Skip to main content

Modeling Criminal Activity in Urban Landscapes

  • Chapter
Mathematical Methods in Counterterrorism

Computational and mathematical methods arguably have an enormous potential for serving practical needs in crime analysis and prevention by offering novel tools for crime investigations and experimental platforms for evidence-based policy making. We present a comprehensive formal framework and tool support for mathematical and computational modeling of criminal behavior to facilitate systematic experimental studies of a wide range of criminal activities in urban environments. The focus is on spatial and temporal aspects of different forms of crime, including opportunistic and serial violent crimes. However, the proposed framework provides a basis to push beyond conventional empirical research and engage the use of computational thinking and social simulations in the analysis of terrorism and counter-terrorism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brantingham, P.J., Brantingham, P.L.: Patterns in Crime. New York: Macmillan Publishing Company (1984)

    Google Scholar 

  2. Brantingham, P.J., Brantingham, P.L.: Environment, Routine and Situation: Toward a Pattern Theory of Crime. Routine Activity and Rational Choice: Advances in Criminological Theory (1993) 259–294

    Google Scholar 

  3. D’Amico, J.: Stopping Crime in Real Time. The Police Chief – The Professional Voice of Law Enforcement (July 2008) URL: http://policechiefmagazine.org/magazine/.

  4. Liu, L., Eck, J., eds.: Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. Information Science Reference (January 2008)

    Google Scholar 

  5. Frank, U., Troitzsch, K.G.: Epistemological Perspectives on Simulation. Journal of Artificial Societies and Social Simulation 8(4)

    Google Scholar 

  6. Groff, E., Birks, D.: Simulating crime prevention strategies: A look at the possibilities. Policing: A journal of Policy and Practice 2(2) 175–184

    Google Scholar 

  7. Brantingham, P.J., Brantingham, P.L., Glässer, U.: Computer Simulation as a Research Tool in Criminology and Criminal Justice. Criminal Justice Matters (58) (February 2005)

    Google Scholar 

  8. Brantingham, P.L., Kinney, B., Glässer, U., Jackson, P., Vajihollahi, M.: Mastermind: Computational Modeling and Simulation of Spatiotemporal Aspects of Crime in Urban Environments. In Liu, L., Eck, J., eds.: Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. Information Science Reference (2008)

    Google Scholar 

  9. Brantingham, P.L., Glässer, U., Kinney, B., Singh, K., Vajihollahi, M.: A Computational Model for Simulating Spatial Aspects of Crime in Urban Environments. In Jamshidi, M., ed.: Proceedings of the 2005 IEEE International Conference on Systems, Man and Cybernetics. (October 2005) 3667–74

    Google Scholar 

  10. Brantingham, P.L., Glässer, U., Kinney, B., Singh, K., Vajihollahi, M.: Modeling Urban Crime Patterns: Viewing Multi-Agent Systems as Abstract State Machines. In Beauquier, D., et al., eds.: Proceedings of the 12th International Workshop on Abstract State Machines (ASM’05). (March 2005)

    Google Scholar 

  11. Börger, E., Stärk, R.: Abstract State Machines: A Method for High-Level System Design and Analysis. Springer-Verlag (2003)

    Google Scholar 

  12. Gurevich, Y.: Sequential Abstract State Machines Capture Sequential Algorithms. ACM Transactions on Computational Logic 1(1) (July 2000) 77–111

    Article  MathSciNet  Google Scholar 

  13. Farahbod, R., Gervasi, V., Glässer, U.: CoreASM: An Extensible ASM Execution Engine. Fundamenta Informaticae (2007) 71–103

    Google Scholar 

  14. Farahbod, R., Glässer, U., Jackson, P., Vajihollahi, M.: High Level Analysis, Design and Validation of Distributed Mobile Systems with CoreASM. In: Proceedings of 3rd International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2008). (October 2008)

    Google Scholar 

  15. Wing, J.M.: Computational Thinking. Communications of the ACM 4(3) (2006) 33–35

    Article  Google Scholar 

  16. Xue, Y., Brown, D.: A decision model for spatial site selection by criminals: a foundation for law enforcement decision support. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on 33 (2003) 78–85

    Article  Google Scholar 

  17. Baumgartner, K., Ferrari, S., Salfati, C.: Bayesian network modeling of offender behavior for criminal profiling. In: 44th IEEE Conference on Decision and Control and European Control Conference CDC-ECC’05. (2005) 2702–2709

    Google Scholar 

  18. Clarke, R.V.: Technology, Criminology and Crime Science. European Journal on Criminal Policy and Research 10(1) (2004) 55–63

    Article  Google Scholar 

  19. Dean, G.: Criminal profiling in a terrorism context. Criminal Profiling International Theory, Research, and Practice (2007)

    Google Scholar 

  20. Elliot, E., Kiel, L.D.: Towards a new vision of complexity. Chaos, Solutions & Fractals 20(1) (April 2004) 63–68

    Article  Google Scholar 

  21. Raczynski, S.: Simulation of the dynamic interactions between terror and anti-terror organizational structures. Journal of Artificial Societies and Social Simulation 7(2) (2004)

    Google Scholar 

  22. Sipser, M.: Introduction to the Theory of Computation. PWS Publishing Company (1997)

    Google Scholar 

  23. Gurevich, Y.: Evolving Algebras 1993: Lipari Guide. In Börger, E., ed.: Specification and Validation Methods. Oxford University Press (1995) 9–36

    Google Scholar 

  24. Blass, A., Gurevich, Y.: Abstract State Machines Capture Parallel Algorithms. ACM Transactions on Computation Logic 4(4) (2003) 578–651

    Article  MathSciNet  Google Scholar 

  25. Glässer, U., Gurevich, Y., Veanes, M.: Abstract Communication Model for Distributed Systems. IEEE Trans. on Soft. Eng. 30(7) (July 2004) 458–472

    Article  Google Scholar 

  26. Farahbod, R., Glässer, U.: Semantic Blueprints of Discrete Dynamic Systems: Challenges and Needs in Computational Modeling of Complex Behavior. In: New Trends in Parallel and Distributed Computing, Proc. 6th Intl. Heinz Nixdorf Symposium, Jan. 2006, Heinz Nixdorf Institute (2006) 81–95

    Google Scholar 

  27. Gurevich, Y., Huggins, J.: The Railroad Crossing Problem: An Experiment with Instantaneous Actions and Immediate Reactions. In: Proceedings of CSL’95 (Computer Science Logic). Volume 1092 of LNCS., Springer (1996) 266–290

    Google Scholar 

  28. Stärk, R., Schmid, J., Börger, E.: Java and the Java Virtual Machine: Definition, Verification, Validation. Springer-Verlag (2001)

    Google Scholar 

  29. Börger, E., Fruja, N.G., Gervasi, V., Stärk, R.F.: A High-level Modular Definition of the Semantics of C#. Theoretical Comp. Sci. 336(2/3) (May 2005) 235–284

    Article  MATH  Google Scholar 

  30. Börger, E.: A Logical Operational Semantics for Full Prolog. Part I: Selection Core and Control. In Börger, E., Kleine Büning, H., Richter, M.M., Schäonfeld, W., eds.: CSL’89. 3rd Workshop on Computer Science Logic. Volume 440 of LNCS., Springer (1990) 36–64

    Google Scholar 

  31. Farahbod, R., Glässer, U., Vajihollahi, M.: An Abstract Machine Architecture for Web Service Based Business Process Management. International Journal of Business Process Integration and Management 1 (2007) 279–291

    Article  Google Scholar 

  32. Glässer, U., Gotzhein, R., Prinz, A.: The Formal Semantics of SDL-2000: Status and Perspectives. Computer Networks 42(3) (2003) 343–358

    Article  MATH  Google Scholar 

  33. Börger, E., Glässer, U., Müller, W.: Formal Definition of an Abstract VHDL’93 Simulator by EA-Machines. In Delgado Kloos, C., Breuer, P.T., eds.: Formal Semantics for VHDL. Kluwer Academic Publishers (1995) 107–139

    Google Scholar 

  34. MĂĽller, W., Ruf, J., Rosenstiel, W.: An ASM Based SystemC Simulation Semantics. In MĂĽller, W., et al., eds.: SystemC - Methodologies and Applications, Kluwer Academic Publishers (June 2003)

    Google Scholar 

  35. Beierle, C., Börger, E., Durdanovic, I., Glässer, U., Riccobene, E.: Refining Abstract Machine Specifications of the Steam Boiler Control to Well Documented Executable Code. In Abrial, J.R., Börger, E., Langmaack, H., eds.: Formal Methods for Industrial Applications. Specifying and Programming the Steam-Boiler Control. Number 1165 in LNCS. Springer (1996) 62–78

    Google Scholar 

  36. Glässer, U., Gu, Q.P.: Formal Description and Analysis of a Distributed Location Service for Mobile Ad Hoc Networks. Theoretical Comp. Sci. 336 (May 2005) 285–309

    Google Scholar 

  37. Glässer, U., Rastkar, S., Vajihollahi, M.: Computational Modeling and Experimental Validation of Aviation Security Procedures. In Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B.M., Wang, F.Y., eds.: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings. Volume 3975 of Lecture Notes in Computer Science., Springer (2006) 420–431

    Google Scholar 

  38. Glässer, U., Rastkar, S., Vajihollahi, M.: Modeling and Validation of Aviation Security. In Chen, H., Yang, C., eds.: Intelligence and Security Informatics: Techniques and Applications. Volume 135 of Studies in Computational Intelligence. Springer (2008) 337–355

    Google Scholar 

  39. Börger, E.: The ASM ground model method as a foundation of requirements engineering. In N.Dershowitz, ed.: Verification: Theory and Practice. Volume 2772 of LNCS., Springer-Verlag (2003) 145–160

    Google Scholar 

  40. Börger, E.: Construction and Analysis of Ground Models and their Refinements as a Foundation for Validating Computer Based Systems. Formal Aspects of Computing 19(2) (2007) 225–241

    Article  MATH  Google Scholar 

  41. Gargantini, A., Riccobene, E., Scandurra, P.: A Metamodel-based Simulator for ASMs. In: Proc. of the 14th Intl. Abstract State Machines Workshop. (June 2007)

    Google Scholar 

  42. Microsoft FSE Group: The Abstract State Machine Language. (2003) Last visited June 2003, http://research.microsoft.com/fse/asml/.

  43. Del Castillo, G.: Towards Comprehensive Tool Support for Abstract State Machines. In Hutter, D., Stephan, W., Traverso, P., Ullmann, M., eds.: Applied Formal Methods – FM-Trends 98. Volume 1641 of LNCS., Springer-Verlag (1999) 311–325

    Google Scholar 

  44. Anlauff, M.: XASM – An Extensible, Component-Based Abstract State Machines Language. In Y. Gurevich and P. Kutter and M. Odersky and L. Thiele, ed.: Abstract State Machines: Theory and Applications. Volume 1912 of LNCS., Springer-Verlag (2000) 69–90

    Google Scholar 

  45. Schmid, J.: Executing ASM Specitications with AsmGofer. (2005) Last visited Sep. 2005, www.tydo.de/AsmGofer/.

  46. Farahbod, R., Gervasi, V., Glässer, U., Ma, G.: CoreASM plug-in architecture. In: Proceedings of the Dagstuhl Seminar on Rigorous Methods for Software Construction and Analysis (LNCS Festschrift), Springer (2008 (to be published))

    Google Scholar 

  47. Farahbod, R., Gervasi, V., Glässer, U., Memon, M.: Design exploration and experimental validation of abstract requirements. In: Proceedings of the 12th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ’06), Essener Informatik Beitrage (June 2006)

    Google Scholar 

  48. Felson, M.: Routine Activities and Crime Prevention in the Developing Metropolis. Criminology (1987) 911–931

    Google Scholar 

  49. Brantingham, P.J., Brantingham, P.L.: The Rules of Crime Pattern Theory. Environmental Criminology and Crime Analysis (2008)

    Google Scholar 

  50. Bratman, M.E., Israel, D., Pollack, M.E.: Plans and Resource-Bounded Practical Reasoning. Computational Intelligence 4 (1988) 349–355

    Article  Google Scholar 

  51. Koffka, K.: Principles of Gestalt Psychology. Harcourt (1967)

    Google Scholar 

  52. Sonnenfeld, J.: Geography, Perception and the Behavioral Environment. In English, P.W., Mayfield, R.C., eds.: Man, Space and the Environment. Oxford University Press, New York (1972) 244–251

    Google Scholar 

  53. Brantingham, P.L., Glässer, U., Jackson, P., Vajihollahi, M.: Modeling Criminal Activity in Urban Landscapes. Technical Report SFU-CMPT-TR-2008-13, Simon Fraser University (Aug 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patricia Brantingham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag/Wien

About this chapter

Cite this chapter

Brantingham, P., Glässer, U., Jackson, P., Vajihollahi, M. (2009). Modeling Criminal Activity in Urban Landscapes. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-211-09442-6_2

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-211-09441-9

  • Online ISBN: 978-3-211-09442-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics