Computational and mathematical methods arguably have an enormous potential for serving practical needs in crime analysis and prevention by offering novel tools for crime investigations and experimental platforms for evidence-based policy making. We present a comprehensive formal framework and tool support for mathematical and computational modeling of criminal behavior to facilitate systematic experimental studies of a wide range of criminal activities in urban environments. The focus is on spatial and temporal aspects of different forms of crime, including opportunistic and serial violent crimes. However, the proposed framework provides a basis to push beyond conventional empirical research and engage the use of computational thinking and social simulations in the analysis of terrorism and counter-terrorism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brantingham, P.J., Brantingham, P.L.: Patterns in Crime. New York: Macmillan Publishing Company (1984)
Brantingham, P.J., Brantingham, P.L.: Environment, Routine and Situation: Toward a Pattern Theory of Crime. Routine Activity and Rational Choice: Advances in Criminological Theory (1993) 259–294
D’Amico, J.: Stopping Crime in Real Time. The Police Chief – The Professional Voice of Law Enforcement (July 2008) URL: http://policechiefmagazine.org/magazine/.
Liu, L., Eck, J., eds.: Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. Information Science Reference (January 2008)
Frank, U., Troitzsch, K.G.: Epistemological Perspectives on Simulation. Journal of Artificial Societies and Social Simulation 8(4)
Groff, E., Birks, D.: Simulating crime prevention strategies: A look at the possibilities. Policing: A journal of Policy and Practice 2(2) 175–184
Brantingham, P.J., Brantingham, P.L., Glässer, U.: Computer Simulation as a Research Tool in Criminology and Criminal Justice. Criminal Justice Matters (58) (February 2005)
Brantingham, P.L., Kinney, B., Glässer, U., Jackson, P., Vajihollahi, M.: Mastermind: Computational Modeling and Simulation of Spatiotemporal Aspects of Crime in Urban Environments. In Liu, L., Eck, J., eds.: Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. Information Science Reference (2008)
Brantingham, P.L., Glässer, U., Kinney, B., Singh, K., Vajihollahi, M.: A Computational Model for Simulating Spatial Aspects of Crime in Urban Environments. In Jamshidi, M., ed.: Proceedings of the 2005 IEEE International Conference on Systems, Man and Cybernetics. (October 2005) 3667–74
Brantingham, P.L., Glässer, U., Kinney, B., Singh, K., Vajihollahi, M.: Modeling Urban Crime Patterns: Viewing Multi-Agent Systems as Abstract State Machines. In Beauquier, D., et al., eds.: Proceedings of the 12th International Workshop on Abstract State Machines (ASM’05). (March 2005)
Börger, E., Stärk, R.: Abstract State Machines: A Method for High-Level System Design and Analysis. Springer-Verlag (2003)
Gurevich, Y.: Sequential Abstract State Machines Capture Sequential Algorithms. ACM Transactions on Computational Logic 1(1) (July 2000) 77–111
Farahbod, R., Gervasi, V., Glässer, U.: CoreASM: An Extensible ASM Execution Engine. Fundamenta Informaticae (2007) 71–103
Farahbod, R., Glässer, U., Jackson, P., Vajihollahi, M.: High Level Analysis, Design and Validation of Distributed Mobile Systems with CoreASM. In: Proceedings of 3rd International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2008). (October 2008)
Wing, J.M.: Computational Thinking. Communications of the ACM 4(3) (2006) 33–35
Xue, Y., Brown, D.: A decision model for spatial site selection by criminals: a foundation for law enforcement decision support. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on 33 (2003) 78–85
Baumgartner, K., Ferrari, S., Salfati, C.: Bayesian network modeling of offender behavior for criminal profiling. In: 44th IEEE Conference on Decision and Control and European Control Conference CDC-ECC’05. (2005) 2702–2709
Clarke, R.V.: Technology, Criminology and Crime Science. European Journal on Criminal Policy and Research 10(1) (2004) 55–63
Dean, G.: Criminal profiling in a terrorism context. Criminal Profiling International Theory, Research, and Practice (2007)
Elliot, E., Kiel, L.D.: Towards a new vision of complexity. Chaos, Solutions & Fractals 20(1) (April 2004) 63–68
Raczynski, S.: Simulation of the dynamic interactions between terror and anti-terror organizational structures. Journal of Artificial Societies and Social Simulation 7(2) (2004)
Sipser, M.: Introduction to the Theory of Computation. PWS Publishing Company (1997)
Gurevich, Y.: Evolving Algebras 1993: Lipari Guide. In Börger, E., ed.: Specification and Validation Methods. Oxford University Press (1995) 9–36
Blass, A., Gurevich, Y.: Abstract State Machines Capture Parallel Algorithms. ACM Transactions on Computation Logic 4(4) (2003) 578–651
Glässer, U., Gurevich, Y., Veanes, M.: Abstract Communication Model for Distributed Systems. IEEE Trans. on Soft. Eng. 30(7) (July 2004) 458–472
Farahbod, R., Glässer, U.: Semantic Blueprints of Discrete Dynamic Systems: Challenges and Needs in Computational Modeling of Complex Behavior. In: New Trends in Parallel and Distributed Computing, Proc. 6th Intl. Heinz Nixdorf Symposium, Jan. 2006, Heinz Nixdorf Institute (2006) 81–95
Gurevich, Y., Huggins, J.: The Railroad Crossing Problem: An Experiment with Instantaneous Actions and Immediate Reactions. In: Proceedings of CSL’95 (Computer Science Logic). Volume 1092 of LNCS., Springer (1996) 266–290
Stärk, R., Schmid, J., Börger, E.: Java and the Java Virtual Machine: Definition, Verification, Validation. Springer-Verlag (2001)
Börger, E., Fruja, N.G., Gervasi, V., Stärk, R.F.: A High-level Modular Definition of the Semantics of C#. Theoretical Comp. Sci. 336(2/3) (May 2005) 235–284
Börger, E.: A Logical Operational Semantics for Full Prolog. Part I: Selection Core and Control. In Börger, E., Kleine Büning, H., Richter, M.M., Schäonfeld, W., eds.: CSL’89. 3rd Workshop on Computer Science Logic. Volume 440 of LNCS., Springer (1990) 36–64
Farahbod, R., Glässer, U., Vajihollahi, M.: An Abstract Machine Architecture for Web Service Based Business Process Management. International Journal of Business Process Integration and Management 1 (2007) 279–291
Glässer, U., Gotzhein, R., Prinz, A.: The Formal Semantics of SDL-2000: Status and Perspectives. Computer Networks 42(3) (2003) 343–358
Börger, E., Glässer, U., Müller, W.: Formal Definition of an Abstract VHDL’93 Simulator by EA-Machines. In Delgado Kloos, C., Breuer, P.T., eds.: Formal Semantics for VHDL. Kluwer Academic Publishers (1995) 107–139
MĂĽller, W., Ruf, J., Rosenstiel, W.: An ASM Based SystemC Simulation Semantics. In MĂĽller, W., et al., eds.: SystemC - Methodologies and Applications, Kluwer Academic Publishers (June 2003)
Beierle, C., Börger, E., Durdanovic, I., Glässer, U., Riccobene, E.: Refining Abstract Machine Specifications of the Steam Boiler Control to Well Documented Executable Code. In Abrial, J.R., Börger, E., Langmaack, H., eds.: Formal Methods for Industrial Applications. Specifying and Programming the Steam-Boiler Control. Number 1165 in LNCS. Springer (1996) 62–78
Glässer, U., Gu, Q.P.: Formal Description and Analysis of a Distributed Location Service for Mobile Ad Hoc Networks. Theoretical Comp. Sci. 336 (May 2005) 285–309
Glässer, U., Rastkar, S., Vajihollahi, M.: Computational Modeling and Experimental Validation of Aviation Security Procedures. In Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B.M., Wang, F.Y., eds.: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings. Volume 3975 of Lecture Notes in Computer Science., Springer (2006) 420–431
Glässer, U., Rastkar, S., Vajihollahi, M.: Modeling and Validation of Aviation Security. In Chen, H., Yang, C., eds.: Intelligence and Security Informatics: Techniques and Applications. Volume 135 of Studies in Computational Intelligence. Springer (2008) 337–355
Börger, E.: The ASM ground model method as a foundation of requirements engineering. In N.Dershowitz, ed.: Verification: Theory and Practice. Volume 2772 of LNCS., Springer-Verlag (2003) 145–160
Börger, E.: Construction and Analysis of Ground Models and their Refinements as a Foundation for Validating Computer Based Systems. Formal Aspects of Computing 19(2) (2007) 225–241
Gargantini, A., Riccobene, E., Scandurra, P.: A Metamodel-based Simulator for ASMs. In: Proc. of the 14th Intl. Abstract State Machines Workshop. (June 2007)
Microsoft FSE Group: The Abstract State Machine Language. (2003) Last visited June 2003, http://research.microsoft.com/fse/asml/.
Del Castillo, G.: Towards Comprehensive Tool Support for Abstract State Machines. In Hutter, D., Stephan, W., Traverso, P., Ullmann, M., eds.: Applied Formal Methods – FM-Trends 98. Volume 1641 of LNCS., Springer-Verlag (1999) 311–325
Anlauff, M.: XASM – An Extensible, Component-Based Abstract State Machines Language. In Y. Gurevich and P. Kutter and M. Odersky and L. Thiele, ed.: Abstract State Machines: Theory and Applications. Volume 1912 of LNCS., Springer-Verlag (2000) 69–90
Schmid, J.: Executing ASM Specitications with AsmGofer. (2005) Last visited Sep. 2005, www.tydo.de/AsmGofer/.
Farahbod, R., Gervasi, V., Glässer, U., Ma, G.: CoreASM plug-in architecture. In: Proceedings of the Dagstuhl Seminar on Rigorous Methods for Software Construction and Analysis (LNCS Festschrift), Springer (2008 (to be published))
Farahbod, R., Gervasi, V., Glässer, U., Memon, M.: Design exploration and experimental validation of abstract requirements. In: Proceedings of the 12th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ’06), Essener Informatik Beitrage (June 2006)
Felson, M.: Routine Activities and Crime Prevention in the Developing Metropolis. Criminology (1987) 911–931
Brantingham, P.J., Brantingham, P.L.: The Rules of Crime Pattern Theory. Environmental Criminology and Crime Analysis (2008)
Bratman, M.E., Israel, D., Pollack, M.E.: Plans and Resource-Bounded Practical Reasoning. Computational Intelligence 4 (1988) 349–355
Koffka, K.: Principles of Gestalt Psychology. Harcourt (1967)
Sonnenfeld, J.: Geography, Perception and the Behavioral Environment. In English, P.W., Mayfield, R.C., eds.: Man, Space and the Environment. Oxford University Press, New York (1972) 244–251
Brantingham, P.L., Glässer, U., Jackson, P., Vajihollahi, M.: Modeling Criminal Activity in Urban Landscapes. Technical Report SFU-CMPT-TR-2008-13, Simon Fraser University (Aug 2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag/Wien
About this chapter
Cite this chapter
Brantingham, P., Glässer, U., Jackson, P., Vajihollahi, M. (2009). Modeling Criminal Activity in Urban Landscapes. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-211-09442-6_2
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-09441-9
Online ISBN: 978-3-211-09442-6
eBook Packages: Computer ScienceComputer Science (R0)