Identifying high risk crime areas using topology

Computational criminology is an area of research that joins advanced theories in criminology with theories and methods in mathematics, computing science, geography and behavioural psychology. It is a multidisciplinary approach that takes the strengths of several disciplines and, with semantic challenges, builds new methods for the analysis of crime and crime patterns. This paper presents a developing algorithm for linking the geographic and cognitive psychology sides of criminology research with a prototype topology algorithm that joins local urban areas together using rules that define similarity between adjacent small units of analysis. The approach produces irregular shapes when mapped in a Euclidean space, but which follow expectations in a non-Euclidean topological sense. There are high local concentrations or hot spots of crime but frequently there is a sharp break on one side of the hot spot and with a gradual diffusion on the other. These shapes follow the cognitive psychological way of moving from one location to another without noticing gradual changes or conversely being aware of sharp changes from one location to the next. This article presents a pattern modeling approach that uses topology to spatially identify the concentrations of crime and their crisp breaks and gradual blending into adjacent areas using the basic components: interior, boundary and exterior. This topology algorithm is used to analyze crimes in a moderate sized city in British Columbia.

[1]  Komal Singh,et al.  A computational model for simulating spatial aspects of crime in urban environments , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.

[2]  Shane D. Johnson,et al.  Space–Time Patterns of Risk: A Cross National Assessment of Residential Burglary Victimization , 2007 .

[3]  W. Bernasco,et al.  How Do Residential Burglars Select Target Areas?: A New Approach to the Analysis of Criminal Location Choice , 2005 .

[4]  M. Felson,et al.  Crime and Everyday Life , 1998 .

[5]  P. Wikström,et al.  Crime Propensity, Criminogenic Exposure and Crime Involvement in Early to Mid Adolescence , 2009 .

[6]  Aidong Zhang,et al.  WaveCluster: A Multi-Resolution Clustering Approach for Very Large Spatial Databases , 1998, VLDB.

[7]  Shashi Shekhar,et al.  Environmental Criminology , 2008, Encyclopedia of GIS.

[8]  M. Raubal UMAN WAYFINDING IN UNFAMILIAR BUILDINGS : A SIMULATION WITH A COGNIZING AGENT , 2001 .

[9]  Hans-Peter Kriegel,et al.  Clustering for Mining in Large Spatial Databases , 1998, Künstliche Intell..

[10]  Richard Block,et al.  WHERE OFFENDERS CHOOSE TO ATTACK: A DISCRETE CHOICE MODEL OF ROBBERIES IN CHICAGO* , 2009 .

[11]  Hong Liu,et al.  Topological Cluster: A Generalized View for Density-based Spatial Clustering , 2007, 2007 11th International Conference on Computer Supported Cooperative Work in Design.

[12]  Ickjai Lee,et al.  Criminal Cross Correlation Mining and Visualization , 2009, PAISI.

[13]  Donald E. Brown,et al.  Criminal incident prediction using a point-pattern-based density model , 2003 .

[14]  P. Brantingham,et al.  Nodes, paths and edges: Considerations on the complexity of crime and the physical environment , 1993 .

[15]  Elizabeth R. Groff,et al.  Simulation for Theory Testing and Experimentation: An Example Using Routine Activity Theory and Street Robbery , 2007 .

[16]  Weimin Mou,et al.  Use of self-to-object and object-to-object spatial relations in locomotion. , 2009, Journal of experimental psychology. Learning, memory, and cognition.

[17]  R. Golledge Wayfinding Behavior: Cognitive Mapping and Other Spatial Processes , 2010 .

[18]  Hua Liu,et al.  C incident prediction using a point-pattern-based density , 2003 .

[19]  Jerry H. Ratcliffe,et al.  A Temporal Constraint Theory to Explain Opportunity-Based Spatial Offending Patterns , 2006 .

[20]  J. Xia,et al.  The wayfinding process relationships between decision-making and landmark utility. , 2008 .

[21]  Ickjai Lee,et al.  Mining top-k and bottom-k correlative crime patterns through graph representations , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.

[22]  Alexander Rakhlin,et al.  Stability of $K$-Means Clustering , 2006, NIPS.

[23]  Paul F. Cromwell,et al.  Breaking and Entering: An Ethnographic Analysis of Burglary. , 1991 .