that observed for the spread of a disease. The current study employs a variety of approaches common to the scientific study of criminal activities to advance our understanding of the correlates of observed patterns of the incidence and contagion of insurgent attacks. We hypothesize that the precise patterns will vary from one place to another, but that more attacks will occur in areas that are heavily populated, where coalition forces are active, and along road networks. To test these hypotheses, we use a fishnet to build a geographical model of Baghdad that disaggregates the city into more than 3000 grid cell locations. A number of logistic regression models with spatial and temporal lags are employed to explore patterns of local escalation and diffusion. These models demonstrate the validity of arguments under each of three models but suggest, overall, that risk heterogeneity arguments provide the most compelling and consistent account of the location of insurgency. In particular, the results demonstrate that violence is most likely at locations with greater population levels, higher density of roads, and military garrisons

    Nonparametric Bayes inference on conditional independence

    Full text link
    In broad applications, it is routinely of interest to assess whether there is evidence in the data to refute the assumption of conditional independence of YY and XX conditionally on ZZ. Such tests are well developed in parametric models but are not straightforward in the nonparametric case. We propose a general Bayesian approach, which relies on an encompassing nonparametric Bayes model for the joint distribution of YY, XX and ZZ. The framework allows YY, XX and ZZ to be random variables on arbitrary spaces, and can accommodate different dimensional vectors having a mixture of discrete and continuous measurement scales. Using conditional mutual information as a scalar summary of the strength of the conditional dependence relationship, we construct null and alternative hypotheses. We provide conditions under which the correct hypothesis will be consistently selected. Computational methods are developed, which can be incorporated within MCMC algorithms for the encompassing model. The methods are applied to variable selection and assessed through simulations and criminology applications

    'Location, Location, Location' : effects of neighborhood and house attributes on Burglars’ target selection

    Get PDF
    Objectives To empirically test whether offenders consider environmental features at multiple spatial scales when selecting a target and examine the simultaneous effect of neighborhood-level and residence-level attributes on residential burglars' choice of residence to burglarize. Methods We combine data on 679 burglaries by 577 burglars committed between 2005 and 2014 with data on approximately 138,000 residences in 193 residential neighborhoods in Ghent, Belgium. Using a discrete spatial choice approach, we estimate the combined effect of neighborhood-level and residence-level attributes on burglars' target choice in a conditional logit model. Results Burglars prefer burglarizing residences in neighborhoods with lower residential density. Burglars also favor burglarizing detached residences, residences in single-unit buildings, and renter-occupied residences. Furthermore, burglars are more likely to target residences in neighborhoods that they previously and recently targeted for burglary, and residences nearby their home. We find significant cross-level interactions between neighborhood and residence attributes in burglary target selection. Conclusions Both area-level and target-level attributes are found to affect burglars' target choices. Our results offer support for theoretical accounts of burglary target selection that characterize it as being informed both by attributes of individual properties and attributes of the environment as well as combinations thereof. This spatial decision-making model implies that environmental information at multiple and increasingly finer scales of spatial resolution informs crime site selection
    corecore