192 research outputs found

    CCTV as a Tool for Early Police Intervention: Preliminary Lessons from Nine Case Studies.

    Full text link
    This study explores the prospect of utilizing CCTV as an early intervention mechanism to detect and disrupt street-level activity that can lead to violence. The analysis focuses on nine case studies in Newark, NJ, incorporating data from several sources, including video footage, computer-aided dispatch (CAD) system incident data, CAD event chronologies and face-to-face interviews with CCTV operators. The findings suggest that the benefits offered by CCTV, namely the instantaneous discovery and reporting of crime, may be rendered incon- sequential by the process times associated with the differential-response policy of police dispatch. Potential methods by which police can more proactively utilize CCTV to prevent crime are discussed

    Place-based correlates of Motor Vehicle Theft and Recovery: Measuring spatial influence across neighbourhood context

    Full text link
    Social scientists have long shown great interest in the spatial correlates of crime patterns. A subset of the literature has focused on how micro-level spatial factors influence the formation of crime hot spots. At the same time, tangential research has highlighted how neighbourhood disadvantage influences crime occurrence. The current study focuses on the intersection of these perspectives through a spatial analysis of Motor Vehicle Theft (MVT) and Motor Vehicle Recovery (MVR) in Colorado Springs, CO. We begin by conducting a Risk Terrain Modelling analysis to identify spatial risk factors significantly related to MVT and MVR occurrence. We then test whether the spatial influences of the criminogenic risk factors differ across traditional measures of neighbourhood disadvantage. Findings suggest that while a citywide effect is evident for multiple risk factors, their spatial influence on crime significantly varies across neighbourhood contexts

    Facilitators and Impediments to Designing, Implementing, and Evaluating Risk-Based Policing Strategies Using Risk Terrain Modeling: Insights from a Multi-City Evaluation in the United States

    Full text link
    The contemporary policing literature contains numerous examples of partnerships between academic researchers and police agencies. Such efforts have greatly contributed to evidence-based policing by increasing the knowledge base on effective strategies. However, research has demonstrated that successful collaboration between researchers and practitioners can be a challenge, with various organizational and inter-agency factors presenting difficulties at various stages of the process. Additionally, applied research can oftentimes face implementation challenges when the time comes to convert research into practice. The current study contributes to the literature by discussing researcher/practitioner partnerships and program implementation in the context of a multi-city risk-based policing project in the United States. We conceptualize police interventions as contingent on four distinct phases: 1) problem analysis, 2) project design, 3) project implementation, and 4) project evaluation. In this project, the research partners were able to successfully complete each phase in certain cities while the project experienced difficulty at one or more phases in other cities. We discuss these disparate experiences, identifying factors that facilitate or impede successful completion of each step. Policy implications and recommendations for future risk-based policing interventions are discussed

    Joint Utility of Event- Dependent and Environmental Crime Analysis Techniques for Violent Crime Forecasting

    Full text link
    Violent crime incidents occurring in Irvington, New Jersey, in 2007 and 2008 are used to assess the joint analytical capabilities of point pattern analysis, hotspot mapping, near-repeat analysis, and risk terrain modeling. One approach to crime analysis suggests that the best way to predict future crime occurrence is to use past behavior, such as actual incidents or collections of incidents, as indicators of future behavior. An alternative approach is to consider the environment in which crimes occur and identify features of the landscape that would be conducive to crime. Thanks to advances in geographic information system technology and federally funded (free) software applications such as CrimeStat III or the Near Repeat Calculator, these methods have recently been made more accessible to “average” users. This study explores the information products that each method offers for the purposes of place-based violent crime forecasting and resource allocation. Findings help to answer questions about where, when, and why violent crimes occur in a jurisdiction. Ways in which event-dependent and environmental crime analysis techniques can be utilized as complementary instruments in a crime analyst’s tool kit are discussed in detail

    Crime in Context: Utilizing Risk Terrain Modeling and Conjunctive Analysis of Case Configurations to Explore the Dynamics of Criminogenic Behavior Settings.

    Full text link
    Risk terrain modeling (RTM) is a geospatial crime analysis tool designed to diagnose environmental risk factors for crime and identify the places where their spatial influence is collocated to produce vulnerability for illegal behavior. However, the collocation of certain risk factors’ spatial influences may result in more crimes than the collocation of a different set of risk factors’ spatial influences. Absent from existing RTM outputs and methods is a straightforward method to compare these relative interactions and their effects on crime. However, as a multivariate method for the analysis of discrete categorical data, conjunctive analysis of case configurations (CACC) can enable exploration of the interrelationships between risk factors’ spatial influences and their varying effects on crime occurrence. In this study, we incorporate RTM outputs into a CACC to explore the dynamics among certain risk factors’ spatial influences and how they create unique environmental contexts, or behavior settings, for crime at microlevel places. We find that most crime takes place within a few unique behavior settings that cover a small geographic area and, further, that some behavior settings were more influential on crime than others. Moreover, we identified particular environmental risk factors that aggravate the influence of other risk factors. We suggest that by focusing on these microlevel environmental crime contexts, police can more efficiently target their resources and further enhance place-based approaches to policing that fundamentally address environmental features that produce ideal opportunities for crime

    Vulnerability and Exposure to Crime: Applying Risk Terrain Modeling to the Study of Assault in Chicago.

    Full text link
    Prior research has applied risk assessment and spatial analysis techniques to the study of violence. This paper builds on those results, tying the practical outcomes of spatial risk analysis methods to broader spatial issues on the articulation of risky places for aggravated assault. We begin by conceptualizing key relationships, addressing the effects of environmental factors on creating distinct, identifiable areas that are conducive to crime. Propositions of the theory of risky places are posed and then empirically tested using a GIS based program, RTMDx, on aggravated assault data in an urban area. Given the current thinking about crime vulnerability based on concentration and spatial influence of features and events, this paper offers an analytical strategy to model risky places that combines the conceptual insights of crime emergence and persistence, advances in geo-spatial analytical techniques, and micro-level data

    ROSAT and ASCA observations of the Crab-Like Supernova Remnant N157B in the Large Magellanic Cloud

    Get PDF
    We report the results of ROSAT and ASCA X-ray observations of the supernova remnant N157B (or 30 Dor B, SNR 0539-69.1) in the Large Magellanic Cloud. For comparison, we also briefly describe the results on SNR 0540-69.3, the only confirmed Crab-like remnant in the Cloud. The X-ray emission from N157B can be decomposed into a bright comet-shaped feature, superimposed on a diffuse emission region of a dimension 20\sim 20 pc. The flat and nearly featureless spectrum of the remnant is distinctly different from those of young shell-like remnants, suggesting a predominantly Crab-like nature of N157B. Characterized by a power law with an energy slope 1.5\sim 1.5, the spectrum of N157B above 2\sim 2 keV is, however, considerably steeper than that of SNR 0540-69.3, which has a slope of 1.0\sim 1.0. At lower energies, the spectrum of N157B presents marginal evidence for emission lines, which if real most likely arise in hot gas of the diffuse emission region. The hot gas has a characteristic thermal temperature of 0.4-0.7 keV. No significant periodic signal is detected from N157B in the period range of 3×10320003 \times 10^{-3}-2000 s. The pulsed fraction is 9\lesssim 9% (99% confidence) in the 272-7 keV range. We discuss the nature of the individual X-ray components. In particular, we suggest that the synchrotron radiation of relativistic particles from a fast-moving (103kms1\sim 10^3 km s^{-1}) pulsar explains the size, morphology, spectrum, and energetics of the comet-shaped X-ray feature. We infer the age of the remnant as 5×103\sim 5 \times 10^3 yrs. The lack of radio polarization of the remnant may be due to Faraday dispersion by foreground \ion{H}{2} gas.Comment: To be published in The Astrophysical Journal, 21 pages, plus 11 images in the PS, GIF, or jpeg format. Postscript files of images are available at http://www.astro.nwu.edu/astro/wqd/paper/n157b

    The Financial Implications of Merging Proactive CCTV Monitoring and Directed Police Patrol: A Cost-Benefit Analysis.

    Full text link
    Objectives: This study presents a cost–benefit analysis of an intervention pairing proactive CCTV monitoring with directed police patrol in Newark, NJ. A recent randomized control trial found that the strategy generated significant crime reductions in treatment areas relative to control areas. The current study focuses on the financial implications of the experimental strategy through a cost–benefit analysis. Methods: The study begins by measuring the costs and benefits associated with the experimental strategy, the findings of which can inform agencies with existing CCTV infrastructure. Follow-up analyses measure the costs and benefits of the intervention for agencies absent existing CCTV infrastructure, meaning a CCTV system would have to be funded in addition to the intervention outputs. Alongside overall benefits, this study presents the tangible cost savings afforded to the Criminal Justice system as well as to each of the separate criminal justice (CJ) system components: Policing, Courts, and Corrections. Results: We found the experimental strategy to be highly cost effective for agencies with existing CCTV infrastructure. However, when the cost of the CCTV system is considered, the strategy is largely cost prohibitive. While the cumulative societal and criminal justice findings suggest some evidence of a modest cost savings, the strategy is highly cost prohibitive for each of the individual CJ system components when CCTV system costs are included. Conclusions: Results suggest that the experimental strategy is a worthwhile investment for agencies with existing CCTV infrastructure. Agencies absent CCTV may want to consider whether funds would be better allocated towards alternate strategies

    Effectiveness of the method of loci is only minimally related to factors that should influence imagined navigation

    Get PDF
    The method of loci is arguably the most famous mnemonic strategy and is highly effective for memorising lists of non-spatial information in order. As described and instructed, this strategy apparently relies on a spatial/navigational metaphor. The user imagines moving through an environment, placing (study) and reporting (recall) list items along the way. However, whether the method relies critically on this spatial/navigation metaphor is unknown. An alternative hypothesis is that the navigation component is superfluous to memory success, and the method of loci is better viewed as a special case of a larger class of imagery-based peg strategies. Training participants on three virtual environments varying in their characteristics (an apartment, an open field, and a radial-arm maze), we asked participants to use each trained environment as the basis of the method of loci to learn five 11-word lists. Performance varied significantly across environment. However, the effects were small in magnitude. Further tests suggested that navigation-relevant knowledge and ability were not major determinants of success in verbal memory, even for participants who were confirmed to have been compliant with the strategy. These findings echo neuroimaging findings that navigation-based cognition does occur during application of the method of loci, but imagined navigation is unlikely to be directly responsible for its effectiveness. Instead, the method of loci may be best viewed as a variant of peg methods

    A Search for Radio Supernova Remnants in Four Irregular Galaxies

    Full text link
    We survey four nearby irregular galaxies for radio supernova remnants (SNRs) using deep (1 sigma ~ 20 microJy), high resolution (~20 pc) VLA continuum data at 20, 6, and 3.6 cm. We identify discrete sources in these galaxies and use radio spectral indices and H alpha images to categorize them as SNRs, H II regions, or background radio galaxies. Our classifications are generally in good agreement agreement with the literature. We identify a total of 43 SNR candidates: 23 in NGC 1569, 7 in NGC 4214, 5 in NGC 2366, and 8 in NGC 4449. Only one SNR--the well-studied object J1228+441 in NGC 4449--is more luminous at 20 cm than Cas A. By comparing the total thermal flux density in each galaxy to that localized in H II regions, we conclude that a significant fraction must be in a diffuse component or in low-luminosity H II regions.Comment: Accepted by AJ. 17 pages, 9 figures. 23 additional figures will be available in the online version of the Astronomical Journa
    corecore