Documente Academic
Documente Profesional
Documente Cultură
and if acted upon appropriately, may lead to apprehension of criminals. From the
perspective of campus security of the University of Hong Kong, this paper studies
Systems (GIS) to manage, visualise and analyse the spatial data of crimes. A special
technique of GIS, hot-spot analysis, will be employed to reveal the trend, spreading
pattern and temporal changes of crime and also help forecast potential future crime
spots. GIS, if developed appropriately, can help stipulate effective crime prevention
June 2005
Declaration
I declare that this thesis represents my own work, except where due acknowledge is
made, and that it has not been previously included in a thesis, dissertation or report
submitted to this University or to any other institution for a degree, diploma or other
qualification.
Signed
Chi Pun Chung, Edward
June 2005
i
Acknowledgements
I would like to express my sincere gratitude to Dr. Ann Mak for her
wholeheartedly guidance, knowledge and assistance in this research, particularly her
profound influence and helpful comments in the preparation of the study.
I am indebted to Miss Kawin Chan for her frankly technical support throughout
the research period. Her generous encouragement helped overcome the crucial
moment in this research.
I would also like to extend my appreciation to Mr. Teddy Wong who provided
the crime data of the campus and generously shared his knowledge, expertise and
experience to help shape my understanding of the security of the campus.
ii
TABLE OF CONTENTS
DECLARATION i
ACKNOWLEDGEMENTS ii
LIST OF TABLES ix
2.1 Introduction 6
iii
2.3.1.4 Criminal Intelligence Analysis 23
2.5 CompStat 32
2.7 Summary 38
3.1 Introduction 40
3.3.1.5 Geocoding 59
iv
3.3.4.1 Visual Inspection 61
3.4 Summary 65
4.1 Introduction 66
v
5.3 Analysis Findings 104
REFERENCES 116
vi
LIST OF FIGURES
Figure 4.2 Spatial distribution of crimes of HKU between 2002 and 2004 71
Figure 4.4 Hot spots of theft in the Main Campus and the Western Region 79
in 2003
Figure 4.5 Hot spots of theft in the Main Campus and the Western Region 81
in 2004
Figure 4.6 Hot spots of loitering and suspected peeping tom activities in 83
vii
Figure 4.7 Spatial distribution of burglary in the Main Campus between 84
and 2004
Figure 5.1 Forecast of crimes in the Main Campus and the Western 108
Region
Figure 5.3 Crime Statistics of campus crime between 2002 and 2004 109
viii
LIST OF TABLES
Table 3.1 Extract of raw crime data of HKU between 2002 and 2004 53
Table 3.2 Statistics of crime data with reported and non-reported time 55
Table 4.5 Crime statistics of Main Campus (M), Western Region (W), 71
and 2004
Table 4.7 Victimisation rate of theft of wallet and cash between 2002 73
and 2004
Table 4.10 Prominent locations of theft of wallet and cash between 2002 75
and 2004
ix
2004
Table 4.13 Statistics of known and unknown crime records between 2002 89
and 2004
Table 4.14 Statistics of known crime records by hours between 2002 and 90
2004
Table 4.18 Statistics of theft of notebook computer and projector between 100
Table 4.19 Comparison of campus crime statistics between HKU and US 101
Universities in 2003
x
CHAPTER ONE
INTRODUCTION
Information Systems (GIS) has become a valuable and popular tool for spatial
analysis. Law enforcement agencies in Western countries have utilised this advanced
reduce and control crimes, and improve efficiency in the allocation of police
resources.
and its motivation. Some have studied the environmental influences of criminals and
have found that their offending behaviour often appears to form discernible patterns
and is not randomly distributed. This spatial characteristic has been carefully
examined and studied to suggest that crime occurrences can be very informative.
Schools of environmental criminologists later developed the crime place theory with
various supporting observations and arguments that crime can be profiled from a
better picture of patterns and trends in crime. The success of its application in crime
control and crime reduction increases the confidence of the public and secures better
1
1.1 Research Background
In the eyes of the public, the campus of the University of Hong Kong has
institution educating elites of the society of Hong Kong. Crimes occurring on the
campus have never caught much attention from the members of the public based on
a simple perception that well educated people do not commit crime, or even any
misdemeanour act. This belief understates the seriousness of crime and it can be
quite threatening.
In actual fact, the crime rate of the campus is really low in terms of crime per
population of Hong Kong and almost all of the crimes reported were minor crimes.
Yet minor crime can always turn into serious crime if it is left unchecked, especially
as the campus is not usually patrolled by the police but by the campus security
guards. It is for this reason the study of campus crime necessitates the management
have a genuine appreciation of the overall crime situation to secure the long-enjoyed
reputation and to ensure that the frontline security personnel have a tactical approach
Indeed, there are many ways of studying crime trends and crime pattern.
Through the history of past incidents, it is possible to see the trend of crime and
suggest ways to control its spread. Through the records of previous incidents, it is
also possible to identify the pattern of crime and increase the chance of detection
2
Nevertheless, this is not to suggest GIS computerised mapping is a panacea that can
cure all problems of crime, it is merely an analytical tool, which is able to assist the
management and frontline security personnel in reviewing crimes away from their
traditional angle.
This research represents the first attempt of its kind in adopting GIS crime
the University of Hong Kong between the year of 2002 and 2004. The primary
concern of this research is to introduce the techniques of GIS crime mapping to the
estate management and frontline patrols of the University of Hong Kong who are
analytical functions and crime prevention strategies employed in this study will be
time and react immediately to allocate sufficient resources effectively in the area
The research will attempt to present a balanced view from a technical and
3
the campus environment; and
the background to the study and outlining the research foci. The significance of the
current study is highlighted through a discussion of the needs to appreciate the past
Chapter two presents a review of the literature. This chapter highlights the
mapping. In addition the functionalities of various crime analysis are discussed, and
technique and the citation of a successful example on crime mapping. Toward the
end, it also touches on the lack of literature on the use of GIS in campus crime
analysis.
Chapter three describes the methodology adopted for the current research.
Information pertaining to the validity and reliability in the data collection stage is
data integrity and data reclassification, and the procedures are also described. The
chapter also describes the visual identification method to locate the hot spots of
crime.
4
Chapter four presents the findings of this research from spatial analysis and
temporal analysis. The analysis focuses on some of the prevailing crimes and intends
Chapter five presents a summary of the research and discusses some of the
improve crime control and crime prevention measures, and future areas for research
5
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
This chapter will first review the classical studies of crime mapping from the
crime shows how a close association between people and place and crime location
soon becomes a focus of studying crimes occurrence. In the early days, crime
analysis by means of pin mapping did produce fruitful results but technology and
philosophy at that time restricted crime mapping from further development. The
crime place research in Section 2.2.3 will summarise the principle of crime mapping
Systems (GIS) has evolved from a traditional crime analysis to a new era in crime
mapping. The automation of crime mapping is not only capable of visualising instant
analysis. Section 2.3 will discuss various crime analysis techniques developed in
support of the growth of GIS, which in turn enable law enforcement agencies at
various levels to devise effective tactics and strategies in crime control and crime
reduction programmes.
6
philosophy to Problem-Oriented Policing (POP) philosophy, which when later
qualitative and quantitative crime analysis. Research has proved that a proactive
approach in policing together with detailed crime analysis can eradicate the root
problem of a crime and may even assist in predicting future crime. Finally, Section
2.5 will examine the structure of crime analysis conducted by tertiary institutions in
Mapping has a long history. Maps have served for a wide range of purposes
in human civilisation but it was not until two centuries ago that maps were used for
showing crimes occurrence (Weisburd and McEven 1998; Boba 2001). According to
the book “Mapping Out Crime: Providing 21st Century Tools for Safer
that it could be traced back to 19th century in France where cartographers first
McEven 1998). Another source cites that spatial studies of crime and delinquency
were written by sociologists and criminologists dating back to about 1830 (Harries
1999). A classical example by Shaw and McKay (1942) who conducted spatial
Maps are static and compiled for designated purposes and users. In the early
7
be manipulated or queried, nor could it be produced or amended in a short period of
Crime mapping is not a new term coined, however, until the emergence of
incidents becomes widely accepted and through its continuously development GIS
Crime happens everywhere and anytime – both space and time. Crime has
never been continuously distributed and the distribution of criminal activities can be
clustered, dispersed or sparse and some activities can occur more in daytime than in
night time, or more in summer than in winter. Spatial analysis allows patterns to be
measured in many different ways, such as time interval: day, week, month and
season.
1830’s, French social ecologists Guerry and Quetelet were already interested in
and McEven 1998; Anselin 2000). Over the years psychologists and criminologists
have studied various criminal behaviours, which were attributed to many causes,
8
(Ainsworth 2001). Recent researches have shown that environment tends to suggest
attractiveness of a place for crime and disorder to take place (Harries 1990).
and criminologists requires long-term observation and study, but this can assist the
criminal intent.
For crimes to occur (except today’s electronic crimes), offenders and victims,
and perhaps their properties must exist at the same location. The act committed by
Indeed, there are many factors which influence offenders in committing crimes, such
as mens rea (guilt intent), modus operandi (methods of operation) and properties
patterns are not limited to offender and victim attributes. The location and time of a
crime may have a unique characteristic explaining why people choose to break the
law. Therefore, it is important to understand where and why crimes take place.
for constructing a theory of crime places. Three recent and prominent theories: crime
pattern theory, rational choice theory and routine activity theory have influenced the
9
Brantingham P.L. and Brantingham P.J., who are the founders of
that crime is the result of people’s (both offenders and potential victims) interaction
Brantingham 1984). So, for a crime to take place it must consist of four essential
1981). The theory they developed suggests that criminal opportunities at a location
open to the attention of offenders have an increased risk to become targets (Eck and
Weisburd 1995). Their further research on location quotients and crime hot spots
reiterated that crime occurs in spatial patterns and therefore some parts of a city
experience more crimes than others, and that some crimes seem to congregate near
certain types of locations. They also affirm that crime has never occurred randomly
in time and in space and there are temporal patterns, for example, bar assaults are
evening events (Brantingham and Brantingham, 1995). From their observation, there
10
Figure 2.1: Interaction of Crime Pattern Theory
Source: Compiled by author based on Crime Pattern Theory, Brantingham and
Brantingham, 1995
that offenders will weigh the risk involved in committing a criminal act before
selecting target and the basic rationale for selecting a place is important to achieve
their goals. In other words, successful crime prevention measures will increase the
cost of offending and at the same time reduce the likelihood of rewards. However,
this theory may well be able to explain target selection for some types of crime and
for some types of offenders but is less helpful in explaining target selection in other
forms of crime (Ainsworth 2001). For example, some burglars, the steal-to-order
type burglars in particular, may ignore any preventive measures, such as CCTV, or
any other forms of risk and still attack the targeted premises which appears to offer
11
Another well-known theory is routine activity theory (or crime triangle)
formulated by Cohen and Felson (1979) in which they explain that predatory crime
occurs when a likely offender and potential target come together in time and place
of protecting their belongings and security devices (Eck and Weisburd 1995). That is
to say, in order for a crime to develop, there must be a motivated offender and a
desirable target at the same place and at the same time while the controller is absent
12
Obviously, all of these three theories can be valid in their contexts and
situations. But of greater importance is that all three theories conclude that place has
analyst be able to investigate the interaction of the physical and social environment
investigation of crime with emphasis on who committed the crime and why the
crime was committed, leading to the end purpose of apprehending the criminal and
bring closure to the criminal case (Vellani and Nahoun, 2001). This philosophy of
1979, http://popcenter.org/about-whatisPOP.htm).
crimes and even today the reality remains much the same. That was particularly true
before 1980’s or even much earlier because the police perception of crime analysis
was mostly limited by their abilities, knowledge and skills, particularly computer
many of them relied very much on their police instinct and very often their common
sense too, and put less emphasis on crime analysis. Nevertheless, there were
13
mapping crimes. One of the most common techniques used in analysing crimes was
to examine the frequency of specific crimes, the temporal analysis, in order to derive
a time sequence model for preventing any future occurrence of crime in their crime
prevention strategy. Calculation could be done easily with simple formulae and
manual mathematics. Yet, this approach only solved part of the puzzles, the
prediction of a crime as to where it was going to happen was far beyond the
map. This manual approach of pin mapping was useful for visualising where crime
occurred but there were certain limitations: (1) when updating the maps the previous
details were lost; (2) the maps could not be archived except by photographing them;
(3) maps were static and therefore they could not be manipulated and queried; (4)
maps could be difficult to read when several types of crime were mixed, especially
when coloured pins were used (Harries 1999); and (5) locations of crime were
approximate and not exact (Vann and Garson, 2003). Having said that, pin mapping
is still regarded as a simple method for analysing and presenting tactical crime
pattern data though limited from combining other data for an in-depth analysis
(Velasco and Boba 2000). It sometimes serves its purpose adequately and
an example quoted by Vann and Garson (2003) about mapping crime in a small
tourist town in western North Carolina with approximately 13,000 residents and the
most serious incidents ever reported were vandalism, auto accidents and
alcohol-related incidents. That is to say, using manual pin maps to visualise crime
and very much dictated by the size of an area and the amount of crime.
14
Even though pin mapping has been practiced for some time and up till now
purpose than for analytical purpose. In fact, before GIS came into operation not
much spatial analysis could be done by pin mapping because of its aforementioned
developed to integrate criminal activity maps into police operations (Weisburd and
McEven 1998).
(Bowers and Hirschfield 2001). The obvious distinction between crime mapping and
GIS can be described that the former is a software while the latter is a hardware. A
combination of the two allows crime analysts to understand the occurrence of crime
Finch and McEwen happened in 1967 (Wiesburd and McEwen 1998). They used
mainframe computers and punch cards to produce black and white shaded
choropleth maps from a line printer outlining the distribution of a type of crime in St.
Louis. This pioneering work conducted by St. Louis Police Department was done
15
the efficiency of patrol operations (Harries 1999). Certainly, these maps proved to be
pragmatic in their use and soon they were observed to possess a great deal of
potential for understanding spatial distribution of criminal activities and for assisting
Research eventually expanded by plotting the boundaries on these maps and since
then maps could be used for crime mapping purpose. All in all, the system
developed in this way was basically an informative crime mapping system that
produced maps of crime distribution and yet it was still lacking analytical capability.
processing power of micro-computer in the 1980’s (Boba 2001), larger storage and
sophisticated mapping software (Rich 1995), has meant that adopting GIS in crime
mapping on desktop computer has created a new age of the history of crime
mapping. Not only does it become an affordable analytical device, it also provides
data exchanging (Weisburd and McEven 1998) and better connectivity in sharing of
crime analysis, the value of crime assessment can only rely on the proficiency of the
analyst’s personal understanding of relations between crime and space (Eck 1998).
However, criminological theories of crime and places have been developed along
with the growth of computer technology and practical experiences have been shared
and integrated crime mapping into law enforcement operations. Crime mapping has
16
The versatility of computer technology and the advance of criminological
theory in the past two decades brought the automated crime mapping into being -
digital representation that enables the user to map crimes analytically, not just
descriptively (La Vigne 1999). Mapping crime incidents on GIS turns out to be no
possible variables in solving a crime. Its output provides instant analysis for
immediate police action that improves the overall efficiency of modern policing.
Moreover, GIS is capable of combining data, including temporal data, from various
databases, which share common geographic features, and many others from sources
outside the police, to perform layering operations for complicated crime analysis. In
this way, spatiotemporal study of a crime analysis becomes more viable than before.
software. The configuration of GIS basically consists of four major sub-systems: (1)
the data input sub-system for creating, importing and accessing data; (2) the data
storage and retrieval sub-system for storing and retrieving data; (3) the manipulation
analysing geographical data; and (4) the reporting sub-system for producing visual
the advantages of a GIS map with the limitations of a pin map, it is not difficult to
find out that a GIS map can overcome all the shortcomings of a pin map and that is
17
The momentum of the use of automated crime mapping continues to grow. In
1997, National Institute of Justice (NIJ) determined to create its Crime Mapping
Research Centre (CMRC) in United States to advance the use of analytic mapping in
a Task Force on Crime Mapping and Data-Driven Management to further the efforts
Quoted from a book “Mapping Out Crime” published by the United States
Department of Justice in 1999, Gore appraised the use of crime mapping that “Maps
can represent every dimension of a community …. They can show how healthy a
community’s children are, where social services are most needed and most effective,
and ways to protect the safety of each citizen …. Innovative communities are using
maps to mobilise resources to solve their toughest problem.” Utilising GIS in crime
mapping once again has been proven to provide the communities with an innovative
CMRC conducted the nationwide Crime Mapping Survey in 1997 indicating that
over 94% of the surveyed police departments with crime mapping capability used it
Griffin (2001) quoted from the Police Foundation survey of American police
18
departments showed that in 1998 almost 70% of large departments (100+ sworn
have engaged in some form of crime mapping (Weisburd, Greenspan and Mastrofski
1998). In 1999, 44% of police forces in the United Kingdom have a crime mapping
facility (Ratcliffe 1999). Canada, Australia and other nations have embarked on
That the concept of crime mapping has been widely accepted by many law
the Field (La Vigne and Wartell (Ed) (1998 and 2000). The strengthening of
computer literacy among police officers also boosts their proficiency in handling
spatial analysis (Griffin 2001). More and more officers begin to realise the
crimes. The growth of these practices and efforts promote the availability of spatial
data from diverse sources and the accumulation of information and knowledge
strengthen the crime mapping capability for future prediction of crimes. Apparently,
over the past few years after the said surveys, all these favourable factors encourage
the utilisation of GIS in crime mapping worldwide. GIS has become a universal and
effective tool in analysing and preventing crime. More importantly, GIS contributes
19
the occurrence of a crime. It involves the collection and analysis of data relating to a
criminal incident, offender and victim, and develops information of use for crime
1994). Therefore, the ultimate goal of crime analysis is to identify and generate the
amount of resources to prevent and control crimes. In addition, crime analysis can
policy through research and help identify or define a problem (Canter 2000). It can
also inform policy and decision makers about the actual or anticipated impact of
crime while the former aims at examining the association and identification of
Association of Crime Analysts (2005) presents a more precise definition for a crime
analyst in conducting crime analysis which "focuses on the study of crime incidents,
20
problems.” In the same book, crime pattern can be defined as when two or more
crimes.
By and large, there are five major types of crime analysis conducted on a
regular basis by law enforcement agencies: tactical crime analysis, strategic crime
operations analysis.
and the arrest of criminal offenders. Analysis data is used to promote response to
field situations (Gottlieb 1994). The goal of tactical analysis is to: (1) identify
any patterns; (3) notify the agency of the pattern’ existence; and (4) work with the
agency to develop the best strategies to address the pattern (Bruce 2004). In
comparison with all the related crime incidents, it is always possible to identify
some commonalities among them. The most significant element in tactical crime
analysis is to identify the pattern and that can be achieved in a number of ways, from
tabulation comparison to statistical analysis and from simple pin map to automated
GIS mapping. This timely qualitative analysis enables the frontline officers to make
good use of the available resources for interdicting recent criminal and potential
21
criminal activity and leading to the apprehension of offenders. After all, tactical
crime analysis relies totally on the methods however refined and scientific, flexible
analysis techniques to focus on the spatial context of criminal and law enforcement
includes the preparation of crime statistical summaries, which are generally referred
to as exception reports (Gottlieb 1994). Since there are always changes in the
properties and modus operandi. From time to time, resources allocated for tackling
will vary according to the crime situation. Exception reports are an effective means
incorporates two primary functions: (1) to assist in the identification and analysis of
and procedures (Boba 2001). After a long-term study, trends can be mapped and
projections are useful in the anticipation of crime trends and future challenges and
the assessment can assist them to have an insight to initiate strategies, priorities,
22
resource deployment and organisational and planning needs (Baker 2005). Crime
crime analysis helps facilitate strategic goals (Baker 2005) and focuses on the
administrative and statistical reports, research and other projects not focused on the
responses. Its subsidiary outcome may improve and promote public relationships by
making available a picture of the overall crime situation for publication to the
public.
geographical features with a view to linking and solving current serial criminal
activity. This is a very specific type of crime analysis that is primarily carried out by
law enforcement agencies (Boba 2001) as it requires professional skills and a high
23
degree of expertise.
2004).
introduced by Boba (2001) explains the relations between the aforementioned first
four types of crime analysis and the levels of aggregation. In short, types with low
levels of aggregation aim at individual cases and use qualitative data and analysis
techniques and those with high levels of aggregation aim at a limited scope of larger
amounts of data and information. Tactical crime analysis relies heavily on latest and
immediate crime information with the aim of putting together a timely and
analysis when compared with the former two analyses depends on additional
24
Figure 2.3: Crime Analysis Model
Source: Boba 2001
analysis produce different outcomes. The ultimate aim of tactical crime analysis is to
crime analysis serves to inform the concerned stakeholders of the prevailing crime
garners community support. Police operations analysis helps with the preparation of
performing high-speed analysis. The use of GIS in policing has two broad
applications in crime analysis: tactical crime analysis and strategic crime analysis
25
(Canter 2001). In tactical crime analysis, GIS can be used to map recent criminal
incidents and related information for the purpose of identifying a crime problem for
or victim. Together with the integration of relevant information, GIS can improve an
analyst’s ability to associate crime with other factors. As such, the use of GIS in
tactical crime analysis boosts the accuracy of a crime assessment. In strategic crime
analysis, since most information has a geographic component, GIS can review these
data and information collected for qualitative or quantitative analysis and determine
whether a crime problem was displaced, reduced or unchanged within a target area.
programmes, planning for resources allocation, and even improving problem solving
capability.
investigations (Eck and Spelman 1987). After reviewing considerable research, they
find that conventional policing effectiveness depends largely on how effective are
the tactics employed. For example, focused patrolling on hot spots can have a large
impact only for a short period of time and these patrols cannot be maintained for
long. Similarly, rapid response to crime reports may not always be applicable and
the delay in reporting gives the offender time to escape. In addition, follow-up
26
Figure 2.4: Incident-driven Policing
Source: Eck and Spelman 1987
Policing (POP). In his book, Problem-Oriented Policing, Goldstein (1990) states that
policing – on the problems that constitute the business of the police and on how they
handle them. This focus establishes a better balance between the reactive and
Policing is a comprehensive plan for improving policing in which the high priority
all changes in personnel, organisation, and procedures.” He further states that “the
the skills, procedures, and research techniques to analyse problems and evaluate
27
This new approach to policing has changed the usual response in crime control and
crime prevention and has shifted the traditional problem-solving concept in crime
analysis too.
The concept of POP is quite simple and it can be summarised in four steps as
follows: (1) scan data to identify patterns in the incidents being routinely handled; (2)
conduct an in-depth analysis of cause from the patterns identified; (3) employ
appropriate tactics to intervene and prevent any future reoccurrence; and (4) assess
the impact of the interventions and if they have not worked, repeat the process all
over again. This approach involves a well-defined problem, a root cause analysis, a
and reducing hazards of a potential crime location. In essence, POP transforms the
28
Figure 2.5: Problem-oriented Policing
Source: Eck and Spelman 1987
The philosophy of POP has seen rapidly adopted by many law enforcement
agencies worldwide and a tremendous number of successful case studies have been
and Grant (Ed) 1998, Brito and Allen 1999 (Ed) 1999, Brito and Gratto (Ed) 2000).
There have openly recognised the effectiveness of the problem solving approach,
and some of the essential ingredients of which are also incorporated into community
policing.
To cope with the introduction of POP and its implementation, a common and
29
widely accepted problem solving technique in crime analysis has also been
formulated by Eck and Spelman to refer to the four phases of problem solving –
Policing, http://www.popcenter.org/about-SARA.htm)
leading to crime and disorder problems for which effective responses can be
developed and through which assessment can be conducted may affect the relevance
The SARA model employed in crime analysis proposes that the first step is a
incident, and to accord priority to the crime problem for future examination.
review, both qualitative and quantitative, of the crime problem from various sources
of information to determine the root cause of it. After that, the next step is a
to be implemented and if necessary modify the implementation. Finally, the last step
before and after the responses have been implemented (Boba 2001, Braga 2002,
effort in that the problem should be clearly defined and validated. Thereafter, the
Analysis phase should focus on the particular elements of crime, such as offender,
30
victim and venue of location. During the Response phase, the emphasis is placed on
the actions to be taken by key personnel and time scales. When it comes to the
Assessment phase, the whole operation should be reviewed and assessed to the
degree of effectiveness and if it was not, why particular actions were not successful
and what other alternatives might be able to achieve the same goal (Patrick 2002).
Still, the SARA model can be misleading in suggesting that these four phases
should follow one another in a strictly linear manner (Clarke and Eck 2003). In the
problem solving process, it is always possible to receive and collate new information,
especially during scanning and analysis phases, and the process can be revisited at
any phase. SARA model is a repetitive process in thinking and it allows the analyst
to refocus on the problem and continue to examine the best possible solution to the
problem.
31
Crime analysis and crime mapping can be interacting with each other in all
accurately during the scanning, analysis and the assessment phases (Boba 2001). In
the scanning phase, crime maps can show the analyst where the problems are located
and that can help test the hypothesis about the problem in the subsequent analysis
phase. Analyst can also monitor the situation in the response phase by advising the
effective allocation of resources of that operation requires, based on the time span of
occurrence and the locations where offences are mainly occurring. After the
temporal change or both. After all, it is vital for crime analysts to have a
role of crime analysis in problem solving even though it always relies very much on
2.5 CompStat
The most effective crime control techniques and later with the aid of GIS
crime mapping witnessed in the success of the CompStat process pioneered by the
former commissioner William Bratton of the New York Police Department (NYPD)
and his management team in 1994 (Shane 2004). CompStat is short for “computer
has remarkably caused 65.99% reduction in the total number of reported crimes for
the seven major crime categories (murder, robbery, first degree rape, felony assault,
burglary, larceny and grand larceny) in New York from 430,460 in 1993 to 146,397
32
in 2003 (CompStat Report 2004 Vol.11 No.50 at
Major Category 1993 1997 % chg vs. 1993 2003 % chg vs. 1993
Murder 1,927 767 -60.2 598 -68.9
Rape 3,225 2,783 -13.7 1,875 -41.8
Robbery 85,892 44,335 -48.3 25,919 -69.8
Fel. Assault 41,121 30,259 -26.4 18,774 -54.3
Burglary 100,936 54,866 -45.6 29,215 -71.0
Gr. Larceny 85,737 55,686 -35.0 46,877 -45.3
G.L.A. 111,622 51,312 -54.0 23,139 -79.2
TOTAL 430,460 240,008 -44.24 146,397 -65.99
Table 2.1: Historical Statistics of CompStat between 1993 and 2003
Source: NYPD at http//www.nyc.gov/html/nypd/pdf/chfdept/cscity.pdf
(accessed on 2005.01.15)
The CompStat process is a hybrid management style that combines the best
philosophies (Henry 2003). Not only does it retain the best practices of traditional
including the SARA model, to formulate crime control strategy. One of the most
important theory resulting from this process is the “Broken Windows” theory which
was introduced by George Kelling and James Wilson in 1982, which state that if
minor offences are left unchecked they will lead to more serious crime (Kelling
1995). The dominant role of police has long focused on serious crime, such as
murder and robbery etc., and rarely geared up to focus on minor crime, such as petty
cash theft. Broken Windows theory raises the level of awareness of the police and
the public that if minor problems are not taken care of they will develop into serious
33
problems. Kelling and Sousa (2001) later revealed in their research on the impact of
Broken Window policing to violent crime in New York that the adoption of Broken
Window policing had successfully prevented 60,000 violent crimes between 1989
and 1998.
part of police officers in the manner they enforce the law (Henry 2003). The
focused, efficient and accountable organisations by motivating the officers who are
as other management philosophies meant that new police cultures then evolved to a
four-crime reduction principle model, namely the CompStat model. These changes
in the management and practices of law enforcement agencies have transformed the
The first step in the CompStat model is the collection of accurate and timely
comprehensive, flexible and adaptable to the shifting crime trends to avoid any
34
possible displacement of crime. The third step requires rapid deployment of
and tasked to tackle and even eradicate the specific crimes, which are accorded with
ongoing process of relentless follow-up and assessment to ensure the desired goals
are actually achieved. The evaluation process allows the agency to assess the
One of the vital facilities in CompStat, especially for the purpose of data
analysis and data presentation, is the weekly CompStat Report which meticulously
captures all the details of crime statistics, ranging from summaries of weekly crime
complaints, arrest and summons activity, crime patterns to specific times and
locations at which the crimes and enforcement actions took place. These reports will
be presented by the personnel from each of the 76 precincts and other departments in
the weekly Crime Control Strategy Meeting where the responsible precinct
commander will be challenged on the skills and effectiveness of their staff in the
capability of crime reduction and police performance. Crime maps obviously have a
35
Figure 2.7: Principles of CompStat Model
Source: Reconstructed based on Shane 2004
they commented that the characteristics of CompStat can be generalised using six
core elements: (1) mission clarification; (2) internal accountability; (3) devolution of
problem solving tactics. CompStat has not been so successfully implemented in the
three study cities, Lowell, Minneapolis and Newark, as its pioneer in the New York
City. One striking effect on key strategic decision-making process was noticeably
the accuracy and timeliness of intelligence of crime information and this has caused
the middle managers to be highly sensitive to the need of what detail of information
they were looking for. Without the support of GIS crime mapping techniques,
36
particularly the visual display of aggregate data explaining the relationships among
criminal offences in time and space, immediate spatial and temporal analysis would
not be possible.
Campus crime appears to be a sensitive topic to discuss. Any search for basic
information, even locally, has always been fruitless, and no mention of any form of
any disclosure of crime situations may cause an adverse effect on the reputation of
an institution. This research has made repeated attempts to locate any updated
articles and reports from the Western countries through internet and publication, and
through email subscription from the Crime Mapping Association and the Law
Enforcement Analysts Network in the United States but almost all has been in vain.
In spite of this, some respondents replied and gave several useful websites on
thousand tertiary institutions the United States. The search engine allows the user to
make one enquiry at a time and yet it does not yield very useful results. The
enactment of the Higher Education Act of 1965 (amended in 1998) requires tertiary
Department of Education has an obligation to inform the students and their parents
of the safety of the environment in which they are studying (Campus Crime and
37
http://ope.ed.gov/security/index.asp). No similar law seems to be enacted in Hong
Kong to keep the members of the public abreast of the campus safety policies.
the Crime Mapping Analysis Program (CMAP) of the National Law Enforcement
Denver affirmed that they have just begun to get involved in analysing crime activity
on campus and agreed that they have not come across too much literature on the
captioned research topic. He further suggested discrete analysis would suit the
2.7 Summary
The development of crime mapping over the past few decades can be
manual mapping to automated GIS mapping has improved the mapping process
prevention from criminal behaviour based to crime and place theory assists law
effects; (3) the philosophical advance from traditional policing to POP by adopting
the SARA problem solving model forces law enforcement to take a proactive
approach to tackling crime; and (4) the expansion of scope of crime analysis from
management structure that helps law enforcement agencies to control crime and
38
disorder effectively in the communities. CompStat is an information-driven process
performance of GIS crime mapping to identify and plot the occurrences of crime.
The visual display of aggregate data enables crime analysts to explain the
relationships among criminal offences in time and space makes immediate spatial
and temporal analysis possible. The world of policing therefore is able to benefit
In the absence of any useful literature on the subject of campus crime, this
research will evaluate two dimensions of the campus crime situation from the
available data. From the analytical perspective, this research will utilise crime
in the campus environment. From the management perspective, it will examine the
current organisation structure and public safety procedures of the campus security
and derive an effective crime reduction strategy. The methodology used will be
39
CHAPTER THREE
METHODOLGY
3.1 Introduction
From the previous chapter, it seems no one would argue that the distribution
concluded that the types of built environments have a direct link with many types of
crime.
The University of Hong Kong was selected as the study area. Section 3.2
will give a brief introduction of the study area and the security system of the campus
as well as the source of research data and the tools to be used in this study. All these
Section 3.3 will explain the design schema of this research. Since the study is
crime prevention measures and patrol strategies in the campus, a practical approach
was adopted for this research. The methodological framework will gear up the
operation of data management and data analysis processes. Section 3.1.1 will
explain the functions of data management how data can fully be optimised for
analysis purpose. Section 3.3.2 will outline the design of analytical flow and
40
3.2.1 Study Area – The University of Hong Kong
Hong Kong, this research sub-divides the campus into three study areas, namely the
Main Campus, Western Region and South Region and these are the terms later
referred to in this research. The first study area is the Main Campus which is situated
at the north side between Pokfulam Road and Bonham Road in the Mid-levels. It
facilities in the whole university. The second study area is the Western Region where
a dense convergence of student dormitories can be found along the west bank of
Pokfulam Road. The third study area is the Southern Region in Sassoon Road where
the medical school and staff residences are located. The size of the study area covers
The map of the campus of the University of Hong Kong can be found at Figure 3.1.
in Stanley and Kadoorie Agricultural Research Centre in Taipo, however, will not be
included in this research simply because there was no residences and no crime
reported and they are distanced from the study area. These facilities occupy an area
http://www.hku.edu.hk).
41
Figure 3.1: Sub-division of the study area of HKU
The ownership of the campus of the University of Hong Kong is under the
the public may have a wrong perception that they have access rights to the open
campus. It is actually a private property and therefore police do not patrol the
campus on a regular basis. Indeed, there are many blocks of buildings in the campus
42
The total number of regular students of the University of Hong Kong
between the year of 2002 and 2003 was 19,000, including 11,700 undergraduate
students and 7,300 postgraduate students of which more than 1,000 were
The number of regular students between 2003 and 2004 was reported as 19,562
take into account the staff population which was reported as 6,724 in December
2003, including 4,462 regular staff and 2,262 temporary staff (Quick Statistics
statistics in American universities staff have never been counted. Neither does it take
105,427 and 730 respectively in the year 2003 and 2004 (Quick Statistics available
very unique. The Main Campus and the Western Region are enclosed by medium
density and middle to high-income residential blocks while the Southern Region is
quite remote from the urban area and surrounded by low density and high-income
residential blocks as at Figures 3.2 and 3.3. There is neither any entertainment centre,
such as cinema, nor any liquor premises, such as bar, closely found in these three
areas. Residents nearby have seldom entered the campus probably because of the
topography and because academic institutions rarely attract any unnecessary visitors,
and therefore the access to the campus is almost confined to the students and staff
only.
43
Figure 3.2: Population Density around HKU Campus
Source: Lands Dept, 2001 B1000, Digital Topographic Map
44
That is to say, the campus area has rarely been influenced by any potential
crime prone factors, such as high population density, high poverty level and high
analysts that low-socioeconomic-status areas have more crime and high-status areas
have low crime; and high pedestrian flow has accelerated higher rate of crime
Unlike many other crime analyses conducted by police that frequently focus
Campus crime mapping, however, is a discrete analysis in that the targeting area is
an isolated area where activities are confined to academic affairs and have little
An interview was conducted with Mr. Teddy Wong, manager of the Security
Section of the University of Hong Kong on 26th Jan 2004. Responsibility of campus
security falls on the shoulder of the security manager under the management arm of
the Estates Office. He directly supervises the security of the Main Campus with a
strength of ninety five guards and co-ordinates security issues with security
management of the Western region and Southern Region. The staff turnover rate is
low and about one third of his personnel are pension staff. Most of his staff are
experienced and trained guards but none of them are capable of performing crime
analysis. Surprisingly, upon the interview with the security manager, it was revealed
that the primary duty of campus security guards is to maintain a good degree of
public relationship with the staff and the students. Their secondary duty is to
45
respond to incident calls including reporting building defects, and the tertiary duty is
to patrol the campus. The Main Campus is divided into nine patrol zones and there is
no static post so that they have to patrol their zone and record their attendance with
an electronic device, very much like an electronic visiting book, at all the check
points. Unlike most of the security guards employed in the tertiary institutions, they
work on a three shifts system instead of a two shifts system and therefore their
The situation outside the Main Campus is slightly different. Security of the
private security companies, which were awarded by the lowest bids, for building
management purpose, such as the staff quarters and medical blocks. This explains
the diversified management style of security within the campus. Each of the
attendants and guards is responsible for the security of their own buildings and the
rotation of staff of the private security companies is quite frequent. The map at
Reports of crime can be made directly to the Security Section and a security
officer will scrutinise each incident. Cases requiring police attention will be referred
to the police immediately for action. Minor cases, such as loss or theft, will be
recorded for documentation purpose and it is up to the victim to make a report to the
incident records, instead they were kept in a word processor, Microsoft Word, for
easy retrieval and report writing. On a monthly basis, the Security Section emails to
all staff and students a crime report keeping them abreast of the current crime
46
situation of the campus and an extract is at Figure 3.5. Around the middle of each
year, the Security Section stages a one-day security campaign advising participants
Since the campus falls within the boundary of the Western Police District,
the Security Section maintains a close liaison with the police for exchanging crime
47
providing District Intelligence Section (DIS) to monitor the crime situation of the
campus and Regional Crime Prevention Office (RCPO) to hold crime prevention
Software for mapping crime has made great strides in crime analysis. There
are many GIS products specialised in crime analysis available on today’s market and
some are even free software, such as the CrimeStat III developed by Ned Levine.
CrimeStat is a spatial programme for the analysis of crime incident locations with
six common tools, such as journey-to-crime estimate, distance analysis and hot spot
analysis etc., made available from National Archive of Criminal Justice Data at
48
mapping practice to individual researchers and smaller scale law enforcement
agencies.
This is the software to be used in this research and more importantly it is available at
the University of Hong Kong. This software application allows crime analysts to
maps and reports and in a Graphical User Interface (GUI) environment. Different
from ArcGIS, CrimeStat is standalone software for spatial analysis and its output can
Along with the software package, a course workbook on crime mapping and
obtained from the National Law Enforcement and Corrections Technology Centre
in this research.
produce an accurate and meaningful picture of the crime situation of the campus at
Figure 3.6. On this basis, there are two structures to be constructed and they are the
data management and spatial analysis. Proper data management helps eliminate the
chances of errors and appropriate spatial analysis helps increase the validity of the
data presented.
49
Crime data provided by the Security Section may not be always useful for
crime analysis or even further for spatial analysis function, particularly when most
of the data was collected based on their subjective purposes and their own data
standards. The first step is therefore to evaluate the usefulness of data and examine
Data integrity and data structure are crucial in assessing the crime analysis
and the maps produced. Data integrity affects the quality of data, such as consistency
and accuracy, in the outcome of an analysis. The design of data structure determines
the entities of data to be collected. Most of the crime data are not always spatially
referenced and neither are they properly captured as it depends on the needs of
classification will assist in re-arranging the data by putting it into the designed
specific crime spot and leads to a holistic crime picture. Spatial distribution of crime
clearly demonstrates that certain areas attract more crime than the others as
such as land uses and population characteristics (Anselin et. la. 2000). This research
will make use of single layer hot-spot operation to identify the concentration of
crimes in the campus and examine the spatial and temporal changes of these crimes
50
The adoption of the SARA model in crime analysis has always helped
uncover the underlying causes of crime problems. Strategic crime analysis and
tactical crime analysis will be useful for devising effective strategy and
51
Figure 3.6: Methodological framework adopted for this research
52
Collecting data from the police on campus crime is nearly impossible due to
Personal Data (Privacy) Ordinance in which it stipulates that data collected should
not be used other than for its originated purpose, except that it is used for the
Nonetheless, the Security Section provided some useful crime statistics of the
campus between the years of 2002 and 2004. This is the database used for the
construction of this research and Table 3.1 shows part of the tabular data given.
collecting evidence from the scene by exercising their power under the laws for
crime detection and crime prevention. Valuable information, such as victim and
suspect description and property loss description etc. are crucial for immediate
Estates Office does not enjoy this privilege for data collection and data collected are
even aggregated data can be obtained, such as type of crime, time or location of a
crime etc. This limits the variety of analysis techniques to be conducted for crime
analysis. One of the alternative techniques which can be used is the hot spots
analysis.
53
went missing
2 Car BET Space No. A resident A motor cycle VTM parked his
found 25-DEC-2 89, Tam of Tam m/c at AA for a
damaged 001 and Tower, Tower week. When he
06-JAN-2 Sha Wan returned to the
002 25 bay, he found the
m/c body
scratched and
suspected that his
m/c had been
tampered with
3 Criminal 1550 hrs Inside HK HK Bank The leaflet A male Chinese
Damage on Bank, holders student whilst
21-JAN-2 RunRun doing transaction
002 Shaw inside the bank
Bldg suddenly turned
violent and threw
all the leaflet
holders on the
ground. The
student was
identified to have
mental problem.
4 Lost 1435 hrs 4/F Main A female A handbag with VTM left the
/ Stolen on Library Student cash, mobile handbag at the
29-JAN-2 phone and ID reading desk and
002 went to toilet.
On her return, the
handbag was
found missing
5 Lost/Stol BET 1530 1/F Old A female A cloth bag VTM studied at VTM would
en and 1730 Library student with cash and Library at the report to
on and IDs material time. police direct
29-JAN-2 During the period,
002 she had left her
desk for an hour.
And she
subsequently
found the bag
missing
Table 3.1: Extract of raw crime data of HKU between 2002 and 2004
Source: Estates Office (Security Section) of the University of Hong Kong in January 2005.
The crime statistics extracted and shown in Table 3.1 are the records stored
in a table form of Microsoft Word format along with some information about the
crime incident. The format of tabular crime data is still commonly adopted by the
Hong Kong Police for their daily crime analysis due to the fact most of the crime
information was not captured electronically nor from any non-spatial databases,
except the Incident Mapping System (IMS) which is the only spatial database
incidents.
54
To an extent, the crime statistics kept by the Estate Office consist of some
types of geographic variable, such as address. Yet, many of these crime locations
reported were not precisely maintained in the tabular records. For example, the
location of a crime occurred in the library only provides the setting of crime but it
does not yield an exact location where crime took place. Data, which carries no
inherent geographic information, renders little value in spatial analysis. With the aim
problem in assessing the accuracy of temporal findings. Of the 225 crime records,
only 164 records contain information of time in hours when the offences were
committed, which represents about 73% of the total crime data. That means the
Table 3.2 presents the percentage of the known and unknown hours of the temporal
analysis in this research. There was no reason given as to absence of this valuable
information. This valuable temporal information was concatenated in one data field
called date / time which squeeze the date and time information in one single column
55
Total 78 64 83 225
Table 3.2: Statistics of crime data with reported and non-reported time between 2002 and
2004.
Apart from the lack of spatial and temporal attributes in the data set for
sustaining possible crime mapping performance, there are other data which require
further verification. For instance, a lengthy narrative illustrating the criminal act of a
suspect in a single data field - the summary of facts field makes them difficult to
differentiate from each other for data matching and data comparison. Obviously, the
In addition to that, other deficiencies were also detected from the data set
instance, floor numbers may be missing and building names are not standardised.
Main Library sometimes refers to the New Wing of Main Library but it happens to
be the Old Wing occasionally. These data, which cannot be matched against the
campus map and the too simplified victim information in some records, create a
The original data structure and the deficiencies spotted in the data set
prohibit further automation of crime analysis. It was at this stage the rectification
process started to re-examine the value of each entity and to collate them into
In fact, each type of crime carries some significant attributes to establish the
56
hypothesis of a modus operandi (M.O.). For example, robbery analysis aims at
identifying the properties robbed and the method employed to succeed; burglary
analysis also aims at not only identifying the stolen properties but also on the
method the burglar entered the premises; Analysing theft of conveyance without
authority is aimed at identifying the types of stolen vehicle, the method employed to
prise open the vehicle and the way to dispose of it. Furthermore, police is able to
Having said that, there are some common elements determined from all
crimes; such as geographic factors, time factors, victim descriptors, property loss
and suspect vehicle descriptors (Gottlieb, Arenberg and Singh 1998). They are the
basic data fields considered to supplement the original data set. The date and time
file expanded to include start date, end date, weekday (Monday etc.), start time and
end time. Some other files were also created to include type of stolen properties and
MO descriptors derived from the original data fields of property and the summary of
brief facts.
In some of the lost or stolen incidents, especially those which were reported
wished to report it to the police, and hence data reliability becomes doubtful. Along
the same lines, most of these cases, if they were carefully examined, should be
classified as theft since none of the stolen properties were recovered at a later time.
57
classified as lost or stolen. At least, there is a prima facie case to establish that
offender has no intention to return the properties to the owner. It is for this reason
that all the lost or stolen cases were reclassified to theft cases. Nonetheless, the
situation improved in 2003 when the Estates Office changed the handling procedure
and maintained a closer liaison with the police in crime reporting. This shift of
crime reports by the management probably due to the upsurge of theft offences.
Department (CID) of the police, while making a lost or stolen report will be
There are other deficiencies found in the data classification stage. For
example, there are non-crime incidents recorded in the original crime data classified
as crime incidents. Report of peeping tom in itself is not a crime and it is only a
police report of suspicious behaviour due to probably, one’s sexual instinct. Yet, if
one is found performing a suspicious act in a place where he could not give a
which should not be counted as a crime, except in the case of trespassing with armed
merely a civic action against violation of intruding one’s property under the
trespassing are also included in the data set of this study to reveal fully the overall
58
3.3.3.4 Temporal data conversion
largely on the data accuracy and data availability. In order to able to allow the
particularly the hours variable, all the available data was transformed in a spread
sheet of an Excel format by means of manual input and converted into an expanded
data table, including fields of date, day in week, length of crime, automatically.
3.3.3.5 Geocoding
georeferencing spatial data. The process involves matching the addresses against a
geographically referenced base map constructed from address data in the Centamap
(http://www.centamap.com/). Since nearly all the crime incidents, except one street
crime snatching, took place inside buildings and the geographic variables kept in the
records did not indicate the exact whereabouts the crime occurred, the centre point
crime location. Regarding the street crimes, the geocodes were manually converted
direct from the referenced base map. This is the analysis unit to be used in the
research.
The geocodes collected were stored with the crime data in a tabular Excel
format and subsequently plotted in ArcGIS against the topology of the base map
59
obtained from the Lands Department. All the crime locations were charted
accordingly.
requirements and to explore the extent of parameters and the value of crime
information for future data collection. Finally, data cleaning was initiated to
eliminate the manual input errors after which data classification was completed.
60
3.3.4 Data Analysis
Boba (2000) stated clearly that there are six general areas to be included in
making a crime analysis and mapping needs assessment: (1) current state of affairs;
(2) strategic goals; (3) data sources; (4) technology; (5) current crime analysis and
mapping products and their uses; and (6) crime analysis and mapping needs. In the
area of crime analysis and mapping needs, she argues that information presented in a
map are subjective information but more important is how this information is
thinking to generate ideas and make a hypothesis of a problem (Harries 1999). This
visual identification allows map users to see some relationships between different
phenomena. Map production, therefore, depends not only on the availability of data
and the objective goal but more importantly the expectations of the readers. Since,
campus administration and front line personnel are the targeted readers of crime
maps in this research, crime maps to be produced have to gauge their level of
thinking.
To ease the understanding of map users, single layer hot spots identification
is used in this study that is similar to a digital pin map displaying points of crime
specific period of time. Graduated size point which serves to distinguish the
locations with multiple occurrences will be applied and since most of the crime
61
locations are represented by building blocks it also overcomes the problem of
overlapping.
In crime analysis, hot spots are always referred to as clusters of crimes. Even
though there is no fixed definition for hot spot, a common interpretation recognised
by most is that hot spot is a small place where crime occurred repeatedly, such that it
becomes highly predictable over a period of one year at least (Sherman 1995). Some
criminologists and analysts generally define hot spot as a somewhat larger area in
size that even the extended surroundings of a building are included (Vann and
Garson 2003). These two definitions will be employed in this research, especially
the latter because of the limitation of geographic variables obtained from the original
data set, where a large number of points are geocoded from the centre points of
buildings.
focusing on the issues of public space and private property, nature of boundaries and
some variants in calculation of a linear block (Buerger, Cohn and Petrosino 1995).
These quickly become confusing as the location of a crime can be measured to the
describe a large open area in front of the property lines where police can park their
patrol car. Obviously, there are geographical differences in the design and layout of
urban land use between the United States and Hong Kong and high precision of
calculating hot spots is not required in this research. Besides, the characteristics of
62
ownership campus and a discrete campus with less influence from its surroundings.
Boundary problems and demarcation of public space and private properties do not
In order to determine whether there is a hot spot or no hot spot, the crime
data has to satisfy that crimes occurred frequently in an area at least once during a
one year period. Initial review of the data set apparently indicated that there are
clusters of crime incidents more contagious than other areas in a long span of time.
In short, hot spots are detected where the density of crimes is high. The crime data
gathered for this study fulfils this basic requirement for crime analysis.
Eck, Gersh and Taylor (2000) suggest that if any one of the following
hypotheses is established, mapping hot spots will be made possible: (1) a location
where crimes are spilling into surrounding areas – central place hypothesis; (2) a
location which appears to have a weak attraction to offenders but there are
interesting crime target in the nearby places – side effect hypothesis; and (3) some
locations (hot spots) are disproportionately vulnerable than other locations (non-hot
spots) but not in crime-resistant areas (area effect). The first and last hypotheses
seem to fit into the spatial distribution of crime in this study and these reasons
individual’s interpretation of a crime hot spot and the analysis techniques applied
accordingly may produce different results (Harries 1999, Vann and Garson 2003).
63
In general, there are five hot spot analysis techniques to help visualise spatial
distribution and they are: (1) visual interpretation which is the most basic method of
presenting crime patterns similar to that of a digitised pin map but the major
problems of it are stacking points and over-lapping points; (2) choropleth mapping
which is very much like a thematic map in which areas are shaded according to the
data values and the fallacy of it may be resulted from generalisation within a
boundary; (3) grid cell analysis, which is based upon artificial boundaries, uses a
uniform-sized grid cell to overlay an area of interest, yet error may occur when a
point falls closely within a neighbouring grid forcing it to give an aggregated value
in the neighbouring cell; (4) point pattern or cluster analysis involves identifying an
arbitrary starting point or a “seed” and thereafter calculating the following seeds
relationships among clusters of points based on spatial similarities and traits among
where no cluster may be located (Harries 1999, Vann and Garson 2003). Although
there are a variety of techniques for detecting hot spots in crime data, there is no
single approach superior to the others (Grubesic and Murray 2001). The argument of
audience.
As mentioned above the data provided in this research has its own limitation
and taking into consideration that the primary objective is to produce a single layer
hot spot analysis and that the analysis is to be explicable to the management and
64
analysis because of its simplicity in visual presentation. The stacking point and
increasing the scale of a map. That is, the use of smaller scale map will prevent the
3.4 Summary
in this chapter. Though most of the theoretical frameworks are designed for a
different setting they are purported to have a more universal applicability. One
commonality they all share is that a well-structured data management and data
high degree of data integrity and data quality control as well as data validity and
data reliability. The importance of it cannot be emphasised any higher. The logical
design of analytical workflow was also outlined by examining each and every
consideration required for making data visualisation possible. These are determining
to research into the crime situation within a University of Hong Kong sample. The
65
CHAPTER FOUR
4.1 Introduction
From reading the literature review in chapter two, it seems no one would
have a direct link with many types of crimes. These are the spatial crime patterns
Section 4.2 will present the overall crime situation of the campus from the
year 2002 to 2004. The spatial and temporal analysis in section 4.3 and section 4.4
will aim at examining the available data to uncover the spatiotemporal relationship
between the crime problems. Serial crimes are detectable through a “signature”, that
is unique behaviours on the part of the offender, and the commonalities they share,
such as timing, location, victim similarities, and modus operandi will be discussed.
Regarding the overall crime distributions, this study will focus on the severe hit
areas and the prevailing crimes that may affect the law and order of the campus.
Finally, section 4.5 will make a comparison between the crime situation of the
campus and that of the universities and colleges in the United States.
Overall, the total number of crimes which occurred on the campus of the
66
University of Hong Kong between the year 2002 and 2004 was not considered
serious at all. The statistics at Table 4.1 shows that there were altogether 225 crime
incidents reported within fourteen categories of crimes, and the total numbers of
crime cases reported in these three years were 78, 64 and 83 respectively.
Further observations from Table 4.1 indicate that more than 90% of the total
without authority (TCWA), theft and theft from vehicle. Of concern are the number
of peeping tom activities reported, which rose from 0 in the years 2002 and 2003 to
7 cases in the year 2004, which must surely catch the attention of the management.
The number of burglaries remained steady with 4 in each year from 2003 to 2004.
When examining the bar chart at Figure 4.1 it can be seen that loitering and related
67
activity, such as peeping tom, and burglary figures have become alarming. For these
reasons, this study will focus on the following crimes: theft, loitering and peeping
tom and burglary, which pose a greater threat to the law and order in the campus
environment. Targeting offenders of these prevailing crimes will become the primary
1000
No. of Crimes
100 2004
2003
10 2002
1
ce ce n
id e
Pe H g
in h t
in l D ry
A
Ex tion
ep e
TC g
at y
Ro om
r
V ft
el Lo re
de De atio
tim g
m n
Tr icl
se
in
Sn ber
W
ep eig
e
In ama
im ina gla
ro eri
su
ro Th
ch
as
T
eh
p
po
b
l F it
Cr rim Bur
m
nt
al
tF
ef
C
tF
In
Th
ec
bj
O
Offences
Tables 4.2 and 4.3 also suggest that the overall crime situation and violent
crime rate of HKU are quite low when compared with the figures for the whole of
Year Hong Kong Total no. of Overall Crime HKU Student Total no. of Overall Crime
Population Crime Rate * Population Crime Rate *
2002 6,787,000 75,877 111.80 19,000 78 41.05
68
2003 6,803,000 88,377 129.91 19,562 64 32.72
2004 6,845,000 81,315 118.79 19,562 83 42.43
Table 4.2: Comparison of Overall Crime Rate between HK and HKU between 2002 and
2004
Sources of Information: Hong Kong Police (http://info.gov.hk/police) and Census and
Statistics Department (http://info.gov.hk/censtatd)
* represents crime rate per 10,000 population
Year Hong Kong Total no. of Overall Crime HKU Student Total no. of Overall Crime
Population Violent Crime Rate * Population Crime Rate *
2002 6,787,000 14,140 20.83 19,000 0 0
2003 6,803,000 14,542 21.38 19,562 5# 2.56
2004 6,845,000 13,890 20.29 19,562 4# 2.04
Table 4.3: Comparison of Overall Violent Crime Rate between HK and HKU between 2002
and 2004
Sources of Information: Hong Kong Police (http://info.gov.hk/police) and Census and
Statistics Department (http://info.gov.hk/censtatd)
* represents crime rate per 10,000 population
# burglary and robbery are the only violent crimes took place in HKU
On average, it takes nearly five days for one crime to occur on the campus as
opposed to two hundred and twenty four crimes reported in Hong Kong each day. It
collaborates with the early presumption that the campus of the University of Hong
In the following spatial and temporal analysis, it will be examining the crime
data from the approach of tactical crime analysis to identify crime patterns by means
helps crime analysts to understand what has happened and what may happen in the
Before going into the analysis stage, it is always good to review the spatial
distribution of crimes from the statistical data. Table 4.4 portrays the geographical
distribution of crimes in the campus. Apparently, the Main Campus was heavily
attacked and suffered slightly over 80% of the total number of crimes from the year
2002 to 2004. Following that was the Southern Region with 14% and thereafter the
Western Region with 5%. Interestingly, there was a drop of crime in the Main
Campus in the year 2003 and no crime was reported in the year 2002. Cartographic
distribution of crimes at Figure 4.2 also signifies the changes of crime locations
70
Year 2002 Year 2003 Year 2004
Figure 4.2: Spatial distribution of crimes of HKU between 2002 and 2004
crime distribution in the Main Campus, Western Region, and Southern Region
within the campus between the years 2002 and 2004. Most of targeted offences, theft,
loitering and peeping tom and burglary, were committed in the Main Campus which
71
Trespassing - - - - - - 1 - - 1
Total 68 0 10 47 7 10 66 5 12 225
Table 4.5: Crime statistics of Main Campus (M), Western Region (W), and Southern Region
(S) of HKU between 2002 and 2004
over 90% of crime was property crime. Property crime usually has a direct
relationship with the types of victims that the offenders normally profiled. The
statistics of victimisation briefly gives a hint as to who was usually being targeted.
academic departments and the thefts took place in administration blocks, offices and
only a small portion of victims was female. Perhaps, the staff were more cautious
about their personal notebook computer and their victimisation rate was the lowest.
The situation seems slightly different in the case of theft of wallet and cash, where
some 60% of the victims were female students and nearly 83% of the victims were
computers and another 3 cases in a loss of 5 projectors, and 7 out of 8 victims were
academic departments. In the case of loitering and peeping tom, all victims were
noticeably female students. Tables 4.6 and 4.7 present the victimisation rates of the
72
Student (gender unknown) 21 38.18% 21 25.00%
Female staff 1 1.82% 1 1.19%
Male staff 3 5.45% 3 3.57%
Staff (gender unknown) 2 3.64% 2 2.38%
Total 55 100.00% 84 100.00%
Table 4.6: Victimisation rate of theft of notebook computer between 2002 and 2004
The statistics at Table 4.8 show the locations which suffered severely from
theft between the year 2002 and 2004. The library area was severely hit by thieves
with 60 theft cases and ranks on the top of the list. Following that the Knowles
Building was attacked 24 times while K.K. Leung Building ranks the third with 9
reports. The statistics also table the top ten hit locations of theft.
73
Library Extension 7 5 71.43%
Swire Hall 7 4 57.14%
Faculty of Medicine Building 6 6 100.00%
Chow Yei Ching Building 6 6 100.00%
Simon K.Y. Lee Hall 6 6 100.00%
Total 132 113 85.61%
Table 4.8: Prominent locations of theft between 2002 and 2004
properties of the offenders targeted helps unearth the relationship of its spatial and
temporal characteristics. The most popular items being stolen were: (1) notebook
computer because of its mobility (83 were stolen); (2) wallet and cash which
involved 46 cases because of easy disposal; (3) projectors because of its high re-sell
value (33 were stolen which added up to nearly a million Hong Kong dollars); (4)
mobile phone because of its trendy attraction (15 were stolen); (5) camera because
spots. The prominent black spots of theft of computers at Table 4.9 show that the
Knowles Building and Chong Yuet Ming Complex were primarily targeted.
74
The prominent black spots of theft of wallet and cash at Table 4.10 indicate
that in the library area, the classrooms of the Faculty of Medicine Building and the
In the total of 191 cases of theft, 88 cases, representing 46% of the total
thefts, were related to theft of wallet and cash. 45 of which took place in the library
area, especially in the year of 2002, and a few at the Faculty of Medicine Building
and the Starr Hall, classroom and dormitory were also targeted.
Statistics at Table 4.11 indicate that the well-known black spots of theft of
projectors were at the Knowles Building and the Ming Wah Complex and a total of
11 projectors were stolen. Between the year 2002 and 2004, there were 33 projectors
stolen. 5 cases reported in the year 2002 with a loss of 6 projectors, 13 cases in the
year after with 20 projectors and finally 5 cases in 2002 with 7 projectors being
stolen. The upsurge of this trend, particularly in the year 2003, was a result of the
75
Location of Theft of Projector No. of Crime No. of Stolen Projector
Knowles Building 5 7
Ming Wah Complex 3 4
Total 8 11
Table 4.11 Prominent locations of theft of projector between 2002 and 2004
When compared with the statistics at Table 4.12 which shows computer
projection facilities in the buildings of the Main Campus, it tends to suggest the
block with more classrooms attracts more thefts (theft of computers and projectors
in particular) from the blocks with less classrooms. However, the Main Building,
which is one of the oldest buildings in the Main Campus and ranks the third in the
number of most classrooms blocks, was rarely attacked with only 3 theft cases
reported and they all happened in the year of 2004. When examining the security
devices installed in the building, such as surveillance camera and electronic door
locks, they are comparatively weaker than other targeted blocks. One of the
premises drawn from this observation is that the top 4 buildings with most
classrooms, except the Main Building, are situated in the centre of the Main Campus
or in the radius of communal area, such as cafeteria and student associations. The
centrality of its geographic location with accesses to almost all the blocks in the
campus allows students to muster and socialise, and it becomes a common assembly
even make good of his escape in case something went wrong. The bus stops and
mini-bus stops along Boham Road which are within close proximity of the Knowles
Building and K.K. Leung Building offer good escape route to culprits. In contrast,
the Main Building does not provide offenders with many of these advantages.
76
Building No. Classroom / Seating Capacity No. of Computer
Theatre Projection
Meng Wah Complex 16 classrooms 1,529 16
K.K. Leung Building 12 classrooms 755 12
Main Building 11 classrooms 953 11
Library Extension 9 classrooms 1,227 9
Knowles Building 5 classrooms 793 5
Chong Yuet Ching Building 4 classrooms 720 4
James Lee Building 4 classrooms 269 4
Run Run Shaw Building 4 classrooms 186 4
Chow Yei Ching Building 3 theatres 395 3
T.T Tsui Building. 3 classrooms 330 3
Eliot Hall 2 classrooms 82 2
Rayson Huang Theatre Shaw Bldg 1 theatre 298 1
Table 4.12: Classroom facilities in the Main Campus buildings
Source: HKU Examination Unit (http://www.hku.hk/exam)
In the year 2002, over 93% of the total crimes were theft of which 66 cases
occurred in the Main Campus and 7 in the Southern Region. Of the 66 cases of theft
which cropped up in the Main Campus, the commonly attacked areas were the Main
Library and the Old Library with 47 reports. Of the 7 theft reports made in the
Southern Region, four took place in the Faculty of Medicine Building and three
were in the nearby buildings. Figure 4.3 shows that the hot spots of theft in the Main
Campus are centred around the library blocks. Seemingly, the library is one of the
most popular spots with the university for staff and students, and targeting victims
for petty cash and personal belongings at the library always yields good rewards for
the criminals.
77
Figure 4.3: Hot spots of theft in the Main Campus in 2002
In the year 2003, theft dropped to 55 cases from 77 cases in the preceding
year. The Main Campus was still the targeted area with 42 thefts reported.
Meanwhile, the Western Region was also attacked with 7 cases and Southern Region
remained very much similar to last year with 6 cases. Surprisingly, only one report
of theft took place in the Main Library and another two in the Library Extension.
This was as a result of a thief being arrested red-handed in the Main Library in
the tactical option employed by the Security Section. There were signs and notices
affixed to the studying desks warning the library users to be cautious about their
belongings. At the same time, plainclothes guards were deployed to identify any
suspicious or potential offenders mingling in the vicinity. Figure 4.4 portrays the hot
78
Equally astonishingly, 13 cases of theft were recorded in the Knowles
Building and 5 cases in the Chong Yuet Ming Physics and Chemistry Building
blocks. It seems the trend of theft has shifted away from the library area eastward
and westward due to displacement factor and a small number of thefts started to
spread around from the centre of the library to all the classroom blocks.
Dormitory theft became one of the characteristics of crime in the year 2003.
All 7 reports of theft which occurred in the Western Region were located in the
dormitories with 5 reports at the St. John’s College. 6 reports of theft took place in
the Southern Region where 3 were found in the Wei Lun Hall and one in the Lee
Hysan Hall. In the case of Wei Lun Hall, 2 thefts were reported in the neighbouring
flats.
Figure 4.4: Hot spots of theft in the Main Campus and the Western Region in 2003
79
In the year 2004, theft experienced a slightly upward trend and increased
from 55 in the previous year to 63. 48 reports of theft were made in the Main
Campus, 5 in the Western Region and 10 in the Southern Region. Figure 4.5 shows
the hot spots of theft of theft in the Main Campus and the Western Region.
The spatial distribution of theft of the year 2004 has changed in the Main
Campus. It has expanded from congregating around the Knowles Building and the
Chong Yuet Ming Physics and Chemistry Building blocks northward to the Swire
Hall and westward to the Simon K.Y. Lee Hall. A two-fold increase of theft with 7
reports was made in the Main Library and the Library Extension but there was a
reduction by nearly a half with 6 reports in the Knowles Building. Dormitories were
also heavily attacked with 4 cases of theft occurring in the Swire Hall where one of
the thefts took place in the amenities centre and 4 in the Simon K.Y. Lee Hall.
reports were made in the Starr Hall shifted northward from the St. John’s College,
which was the targeted dormitory block in the previous year. The situation in the
Southern Region remained not much different from last year except that 4 out of 10
theft reports were made in the R.C. Lee Hall moved southward from the Wei Lun
Hall, which was the badly hit dormitory block in the preceding year.
80
Figure 4.5: Hot spots of theft in the Main Campus and the Western Region in 2004
Of deep concerned was that number of loitering and related peeping tom and
indecent exposure complaints rose to 10 cases between the latter part of the year of
2003 and the end of the year 2004 which appeared outrageous. There was no history
of complaints of this nature made to the Security Section before that and the upsurge
Spatially, both loitering offences, the 7 reports of peeping tom and one report
of indecent exposure in the female toilets all occurred in the Main Campus except
for one in the Southern Region. One loitering and one peeping tom case were
located in the Library Extension, one peeping tom and one indecent exposure took
81
place in the same disabled toilet in the Fong Shu Chuen Amenities Building, two
peeping tom cases were reported in the same toilet complex in the K.K. Leung
Building, one loitering case on the upper floor and one peeping tom case on the
lower floor were located in the Knowles Building, one peeping tom case occurred in
the Hui Oi Chow Building; and last peeping tom case occurred in the dormitory of
In connection with this peculiar activity, a case of theft was reported in July
2004 where some woman’s clothing were stolen from a laundry room at the R.C.
Lee Hall in the small hours. Yet, there is no evidence to link this case with peeping
tom activity.
female toilet by a female student and later charged with the offence but he was
acquitted in court. In the rest of the cases, no one was arrested. There were three
cases reported in connection with weird behaviour in the use of camera. Security
Section has been actively investigating this unusual behaviour and has advised the
“sneak a look” activity in the female toilet around the black spots as a preventive
measure.
All the spatial evidence suggests that the female toilets in the communal
blocks and classroom blocks, especially at the lower floors where 8 out of 10 cases
were reported, were seriously targeted. It is easy to understand that the lower floors
believed that the suspect has a good local knowledge of the area and probably even
82
resides not far away from the scenes as a hideaway. Figure 4.6 plots out the hot spots
of this activity.
Figure 4.6: Hot spots of loitering and suspected peeping tom activities in the Main Campus
in 2004
Between the year 2003 and 2004 there were 8 cases of burglary reported
and 4 in each year of which 3 were in the Main Campus and one in the Southern
region. The spatial pattern appeared to be the same in these two study areas. In
general, two locations were burgled twice where the Run Run Shaw Building and
the New Clinical Building was hit once in each year and another six cases were
single incident.
83
Main Campus. Due to small number of burglary reports and light density of its
can be generalised that the burglars tended to target the administration blocks or
office blocks.
Figure 4.7: Spatial distribution of burglary in the Main Campus between 2003 and 2004
distribution of crime events helps crime analysts to understand what has happened
and what will happen in the future. Measuring time can be done in many ways, such
as annually, seasonally, monthly, weekly, daily and even hourly. When considering
the measurement interval, one has take into account the characteristics of an area,
clusters and serial occurrence of crime events. The University of Hong Kong is a
tertiary institution where activities of staff and students are worked on regular
84
monthly, weekly and daily schedules. This is the framework of measurement interval
As stated in Section 4.2 for examining crime distribution this study only
aims at studying temporal changes of the three specific crimes affecting the law and
order of the campus which are theft, loitering and peeping tom, and burglary. If other
applicable.
that the number of crime events in the year 2002 were highest in the months of
Summer vacation seems to provide a favourable buffer period when crime dropped
dramatically.
The overall crime situation in the year 2003 started to decline as the total
number of crimes decreased 19% from 78 in the year 2002 down to 64, and the peak
months were shifted to March, May, July, September and December with a month
interval in between. The upsurge of nine cases of crime in July seems unusual where
2 burglaries and 3 thefts were purposely targeted at the administration and office
blocks. One of the possible explanations for this escalation of crime is believed to be
that a good number of offices were either left unoccupied or closed during summer
holidays turning them into a more vulnerable situation thus attracting the attention of
opportunity offenders.
85
In the year 2004, the trend of crime was changed totally in the second half of
the year that the average crime rate rose to slightly more than 8 cases each month. It
may be conclusive to say that the rise was resulted from the emergence of all crimes,
particularly peeping tom, indecent exposure, snatching and other minor offences.
March was the worst month in which 10 cases of theft and 2 cases of burglary took
place.
16
14
12
No. of Crime
10 2002
8 2003
6 2004
4
2
0
Jan Feb Mar Apri May Jun Jul Aug Sept Oct Nov Dec
Figure 4.8: Comparison of frequency of crime by month between 2002 and 2004
The following accumulative bar chart at Figure 4.9 depicts the monthly
distribution of crimes in the campus over the duration of the research period. It can
be concluded that February and March, and September and October are the peak
periods of criminal activities. It is highly suggested that these high crime seasons
86
Frequency of Crime by Month (2002 - 2004)
35
30
25
No. of Crime
2004
20
2003
15
2002
10
5
0
Jan Feb Mar Apri May Jun Jul Aug Sept Oct Nov Dec
Figure 4.9: Accumulative frequency of crime by month between 2002 and 2004
weekdays and shows that Monday, Tuesday, Thursday and Friday are more
vulnerable than the other days in the rest of the week. This is probably having a
direct link with the school days as many students have no classes in the low risk
days. This is quite true until the year 2004 when almost every day was targeted and
87
Frequency of Crime by Weekday (2002 - 2004)
18
16 2002
14 2003
No. of Crime
12 2004
10
8
6
4
2
0
Mon Tue Wed Thur Fri Sat Sun
temporal analysis.
Table 4.13 shows that the extent of missing temporal data of hours is quite
scattered around in the three study areas. 42 crime events in the Main Campus where
time was not recorded represents about 23% of the total number of crime data in this
study. It becomes worse in the Western Region and Southern Region where one third
and nearly half of the respective records were absent. Therefore, the temporal study
will focus on the Main Campus. In order to not to cause any confusion with the
missing hours records in this section, those records containing hours information
will be referred as known records whereas those which do not will be the unknown
records.
88
Main Campus 2002 2003 2004 Total
Unknown 6 15 21 42
Known 62 32 45 139
Total 68 47 66 181
Unknown % 8.82% 31.91% 31.82% 23.20%
explained in Chapter three and how it affects the measurement on the frequency of
Table 4.14 outlines the temporal distribution of the known records of crimes.
This study will assess the temporal distribution of crime in three sessions. The
tuition hours of the University of Hong Kong start from eight o’clock (0800hrs) in
the morning to six o’clock (1800hrs) in the evening. The time before and after the
school hours will be sub-divided into two time segments using the mid-night line
(2400hrs). Between six o’clock (1800hrs) in the evening and before mid-night is the
89
evening session; and from mid-night to eight o’clock (0800hrs) in the morning is the
morning session. The delineation of three separate periods will explain the temporal
Again from Table 4.14, it can be seen that between the year 2002 and 2004,
90
the occurrence of crime in the morning session took up slightly over 6% of the total
of 104 crime cases. Nearly 77% of the total known cases occurred in the school
session while another 27% took place in the evening session. Figure 4.8 shows the
10
2002
8
No. of Crime
2003
6
2004
4
Known cases:
2 164
0 Unknown
cases:61
00
00
00
00
00
0
0
0
0
:0
:0
:0
:0
:0
:0
:0
12 in 2002
0:
2:
4:
6:
8:
10
12
14
16
18
20
22
22 in 2003
27 in 2004
Time Interval
between the year 2002 and 2004 are shown to be quite significant. Figure 4.12 and
Figure 4.13 indicate s that in the year 2002 the temporal pattern is centred on the
library area, especially during the class session. Figure 4.14 and Figure 4.15 reveal
the situation in the year 2003 was changed that the pattern extended eastward and
westward again from the library area with a much lower crime rate and that is
similar to its spatial distribution. Figure 4.16 and Figure 4.17 shows that in the year
2004 the pattern shift to northeast during the class session while the pattern in the
evening session remained much the same as that of the year 2003.
91
Figure 4.12: Temporal distribution of crime in the Main Campus between
0800 and 1800hrs in 2002
92
Figure 4.14: Temporal distribution of crime in the Main Campus between
0800 and 1800hrs in 2003
93
Figure 4.16: Temporal distribution of crime in the Main Campus between
0800 and 1800hrs in 2004
94
4.4.4 Temporal Analysis - Theft
Table 4.15 presents the temporal distribution of theft between the year 2002
and 2004. The upsurge of theft cases in the year 2002 was an exceptional
phenomenon. An observation of this trend between the year 2003 and 2004 indicates
that on average it is most active in February and March during the first half of the
year and same is true in September, November and December in the second half.
The reason is believed to be connected with the opening of school after the winter
and summer holidays when the students returned to school and the opportunity for
being targeted becomes higher. Yet, there is no pattern of weekday identified in this
analysis.
Figure 4.15, however, suggests that theft varies in different time segments. It
seldom occurred in the morning session which only takes a small portion of 5% of
all the known records. In the year 2004 there were 5 cases reported in which 4 took
place in the dormitory where some petty cash, clothing and notebook computers
Crime become active during the class session. In the year 2002, 24 cases of
95
theft took place in the library area falling into this time segment. The year after,
there were 3 each found in the Chong Yuet Ming Chemistry Building, Knowles
Building and the library area. In these 9 cases of theft, 5 took place in the office
where notebook computers were targeted and one in the registry where 3 projectors
worth HK$130,000 were found missing. Probably due to the frequent flow of staff
and student in these areas over this period of time, offices and classroom became
targeted. By the year 2004, no significant temporal pattern of theft of more than two
Stealing activity does not diminish in the evening course hours. The only
temporal pattern of theft was reported at the Knowles Building where 3 offices and
one workshop were attacked with 3 stolen notebook computers and some cash taken,
while the remaining one was an attempted theft of a notebook computer. In two of
these cases, a male was found acting suspiciously in the building and another male
was found to be at his age of early fifty’s. Again, it is believed that many staff and
students remained in their offices and classrooms after normal working hours or
studying hours, and their alertness was lowered so their negligence increased.
96
Temporal Pattern of Theft (2002 - 2004)
60
50
No. of Crime
40 2002
30 2003
20 2004
10
0
2400-0800 hrs 0800-1800 hrs 1800-2400 hrs
Time Interval
As mentioned before, loitering, peeping tom and indecent exposure did not
occur prior to the end of the year 2003. 4 reports of peeping tom were made between
May and July, and 2 in October in the year 2004. 3 occurrences were found on
Wednesdays.
Of the nine known cases as shown at Table 4.16, one report of peeping tom
was made at eleven o’clock (1100hrs) in the morning and 4 between half-past one
(1330hrs) and four o’clock (1600hrs) in the afternoon. During the class session,
female toilets probably have fewer visitors and therefore give the potential offenders
an opportunity. The sole indecent exposure also falls into this time frame. Another
two reports of peeing tom and one loitering took place between seven o’clock
(1900hrs) and eleven o’clock (2300hrs) in the evening and there was not conclusive
97
Loitering 2400-0800 0800-1800 1800-2400 Total
2002 0 0 0 0
2003 0 0 0 0
2004 0 6 3 9
Total 0 6 3 9
Percentage 0.00% 66.67% 33.33% 100.00%
Table 4.16: Temporal distribution of loitering, peeping tom and indecent exposure between
2002 and 2004
Estimating the actual time of burglary is no easy task except with the
4.17 only shows the starting time when the victim had last seen the stolen properties.
Burglary reports are often received in the morning and it is usually a few hours
There was no report of burglary made in the year 2002 but 4 were made in
each of the following two years. Of the 7 known records, there was one which was
responded to immediately after the offenders triggered the burglar alarm and another
one reacted to within 2 hours, while in the rest of the 5 cases the average time span
98
for making a report was more than 15 hours. This explains the complexity in
measuring the exact time a burglary was committed. One significant observation is
revealed that in the 4 known cases of burglary in the year 2003, 2 were made in
March and July and in both cases they were just one day apart. That is not to suggest
they were connected but the frequency of burglary in these two months was high.
Further examination of the 7 burglary records shows that 6 burglaries took place
between Tuesday and Thursday and burglars tend to aim at the office blocks and
In 4 burglary cases offenders smashed the window panel in order to gain the
entry and stole the notebook computer therein, and in two of these cases 12
computers were stolen each time. In another case the offender prised opened the
door to the theatre and two projectors worth HK$280,000 were stolen. Theft of a
single notebook computer might be committed by a student who could hide it away
easily and swiftly but the appropriation of 12 notebook computers and 2 theatre
projectors might not. It is highly suspected that these serious burglaries could only
control the situation by the end of the year 2003. They carried out risk assessment to
the buildings at high risk of theft and burglary and advised the administration
personnel to install closed circuit television (CCTV) in the area likely to be exposed
to theft and burglary. They also revised their deployment strategy to task the patrols
in the high-risk area and tighten up the exit control of the campus. More and more
99
CCTV and electronic door locks were installed in the classrooms equipped with
expensive equipment. The crime statistics at Table 4.18 seem promising that in terms
of crime cases, theft of projector was down significantly from 13 cases in the year
2003 to 5 in the following year and there was no report made between March and
October in that year. Theft of notebook computer also witnessed a slight drop from
26 in the year 2003 to 20 in the year after but the actual number of loss of notebook
computers went up due to the two incidents where 12 computers were stolen each
Subject to the Student Right-to-Know and Campus Security Act 1990 and
upon request from the Department of Education, an institute, the National Center for
crime and security at tertiary institutions. The Act also demands tertiary institutions
publish and distribute a security report containing information about campus policies
and crime situation for all students and staff. The purpose of conducting the survey
100
http://nces.gov/surveys/peqis/publications/97402/3.asp).
on campus crime statistics of five hundred tertiary institutions in the year 2003. Of
the 500 institutions, sixteen with an enrolment between 18,000 and 21,000 students
were selected to compare with the University of Hong Kong. Table 4.19 shows the
sharp contrast in crime situation between the United States institutions and the
University of Hong Kong. One may argue the difference in social cultures,
education systems and security measures may vary the result. Still, it demonstrates
that the University of Hong Kong is comparatively safer than those in the United
States.
University / College Enrolment Mur Rape Rob Assault Bur Theft M Theft Arson
101
Northern Arizona 19728 0 7 1 18 61 416 7 7
University
Columbus State 19642 0 0 0 5 6 263 3 0
Community University
East Carolina University 19412 0 2 9 2 22 290 4 0
University of Alabama, 19130 0 4 1 6 14 400 9 *
Tuscaloosa
California State Polytec 19041 0 1 3 0 40 252 30 0
University, Pomona
Hong Kong University 19000 0 0 1 0 4 55 2 0
Bowling Green State 18739 0 2 1 0 8 255 3 2
University
Table 4.19: Comparison of campus crime statistics between HKU and US Universities in 2003
Source of Statistics: Security on Campus. www.securityoncampus.org/crimestats/ucr03.pdf
Mur – Murder & Non-negligent Manslaughter; Rape – Forcible; Rob – Robbery; Assault – Aggravated
Assault; Bur – Burglary; Theft – Larceny / Theft; M theft – Motor Vehicle Theft Arson - Arson
* - FBI did not receive 12 months of arson data from either the agency or the state.
4.6 SUMMARY
and temporal analysis for crime mapping. In comparison with the statistical analysis
operated side by side in the study, hot spot area crime analysis can identify the
hotspots of the prevailing crimes in the campus visually with the use of graduated
size symbol, and presents far better result than the textual description of crime
102
CHAPTER FIVE
CONCLUSION
5.1 Introduction
The data visualisation method of crime mapping and its practicality in spatial
and temporal crime analysis were discussed in the previous chapter. This chapter
will discuss some of the limitations encountered in this research and summarise the
major findings from the current analysis. To echo to the last focus stated in chapter
one, it will also make some recommendations to improve the current crime control
and crime prevention strategy and finally some suggestions for the future research.
The first and perhaps most obvious limitation of the study lies in the data
availability. Like most of the crime studies, comprehensive crime information from
crime. Due to personal confidentiality and data privacy control, some vital and
useful information were not recorded or made available from the Security Section.
constructing profiling analysis and some interesting findings may be stemmed out
Another limitation of the current study is the data structure of the raw crime
data. Not only was it presented in a textual descriptive format, it was not structured
103
nor suitably categorised for any possible comparative analysis. Not to mention the
manual input errors, missing temporal data records and low data standardisation
found in the data set. It took quite a long while to overcome these problems by
verifying and rectifying each and every single crime incident record before the data
A final key limitation in this research lies in the small data sample. There
were only 225 crime incidents reported between the year 2002 and 2004, including a
crime cases a year and given the disparity of crime distribution in some areas, the
outcome of this analysis tends towards generalisation and therefore the inferences
effectiveness of spatial and temporal analysis in crime mapping and the prediction of
effective in plotting all the crime black spots on a two-dimension platform for spatial
analysis. Some hot spots of prevailing crimes were more identifiable than the others
because the occurrence of the former were more frequent in volume and more
concentrated in an area than that of the latter. This reveals one fact that in the setting
104
of the University of Hong Kong due to low rate of some rare crimes, such as
snatching and robbery, they do not produce any hot spot. Analysis into these rarely
When comparing the crime rate between the year 2002 and 2004 with the
annual average of 75, the crime rate of the year 2004 climbed to the highest point at
83, a recorded high in a three-year period. An alarming signal is the rising number of
different crime types, which went from 3 in the year 2002 to 6 in the following year
and finally reached to 14 in the year 2004, which poses a challenge to the security of
the campus. The emergence of other crimes into the campus, even if the rate of
which was low, if they are not properly controlled or enforced the opportunity for
crimes will be promoted, such as snatching and robbery. The deployment of frequent
patrols to the high-risk areas will initiate a displacement effect, which, in turns,
The apprehension of an active thief in the year 2002 has neutralised theft
activities in the library area, but theft is still prevailing throughout the whole campus
and continues to spread out from the conventional targets, such as classrooms and
office areas, to the dormitories. More importantly, theft of petty cash, notebook
computers and some trendy appliances, such as mobile phones and digital cameras,
are higher. Spatial analysis of theft is very effective in locating all the black spots as
well as monitoring the annual changes of it. Since there was no one arrested or
105
confronted and victim kept on neglecting on their personal belongings, the identified
Hong Kong in the coming year stays very much like the year 2004, the current crime
The disquieting burglary also remains problematic. There was no arrest made
nor any stolen properties recovered in the past providing few clues to the analysts
for further study. Spatial analysis in this research does not yield any useful
information in identifying any hot spot due to small data samples and its sparse
spatial distribution. Yet, temporal analysis and modus operandi (MO) analysis
provide an important lead that most of these “bespoken” burglars target on the high
value items, such as projectors and notebook computers, or perhaps some other
expensive equipment. As long as these properties are well protected and kept
confidential, it will render less chances to the burglars. The step up of preventive
locks, in the high-risk blocks recently will serve its purpose. However, spatial
analysis reveals one significance phenomenon that they never take place twice in the
same building block at least this is the situation so far. If the hypothesis is correct,
Of concern are the increasing numbers of the activities of peeping tom and
indecent exposure in the year 2004. Not only have they caused anxiety to the
females, the worst scenario is that they would turn into some serious sexual offences,
such as indecent assault and rape, if “Broken Windows” theory is correct. Spatial
analysis has precisely identified a hot spot of 4 building blocks in the Main Campus
where the suspects usually frequent. Temporal analysis has also traced the time span
106
when the suspects become more active. This spatiotemporal analysis narrows down
the parameter of the suspects’ peculiar behaviour in time and space and serves to
allocate resources to keep the areas under close surveillance. That is to say,
crimes, theft and peeping tom activities would continue in the three study areas as
shown in Figure 5.1 and 5.2. Theft will stay prevailing in the communal areas, such
as library, classrooms, amenities hall and dormitories. Peeping tom activities will
shift to the building blocks east and west from the Knowles Building, especially at
the lower floor female toilets, which have not been renovated with heightened
partition.
107
Figure 5.1: Forecast of crimes in the Main Campus and the Western Region
108
Figure 5.3 exhibits the crime trend between the year 2002 and 2004.
Seemingly, it has been varied in its patterns from a seasonal variation pattern in the
year 2002 to a cyclical fluctuation pattern in the year after, and finally to an irregular
fluctuation pattern which was cyclical high in the first half and became steady in the
second half. The changes of these patterns tend to suggest that the pattern in the
coming year will be on a more stable development with a small level of fluctuation
16
14
12
No. of Crime
10 2002
8 2003
6 2004
4
2
0
ay
b
ar
ug
ec
i
ct
ov
pt
n
l
pr
Ju
Fe
Ja
Ju
O
M
Se
D
M
N
A
mapping crime hot spots but not considered to be fully successful in the campus
environment. In the case of burglary and rarely occurred offences, no hot spot was
produced because of the thin distribution of burglary cases and low crime rate of the
minor offences. In the case of theft, hot spots were identified spatially but not quite
apparent temporally. In the case of peeping tom activities, hot spots were shown in
109
both spatial analysis and temporal analysis.
of crimes. The four scenarios discussed in sections 5.3.1 and 5.3.2 summarise the
current situation in this study. To unearth the root cause of a complex crime problem,
other analysis techniques, particularly the modus operandi (MO) analysis, are
5.4 Recommendations
approach aiming at resolving each and individual crime incidents (Clarke and Eck
2003). This is the approach the Security Section adopting in the current situation. It
is considered to be successful in reducing the crime rate in some of the hot spot
areas but it does not control them from spreading out. Problem-oriented policing
recommended to control the distribution of crimes and at the same time to eradiate
strategy. The four principles of CompStat are equally applicable in targeting crimes
designed for law enforcement environment and for high crime rate communities.
110
Though the subjects of protection between police and private security are similar,
police aim at protecting the safety of the general public while private security aims
nature of duties of the two professional which are overlapping, such as the methods
and mandates of policing, and the organisational and operational structure (Henry
2003). The following recommendations in this study are made to improve the
current situation.
(POP) requires a clear and well-defined mission statement and scope of vision. It
will provide all the personnel a better understanding of the direction an organisation
therefore, recommended that the Security Section under the Estates Office take on
Once the philosophy is instilled and anchored in their minds, personal accountability
The structure of the management should be revised as well to cope with the
introduction of new technology and techniques, and to suite the changes of the new
fast flow of information. Thus, exchanging timely information from the crime
database and the crime map system makes immediate assessment possible and can
devise functional tactics readily for operation. CompStat meeting is another way to
facilitate the flow of communication, it allows all the stakeholders to evaluate the
111
The complexity of today’s society means that no one can fight against crime
on his own. Partnership with other organisations always garners better support,
gathers more resources and trades new skills from each other. Resources in the
campus are huge. The Geography Department can provide the Security Section a
GIS platform for crime mapping analysis. The Sociology Department can conduct
survey on the awareness of crime prevention from the students and provide Security
Section detailed analysis to devise effective crime control and crime reduction
personnel can look for some characteristics of the potential offender. Liaison with
the police surely is important, as they can provide professional advice on crime
Estates Office should take up the leading role in this regard to co-ordinate
with the aforementioned departments and faculties for administration, research and
resources allocation for the coming year. Security Section should liaise with the
police for intelligence purposes and the administration unit of all departments for
routine security checks and risk evaluation functions. On the ground level, the
section should conduct regular tactical analysis based on the outcome of spatial and
temporal distribution of crime and other forms of intelligence, and task frontline
security teams to mount targeting operation and tactical patrol duties. Besides, the
section should always evaluate the effectiveness of crime maps and the result of
tactical operations, and from time to time to fine-tune the operational plan.
112
In order to enhance the professional capability of the staff, training is
definitely a must for all to acquire the required knowledge and skills for a specific
function. Some indoor officers should be trained to perform crime analysis together
with some basic understanding of GIS and crime mapping. Their analysis will be
vital for the supervisors and the management to allocate resources to handle the
problems at the right time and at the right place. Patrol guards should have a good
grasp of local knowledge and always be briefed of the development of the prevailing
prevention seminars should continue and be held more frequently to raise their
shown on the front page of the web before they logged on the university computer
Crime analysis relies greatly on the clarity of data set and structure of the
database. Data collected from the current crime incident reports needs to be
expanded and cover more information for analysis, such as standardising keyword
for modus operandi (MO) search which is handy for an advanced and multifaceted
crime analysis. Also, special event data, such as dates of important school events,
opening days and public holidays, are indicators to link some crime incidents with
festive events for more precise temporal analysis. Other tabular data should be
113
overlooked.
Since this research represents the first attempt in studying the spatial and
temporal distribution of crime on the campus of the University of Hong Kong, there
There is a need for further research into the crime distribution from a
use of the campus, such as census distribution on the campus, functions and
multilayer spatial analysis. It will present a clearer correlation between crime and
place and certainly will verify and extend the results of this study.
Future research should, where possible, address the issue of crime prediction.
forecast the crime trend and crime pattern in a specific time span. It will show the
changes of crime over time period and also show the effects of displacement after
intervention. Again, it will help researchers to develop and test their hypothesis for
5.6 Conclusion
114
and neither can spatial analysis nor temporal analysis. It is the joint efforts of the
crimes so that they can easily explore relationships between crime, time and place to
tool in mapping crime hot spots, and its potential for further development should not
way forward for the future of police and private security. In order to assist the
and the frontline personnel in deciding appropriate tactical options at ground level, a
reform in the current management system and policing strategy is deemed necessary.
115
References
Anselin, L.; Cohen, J.; Cook, D.; Gorr, W.; and Tita, G. (2000) Spatial Analyses of
Crime. In Duffee (ed.) Measurement and Analysis of Crime and Justice. Vol. 4,
Washington, DC: National Institute of Justice: 213-262.
Buerger, M., Cohn, E., and Petrosino, A. (1995) Defining the “Hot Spots of Crime”
Operationalizing Theoretical Concepts for Field Research. In Eck, J.; and
Weisburd, D. (ed.), Crime And Place. Crime Prevention Studies No. 4. New
York: Criminal Justice Press and Washington, D.C.: 237-257.
Bowers, K. and Hirschfield, A. (ed.) (2001) Mapping And Analysing Crime Data:
Lessons From Research And Practice. Taylor and Francis.
Brantingham, P.J.; and Brantingham, P.L. (1984) Patterns in Crime. New York:
Macmillan.
Brantingham, P.J.; and Brantingham, P.L. (1995) Location Quotients And Crime Hot
Spots In The City. In Carolyn Rebecca Block, Margaret Dabdoub and Suzanne
Fregly (ed.), Crime Analysis through Computer Mapping. Washington, DC:
116
Police Executive Research Forum.
Clarke, R.V., and Eck, J. (2003) Become a Problem Solving Crime Analyst In 55
Small Steps. University College London: Jill Dando Institute of Crime Science.
Cohen, L.E.; and Felson. M. (1979) Social Change And Crime Rate Trends: A
Routine Activity Approach. American Sociological Review 44: 588-605.
Cornish, D.; and Clarke. R.V. (1986) The Reasoning Criminal: Rational Choice
Perspectives on Offending. New York: Springer-Verlag.
Eck, J. (1998) What Do Those Dots Mean? Mapping Theories With Data. In David
Weisburd, D.; and McEwen, T. (ed.), Crime Mapping and Crime Prevention,
Crime Prevention Studies No.8. New York: Criminal Justice Press: 379-406.
Eck, J.; Gersh, J.S.; and Taylor, C. (2000) Finding Crime Hot Spots Through Repeat
Address Mapping. In Goldsmith, V.; McGuire, P; Mollenkopt, J.; and Ross, T.
117
(ed.), Analyzing Crime Patterns: Frontier Of Practice. California: Sage
Publications, Inc.: 49-63.
Eck, J.; and Weisburd, D. (1995) Crimes Places In Crime Theory. In Eck, J.; and
Weisburd, D. (ed.), Crime And Place. Crime Prevention Studies No. 4. New
York: Criminal Justice Press and Washington, D.C.: 1-34.
Felson, M (1995) Those Who Discourage Crime. In Eck, J.; and Weisburd, D. (ed.),
Crime And Place. Crime Prevention Studies No. 4. New York: Criminal Justice
Press and Washington, D.C.: 53-66.
Gottlieb, S.; Arenberg, S.; and Singh. R. (1994) Crime Analysis: From First Report
To Final Arrest. California: Alpha Publishing.
Grubesic, T.; and Murray, A. (2001) Detecting Hot Spots Using Cluster Analysis and
GIS. Paper presented at the 5th Annual International Crime Mapping Research
Conference in Dec 2001, Dallas, Texas.
Available at www.ojp.usdoj.gov/cmrc/whatsnew/hotspot/intro.pdf (assessed Jan
2005)
Harries, K. (1990) Geographic Factors in Policing. Washington, DC: Police
Executive Research Forum.
Harries, K. (1999) Mapping Crime: Principle And Practice. Washington, DC: Crime
Mapping Research Center.
118
Henry, V. (2003) The CompStat Paradigm: Management accountability in Policing,
Business and the Public Sector. New York: Looseleaf Law Publications, Inc.
Kamber, T.; Mollenkopf, J.; and Ross, T (2000) Crime, Space, and Place An Analysis
of Crime Patterns in Brooklyn. In Goldsmith, V.; McGuire, P; Mollenkopt, J.;
and Ross, T. (ed.), Analyzing Crime Patterns: Frontier Of Practice. California:
Sage Publications, Inc.: 107-119.
Kelling, G. and Sousa, W. Jr. (2001) Do Police Matter? An Analysis of the Impact of
New York City’s Police Reforms. New York: Manhattan Institute for Policy
Research, Center for Civil Innovation.
La Vigne, N.; and Wartell, J. (ed.) (1998) Crime Mapping Case Studies, Volume 1.
Washington, DC: Police Executive Research Forum.
La Vigne, N.; and Wartell. J. (ed.) (2000) Crime Mapping Case Studies, Volume 2.
Washington, DC: Police Executive Research Forum.
Mamalian, C.; and La Vigne, N. (1999) The Use of Computerised Crime Mapping by
Law Enforcement: Survey Results. Washington, DC: National Institute of
Justice, Research Preview.
Patrick, M. (2002) Proving the SARA Model: A problem solving approach to street
crime reduction in the London Borough of Lewisham. London: InfoTech
Enterprises Europe.
119
Ratcliffe, J.H. (1999) Terrorist, Patrons And Champions: Implementing Crime
Mapping Across the UK. Presented at 3rd Annual International Crime Mapping
Research Conference, Orlando, FL.
Rich, T. (1995) The Use of Computerised Mapping In Crime Control And Prevention
Programs. Washington, DC: National Institute of Justice, Research in Action.
Rich, T. (1999) Mapping the Path to Problem Solving. In National Institute of Justice
Journal. October 1999. Washington, DC: National Institute of Justice.
Shane, J. (2004) CompStat Process. In FBI Law Enforcement Bulletin April 2004
issue: 12-19.
Sherman, L. (1995) Hot Spots of Crime and Criminal Careers of Places. In Eck, J.;
and Weisburd, D. (ed.), Crime And Place. Crime Prevention Studies No. 4. New
York: Criminal Justice Press and Washington, D.C.: 35-52.
U.S, Department of Justice (1999) Mapping Out Crime: Providing 21st Century Tools
for safety Communities. Available at: http://govinfo.library.unt.edu/npr/library/
papers/bkgrd/crimemap/071299.pdf (Accessed Jan 2005)
Vann, I.; and Garson, D. (2003) Crime Mapping: New Tools For Law Enforcement.
New York: Peter Lang Publishing, Inc.
Velasco, M.; and Boba, R. (2000) Manual of Crime Analysis Map Production.
Washington, DC: Police Foundation.
120
Velasco, M.; and Boba, R. (2000) Tactical Crime Analysis And Geographic
Information Systems: Concepts and Examples. In Crime Mapping News,
Volume 2, Issue 2, 2000. Washington, DC: Police Foundation: 1-4.
Wartell, J.; and McEwen, T. (2001) Privacy in the Information Age: A Guide for
Sharing Crime Maps and Spatial Data. Washington. DC: U.S. Department of
Justice Office of Justice Programs.
Weisburd, D.; and McEwen, T. (ed.) (1998) Introduction: Crime Mapping And Crime
Prevention. In Crime Mapping and Crime Prevention. Crime Prevention
Studies No.8. New York: Criminal Justice Press: 1-23.
Willis, J.; Mastrofski, S.; and Weisburd, D. (2003) CompStat in Practice: An In-depth
Analysi of Three Cities. Washington D.C.: Police Foundation
121