Skip to main content
Log in

Heterogeneity in the Frequency Distribution of Crime Victimization

  • Original Paper
  • Published:
Journal of Quantitative Criminology Aims and scope Submit manuscript

Abstract

Objectives

Tests the idea that the frequency distribution typically observed in crosssectional crime victimization data sampled from surveys of general populations is a heterogeneously distributed result of the mixing of two latent processes associated, respectively, with each of the tails of the distribution.

Methods

Datasets are assembled from a number of samples taken from the British Crime Survey and the Scottish Crime Victimization Survey. Latent class analysis is used to explore the probable, latent distributions of individual property crime and personal crime victimization matrices that express the frequency and type of victimization that are self-reported by respondents over the survey recall period.

Results

The analysis obtains broadly similar solutions for both types of victimization across the respective datasets. It is demonstrated that a hypothesized mixing process will produce a heterogeneous set of local sub-distributions: a large sub-population that is predominantly not victimized, a very small ‘chronic’ sub-population that is frequently and consistently victimized across crime-type, and an ‘intermediate’ sub-population (whose granularity varies with sample size) to whom the bulk of victimization occurs. Additionally, attention is paid to the position of very high frequency victimization within these sub-populations.

Conclusions

The analysis supports the idea that crime victimization may be a function of two propensities: for immunity, and exposure. It demonstrates that zero-inflation is also a defining feature of the distribution that needs to be set alongside the significance that has been attached to the thickness of its right tail. The results suggest a new baseline model for investigating population distributions of crime victimization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. Definitions of the crime categories used in this paper are given in the “Appendix”.

  2. The SP model is a benchmark for counts data that consist of a number of discrete events occurring at the unit-level over a fixed time interval (Cameron and Trivedi 1998). It assumes that successive events for any individual case occur independently of each other over time at a constant rate, an assumption violated by over-dispersion (Nelson 1980: 871).

  3. NB2 assumes a Poisson distribution, with gamma-distributed unobserved individual heterogeneity (Cameron and Trivedi 1998: 71).

  4. Even the relatively few analyses of longitudinal crime victimization data to date have been unable to distinguish clearly and conclusively the mixing components of the DGP, or the relative importance of heterogeneity versus state-dependency (Bottoms and Costello 2009; Hope and Trickett 2004, 2008; Wittebrood and Nieuwbeerta 2000; Lauritsen and Davis Quinet 1995). Morgan (2007) provides a detailed discussion and analysis of time-dependent models of crime victimization.

  5. The NB model specification can support a variety of probability mechanisms, a range of mixtures that might produce it (Cameron and Trivedi 1998: 102) and a variety of Mixed-Poisson models to help explain it (Karlis and Xekalaki 2005).

  6. Specifically, the study utilized a bivariate probit regression model with censoring (Osborn et al. 1996).

  7. The categories of counts were: Non-victim (no incidents over the recall period); Low-level (1 victimization incident over the recall period); and High-level (2 or more incidents). The waves were measured by a panel embedded in two cross-sectional self-report sample surveys, with 12-month recall periods, separated by a period of 3 years between each sampling (Hope and Trickett 2008: 47).

  8. In addition to having been victimized over the past 5 years, contemporaneous multiple crime-type victims were significantly more likely to be younger adults, living with children, renting from the social or public housing authorities and living in poorer, urban areas; all characteristic of economically marginal and socially vulnerable sub-populations in the UK who might be more likely to be most often exposed to active offenders (Hope et al. 2001).

  9. Tseloni et al. (2010) also call attention to composite crimes, i.e. when more than one crime type coincides as part of a single event. This might be a further dimension to an individual’s crime victimization event matrix but is excluded from consideration here both on the grounds of a lack of accessible data on event-composition (Tseloni et al. 2010) and because its inclusion would increase the complexity of subsequent analysis (probably exponentially) to the detriment of exposition. Still, we should concede that all efforts to classify crime victimization events or states statistically are highly circumscribed in their phenomenology, due largely to the constraints of the incident-counting machinery, whether sample surveying or offence recording (Biderman 1981).

  10. These two hypothetical probability distributions may be thought of as propensities, in the sense of Popper’s propensity interpretation of probability (Popper 1983/1957); that is, as heuristics that give an idealized account of the objective, relational properties of the physical world (Gillies 2000).

  11. For example, Tseloni et al. test a Bivariate Zero-inflated Poisson (BZIP) model that assumes zero counts to arise in two ways: first, that “…no crime occurs, with probability p and produces only zeros, while the other state where crime exists, occurs with probability 1 − p and leads to a standard Poisson count” (2010: 334).

  12. A substantial, significant zero-inflation coefficient is identified in the BZIP model estimated by Tseloni et al. (2010).

  13. The idea that distributions (such as crime victimization) are multiplicative heterogeneous mixtures is supported by reference to the Two-Crossings Theorem (Mullahy 1997): “…Two Crossings Theorem. For the random variable y, continuous or discrete, let f (y | x, v) denote an exponential family conditional (on v) model density and let E [v] = 1, V [v] = σ2 > 0. Then the mixed (marginal with respect to v) distribution h (y | x) = Ev f (y | x, v) will have heavier tails than f (y | x, v) in the sense that the sign pattern of marginal minus the conditional h (y | x) − f (y | x, v) is {+ , −, +} as y increases on its support. That is, for the same mean, any marginal distribution must ‘cross’ the conditional distribution twice, first from above and then from below, the first crossing accounting for a relative excess of zeros, and the second for the thickness of the right tail” (Cameron and Trivedi 1998: 99).

  14. Pickles and Angold (2003) describe the approach as akin to Gaussian Quadrature, that represents “…smoothly varying densities of a distribution by estimating a limited number of spikes at a set of specific values…each spike is assigned a probability weight…the spikes are, mathematically speaking, identical to a set of ordered latent classes” (Pickles and Angold 2003: 540).

  15. Recently, both Survey series have undergone name changes, while the SCVS has had several changes of nomenclature. These names are retained however as those most appropriate at the time the surveys were conducted.

  16. Responses for England and Wales were taken from the 1992, 1996, 2001, 2003/4 and 2006/7 BCS. Responses for Scotland were taken from the 1993, 1996, 2000, 2003 and 2006 SCVS.

  17. Chiefly, this has been done to facilitate the development of performance indicators to assist the Home Office in its governance of the police service in England and Wales (Allen 2007).

  18. Further comfort that the different sample designs of the components of our dataset have not biased our results is provided by a recent and extensive investigation of this issue, concluding that, under all of its sample designs, the BCS has generated estimates of victimization with low levels of sampling error (Tipping et al. 2010).

  19. Methods based on simulation have been suggested as providing a more accurate indication as to how many classes are needed for an LCA model to accurately reflect an underlying dataset (Nylund et al. 2007). Of these, the most common is the Bootstrap Log-likelihood Ratio Test (BLR) (McLachlan and Peel 2000). This calculates a p value that indicates whether or not the inclusion of an additional class significantly improves the relationship between the data and the model. However, the use of these methods with weighted data is not well understood or widely implemented at this time.

  20. See Fn 14. Morgan (2007) makes an analogous point regarding the merits of event-hazard models for estimating stochastic crime victimization processes.

  21. Although the counts from series that are derived from victim forms are subsequently capped at 6, being the maximum count per series per victim form (Farrell and Pease 2007).

  22. For example, Tseloni (2006), Hope et al. (2001), Osborn and Tseloni (1998), Ellingworth et al. (1997), Osborn et al. (1992, 1996), Trickett et al. (1992).

  23. “…repeated victimizations cannot be looked at comprehensively through the victim forms, because of the constraint imposed on the number of victim forms completed per respondent, and the maximum number of events ‘permissible’ in the series…there is no alternative to the use of the main questionnaire for the purposes advanced here…The general pattern is robust across different limits to the number of victimizations allowable per person” (Ellingworth et al. 1995: 361).

  24. A table summarising the operation of capping is available from the authors, on request.

  25. Within the BCS and SCVS datasets, such responses are coded with a very high value, typically ‘97’, though this is usually understood as a missing value code (Bolling et al. 2007: 71; Brown 2007: 91). Although these can form a substantial proportion of the cases with values over six (the highest, at 52 %, being for the BCS property crime ‘entered property and committed theft’), the proportions reporting ‘too many to count’ vary not only between crime types but also between the BCS and SCVS samples, suggesting a complex outcome of a combination of reporting and coding processes. A tabulation of these cases is available from the authors on request (see also Fn. 23).

  26. Models were also created based on negative binomial distributions without zero inflation and, in the case of the BCS data, using a censored distribution capped at 6. While the exact model fit statistics for these different distributions varied, the number of groups identified as optimal for capturing patterns of victimization was the same as when using zero-inflated distributions.

  27. Extensive introductions to LCA can be found in Magidson and Vermunt (2004), and McCutcheon (1987).

  28. The LCA models in this analysis were estimated using MPlus Version 5.1 (Muthen and Muthen 1998–2008).

  29. Although the BCS analysis optimizes one more group than the SCVS for both property crime (six compared with five) and personal crime (five compared with four), probably this is a ‘degrees of freedom’ phenomenon, due to differences in sample size and in numbers of variables (see Table 1). To test the effect of sample size on optimization capacity, an identical LCA model was run on sub-samples of diminishing size, each selected randomly from the overall pooled sample of BCS property crime. Results clearly confirm the importance of sample size; while twenty per cent of the overall pooled sample could support a minimum three-class solution, it would need around eighty per cent to support the optimum six-class solution, according to the ABIC.

  30. The labels used to describe the classes in this and other solutions are merely descriptive and are employed for illustrative purposes only. As discussed earlier, the point of this analysis is to establish that the distribution is composed of ordered latent classes, rather than to identify groups. To reflect this, the following labeling convention is used throughout: Non-Victims > Intermediate Victims (A > B > C > D) > Chronic Victims, ordered by class size, where Non-Victims + Intermediate Victims + Chronic Victims = \( \sum\nolimits_{j = 1}^{C} {\pi_{j} } \) (Eq. 1).

  31. See Table 1, and Fn 28.

  32. In England and Wales, 16 % of the population fall into the Victim classes; while the corresponding figure for Scotland is 11.6 %.

  33. Specifically, the size of the ‘non-victim’ group reduces from 88.3 % (2-class), 82.8 % (3-class), 81.3 % (4-class), 81.0 % (5-class), to 79.8 % (6-class).

  34. Similar patterns were found for BCS personal crime.

  35. Likewise, the dip at the count of 11 in the probability of being a chronic victim (p = 0.642) is attributable mainly to the probabilities of being an Intermediate C (p = 0.292) or Intermediate A Victim (p = 0.064); while the dip at the count of 12 (p = 0.486) is attributable to the probabilities of being an Intermediate C (p = 0.363), Intermediate D (p = 0.109) or Intermediate A (p = 0.042) Victim. These occurrences may be in part a consequence of the capping procedure employed (see section “The Effect of Uncapped Frequencies”). Specifically, respondents associated with the chronic class typically report high levels of victimization across the range of crime types, which might be subject to capping, while Intermediate Victim respondents may only experience frequent victimization in one or two types of victimization, which would be the ones that were subjected to the capping procedure.

  36. While negligible numbers of victims with a frequency of 14 victimizations or more were classified as anything other than Chronic Victims, below that level, substantial numbers were placed in other classes as well.

  37. With the caveat that the population we are considering here is characterized only by its type and frequency of crime victimization.

  38. The Non-Victim class also captures substantial numbers of low-frequency victims. Victims with a frequency (f) of 1 victimization have a probability (p) of 0.514 of being classed in the Non-Victim category, and subsequently f = 2, p = 0.142, and f = 3, p = .03 (Fig. 11).

  39. This consistency did not quite hold for the SCVS dataset (see Figs. 6, 8), though it is difficult to know whether this is due to substantive differences or artefactual differences between the surveys (see Fn. 25).

  40. Nevertheless, it should be remembered that this is a methodological precept. As Karl Popper remarked “…we must always clearly distinguish between an ‘essentialist’ explanation with appeals to the nature of things and a ‘descriptive’ explanation which appeals to a Law of Nature, i.e. to the description of an observed regularity. Of these two kinds of explanation only the latter is admissible in physical science” (1969: 169).

  41. See Cohen and Felson (1979) and Hindelang et al. (1978) respectively, and for further elaboration, inter alia, Cohen et al. (1981), Miethe and Meier (1994) and Osgood et al. (1996).

  42. That is, “…the probability that a violation will occur at any specific time and place might be taken as a function of the convergence of likely offenders and suitable targets in the absence of capable guardians” (Cohen and Felson 1979: 590).

  43. We are grateful to one of our anonymous reviewers for posing this question.

  44. Where measurement is by positive integers, a two-group solution is the inverse of the frequency distribution, replicating the cut-point between all positive values and zero.

  45. If the number of victims = V, the number in the population = P, and the number of victimization events = C, then Prevalence  = V/P, Concentration = C/V, and Incidence = C/P = (V/P)(C/V) (Hope 2007b: 103).

References

  • Allen J (2007) Survey assessments of police performance in the British Crime Survey. In: Hough M, Maxfield M (eds) Surveying crime in the 21st century. Criminal Justice Press, Monsey, NY

    Google Scholar 

  • Biderman AD (1981) Sources of data for victimology. J Crim Law Criminol 72:789–817

    Article  Google Scholar 

  • Bolling K, Grant C, Sinclair P (2007) British Crime Survey 2006/07. Technical report, vol 2. UK Data Archive: study number 5755

  • Bottoms A, Costello A (2009) Crime prevention and the understanding of repeat victimization: a longitudinal study. In: Knepper P, Doak J, Shapland J (eds) Urban crime prevention, surveillance, and restorative justice. Taylor and Francis, Boca Raton

    Google Scholar 

  • Brame R, Nagin DS, Wasserman L (2006) Exploring some analytical characteristics of finite mixture modeling. J Quant Criminol 22:31–59

    Article  Google Scholar 

  • Brown M (2007) The 2006 Scottish Crime and Victimization Survey 2006. Technical report, vol 1. UK Data Archive: study number 5784

  • Cameron AC, Trivedi PK (1998) Regression analysis of count data. Cambridge University Press, Cambridge, UK

    Book  Google Scholar 

  • Cantor D, Lynch JP (2007) Addressing the challenge of costs and error in victimization surveys: the potential of new technologies and methods. In: Hough M, Maxfield M (eds) Surveying crime in the 21st century: commemorating the 25th anniversary of the British Crime Survey. Crime prevention studies, vol 22. Criminal Justice Press, Monsey, NY

    Google Scholar 

  • Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 44:588–608

    Article  Google Scholar 

  • Cohen LE, Kluegel JR, Land KC (1981) Social inequality and predatory criminal victimization: an exposition and test of a formal theory. Am Sociol Rev 46:505–524

    Article  Google Scholar 

  • Eck JE, Clarke RV, Guerette RT (2007) Risky facilities: crime concentration in homogeneous sets of establishments and facilities’. Crime Prev Stud 21:225–264

    Google Scholar 

  • Ellingworth DG, Farrell G, Pease K (1995) A victim is a victim is a victim—chronic victimization in four sweeps of the British Crime Survey. Br J Criminol 35:360–365

    Google Scholar 

  • Ellingworth D, Hope T, Osborn DR, Trickett A, Pease K (1997) Prior Victimization and Crime Risk. Int J Risk Secur Crime Prev 2:201–214

    Google Scholar 

  • Farrell G (1995) Preventing repeat victimization. In: Tonry M, Farrington DP (eds) Building a safer society: strategic approaches to crime prevention. Crime and justice, vol 19. University of Chicago Press, Chicago

    Google Scholar 

  • Farrell G, Pease K (1993) Once bitten, twice bitten: repeat victimization and its implications for crime prevention. Crime prevention unit paper 46. Home Office, London

  • Farrell G, Pease K (2007) The sting in the tail of the British Crime Survey: multiple victimizations. In: Hough M, Maxfield M (eds) Surveying crime in the 21st century: commemorating the 25th anniversary of the British Crime Survey. Crime prevention studies, vol 22. Criminal Justice Press, Monsey, NY

    Google Scholar 

  • Farrell G, Phillips C, Pease K (1995) Like taking candy: why does repeat victimization occur? Br J Criminol 35:384–399

    Google Scholar 

  • Gillies D (2000) Philosophical theories of probability. Routledge, London

    Google Scholar 

  • Hacking I (2001) An introduction to probability and inductive logic. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Hindelang MS, Gottfredson M, Garofalo J (1978) Victims of violent crime. Ballinger, Cambridge, MA

    Google Scholar 

  • Hope T (2007a) Theory and method: the social epidemiology of crime victims. In: Walklate S (ed) Handbook on victims and victimology. Cullompton, Willan

    Google Scholar 

  • Hope T (2007b) The distribution of household property crime victimization: insights from the British Crime Survey. In: Hough M, Maxfield M (eds) Surveying crime in the 21st century: commemorating the 25th anniversary of the British Crime Survey. Crime prevention studies, vol 22. Criminal Justice Press, Monsey, NY

    Google Scholar 

  • Hope T, Trickett A (2004) La Distribution de la Victimation dans la Population. Déviance et Société 28:385–404

    Article  Google Scholar 

  • Hope T, Trickett A (2008) The distribution of crime victimization in the population. International Review of Victimology 15:37–58

    Article  Google Scholar 

  • Hope T, Bryan J, Osborn D, Trickett A (2001) The phenomena of multiple victimization: the relationship between personal and property crime risk. Br J Criminol 41:595–617

    Article  Google Scholar 

  • Howson C, Urbach P (1989) Scientific Reasoning: the Bayesian approach. Open Court, La Salle, IL

    Google Scholar 

  • Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47:263–291

    Article  Google Scholar 

  • Karlis DAnd, Xekalaki E (2005) Mixed Poisson distributions. Int Stat Rev 73:35–58

    Article  Google Scholar 

  • Lauritsen JL, Davis Quinet KF (1995) Repeat victimization among adolescents and young adults. J Quant Criminol 11:143–166

    Article  Google Scholar 

  • Lauritsen JL, Laub JH (2007) Understanding the link between victimization and offending: new reflections on an old idea. In: Hough M, Maxfield M (eds) Surveying crime in the 21st century: commemorating the 25th anniversary of the British Crime Survey. Crime prevention studies, vol 22. Criminal Justice Press, Monsey, NY

    Google Scholar 

  • Lütkepohl H (1982) Non-causality due to omitted variables. J Econom 19:367–378

    Article  Google Scholar 

  • Magidson J, Vermunt JK (2004) Latent class models. In: Kaplan D (ed) The Sage handbook for quantitative methodology. Sage Publications, Thousand Oaks, CA, pp 175–198

    Google Scholar 

  • Maltz M (2009) Waves, particles and crime. In: Weisburd D, Bernasco W, Bruinsma GJN (eds) Putting crime in its place: units of analysis in geographic criminology. Springer Science + Business Media, New York

    Google Scholar 

  • McCutcheon A (1987) Latent class analysis. Sage Publications, London

    Google Scholar 

  • McDowell D (2010) The present and possible future of quantitative criminology. J Quant Criminol 26:429–435

    Article  Google Scholar 

  • McLachlan G, Peel D (2000) Finite mixture models. Wiley, New York

    Book  Google Scholar 

  • Meier RF, Miethe TD (1993) Understanding theories of criminal victimization. Crime Justice 17:459–499

    Article  Google Scholar 

  • Miethe TD, Meier RF (1994) Crime and its social context. SUNY Press, Albany, NY

    Google Scholar 

  • Morgan F (2007) Initial and repeated burglary victimization: victim vulnerability, same offender involvement and implications for theory and crime prevention. Unpublished PhD thesis, University of Western Australia, Perth

  • Mullahy J (1997) Heterogeneity, excess zeros and the structure of count data models. J Appl Econom 12:337–350

    Article  Google Scholar 

  • Muthen B (2001) Latent variable mixture modeling. In: Marcoulides G, Schumacker R (eds) New developments and techniques in structural equation modeling. Lawrence Erlbaum, New Jersey

    Google Scholar 

  • Muthen L, Muthen B (1998–2008) MPlus user s guide, 5th Edn. Muthen and Muthen, Los Angeles

  • Nagin DS, Tremblay RE (2005) Developmental trajectory groups: fact or useful statistical fiction? Criminology 45:873–904

    Article  Google Scholar 

  • Nelson JF (1980) Multiple victimization in american cities: a statistical analysis of rare events. Am J Sociol 85:870–891

    Article  Google Scholar 

  • Nylund K, Asparouhov T, Muthen B (2007) Deciding on the number of classes in latent class analysis and growth mixture modeling: a Monte Carlo simulation study. Struct Equ Model 14:535–569

    Article  Google Scholar 

  • Osborn DR, Tseloni A (1998) The distribution of household property crimes. J Quant Criminol 14:307–330

    Article  Google Scholar 

  • Osborn DR, Trickett A, Elder R (1992) Area characteristics and regional variates as determinants of area property crime levels. J Quant Criminol 8:265–285

    Article  Google Scholar 

  • Osborn DR, Ellingworth D, Hope T, Trickett A (1996) Are multiply victimized households different? J Quant Criminol 12:223–245

    Article  Google Scholar 

  • Osgood DW, Wilson JK, O’Malley PM, Bachman JG, Johnston LD (1996) Routine activities and individual deviant behavior. Am Sociol Rev 61:635–655

    Article  Google Scholar 

  • Pearl J (2000) Causality: models, reasoning and inference. Cambridge University Press, Cambridge

    Google Scholar 

  • Pease K (1998) Repeat victimization: taking stock. Crime detection and prevention series paper 90. Home Office, London

  • Pease K, Farrell G (2007) Repeat victimization. In: Wortley R, Mazerolle L (eds) Environmental criminology and crime analysis. Cullompton, Willan

    Google Scholar 

  • Pickles A, Angold A (2003) Natural categories or fundamental dimensions: on carving nature at the joints and the rearticulation of psychopathology. Dev Psychopathol 15:529–551

    Article  Google Scholar 

  • Pitcher AB, Johnson SD (2011) Exploring theories of victimization using a mathematical model of burglary. J Res Crime Delinquency 48:83–109

    Article  Google Scholar 

  • Planty M, Strom KJ (2007) Understanding the role of repeat victims in the production of annual US victimization rates. J Quant Criminol 23:179–200

    Article  Google Scholar 

  • Popper KR (1959) The logic of SCIENTIfiC DISCOVEry. Hutchinson, London

    Google Scholar 

  • Popper KR (1969) Conjectures and refutations: the growth of scientific knowledge, 3rd edn (revised). Routledge and Kegan Paul, London

  • Popper KR (1983/1957) Propensities, probabilities and the quantum theory. In Miller D (ed) A pocket Popper. Fontana Paperbacks, Oxford

  • Sampson RJ, Laub JH (2003) Life course desisters? Trajectories of crime among delinquent boys followed to age 70. Criminology 41:555–592

    Article  Google Scholar 

  • Sampson RJ, Laub JH (2005) Seductions of method: rejoinder to Nagin and Tremblay’s ‘developmental trajectory groups: fact or fiction?’. Criminology 43:905–913

    Article  Google Scholar 

  • Schwarz G (1978) Estimating the dimension of a model. Ann Stat 6:461–464

    Article  Google Scholar 

  • Sherman LW (2007) The power few: experimental criminology and the reduction of harm: the 2006 Joan McCord prize lecture. J Exp Criminol 3:299–321

    Article  Google Scholar 

  • Short MB, D’Orsogna MR, Brantingham PJ, Tita GE (2009) Measuring and modeling repeat and near-repeat burglary effects. J Quant Criminol 25:325–339

    Article  Google Scholar 

  • Sparks RF (1981) Multiple victimization: evidence, theory and future research. J Crim Law Criminol 72:762–788

    Article  Google Scholar 

  • Sparks RF, Genn H, Dodd D (1977) Surveying victims. Wiley, London

    Google Scholar 

  • Tipping S, Hussey D, Wood M, Hales J (2010) British Crime Survey: methods review 2009 final report. National Centre for Social Research (NatCen), London

    Google Scholar 

  • Trickett A, Osborn DR, Seymour J, Pease K (1992) What is different about high crime areas? Br J Criminol 32:81–90

    Google Scholar 

  • Tseloni A (2006) Multi-level modeling of the number of property crimes: household and area effects. J R Stat Soc Ser A 169:205–233

    Article  Google Scholar 

  • Tseloni A, Pease K (2003) Repeat victimization: ‘boosts’ or ‘flags’? Br J Criminol 43:196–212

    Article  Google Scholar 

  • Tseloni A, Pease K (2004) Repeat personal victimization: random effects, event dependence and unexplained heterogeneity. Br J Criminol 44:931–945

    Article  Google Scholar 

  • Tseloni A, Osborn DR, Trickett A, Pease K (2002) Modeling property crime using the British Crime Survey: what have we learnt? Br J Criminol 42:109–128

    Article  Google Scholar 

  • Tseloni A, Ntzoufras I, Nicolaou A, Pease K (2010) Concentration of personal and household crimes in England and Wales. Eur J Appl Math 21:325–348

    Article  Google Scholar 

  • Wittebrood K, Nieuwbeerta P (2000) Criminal victimization during one’s life course: the effects of previous victimization and patterns of routine activities. J Res Crime Delinquency 37:91–122

    Article  Google Scholar 

  • Yang C (2006) Evaluating latent class analyses in qualitative phenotype identification. Comput Stat Data Anal 50:1090–1104

    Article  Google Scholar 

Download references

Acknowledgments

The research for this paper was carried out while the authors were, respectively, Senior Visiting Research Fellow and Research Fellow at the Scottish Centre for Crime and Justice Research (SCCJR), University of Edinburgh, whose support and encouragement is gratefully acknowledged, especially that of Susan McVie and Richard Sparks. The UK Data Archive made data available. We also wish to acknowledge valuable discussions with Kauko Aromaa and Frank Morgan and comments from the anonymous reviewers that have helped to improve the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tim Hope.

Additional information

This paper is dedicated to the memory of Alan Trickett.

Appendix: Definitions of Property and Personal Crime

Appendix: Definitions of Property and Personal Crime

A1. Questions Used to Measure Property Crime (Taken From the Scottish Crime Victimization Survey 2006)

Since [1st April 2005], (apart from anything you have already mentioned,) has anyone GOT INTO your home without permission and STOLEN or TRIED TO STEAL anything?

(Apart from anything you have already mentioned,) in that time did anyone GET INTO your home without permission and CAUSE DAMAGE?

(Apart from anything you have already mentioned) in that time have you had any evidence that someone has TRIED to get in without permission to STEAL or to CAUSE DAMAGE?

(Apart from anything you have already mentioned), in that time was anything (else) stolen OUT OF your home? For example, by a guest, a workman or anyone else there with your permission.

And (apart from anything you have already mentioned), in that time was anything (else) that belonged to someone in your household stolen FROM OUTSIDE YOUR HOME—for example, from the doorstep, the garden, a shed, outhouse or garage? Please don t include milk bottles or newspapers.

And again, (apart from anything you have already mentioned), in that time has anyone deliberately DAMAGED or DEFACED your home or anything outside it (APART FROM A MOTOR VEHICLE) that belonged to YOU or ANYONE ELSE in your household?

A2. Questions Used to Measure Personal Crime (Taken from the Scottish Crime Victimization Survey 2006)

Since [1st April 2005], (apart from anything you have already mentioned), was anything you were CARRYING STOLEN out of your hands or from your pockets or from a bag or case you were carrying?

(Apart from anything you have already mentioned), in that time has anyone TRIED to STEAL something you were carrying out of your hands or from your pockets or from a bag or case you were carrying?

And again, (apart from anything you have already mentioned), since [1st April 2005] has anyone, including people you know well, DELIBERATELY HIT YOU with their fists, or with a weapon of any sort, or kicked you, or used force or violence on you in any other way?

And (apart from anything you have already mentioned), in that time, has anyone THREATENED to damage things of yours or THREATENED to use force or violence on you in any way that actually frightened you?

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hope, T., Norris, P.A. Heterogeneity in the Frequency Distribution of Crime Victimization. J Quant Criminol 29, 543–578 (2013). https://doi.org/10.1007/s10940-012-9190-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10940-012-9190-x

Keywords

Navigation