192 research outputs found
CCTV as a Tool for Early Police Intervention: Preliminary Lessons from Nine Case Studies.
This study explores the prospect of utilizing CCTV as an early intervention mechanism to detect and disrupt street-level activity that can lead to violence. The analysis focuses on nine case studies in Newark, NJ, incorporating data from several sources, including video footage, computer-aided dispatch (CAD) system incident data, CAD event chronologies and face-to-face interviews with CCTV operators. The findings suggest that the benefits offered by CCTV, namely the instantaneous discovery and reporting of crime, may be rendered incon- sequential by the process times associated with the differential-response policy of police dispatch. Potential methods by which police can more proactively utilize CCTV to prevent crime are discussed
Place-based correlates of Motor Vehicle Theft and Recovery: Measuring spatial influence across neighbourhood context
Social scientists have long shown great interest in the spatial correlates of crime patterns. A subset of the literature has focused on how micro-level spatial factors influence the formation of crime hot spots. At the same time, tangential research has highlighted how neighbourhood disadvantage influences crime occurrence. The current study focuses on the intersection of these perspectives through a spatial analysis of Motor Vehicle Theft (MVT) and Motor Vehicle Recovery (MVR) in Colorado Springs, CO. We begin by conducting a Risk Terrain Modelling analysis to identify spatial risk factors significantly related to MVT and MVR occurrence. We then test whether the spatial influences of the criminogenic risk factors differ across traditional measures of neighbourhood disadvantage. Findings suggest that while a citywide effect is evident for multiple risk factors, their spatial influence on crime significantly varies across neighbourhood contexts
Facilitators and Impediments to Designing, Implementing, and Evaluating Risk-Based Policing Strategies Using Risk Terrain Modeling: Insights from a Multi-City Evaluation in the United States
The contemporary policing literature contains numerous examples of partnerships between academic researchers and police agencies. Such efforts have greatly contributed to evidence-based policing by increasing the knowledge base on effective strategies. However, research has demonstrated that successful collaboration between researchers and practitioners can be a challenge, with various organizational and inter-agency factors presenting difficulties at various stages of the process. Additionally, applied research can oftentimes face implementation challenges when the time comes to convert research into practice. The current study contributes to the literature by discussing researcher/practitioner partnerships and program implementation in the context of a multi-city risk-based policing project in the United States. We conceptualize police interventions as contingent on four distinct phases: 1) problem analysis, 2) project design, 3) project implementation, and 4) project evaluation. In this project, the research partners were able to successfully complete each phase in certain cities while the project experienced difficulty at one or more phases in other cities. We discuss these disparate experiences, identifying factors that facilitate or impede successful completion of each step. Policy implications and recommendations for future risk-based policing interventions are discussed
Joint Utility of Event- Dependent and Environmental Crime Analysis Techniques for Violent Crime Forecasting
Violent crime incidents occurring in Irvington, New Jersey, in 2007 and 2008 are used to assess the joint analytical capabilities of point pattern analysis, hotspot mapping, near-repeat analysis, and risk terrain modeling. One approach to crime analysis suggests that the best way to predict future crime occurrence is to use past behavior, such as actual incidents or collections of incidents, as indicators of future behavior. An alternative approach is to consider the environment in which crimes occur and identify features of the landscape that would be conducive to crime. Thanks to advances in geographic information system technology and federally funded (free) software applications such as CrimeStat III or the Near Repeat Calculator, these methods have recently been made more accessible to “average” users. This study explores the information products that each method offers for the purposes of place-based violent crime forecasting and resource allocation. Findings help to answer questions about where, when, and why violent crimes occur in a jurisdiction. Ways in which event-dependent and environmental crime analysis techniques can be utilized as complementary instruments in a crime analyst’s tool kit are discussed in detail
Crime in Context: Utilizing Risk Terrain Modeling and Conjunctive Analysis of Case Configurations to Explore the Dynamics of Criminogenic Behavior Settings.
Risk terrain modeling (RTM) is a geospatial crime analysis tool designed to diagnose environmental risk factors for crime and identify the places where their spatial influence is collocated to produce vulnerability for illegal behavior. However, the collocation of certain risk factors’ spatial influences may result in more crimes than the collocation of a different set of risk factors’ spatial influences. Absent from existing RTM outputs and methods is a straightforward method to compare these relative interactions and their effects on crime. However, as a multivariate method for the analysis of discrete categorical data, conjunctive analysis of case configurations (CACC) can enable exploration of the interrelationships between risk factors’ spatial influences and their varying effects on crime occurrence. In this study, we incorporate RTM outputs into a CACC to explore the dynamics among certain risk factors’ spatial influences and how they create unique environmental contexts, or behavior settings, for crime at microlevel places. We find that most crime takes place within a few unique behavior settings that cover a small geographic area and, further, that some behavior settings were more influential on crime than others. Moreover, we identified particular environmental risk factors that aggravate the influence of other risk factors. We suggest that by focusing on these microlevel environmental crime contexts, police can more efficiently target their resources and further enhance place-based approaches to policing that fundamentally address environmental features that produce ideal opportunities for crime
Vulnerability and Exposure to Crime: Applying Risk Terrain Modeling to the Study of Assault in Chicago.
Prior research has applied risk assessment and spatial analysis techniques to the study of violence. This paper builds on those results, tying the practical outcomes of spatial risk analysis methods to broader spatial issues on the articulation of risky places for aggravated assault. We begin by conceptualizing key relationships, addressing the effects of environmental factors on creating distinct, identifiable areas that are conducive to crime. Propositions of the theory of risky places are posed and then empirically tested using a GIS based program, RTMDx, on aggravated assault data in an urban area. Given the current thinking about crime vulnerability based on concentration and spatial influence of features and events, this paper offers an analytical strategy to model risky places that combines the conceptual insights of crime emergence and persistence, advances in geo-spatial analytical techniques, and micro-level data
ROSAT and ASCA observations of the Crab-Like Supernova Remnant N157B in the Large Magellanic Cloud
We report the results of ROSAT and ASCA X-ray observations of the supernova
remnant N157B (or 30 Dor B, SNR 0539-69.1) in the Large Magellanic Cloud. For
comparison, we also briefly describe the results on SNR 0540-69.3, the only
confirmed Crab-like remnant in the Cloud. The X-ray emission from N157B can be
decomposed into a bright comet-shaped feature, superimposed on a diffuse
emission region of a dimension pc. The flat and nearly featureless
spectrum of the remnant is distinctly different from those of young shell-like
remnants, suggesting a predominantly Crab-like nature of N157B. Characterized
by a power law with an energy slope , the spectrum of N157B above
keV is, however, considerably steeper than that of SNR 0540-69.3,
which has a slope of . At lower energies, the spectrum of N157B
presents marginal evidence for emission lines, which if real most likely arise
in hot gas of the diffuse emission region. The hot gas has a characteristic
thermal temperature of 0.4-0.7 keV. No significant periodic signal is detected
from N157B in the period range of s. The pulsed
fraction is (99% confidence) in the keV range. We discuss
the nature of the individual X-ray components. In particular, we suggest that
the synchrotron radiation of relativistic particles from a fast-moving () pulsar explains the size, morphology, spectrum, and energetics
of the comet-shaped X-ray feature. We infer the age of the remnant as yrs. The lack of radio polarization of the remnant may be due to
Faraday dispersion by foreground \ion{H}{2} gas.Comment: To be published in The Astrophysical Journal, 21 pages, plus 11
images in the PS, GIF, or jpeg format. Postscript files of images are
available at http://www.astro.nwu.edu/astro/wqd/paper/n157b
The Financial Implications of Merging Proactive CCTV Monitoring and Directed Police Patrol: A Cost-Benefit Analysis.
Objectives: This study presents a cost–benefit analysis of an intervention pairing proactive CCTV monitoring with directed police patrol in Newark, NJ. A recent randomized control trial found that the strategy generated significant crime reductions in treatment areas relative to control areas. The current study focuses on the financial implications of the experimental strategy through a cost–benefit analysis.
Methods: The study begins by measuring the costs and benefits associated with the experimental strategy, the findings of which can inform agencies with existing CCTV infrastructure. Follow-up analyses measure the costs and benefits of the intervention for agencies absent existing CCTV infrastructure, meaning a CCTV system would have to be funded in addition to the intervention outputs. Alongside overall benefits, this study presents the tangible cost savings afforded to the Criminal Justice system as well as to each of the separate criminal justice (CJ) system components: Policing, Courts, and Corrections.
Results: We found the experimental strategy to be highly cost effective for agencies with existing CCTV infrastructure. However, when the cost of the CCTV system is considered, the strategy is largely cost prohibitive. While the cumulative societal and criminal justice findings suggest some evidence of a modest cost savings, the strategy is highly cost prohibitive for each of the individual CJ system components when CCTV system costs are included.
Conclusions: Results suggest that the experimental strategy is a worthwhile investment for agencies with existing CCTV infrastructure. Agencies absent CCTV may want to consider whether funds would be better allocated towards alternate strategies
Effectiveness of the method of loci is only minimally related to factors that should influence imagined navigation
The method of loci is arguably the most famous mnemonic strategy and is highly effective for memorising lists of non-spatial information in order. As described and instructed, this strategy apparently relies on a spatial/navigational metaphor. The user imagines moving through an environment, placing (study) and reporting (recall) list items along the way. However, whether the method relies critically on this spatial/navigation metaphor is unknown. An alternative hypothesis is that the navigation component is superfluous to memory success, and the method of loci is better viewed as a special case of a larger class of imagery-based peg strategies. Training participants on three virtual environments varying in their characteristics (an apartment, an open field, and a radial-arm maze), we asked participants to use each trained environment as the basis of the method of loci to learn five 11-word lists. Performance varied significantly across environment. However, the effects were small in magnitude. Further tests suggested that navigation-relevant knowledge and ability were not major determinants of success in verbal memory, even for participants who were confirmed to have been compliant with the strategy. These findings echo neuroimaging findings that navigation-based cognition does occur during application of the method of loci, but imagined navigation is unlikely to be directly responsible for its effectiveness. Instead, the method of loci may be best viewed as a variant of peg methods
A Search for Radio Supernova Remnants in Four Irregular Galaxies
We survey four nearby irregular galaxies for radio supernova remnants (SNRs)
using deep (1 sigma ~ 20 microJy), high resolution (~20 pc) VLA continuum data
at 20, 6, and 3.6 cm. We identify discrete sources in these galaxies and use
radio spectral indices and H alpha images to categorize them as SNRs, H II
regions, or background radio galaxies. Our classifications are generally in
good agreement agreement with the literature. We identify a total of 43 SNR
candidates: 23 in NGC 1569, 7 in NGC 4214, 5 in NGC 2366, and 8 in NGC 4449.
Only one SNR--the well-studied object J1228+441 in NGC 4449--is more luminous
at 20 cm than Cas A. By comparing the total thermal flux density in each galaxy
to that localized in H II regions, we conclude that a significant fraction must
be in a diffuse component or in low-luminosity H II regions.Comment: Accepted by AJ. 17 pages, 9 figures. 23 additional figures will be
available in the online version of the Astronomical Journa
- …