Skip to main content
Log in

Building better crime simulations: systematic replication and the introduction of incremental complexity

  • Published:
Journal of Experimental Criminology Aims and scope Submit manuscript

Abstract

Computer simulation models have changed the ways in which researchers are able to observe and study social phenomena such as crime. The ability of researchers to replicate the work of others is fundamental to a cumulative science, yet this rarely occurs in computer simulations. In this paper, we argue that, for computer simulations to be seen as a legitimate methodology in social science, and for new knowledge to be generated, serious consideration needs to be given to how simulations could or should be replicated. We develop the concept of systematic replication, a method for developing simulation experiments that move towards a generalisable inference that is directed, explicit, and incorporates complexity incrementally. Finally, we outline how the discrete parts of this process might be carried out in practice, using a simple simulation model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. For the purposes of this article, we define a simulation model as a system defined by rules, some of which relate to interactions between components of the system. Allowing the system to ‘run’ the application of these rules generates output. All aspects of the system are defined and directly programmed by the researcher.

  2. These comments apply equally to any discipline that acts as a ‘service’ discipline to others. Obvious examples include applied statistics and mathematics. We do not believe all, or even most, computer scientists (or statisticians and mathematicians) are rapacious mercenaries obsessed with methodological gymnastics for the sake of it.

  3. Computer scientists use convergence and sensitivity tests at this stage as well. Our focus in this article is primarily on the social scientists who we feel have the most to gain from testing the validity of models that focus on social phenomena.

  4. Freely available from http://ccl.northwestern.edu/netlogo/

  5. Ibid

  6. For reasons similar to those of Shadish et al. (2002), we represent Cronbach’s notation in a modified form, which we believe makes it more interpretable.

  7. This list is by no means exhaustive and serves only to aid the presentation of the case studies.

  8. See www.campbellcollaboration.org.

  9. Later simulations may also recreate treatments such as crime prevention interventions in a more analogous way to traditional uses of Treatment within utos. Importantly though, such intervention simulation relies heavily upon a sufficiently validated and verified base model of all the interactions associated with crime and its key elements. Therefore, the initial models we describe only strive towards theoretically, rather than operationally, relevant applications.

  10. Of course, in reality, there were other differences between the two studies, so it is unlikely that purely setting differences were responsible for the difference.

References

  • Axelrod, R. (1995). The convergence and stability of cultures: Local convergence and global polarization. Santa Fe Institute working paper 95-03-028.

  • Axtell, R., Axelrod, R., Epstein, J. M., & Cohen, M. D. (1996). Aligning simulation models: A case study and results. Computational and Mathematical Organization Theory, 1(2), 123–141.

    Article  Google Scholar 

  • Birks, D. J., Donkin, S., & Wellsmith, M. J. (2008). Synthesis over analysis: Towards an ontology for volume crime simulation. In L. Liu, & J. Eck (Eds.), Artificial crime analysis systems: Using computer simulations and geographic information systems (pp. 160–192). Hershey, PA: Idea Group Publishing.

    Google Scholar 

  • Braga, A. A., Weisburd, D. L., Waring, E. J., Mazerolle, L. G., Spelman, W., & Gajewski, F. (1999). Problem-oriented policing in violent crime places: A randomised controlled experiment. Criminology, 37(3), 541–580.

    Article  Google Scholar 

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.

    Article  Google Scholar 

  • Cranefield, S., Haustein, S., & Purvis, M. (2001). UML-based ontology modelling for software agents. In: Proceedings of the Autonomous Agents 2001 Workshop on Ontologies in Agent Systems.

  • Cronbach, L. J. (1982). Designing evaluations of educational and social programs. San Francisco, CA: Jossey-Bass Inc Pub.

    Google Scholar 

  • DeAngelis, D. L., & Gross, L. J. (Eds.) (1992). Individual-based models and approaches in ecology: populations, communities, and ecosystems. New York: Chapman and Hall.

  • DeAngelis, D. L., & Rose, K. A. (1992). Which individual-based approach is most appropriate for a given problem? In D. L. DeAngelis & L. J. Gross (Eds.), Individual-based models and approaches in ecology: Populations, communities, and ecosystems (pp. 67–87). New York: Chapman and Hall.

    Google Scholar 

  • Eck, J. (2007). Simulating police outcomes: A framework for understanding policing strategies. (Paper presented at Crime Hot Spots: Behavioral, Computational and Mathematical Models conference, Institute of Pure and Applied Mathematics, UCLA, Los Angeles, Feb 2007).

  • Edmonds, B., & Hales, D. (2003). Replication, replication and replication: Some hard lessons from model alignment. Journal of Artificial Societies and Social Simulation, 6(4). Retrieved 13 September, 2006, from<http://jasss.soc.surrey.ac.uk/6/4/11.html>.

  • Epstein, J. M. (2006). Generative social science: Studies in agent-based computational modeling. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Epstein, J. M., & Axtell, R. (1995). Growing artificial societies: Social science from the bottom up. The Brookings Institution: Washington, D.C.

    Google Scholar 

  • Faggiano, F., Vigna-Taglianti, F. D., Versino, E., Zambon, A., Borraccino, A., & Lemma, P. (2005). School-based prevention for illicit drugs’ use. Cochrane Database of Systematic Reviews, Issue 2. Art. No.: CD003020. doi:10.1002/14651858.CD003020.pub2.

  • Forrester, D., Frenz, S., O’Connell, M., & Pease, K. (1990). The Kirkholt Burglary Prevention Project: Phase II. Crime Prevention Unit Paper 23. London: Home Office.

    Google Scholar 

  • Hales, D., Rouchier, J., & Edmonds, B. (2003). Model-to-Model Analysis. Journal of Artificial Societies and Social Simulation, 6(4). Retrieved 13 September, 2006, from<http://jasss.soc.surrey.ac.uk/6/4/5.html>.

  • Huget, M. P., & Odell, J. (2005). Representing agent interaction protocols with agent uml, Agent-Oriented Software Engineering V: 5th International Workshop, AOSE 2004, New York, NY, USA, July 19, 2004: Revised Selected Papers.

  • Holland, P. (1986). Statistics and causal inference. Journal of the American Statistical Association, 81(396), 945–960.

    Article  Google Scholar 

  • Klüver, J., & Stoica, C. (2003). Simulations of group dynamics with different models. Journal of Artificial Societies and Social Simulation, 6(4). Retrieved 16 September 2006, from <http://jasss.soc.surrey.ac.uk/6/4/8.html>.

  • Liu, L., & Eck, J. (Eds.) (2008). Artificial crime analysis systems: Using computer simulations and geographic information systems. Hershey, PA: Idea Group Publishing.

  • Nagin, D. S., Farrington, D. P., & Moffitt, T. E. (1995). Life-course trajectories of different types of offenders. Criminology, 33(1), 111–139.

    Article  Google Scholar 

  • Odell, J., Parunak, H., & Bernhard, B. (2000a). Representing agent interaction protocols in UML. Proceedings of the First International Workshop on Agent-Oriented Software Engineering (AOSE-2000), Limerick, Ireland.

  • Odell, J., Parunak, H., & Bernhard, B. (2000b). Extending UML for agents. Proceedings Agent Oriented Information System Workshop at the 17th National Conference on Artificial Intelligence.

  • Schwab, M., Karrenbach, N., & Claerbout, J. (2000). Making scientific computations reproducible. Computing in Science & Engineering, 2(6), 61–67.

    Article  Google Scholar 

  • Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference. Boston, MA: Houghton Mifflin Co.

    Google Scholar 

  • Sherman, L. W., & Berk, R. A. (1984). The Minneapolis domestic violence experiment. Washington, DC: Police Foundation.

    Google Scholar 

  • Takadama, K., Suematsu, Y. L., Sugimoto, N., Nawa, N. E., & Shimohara, K. (2003). Cross-element validation in multiagent-based simulation: Switching learning mechanisms in agents. Journal of Artificial Societies and Social Simulation, 6(4). Retrieved 16 May 2007, from <http://jasss.soc.surrey.ac.uk/6/4/6.html>.

  • Tilley, N. (1993). After Kirkholt: Theory, method and results of replication evaluation. Crime Prevention Unit Paper 47. London: Home Office.

    Google Scholar 

  • Townsley, M., & Johnson, S. D. (2008). The need for systematic replication and tests of validity in simulation. In L. Liu, & J. Eck (Eds.),Artificial crime analysis systems: Using computer simulations and geographic information systems (pp. 1–18). Hershey, PA: Idea Group Publishing.

    Google Scholar 

Download references

Acknowledgements

A version of this paper was presented at a meeting of the Crime Simulation Network and feedback from numerous delegates has improved the paper. The authors would also like to thank the three anonymous reviewers for their constructive comments that have improved the scope of the arguments set out in the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Townsley.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Townsley, M., Birks, D.J. Building better crime simulations: systematic replication and the introduction of incremental complexity. J Exp Criminol 4, 309–333 (2008). https://doi.org/10.1007/s11292-008-9054-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11292-008-9054-4

Keywords

Navigation