SlideShare uma empresa Scribd logo
1 de 15
Larry J. Siegel


            www.cengage.com/cj/siegel




        Chapter Two
The Nature and Extent of Crime



  Valerie Bell • University of Cincinnati, Cincinnati, OH
The Nature & Extent of Crime
• Primary Sources of Crime Data
  – Uniform Crime Reports (UCR)
     • Part I Crimes
     • Part II Crimes
     • Cleared Crimes
     • Validity of the UCR
The Nature & Extent of Crime
• Primary Sources of Crime Data
  – National Incident-Based Reporting System (NIBRS)
     • Improvement over UCR
     • 46 specific offenses
     • 22 crime patterns
     • Incident, victim, and offender information
     • 20 states have implemented
     • 12 states finalizing data collection
The Nature & Extent of Crime
• Primary Sources of Crime Data
  – National Crime Victimization Survey (NCVS)
     • Annual survey of victims
     • Addresses “non-reporting” issue
     • Information regarding victims, offenders, and
       crimes.
     • Validity of the NCVS
     • Future of the NCVS
The Nature & Extent of Crime
• Primary Sources of Crime Data
  – Self-Report Surveys
     • Given in groups
     • Anonymous
     • Additional questions about attitudes, values , and
       behaviors.
     • Validity of Self-Reports
     • “Monitoring the Future” Survey
The Nature & Extent of Crime
• Evaluating Crime Data
  – Strengths
     • UCR
        – Offender data
        – Information on crimes surveys cannot measure
     • NCVS
        – Unreported crimes
        – Victimization data
     • Self-report surveys
        – Information on offenders
The Nature & Extent of Crime
• Evaluating Crime Data
  – Weaknesses
     • UCR
        – Does not include unreported crimes
     • NCVS
        – Limited samples
        – Personal recollections
        – Does not include homicide, drug abuse crimes
     • Self-report surveys
        – Rely on honesty of offenders
The Nature & Extent of Crime
• Crime Patterns
  – The Ecology of Crime
     • Day, Season, and Climate
     • Temperature
     • Regional Differences
  – Use of Firearms
The Nature & Extent of Crime
• Crime Patterns
  – Social Class, Socioeconomic Conditions and Crime
     • Instrumental crimes
     • Expressive crimes
  – Age and Crime
The Nature & Extent of Crime
• Crime Patterns
  – Age and Crime
     • Aging out of crime
     • Age and biology
        – Neurotransmitters
The Nature & Extent of Crime
• Crime Patterns
  – Gender and Crime
     • Official statistics
        – Male to female arrests 4-1 overall
             » 5-1 for serious violent crime
             » 8-1 for murder
     • Self-report
        – Same pattern but smaller ratios
     • Difference is decreasing
The Nature & Extent of Crime
• Crime Patterns
  – Gender and Crime
     • Trait differences
     • Socialization differences
     • Cognitive differences
     • Social/political differences
The Nature & Extent of Crime
• Crime Patterns
  – Race and Crime
     • Racism and discrimination
     • Economic and social disparity
     • Family dissolution
The Nature & Extent of Crime
• Chronic Offenders/Criminal Careers
  – Delinquency in a Birth Cohort
     • Wolfgang, Figlio, and Sellin
The Nature & Extent of Crime
• Chronic Offenders/Criminal Careers
  – What Causes Chronicity?
     • Early onset
  – Implications of the Chronic Offender Concept
     • “three-strikes”
     • “truth-in-sentencing”

Mais conteúdo relacionado

Mais procurados

politica_criminal_.pptx
politica_criminal_.pptxpolitica_criminal_.pptx
politica_criminal_.pptxLuisAnjiru
 
Schools of criminology
Schools of criminologySchools of criminology
Schools of criminologyWARIFVACIM
 
81-220-1 - Chapter 3
81-220-1 - Chapter 381-220-1 - Chapter 3
81-220-1 - Chapter 3mpalaro
 
Victimology Intro Students
Victimology Intro StudentsVictimology Intro Students
Victimology Intro Studentsburgessw
 
nature and scope of Criminology
nature and scope of Criminologynature and scope of Criminology
nature and scope of Criminologygagan deep
 
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol, Inc
 
Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policinggroundskeeper20
 
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...Cielo Gc
 
Schools of Criminology
Schools of CriminologySchools of Criminology
Schools of CriminologyVelika D'Souza
 
Crime and society criminal profiling
Crime and society   criminal profilingCrime and society   criminal profiling
Crime and society criminal profilingRavinderKaur194
 
Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan Shahbaz Cheema
 

Mais procurados (20)

1.1 what is crime
1.1 what is crime1.1 what is crime
1.1 what is crime
 
politica_criminal_.pptx
politica_criminal_.pptxpolitica_criminal_.pptx
politica_criminal_.pptx
 
Schools of criminology
Schools of criminologySchools of criminology
Schools of criminology
 
81-220-1 - Chapter 3
81-220-1 - Chapter 381-220-1 - Chapter 3
81-220-1 - Chapter 3
 
The Elements of a Crime
The Elements of a CrimeThe Elements of a Crime
The Elements of a Crime
 
Criminal law.power point....
Criminal law.power point....Criminal law.power point....
Criminal law.power point....
 
Crime & Violence
Crime & ViolenceCrime & Violence
Crime & Violence
 
ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)
 
Victimology Intro Students
Victimology Intro StudentsVictimology Intro Students
Victimology Intro Students
 
nature and scope of Criminology
nature and scope of Criminologynature and scope of Criminology
nature and scope of Criminology
 
Crime statistics uses
Crime statistics  usesCrime statistics  uses
Crime statistics uses
 
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
 
Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policing
 
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
 
Schools of Criminology
Schools of CriminologySchools of Criminology
Schools of Criminology
 
Crime and society criminal profiling
Crime and society   criminal profilingCrime and society   criminal profiling
Crime and society criminal profiling
 
History of Criminology
History of CriminologyHistory of Criminology
History of Criminology
 
Community Policing
Community PolicingCommunity Policing
Community Policing
 
Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan
 
Teoria del delito
Teoria del delitoTeoria del delito
Teoria del delito
 

Destaque

81-220-1 Chapter 9
81-220-1 Chapter 981-220-1 Chapter 9
81-220-1 Chapter 9mpalaro
 
Chapter 5 Challenges to Effective Policing
Chapter 5 Challenges to Effective PolicingChapter 5 Challenges to Effective Policing
Chapter 5 Challenges to Effective PolicingKatrina Homer
 
81-220-1 Chapter 8
81-220-1 Chapter 881-220-1 Chapter 8
81-220-1 Chapter 8mpalaro
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewFrancis Postrado
 
Project World Cultures
Project World CulturesProject World Cultures
Project World Cultureszmiers
 
Constitutional Issues - Chapter 13
Constitutional Issues - Chapter 13Constitutional Issues - Chapter 13
Constitutional Issues - Chapter 13mpalaro
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - CriminologyDiana Dianot
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of CriminologyJwooten2
 
81-220-1 Chapter 7
81-220-1 Chapter 781-220-1 Chapter 7
81-220-1 Chapter 7mpalaro
 
Deviant Behavior 6
Deviant Behavior 6Deviant Behavior 6
Deviant Behavior 6zmiers
 
Agnew's General Strain Theory
Agnew's General Strain TheoryAgnew's General Strain Theory
Agnew's General Strain Theorymonroyd
 
Crime and deviance complete revision
Crime and deviance complete revisionCrime and deviance complete revision
Crime and deviance complete revisionlouisamcdonald
 

Destaque (16)

Chapter 2
Chapter 2Chapter 2
Chapter 2
 
81-220-1 Chapter 9
81-220-1 Chapter 981-220-1 Chapter 9
81-220-1 Chapter 9
 
Chapter 5 Challenges to Effective Policing
Chapter 5 Challenges to Effective PolicingChapter 5 Challenges to Effective Policing
Chapter 5 Challenges to Effective Policing
 
81-220-1 Chapter 8
81-220-1 Chapter 881-220-1 Chapter 8
81-220-1 Chapter 8
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
Project World Cultures
Project World CulturesProject World Cultures
Project World Cultures
 
Constitutional Issues - Chapter 13
Constitutional Issues - Chapter 13Constitutional Issues - Chapter 13
Constitutional Issues - Chapter 13
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
 
81-220-1 Chapter 7
81-220-1 Chapter 781-220-1 Chapter 7
81-220-1 Chapter 7
 
Deviant Behavior 6
Deviant Behavior 6Deviant Behavior 6
Deviant Behavior 6
 
Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
 
Agnew's General Strain Theory
Agnew's General Strain TheoryAgnew's General Strain Theory
Agnew's General Strain Theory
 
Moral Panic
Moral PanicMoral Panic
Moral Panic
 
Crime and deviance complete revision
Crime and deviance complete revisionCrime and deviance complete revision
Crime and deviance complete revision
 
Chapters 1 5
Chapters 1 5Chapters 1 5
Chapters 1 5
 

Semelhante a Analyzing Primary Crime Data Sources and Patterns

81-220-1 - Chapter 2
81-220-1 - Chapter 281-220-1 - Chapter 2
81-220-1 - Chapter 2mpalaro
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and MeasurinCicelyBourqueju
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and MeasurinChantellPantoja184
 
81-220-1 Chapter 10
81-220-1 Chapter 1081-220-1 Chapter 10
81-220-1 Chapter 10mpalaro
 
RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception
RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception
RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception AlleneMcclendon878
 
Forensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdfForensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdfphweb
 
Ch06 Measuring Crime
Ch06 Measuring CrimeCh06 Measuring Crime
Ch06 Measuring Crimeyxl007
 
Chapter 12Elder Abuse VictimsCase ExampleM
Chapter 12Elder Abuse VictimsCase ExampleMChapter 12Elder Abuse VictimsCase ExampleM
Chapter 12Elder Abuse VictimsCase ExampleMEstelaJeffery653
 
Angela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicidesAngela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicidesIstituto nazionale di statistica
 
Forensic psychology - AQA Alevel Revision
Forensic psychology - AQA Alevel Revision Forensic psychology - AQA Alevel Revision
Forensic psychology - AQA Alevel Revision Evie-Anne Davis
 
North carolinas violent death reporting system ps nworkshopfinal
North carolinas violent death reporting system ps nworkshopfinalNorth carolinas violent death reporting system ps nworkshopfinal
North carolinas violent death reporting system ps nworkshopfinalCenter for Community Safety
 
Ethics in Criminal Data Collection
Ethics in Criminal Data CollectionEthics in Criminal Data Collection
Ethics in Criminal Data CollectionAyodele Odubela
 
Aiming for Zero: Sexual Behaviours Clinic at The Royal
Aiming for Zero: Sexual Behaviours Clinic at The RoyalAiming for Zero: Sexual Behaviours Clinic at The Royal
Aiming for Zero: Sexual Behaviours Clinic at The RoyalThe Royal Mental Health Centre
 

Semelhante a Analyzing Primary Crime Data Sources and Patterns (20)

81-220-1 - Chapter 2
81-220-1 - Chapter 281-220-1 - Chapter 2
81-220-1 - Chapter 2
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin
 
122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin122820211Chapter Two Defining Crimes and Measurin
122820211Chapter Two Defining Crimes and Measurin
 
Crime Rate 1
Crime Rate 1Crime Rate 1
Crime Rate 1
 
81-220-1 Chapter 10
81-220-1 Chapter 1081-220-1 Chapter 10
81-220-1 Chapter 10
 
RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception
RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception
RACE, ETHNICITY, VICTIMIZATION, AND OFFENDINGPerception
 
Forensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdfForensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdf
 
Ch06 Measuring Crime
Ch06 Measuring CrimeCh06 Measuring Crime
Ch06 Measuring Crime
 
1.5.5 Liz Mulder
1.5.5 Liz Mulder1.5.5 Liz Mulder
1.5.5 Liz Mulder
 
Chapter 12Elder Abuse VictimsCase ExampleM
Chapter 12Elder Abuse VictimsCase ExampleMChapter 12Elder Abuse VictimsCase ExampleM
Chapter 12Elder Abuse VictimsCase ExampleM
 
Angela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicidesAngela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicides
 
2010 Middle District PSN Training (09 30-10)
2010 Middle District PSN Training (09 30-10)2010 Middle District PSN Training (09 30-10)
2010 Middle District PSN Training (09 30-10)
 
2010 Middle District PSN Training (09-30-10)
2010 Middle District PSN Training (09-30-10)2010 Middle District PSN Training (09-30-10)
2010 Middle District PSN Training (09-30-10)
 
Forensic psychology - AQA Alevel Revision
Forensic psychology - AQA Alevel Revision Forensic psychology - AQA Alevel Revision
Forensic psychology - AQA Alevel Revision
 
North carolinas violent death reporting system ps nworkshopfinal
North carolinas violent death reporting system ps nworkshopfinalNorth carolinas violent death reporting system ps nworkshopfinal
North carolinas violent death reporting system ps nworkshopfinal
 
Ethics in Criminal Data Collection
Ethics in Criminal Data CollectionEthics in Criminal Data Collection
Ethics in Criminal Data Collection
 
Chapter12
Chapter12Chapter12
Chapter12
 
Chapter4
Chapter4Chapter4
Chapter4
 
Aiming for Zero: Sexual Behaviours Clinic at The Royal
Aiming for Zero: Sexual Behaviours Clinic at The RoyalAiming for Zero: Sexual Behaviours Clinic at The Royal
Aiming for Zero: Sexual Behaviours Clinic at The Royal
 
Senior Capstone
Senior CapstoneSenior Capstone
Senior Capstone
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Analyzing Primary Crime Data Sources and Patterns

  • 1. Larry J. Siegel www.cengage.com/cj/siegel Chapter Two The Nature and Extent of Crime Valerie Bell • University of Cincinnati, Cincinnati, OH
  • 2. The Nature & Extent of Crime • Primary Sources of Crime Data – Uniform Crime Reports (UCR) • Part I Crimes • Part II Crimes • Cleared Crimes • Validity of the UCR
  • 3. The Nature & Extent of Crime • Primary Sources of Crime Data – National Incident-Based Reporting System (NIBRS) • Improvement over UCR • 46 specific offenses • 22 crime patterns • Incident, victim, and offender information • 20 states have implemented • 12 states finalizing data collection
  • 4. The Nature & Extent of Crime • Primary Sources of Crime Data – National Crime Victimization Survey (NCVS) • Annual survey of victims • Addresses “non-reporting” issue • Information regarding victims, offenders, and crimes. • Validity of the NCVS • Future of the NCVS
  • 5. The Nature & Extent of Crime • Primary Sources of Crime Data – Self-Report Surveys • Given in groups • Anonymous • Additional questions about attitudes, values , and behaviors. • Validity of Self-Reports • “Monitoring the Future” Survey
  • 6. The Nature & Extent of Crime • Evaluating Crime Data – Strengths • UCR – Offender data – Information on crimes surveys cannot measure • NCVS – Unreported crimes – Victimization data • Self-report surveys – Information on offenders
  • 7. The Nature & Extent of Crime • Evaluating Crime Data – Weaknesses • UCR – Does not include unreported crimes • NCVS – Limited samples – Personal recollections – Does not include homicide, drug abuse crimes • Self-report surveys – Rely on honesty of offenders
  • 8. The Nature & Extent of Crime • Crime Patterns – The Ecology of Crime • Day, Season, and Climate • Temperature • Regional Differences – Use of Firearms
  • 9. The Nature & Extent of Crime • Crime Patterns – Social Class, Socioeconomic Conditions and Crime • Instrumental crimes • Expressive crimes – Age and Crime
  • 10. The Nature & Extent of Crime • Crime Patterns – Age and Crime • Aging out of crime • Age and biology – Neurotransmitters
  • 11. The Nature & Extent of Crime • Crime Patterns – Gender and Crime • Official statistics – Male to female arrests 4-1 overall » 5-1 for serious violent crime » 8-1 for murder • Self-report – Same pattern but smaller ratios • Difference is decreasing
  • 12. The Nature & Extent of Crime • Crime Patterns – Gender and Crime • Trait differences • Socialization differences • Cognitive differences • Social/political differences
  • 13. The Nature & Extent of Crime • Crime Patterns – Race and Crime • Racism and discrimination • Economic and social disparity • Family dissolution
  • 14. The Nature & Extent of Crime • Chronic Offenders/Criminal Careers – Delinquency in a Birth Cohort • Wolfgang, Figlio, and Sellin
  • 15. The Nature & Extent of Crime • Chronic Offenders/Criminal Careers – What Causes Chronicity? • Early onset – Implications of the Chronic Offender Concept • “three-strikes” • “truth-in-sentencing”

Notas do Editor

  1. Learning Objective 1. Be familiar with the various forms of crime data.
  2. Learning Objective 1. Be familiar with the various forms of crime data.
  3. Learning Objective 1. Be familiar with the various forms of crime data.
  4. Learning Objective 1. Be familiar with the various forms of crime data.
  5. Learning Objective 2. Know the problems associated with collecting data.
  6. Learning Objective 2. Know the problems associated with collecting data.
  7. Learning Objective 4. Be familiar with the factors that influence crime rates. Learning Objective 5. Compare crime rates under different ecological conditions.
  8. Learning Objective 4. Be familiar with the factors that influence crime rates. Learning Objective 6. Be able to discuss the association between social class and crime.
  9. Learning Objective 4. Be familiar with the factors that influence crime rates. Learning Objective 7. Know what is meant by the term “aging out process.”
  10. Learning Objective 4. Be familiar with the factors that influence crime rates. Learning Objective 8. Recognize that there are gender and racial patterns in crime.
  11. Learning Objective 4. Be familiar with the factors that influence crime rates. Learning Objective 8. Recognize that there are gender and racial patterns in crime.
  12. Learning Objective 4. Be familiar with the factors that influence crime rates. Learning Objective 8. Recognize that there are gender and racial patterns in crime.
  13. Learning Objective 9. Be familiar with Wolfgang, Figlio, and Sellin’s pioneering research on chronic offending.
  14. Learning Objective 10. Know what causes chronicity.