282 research outputs found

    Analysing Police-Recorded Data

    Get PDF
    The quarterly bulletins on crime statistics in England and Wales are compiled from two sets of data: crime survey and police-recorded crime. Whilst the former is considered to give the most reliable trends, the latter has a greater level detail for a fuller spectrum of crimes types. This paper explores the advantages and problems of analysing police-recorded data for the insights they contain. This is illustrated by examples from an analysis of domestic violence

    Cluster detection inspatially repetitive events

    Get PDF
    Analyses of point event patterns in geography, ecology and epidemiology have a long tradition. Of particular interest are patterns of clustering or ‘hot spots’. Some point event patterns exhibit a tendency towards spatial repetitiveness although with temporal separation. Examples are burglary and traffic accidents. Spatial superimposition of point events challenges many existing approaches to spatial cluster detection. In this paper a variable resolution approach, Geo-ProZones, is applied to residential burglary data exhibiting a high level of repeat victimisation. This is coupled with robust normalisation as a means of consistently defining and visualising the ‘hot spots’

    Cyber Intelligence and OSINT: Developing Mitigation Techniques Against Cybercrime Threats on Social Media

    Get PDF
    Open Source Intelligence (OSINT) involve the collection or processes of gathering data and profiling of publicly available private and public sector information sources about individuals and business intelligence purposes. These sources includes internet and other social media platforms such as Facebook, emails, twitters, what’s apps for. Much debate and research has been done on the threats, vulnerabilities and the impact of the use of social media sites but this study is to minimize bias. Objective: To systematic review and synthesis findings on current empirical research topic on cyber intelligence and open source intelligence profiling to identifying both the threats and vulnerabilities on online social networks for mitigation purposes. Methods: A systematic narrative review of research using rigorous searching on online databases. The results were then subjected to review using a quantitative and quality appraisal tool and a narrative synthesis methodology. A theoretical framework was developed for the synthesis using concepts from the literature ‘The Effectiveness of Neighborhood Watch’. A Campbell Systematic Review Results: The systematic search retrieved 18 original research papers investigating and exploring the effects of online social media technologies on open source intelligence concepts. The use of social media were reported as enhancing social cohesion among peers, improving business opportunities as information gets to customers quickly. Safe identity experimentations, OSINT and cyber intelligence social media gathering is especially vital in the modern war on terror. Understanding terrorist network topologies, crime data analysis and mining, countering improvised explosive devices. The study also highlighted potential negative impacts and threats and the effect of social engineering threats in SNSs, threats of social networking and identity crime. Vulnerabilities of HTTP header information and cookies being sent to third-party aggregators as well harmful effects of exposure to threats. Conclusion: The systematic review has revealed extraordinary evidences and contradictory concepts. It has also revealed the underlining research challenges impacting on open source intelligence. Due to the invincibility nature of social media technologies, social media platforms are constantly being used for social, business and intelligence gathering purposes but to ensure proper and advance mitigating circumstance, further research is required to gain situational awareness and appropriate counter measure

    Mining Police-Recorded Offence and Incident Data to Inform a Definition of Repeat Domestic Abuse Victimization for Statistical Reporting

    Get PDF
    Following inspections in 2013 of all police forces, Her Majesty’s Inspectorate of Constabulary found that one-third of forces could not provide data on repeat victims of domestic abuse (DA) and concluded that in general there were ambiguities around the term ‘repeat victim’ and that there was a need for consistent and comparable statistics on DA. Using an analysis of police-recorded DA data from two forces, an argument is made for including both offences and non-crime incidents when identifying repeat victims of DA. Furthermore, for statistical purposes the counting period for repeat victimizations should be taken as a rolling 12 months from first recorded victimization. Examples are given of summary statistics that can be derived from these data down to Community Safety Partnership level. To reinforce the need to include both offences and incidents in analyses, repeat victim chronologies from policerecorded data are also used to briefly examine cases of escalation to homicide as an example of how they can offer new insights and greater scope for evaluating risk and effectiveness of interventions

    A Semantic Rule-Based Approach for Software Privacy by Design

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the URI link. Open access journalInformation system business is currently witnessing an increasing demand for system conformance with the international regime of GRC Governance, Risk and Compliance. Among different compliance approaches, data protection and privacy laws plays a key role. In this paper, we propose a compliance requirement analysis method from early stages of system modelling based on a semantically-rich model, where a mapping can be established from data protection and privacy requirements defined by laws and regulations to system business goals and contexts. The early consideration of requirements satisfies Privacy by Design, a key concept in General Data Protection Regulation 2012. The proposed semantic model consists of a number of ontologies each corresponding to a knowledge component within the developed framework of our approach. Each ontology is a thesaurus of concepts in the compliance related to system along with relationships and rules between these concepts that encompass the domain knowledge. The main contribution of the work presented in this paper is the ontology-based compliance framework that demonstrates how description-logic reasoning techniques can be used to simulate legal reasoning requirements employed by legal professions against the description of each ontology

    Improving Geocoding Rates in Preparation for Crime Data Analysis

    Get PDF
    The new geocoding toolkit (matching a crime to the geographic location where it occurred) has been developed in order to improve the "hit" rate (rate at which a batch of crimes can be accurately located on a map). The purpose of the toolkit is not to replace commercial address-matching software such as Matchcode or QAS, but to enhance the outcome of the geocoding process by building additional steps and tools around these existing software products. It is a five-stage process. The first stage cleans common errors that arise in the address fields of crime data. In the second stage, the crime data are passed through commercial address-matching software, which attaches geographic coordinates to the crime location based on a street address. All addresses successfully geocoded at this stage are given the validation code "L1," indicating that the crime has been linked to an individual property address at the highest level of accuracy. The third stage focuses on crimes with nonaddress locations. The majority of these are street junctions and can be found in the free-text data field that describes the venue of the crime incident. Other nonaddress locations would include railway stations, bus stations, and prominent landmarks. The junctions are text-mined by searching for key words. In the fourth stage, all remaining records with a valid unit postcode (mail delivery point) are geocoded at the postcode level. The final stage of the toolkit geocodes all remaining records according to street name. A test of this system in a British police force raised the "hit" rate for accurate crime location an additional 65 percent to a rate of 91 percent

    Beware, win or lose: Domestic violence and the World Cup

    Get PDF
    In the run up to just about any mega sporting event these days (e.g. Football World and European Cups, Rugby World Cup, Super Bowl Sunday) there are warnings and public conversations about a likely rise in domestic violence (DV) during these events. London 2012 is no exception – Figure 1 is a beer mat used in the London Borough of Newham (one of the London 2012 ‘Host Boroughs’) as part of its campaign in the run-up to and during the Games period. Many of these conversations, in the UK at least, quote a Home Office report 1 which purports to have found a link during the 2006 FIFA World Cup between sporting events, alcohol consumption and DV. The report states that “major sporting events do not cause DV, as perpetrators are responsible for their actions, but the levels of alcohol consumption linked to the highly charged emotional nature of those events seems to increase the prevalence of such incidents” (p36). Campaigners would argue that DV is a serious every day event not caused by sport or alcohol and that public consciousness of this scourge should not just be tied to particular sporting fixtures or tournaments. Spikes in DV can be much larger, for example, over Christmas and New Year. Nevertheless, the perennial nature of the debate around DV and football prompted the second author of this paper, a BBC journalist, to put the 2006 Home Office conclusions to the test for the 2010 FIFA World Cup (though the story was not run by the BBC until the 2012 UEFA Cup2). For reasons discussed below, police recorded figures of DV are more problematic than, say, burglary or theft of a vehicle, and finding a suitable control against which to test the significance of any change is particularly problematic. This paper gives a more in-depth presentation of the thinking behind the analysis

    Building bridges between healthcare professionals, patients and families : a coproduced and integrated approach to self-management support in stroke

    Get PDF
    BACKGROUND: Programmes providing self-management support for patients and families are gaining attention and have shown promising outcomes with regards to reducing long-term unmet needs post stroke. However, notions of what good self-management support looks like can differ depending on professional opinion, individual preferences, skills and experiences of patients and their families as well as on how care and rehabilitation is organised in a particular healthcare setting. This resonates with the perspective of patient-centred care, according to which the meaning of good care is not universal, but rather jointly shaped between healthcare professionals and patients in everyday interactions. While self-management support is continuously co-produced in care and rehabilitation practices, most self-management programmes are typically provided as an 'add-on' to existing statutory care. OBJECTIVE: This paper aims to deepen the understanding of how self-management support can be made an integral part of everyday care and rehabilitation using Bridges methodology. METHODS: The authors provide a self-reflective account on 'Bridges' an integrated approach to self-management support, which is used by healthcare professionals within acute and community stroke rehabilitation across the UK, and in some parts of New Zealand and Australia. RESULTS: Bridges is based on self-efficacy principles, but has a central aim of professionals sharing decision-making and expertise with patients and families in every healthcare interaction. Methodologically, the co-production of a Bridges support package with local healthcare professionals and patients is critical. The authors present the values articulated by the support package and how it engages professionals, patients and Bridges training facilitators in a continuous process of adjusting and re-adjusting situated self-management support practices. CONCLUSIONS: Our reflections reveal the need to consider development and implementation of self-management support as one and the same on-going process, if we are to facilitate successful engagement and interest from healthcare professionals as well as their patients and families

    Scenario-based Small Area Population Modelling for Social Infrastructure Planning

    Get PDF
    In recent years, the geodemographic makeup of some areas in the UK has been rapidly changing. For example, immigration has put more pressure on child services, education and health care in places such as Slough, Peterborough and the Thames Gateway. Other factors affecting the Thames Gateway are housing development as part of the massive regeneration and the development and legacy of the Olympic site. This region is also experiencing high population churn, uncertainty in its demographic composition and issues in matching service delivery. There are also increasing demands for building sustainable communities that can adapt to change. A key to maintaining sustainable communities is the quality of services and opportunities afforded by the social infrastructure. Where the needs of residents rapidly change due to (im)migration, social and economic mobility and transience, there needs to be robust mechanisms for compiling and updating the evidence base on which policy and planning changes must necessarily be founded. This paper proposes scenario-base small area population modelling with multiple administrative data sources as a means of evidencing change. It is being implemented in the Thames Gateway London boroughs, with funding from UrbanBuzz (www.urbanbuzz.org) to support local social infrastructure planning
    • 

    corecore