Skip to main content
Log in

Repeat burglary victimisation: a tale of two theories

  • Published:
Journal of Experimental Criminology Aims and scope Submit manuscript

Abstract

Research consistently demonstrates that crime is spatially concentrated. Considering repeat burglary, studies conducted across a variety of countries and for different periods of time demonstrate that events also cluster in time. Two theories have been proposed to explain patterns of repeat victimisation. The first suggests that repeat victimisation is the consequence of a contagion-like process. If a home has been burgled on one occasion, the risk to the home is boosted, most likely because offenders will return to exploit good opportunities further (e.g. to steal replaced items or those left behind). In contrast, the second suggests that repeat victimisation may be explained by time-stable variation in risk across homes and a chance process. Different offenders independently target attractive locations for which risk is flagged. Understanding the contribution of the two explanations is important for both criminological understanding and crime reduction. Hitherto, research concerned with repeat victimisation has adopted a top-down methodology, analysing either victimisation or offender data. In this paper, results are reported for a simple micro-simulation experiment used to examine patterns of victimisation under conditions where the contributions of both theoretical mechanisms are varied. The findings suggest that increasing the heterogeneity of target attractiveness can generate spatial concentrations of crime not dissimilar to those discussed above, but that a contagion-like process is (also) required to generate the time course of repeat victimisation. The implications of the findings are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. This is not to suggest that burglary exudes a bacillus, but that patterns of victimisation might suggest that it does.

  2. Lauritsen and Davis-Quinet (1995) also examined this, using longitudinal survey data collected as part of the US National Youth Survey. Although they did not consider burglary, they did examine patterns of victimisation for larceny, which included theft of or from cars and bicycles. There results were consistent with those of Wittebrood and Nieuwbeerta (2000).

  3. To examine this, Tseloni and Pease (2004) analysed data concerned with crimes against the person collected for the 1994 US National Crime Victim Survey. Their results suggested that both explained and unexplained heterogeneity contribute substantially to victimisation risk but do not alter the importance of event dependency. Although the data analysed did not include burglary, the findings are of clear theoretical relevance here.

  4. Where a series of events occur at a particular home on a chance basis, the average time elapsed between them will be inversely proportional to the number of events experienced.

  5. A range of other models was tested, but the results are excluded as they did not change the conclusions that follow. Results are available on request.

  6. In computing the area-level risks, a question that naturally arises relates to the interval of time used to generate the estimates. The decision taken was to use data for the entire period for which data were available. The reasons for this are as follows. First, if, as is suggested by risk heterogeneity theory, patterns of repeat victimisation are the consequence of time-stable variation in risk across homes, then the epoch sampled to estimate time-stable variation is unimportant. A series of sampling intervals should give the same or similar results. However, using only a sample of the data available could reduce the reliability of any estimates produced. Thus, whilst other possibilities are acknowledged, using data for the entire 4-year period seemed the most sensible approach.

  7. Exactly the same estimates were derived using the Poisson distribution.

  8. The mean values of the simulation model were greater than 1.96 standard deviations of the observed values.

  9. To ease interpretation, the risk to homes was initially scaled by a factor of 0.974, so that the overall volume of events generated by the boost models did not exceed that for the observed distribution.

  10. For this and all other models, results for models with other scaling factors are available upon request.

  11. Visual inspection of the results across all iterations generated the same conclusions.

  12. One way of examining the extent to which a model fits the data is to compute the sum of the squared errors (SSE), an index commonly used for evaluating time series models. To do this, for each data point, the value for the model is subtracted from that of the observed data, and the result is squared. The squared errors can then be summed to provide an indication of how well the model fits the data. The lower the value the better the model fits the data. In this case, the model that included only area-level heterogeneity had a lower SSE value (54,549) than the model with homogeneous risks (SSE = 75,337) or those that modelled area risks and differences in the number of security features (SSE = 111,098) or types of homes located in an area (SSE = 192,702).

  13. The SSE values for these models ranged from 6,725 (the temporal decay model with area level risks) to 29,223 (the random interval model with homogeneous risks).

  14. For example, in the study by Osborn and Tseloni (1998), the areas considered contained around 3,000 homes. Wittebrood and Nieuwbeerta (2000) included a variable to model urbanisation, which ranged from 0 to 4, but it is unclear how this variable was constructed and it is thus perhaps likely to have been a fairly coarse measure.

  15. A boost process could, of course, have a role to play in this context if the experience of victimisation shapes the victims subsequent behaviour in such a way that it exposes him or her to an elevated risk of victimisation.

References

  • Ashton, J., Brown, I., Senior, B., & Pease, K. (1998). Repeat victimisation: offender accounts. International Journal of Risk, Security and Crime Prevention, 3(4), 269–279.

    Google Scholar 

  • Bernasco, W. (2008). Them again? Same-offender involvement in repeat and near repeat burglaries. European Journal of Criminology (in press).

  • Bowers, K. J., Johnson, S., & Pease, K. (2005). Victimisation and re-victimisation risk, housing type and area: a study of interactions. Crime Prevention and Community Safety, 7, 7–17.

    Google Scholar 

  • Brantingham, P. L., & Brantingham, P. J. (2004). Computer simulation as a tool for environmental criminologists. Security Journal, 17(1), 21–30.

    Article  Google Scholar 

  • Budd, T. (1999). Burglary of domestic dwellings: findings from the British crime survey. Home Office Statistical Bulletin, 4(99). London: Home Office.

  • Cornish, D., & Clarke, R. (1986). The reasoning criminal: rational choice perspectives on offending. New York: Springer-Verlag.

    Google Scholar 

  • Ericsson, U. (1995). Straight from the Horse’s mouth. Forensic Update, 43, 23–25.

    Google Scholar 

  • Everson, S., & Pease, K. (2001). Crime against the same person and place: detection opportunity and offender targeting. In G. Farrell, & K. Pease (Eds.), Crime prevention studies 12. Monsey: CRC press.

    Google Scholar 

  • Farrell, G. (1995). Preventing in repeat victimization. In M. Tonry, & D. P. Farrington (Eds.), Building a safer society: strategic approaches to crime prevention, crime and justice. Chicago, IL: Chicago University Press.

    Google Scholar 

  • Farrell, G., Phillips, C., & Pease, K. (1995). Like taking candy from a baby: why does repeat victimization occur? British Journal of Criminology, 35, 384–399.

    Google Scholar 

  • Fienberg, S. E. (1980). Statistical modeling of repeat victimization. In S. E. Fienberg, & A. J. Reiss (Eds.), Indicators of crime and Criminal Justice: Quantitative Studies. Washington: U.S. Department of Justice.

    Google Scholar 

  • Gilbert, N., & Troitzsch, K. G. (2003). Simulation for the social scientist. Buckingham: Open University Press.

    Google Scholar 

  • Goldstein, M. L., Morris, S. A., & Yen, G. G. (2004). Problems with fitting to the power-law distribution. The European Physical Journal B, 41, 255–258.

    Article  Google Scholar 

  • Groff, L. (2007). Simulation for theory testing and experimentation: an example using routine activity theory and street robbery. Journal of Quantitative Criminology, 23(2), 75–103.

    Article  Google Scholar 

  • Hirschfield, A. F. G., & Bowers, K. J. (1998). The geography of crime and disadvantage: an English case study. Japanese Journal of Crime and Delinquency (Hanzai to Hiko), 3, 77–106.

    Google Scholar 

  • Hockley, W. E. (1992). Item versus associative information - further comparisons of forgetting rates. Journal of Experimental Psychology, 18(6), 1321–1330.

    Google Scholar 

  • Huberman, B. A., & Glance, N. (1993). Evolutionary games and computer simulation. Proceedings of the National Academy of Sciences, 90, 7716–7718.

    Article  Google Scholar 

  • Johnson, S. D., Bowers, K. J., & Hirschfield, A. F. G. (1997). New insights into the spatial and temporal distribution of repeat victimization. British Journal of Criminology, 37(2), 224–241.

    Google Scholar 

  • Kleemans, E. R. (2001). Repeat burglary victimization: results of empirical research in the Netherlands. In G. Farrell, & K. Pease (Eds.), Crime prevention studies 12. Monsey: CRC press.

    Google Scholar 

  • Lauritsen, J. L., & Davis-Quinet, K. F. (1995). Repeat victimization among adolescents and young adults. Journal of Quantitative Criminology, 11(2), 143–166.

    Article  Google Scholar 

  • Liu, L., Wang, X., Eck, J., & Liang, J. (2005). Simulating crime events and crime patterns in a RA/CA model. In F. Wang (Ed.), Geographic information systems and crime analysis. Reading, PA: Idea Publishing.

    Google Scholar 

  • Nagin, D., & Paternoster, R. (1991). On the relationship of past and to future participation in delinquency. Criminology, 29, 163–189.

    Article  Google Scholar 

  • Nagin, D., & Paternoster, R. (2000). Population heterogeneity and state dependence: specification and estimation of a nonparametric, mixed Poisson model. Journal of Quantitative Criminology, 16(2), 117–144.

    Article  Google Scholar 

  • Nelson, J. (1980). Multiple victimisation in American cities: a statistical analysis of rare events. American Journal of Sociology, 85(4), 870–891.

    Article  Google Scholar 

  • Newman, M. E. J. (2005). Power laws, Pareto distributions and Zipf’s Law. Contemporary Physics, 46(5), 323–351.

    Article  Google Scholar 

  • North, B. V., Curtis, D., & Sham, P. C. (2002). A note on the calculation of empirical P values from Monte Carlo Procedures. American Journal of Human Genetics, 71(2), 439–441.

    Article  Google Scholar 

  • Nowak, M. A., & May, R. (1992). Evolutionary games and spatial chaos. Nature, 359, 826–829.

    Article  Google Scholar 

  • Osborn, D. R., & Tseloni, A. (1998). The distribution of property crimes. Journal of Quantitative Criminology, 14, 307–330.

    Article  Google Scholar 

  • Pease, K. (1998). Repeat victimization: taking stock. The Home Office: Police Research Group: Crime Detection and Prevention Series Paper 90.

  • Polvi, N., Looman, T., Humphries, C., & Pease, K. (1991). The time course of repeat burglary victimization. British Journal of Criminology, 31(4), 411–414.

    Google Scholar 

  • Ratcliffe, J., & McCullagh, M. (1998). Identifying repeat victimisation with GIS. British Journal of Criminology, 38(4), 651–662.

    Article  Google Scholar 

  • Reiss, A. J. (1980). Victimization in American cities: a statistical analysis of rare events. In S. E. Fienberg, & A. J. Reiss (Eds.), Indicators of crime and criminal justice: quantitative studies. Washington: U.S. Department of Justice.

    Google Scholar 

  • Rengert, G., Piquero, A., & Jones, P. (1999). Distance decay reexamined. Criminology, 37(2), 601–619.

    Article  Google Scholar 

  • Rengert, G., & Wasilchick, J. (2000). Suburban burglary: a tale of two suburbs. Springfield, IL: Charles Thomas.

    Google Scholar 

  • Repetto, T. A. (1974). Residential crime. Cambridge, MA: Ballinger.

    Google Scholar 

  • Rossmo, D. K. (2000). Geographic profiling. Boca Raton, FL: CRC Press.

    Google Scholar 

  • Sagovsky, A., & Johnson, S. D. (2007). When does repeat burglary victimisation occur? Australian and New Zealand Journal of Criminology, 40(1), 1–26.

    Article  Google Scholar 

  • Shaw, C., & McKay, H. (1969). Juvenile delinquency and urban areas. Chicago: University of Chicago Press.

    Google Scholar 

  • Sherman, L., Gartin, P., & Buerger, M. (1989). Hot spots of predatory crime: routine activities and the criminology of place. Criminology, 27(1), 27–55.

    Article  Google Scholar 

  • Simpson, E. H. (1951). The interpretation of interaction in contingency tables. Journal of the Royal Statistical Society: Series B, 13, 238–241.

    Google Scholar 

  • Smit, P. R., Meijer, R. F., & Groen, P. J. (2004). Detection rates, an international comparison. European Journal on Criminal Policy and Research, 10, 225–253.

    Article  Google Scholar 

  • Snook, B. (2004). Individual differences in distance traveled by serial burglars. Journal of Investigative Psychology and Offender Profiling, 1(1), 53–66.

    Article  Google Scholar 

  • Sparks, R. (1981). Multiple victimisation: evidence, theory and future research. Journal of Criminal Law and Criminology, 72, 762–778.

    Article  Google Scholar 

  • Spelman, W. (1995). Once bitten, then what? British Journal of Criminology, 35(3), 366–383.

    Google Scholar 

  • Stevens, S. S. (1957). On the psychophysical law. The Psychological Review, 64(3), 153–181.

    Article  Google Scholar 

  • Townsley, M., Homel, R., & Chaseling, J. (2000). Repeat burglary victimisation: spatial and temporal patterns. Australian and New Zealand Journal of Criminology, 33(1), 37–63.

    Google Scholar 

  • Trickett, A., Osborn, D., Seymour, J., & Pease, K. (1992). What is different about high crime areas? British Journal of Criminology, 32(1), 81–89.

    Google Scholar 

  • Tseloni, A. (2006). Multilevel modeling of the numbers of property crimes: household and area effects. Royal Statistical Society: Series A, 169(2), 205–233.

    Google Scholar 

  • Tseloni, A., & Pease, K. (2003). Repeat personal victimisation: ‘Boosts’ or ‘Flags’. British Journal of Criminology, 43, 196–121.

    Article  Google Scholar 

  • Tseloni, A., & Pease, K. (2004). Repeat personal victimisation: random effects, event dependence and unexplained heterogeneity. British Journal of Criminology, 44, 931–945.

    Article  Google Scholar 

  • Vaupel, J. W., & Yashin, A. I. (1985). Heterogeneity’s Ruses: some surprising effects on selection on population dynamics. The American Statistician, 39(3), 176–185.

    Article  Google Scholar 

  • Weisburd, D., Bushway, S., Lum, C., & Yang, S. (2004). Trajectories of crime at places: a longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283–321.

    Article  Google Scholar 

  • Wiesel, D. L., Clarke, R. V., & Stedman, J. R. (2002). Hot Dots in Hot Spots: Examining Repeat Victimization for Residential Burglary in Three Cities, Final Report to the U.S. Department of Justice. www.ncjrs.gov/pdffiles1/nijgrants/193808.pdf. Accessed 15 January 2007.

  • Wittebrood, K., & Nieuwbeerta, P. (2000). Criminal victimization during one’s life course: the effects of previous victimization and patterns of routine activities. Journal of Research in Crime and Delinquency, 37(1), 91–122.

    Article  Google Scholar 

Download references

Acknowledgements

The author would like to thank the Ordnance Survey and Merseyside police for supplying the data used in this research. Thanks also go (in alphabetical order) to Wim Bernasco, Kate Bowers, Henk Elffers, John Eck, Ken Pease, Jerry Ratcliffe, Aiden Sidebottom, Mike Townsley and three anonymous reviewers for comments on an earlier version of this paper. This research was supported by a British Academy research grant (award number LRG-45507), an International Collaborative Network grant from the British Academy, and additional funding from UCL Futures, NSCR and the Research Incentive Fund at Temple University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shane D. Johnson.

Appendices

Appendix

Appendix 1 Data used

Recorded-crime data

Data for the crime of residential burglary were obtained for the 4-year period 1 April 1999 to 31 March 2003 for the administrative county of Merseyside (UK). For each event, the following fields of information were available: a unique crime reference number; the address of the offence, recorded in a free text format; the earliest and latest date on which the offence could have occurred; the geographical grid coordinate of the offence, accurate to a resolution of 1 m; and, the surname of the victim.

The data were comprehensively cleaned prior to analysis. Those for which the address was incomplete, or which represented duplicates of other records—identified by virtue of their having the same details—were excluded from analysis. Data stored as free text were also reformatted where necessary. For example, common abbreviations such as RD (instead of Road) or GR (instead of Grove) were replaced with full-text equivalents. After the data had been cleaned, there was a total of 50,691 burglaries available for analysis.

Ordnance survey address point data

To generate a simulated population of households, Ordnance Survey (OS) address point data for the administrative county of Merseyside were used. The data included the geographic coordinate of each residential address within the county, of which there were 590,856.

Census data

The census for England and Wales is conducted every 10 years by the Office for National Statistics (ONS). The census provides detailed information about all homes located within England and Wales, including the number of households, age of the population, and the types of homes owned. For the purposes of confidentiality, data are only available in an aggregated format. The level of aggregation at which data are available varies, and, in this study, data at the finest level of resolution, the output area (OA) geography, were used. There is a total of 175,000 OAs in England and Wales, and they each contain around 125 households. To generate the OA geography a procedure was used by ONS to ‘build’ the areas such that homes with similar characteristics were selected to form discrete OAs. The procedure thus aims to maximise homogeneity within OAs. For current purposes the variables of interest were the counts of housing per OA and the types of homes within them.

Appendix 2

Observed and mean number of homes burgled n times for the Flag models (SD standard deviation, d.p. decimal place, RV repeat victimisation)

Table 3

Appendix 3

Observed and mean number of homes burgled n times for boost models with and without area-level variation in risk (SD standard deviation, d.p. decimal place, RV repeat victimisation)

Table 4

Rights and permissions

Reprints and permissions

About this article

Cite this article

Johnson, S.D. Repeat burglary victimisation: a tale of two theories. J Exp Criminol 4, 215–240 (2008). https://doi.org/10.1007/s11292-008-9055-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11292-008-9055-3

Keywords

Navigation