SlideShare a Scribd company logo
1 of 30
Download to read offline
Arrest Networks
and the
Spread of Violent Victimization
DANIEL T. RAGAN
UNIVERSITY OF NEW MEXICO
Other Team Members
Lisa Broidy
University of New Mexico
Brian Soller
University of Maryland, Baltimore County
Background
Violent victimization:
‣ As a health outcome
‣ Not randomly distributed
‣ Importance of social ties
Prior Research
Violent victimization: Predicted by arrest with other victims
‣ Exposure to similar risk factors
Gunshot and homicide victimization
‣ Generalizability to more common types of violence?
Chicago, IL; Boston, MA; Newark, NJ
‣ Generalizability to different geographic locations?
Our Goal: Network Approach to Violent Victimization
Primary data
‣ Law enforcement
Supplementary data
‣ Criminal courts
‣ State criminal history databases
‣ Emergency room visits
‣ U.S. Census
Pilot Project
Violent victimization in criminal networks
‣ Approximately three years of crime-related data
‣ Information on both offenders and victims
‣ Albuquerque, New Mexico
Current Goals
1) What can we learn about violence in criminal networks?
‣ Do offending networks link violent offenders and victims?
2) Assess feasibility of a larger project
‣ Do these data support a network approach?
Data: Overview
‣ Criminal event data
‣ Case numbers
‣ Suspects, arrestees, and victims: Unique identifiers
‣ Approximately three years of coverage
‣ 2011 into 2014
‣ Albuquerque, New Mexico
Albuquerque
‣ Population size
‣ Mobility
‣ City borders & Law enforcement jurisdiction
Data at a Glance: Cases
Records (case/person combination): 155,906
‣ Cases: 120,675
‣ Single offender: 45,348
‣ Multiple offenders: 4,150
Data at a Glance: People
Unique person identifiers: 120,345
‣ Offenders (suspects/arrestees): 40,858
‣ Multiple cases: 8,441
‣ Victims: 86,677
‣ Both offender and victim: 7,190
Violent Offenses: Examples
Battery/Aggravated battery/Aggravated assault
‣ 8,946 cases
Robbery/Commercial armed robbery/Auto car jacking
‣ 552 cases
Forcible rape/Attempted rape/Sexual assault with an object
‣ 490 cases
Murder and nonnegligent manslaughter/Justifiable homicide
‣ 83 cases
Building the Network
Offenders: Linked through crimes
‣ One-mode projection from two-mode data
‣ Assumption: Co-offending signifies social connection
‣ Case removal: > 10 offenders
‣ Case removal: Individual is both offender and victim
‣ Time dimension collapsed: Cross-sectional
Offender Network: Offenders
Offenders: 40,499
‣ Isolates: 32,637
‣ Connected offenders: 7,862
Offender Network: Ties
Ties: 5,990
‣ Average ties: 0.30
‣ Average ties, excluding isolates: 1.52
‣ Degree distribution:
1 2 3 4 5 6 7 8 - 18
5,476 1,444 534 219 81 67 27 14
Offender Network: Groups
Components, excluding isolates: 3,151
• Average component size, excluding isolates: 2.50
• Component distribution:
2 3 4 5 6 7 8 9 - 53
2,364 488 151 54 34 22 18 20
How are different offender-types connected?
Do victims of violence have ties to violent offenders?
‣ Do links within offending network suggest “spread”?
How are different offender-types connected?
Non-victim Victim
Non-violent
offender
Non-violent offender,
non-victim1
Non-violent offender,
victim3
Violent offender Violent offender,
non-victim2
Violent offender,
victim4
Non-violent offender,
non-victim1
Violent offender,
non-victim2
Non-violent offender,
victim3
Violent offender,
victim4
Non-violent offender,
non-victim1
001001 001102 001013 001114
Violent offender,
non-victim2
102001 102102 102013 102114
Non-violent offender,
victim3
013001 013102 013013 013114
Violent offender,
victim4
114001 114102 114013 114114
Non-violent offender,
non-victim1
Violent offender,
non-victim2
Non-violent offender,
victim3
Violent offender,
victim4
Non-violent offender,
non-victim1
0
Violent offender,
non-victim2
0 0
Non-violent offender,
victim3
0 013102 0
Violent offender,
victim4
0 114102 114013 114114
Exponential Random Graph Models
Y: Random variable for state of network
g(y): Vector of network statistics for model
𝜃: Vector of parameters
k: Normalizing constant
Conditional log-odds of a single tie between two actors:
𝑝 𝑌 = 𝑦 =
𝑒𝑥𝑝(𝜃′
𝑔 𝑦 )
𝑘 𝜃
𝑙𝑜𝑔𝑖𝑡(𝑌𝑖𝑗 = 1|𝑦𝑖𝑗
𝑐
) = 𝜃′𝛿(𝑦𝑖𝑗)
Exponential Random Graph Models
Parameter Estimate Std. Error
Edges -9.891*** 0.032
Isolates 1.695*** 0.027
Actor covariate: Number offenses 0.159*** 0.004
Attributes mixes: Offender type
Non-violent offender, victim3
x Violent offender, victim4 0.205 0.147
Violent offender, non-victim2
x Non-violent offender, victim3 -0.626*** 0.111
Violent offender, non-victim2
x Violent offender, victim4 0.617*** 0.070
Violent offender, victim4
x Violent offender, victim4 1.138*** 0.146
Non-violent offender,
non-victim1
Violent offender,
non-victim2
Non-violent offender,
victim3
Violent offender,
victim4
Non-violent offender,
non-victim1
0
Violent offender,
non-victim2
0 0
Non-violent offender,
victim3
0 — 0
Violent offender,
victim4
0 + n.s. +
Conclusions
1) Presence of offender network
‣ Ties: Sparse but not insignificant
2) Clustering of violence within network
‣ Violent offenders and victim ties: Victims are violent
‣ “Selection” vs. “Spread”
Next Steps
1) Continuing work: ERGMs
‣ Model specification & Goodness of fit
2) Pilot project: Future directions
‣ Projection of crime network
3) Larger project feasibility
‣ Current mood: “Cautiously optimistic”

More Related Content

What's hot

Sextortion: Coercion of sex through blackmail
Sextortion: Coercion of sex through blackmailSextortion: Coercion of sex through blackmail
Sextortion: Coercion of sex through blackmailThe Brookings Institution
 
Crime stats pressreleasecius09
Crime stats pressreleasecius09Crime stats pressreleasecius09
Crime stats pressreleasecius09sevans-idaho
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law AbmpegasusDawnStarling
 
Max Keller Interviewed for Minnesota Lawyer Magazine Article
Max Keller Interviewed for Minnesota Lawyer Magazine ArticleMax Keller Interviewed for Minnesota Lawyer Magazine Article
Max Keller Interviewed for Minnesota Lawyer Magazine Articlekellerlawoffices
 
Hall Elizabeth Unit Two Written Assignment
Hall Elizabeth Unit Two Written AssignmentHall Elizabeth Unit Two Written Assignment
Hall Elizabeth Unit Two Written AssignmentElizabeth Hall
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeChristian Watson
 
Hall Elizabeth Unit Two Written assignment
Hall Elizabeth Unit Two Written assignmentHall Elizabeth Unit Two Written assignment
Hall Elizabeth Unit Two Written assignmentElizabeth Hall
 
Dan Finkelstein - JRIC Border Patrol Presentation
Dan Finkelstein - JRIC Border Patrol PresentationDan Finkelstein - JRIC Border Patrol Presentation
Dan Finkelstein - JRIC Border Patrol PresentationContract Cities
 
LGBT Domestic Violence Report
LGBT Domestic Violence ReportLGBT Domestic Violence Report
LGBT Domestic Violence ReportSkyler Saunders
 
Cja 105 Enthusiastic Study / snaptutorial.com
Cja 105 Enthusiastic Study / snaptutorial.comCja 105 Enthusiastic Study / snaptutorial.com
Cja 105 Enthusiastic Study / snaptutorial.comStephenson20
 
S Johnson SROP Poster_Melde (1)
S Johnson SROP Poster_Melde (1)S Johnson SROP Poster_Melde (1)
S Johnson SROP Poster_Melde (1)Shavonda Johnson
 
Obama orders review of giving local police military gear
Obama orders review of giving local police military gearObama orders review of giving local police military gear
Obama orders review of giving local police military gearexpensiveface9047
 
Unit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation EssayUnit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation EssayElizabeth Hall
 
Essays on using Formal Concept Analysis in Information Engineering
Essays on using Formal Concept Analysis in Information EngineeringEssays on using Formal Concept Analysis in Information Engineering
Essays on using Formal Concept Analysis in Information EngineeringWitology
 

What's hot (18)

Sextortion: Coercion of sex through blackmail
Sextortion: Coercion of sex through blackmailSextortion: Coercion of sex through blackmail
Sextortion: Coercion of sex through blackmail
 
Study of Women's Rights
Study of Women's RightsStudy of Women's Rights
Study of Women's Rights
 
Crime stats pressreleasecius09
Crime stats pressreleasecius09Crime stats pressreleasecius09
Crime stats pressreleasecius09
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law Abmpegasus
 
MPRI Presentation To NMSAS Board August 31, 2009
MPRI Presentation To NMSAS Board August 31, 2009MPRI Presentation To NMSAS Board August 31, 2009
MPRI Presentation To NMSAS Board August 31, 2009
 
Max Keller Interviewed for Minnesota Lawyer Magazine Article
Max Keller Interviewed for Minnesota Lawyer Magazine ArticleMax Keller Interviewed for Minnesota Lawyer Magazine Article
Max Keller Interviewed for Minnesota Lawyer Magazine Article
 
Hall Elizabeth Unit Two Written Assignment
Hall Elizabeth Unit Two Written AssignmentHall Elizabeth Unit Two Written Assignment
Hall Elizabeth Unit Two Written Assignment
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on Crime
 
Hall Elizabeth Unit Two Written assignment
Hall Elizabeth Unit Two Written assignmentHall Elizabeth Unit Two Written assignment
Hall Elizabeth Unit Two Written assignment
 
Dan Finkelstein - JRIC Border Patrol Presentation
Dan Finkelstein - JRIC Border Patrol PresentationDan Finkelstein - JRIC Border Patrol Presentation
Dan Finkelstein - JRIC Border Patrol Presentation
 
LGBT Domestic Violence Report
LGBT Domestic Violence ReportLGBT Domestic Violence Report
LGBT Domestic Violence Report
 
Cja 105 Enthusiastic Study / snaptutorial.com
Cja 105 Enthusiastic Study / snaptutorial.comCja 105 Enthusiastic Study / snaptutorial.com
Cja 105 Enthusiastic Study / snaptutorial.com
 
S Johnson SROP Poster_Melde (1)
S Johnson SROP Poster_Melde (1)S Johnson SROP Poster_Melde (1)
S Johnson SROP Poster_Melde (1)
 
Election hate crime analysis
Election hate crime analysisElection hate crime analysis
Election hate crime analysis
 
Obama orders review of giving local police military gear
Obama orders review of giving local police military gearObama orders review of giving local police military gear
Obama orders review of giving local police military gear
 
Unit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation EssayUnit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation Essay
 
Essays on using Formal Concept Analysis in Information Engineering
Essays on using Formal Concept Analysis in Information EngineeringEssays on using Formal Concept Analysis in Information Engineering
Essays on using Formal Concept Analysis in Information Engineering
 
Dissi Done
Dissi DoneDissi Done
Dissi Done
 

Similar to 00 Arrest Networks and the Spread of Violent Victimization

Angela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicidesAngela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicidesIstituto nazionale di statistica
 
A stastistical analysis of homicide incidents in US (1980 to 2014)
A stastistical analysis of homicide incidents in US (1980 to 2014)A stastistical analysis of homicide incidents in US (1980 to 2014)
A stastistical analysis of homicide incidents in US (1980 to 2014)Arafath Hossain
 
3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docxlorainedeserre
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1guest846943
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]rcamer
 
3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docxtamicawaysmith
 
Deviance, Class 8, Part Ii
Deviance, Class 8, Part IiDeviance, Class 8, Part Ii
Deviance, Class 8, Part Iijcarlson1
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)Arete-Zoe, LLC
 
Introtocrimeanalysis.ppt
Introtocrimeanalysis.pptIntrotocrimeanalysis.ppt
Introtocrimeanalysis.pptRehmanmagsri
 

Similar to 00 Arrest Networks and the Spread of Violent Victimization (20)

1-measuring_crime.ppt
1-measuring_crime.ppt1-measuring_crime.ppt
1-measuring_crime.ppt
 
Angela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicidesAngela Me, The killing of women in the context of global homicides
Angela Me, The killing of women in the context of global homicides
 
A stastistical analysis of homicide incidents in US (1980 to 2014)
A stastistical analysis of homicide incidents in US (1980 to 2014)A stastistical analysis of homicide incidents in US (1980 to 2014)
A stastistical analysis of homicide incidents in US (1980 to 2014)
 
3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1
 
Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]
 
3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx
 
GSS
GSSGSS
GSS
 
Deviance, Class 8, Part Ii
Deviance, Class 8, Part IiDeviance, Class 8, Part Ii
Deviance, Class 8, Part Ii
 
Sexual assault (2017)
Sexual assault (2017)Sexual assault (2017)
Sexual assault (2017)
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)
 
Introtocrimeanalysis.ppt
Introtocrimeanalysis.pptIntrotocrimeanalysis.ppt
Introtocrimeanalysis.ppt
 
Criminal Justice
Criminal JusticeCriminal Justice
Criminal Justice
 
Victims
VictimsVictims
Victims
 
Chapter14
Chapter14Chapter14
Chapter14
 
Crim methods2
Crim methods2Crim methods2
Crim methods2
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 

More from Duke Network Analysis Center

01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security IssuesDuke Network Analysis Center
 
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...Duke Network Analysis Center
 
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)Duke Network Analysis Center
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network FunctionDuke Network Analysis Center
 
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...Duke Network Analysis Center
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...Duke Network Analysis Center
 

More from Duke Network Analysis Center (20)

01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues
 
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
 
24 The Evolution of Network Thinking
24 The Evolution of Network Thinking24 The Evolution of Network Thinking
24 The Evolution of Network Thinking
 
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
 
20 Network Experiments
20 Network Experiments20 Network Experiments
20 Network Experiments
 
19 Electronic Medical Records
19 Electronic Medical Records19 Electronic Medical Records
19 Electronic Medical Records
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
17 Statistical Models for Networks
17 Statistical Models for Networks17 Statistical Models for Networks
17 Statistical Models for Networks
 
15 Network Visualization and Communities
15 Network Visualization and Communities15 Network Visualization and Communities
15 Network Visualization and Communities
 
13 Community Detection
13 Community Detection13 Community Detection
13 Community Detection
 
11 Respondent Driven Sampling
11 Respondent Driven Sampling11 Respondent Driven Sampling
11 Respondent Driven Sampling
 
09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
 
04 Network Data Collection
04 Network Data Collection04 Network Data Collection
04 Network Data Collection
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function
 
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 
11 Siena Models for Selection & Influence
11 Siena Models for Selection & Influence 11 Siena Models for Selection & Influence
11 Siena Models for Selection & Influence
 

Recently uploaded

Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfWadeK3
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 

Recently uploaded (20)

Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 

00 Arrest Networks and the Spread of Violent Victimization

  • 1. Arrest Networks and the Spread of Violent Victimization DANIEL T. RAGAN UNIVERSITY OF NEW MEXICO
  • 2. Other Team Members Lisa Broidy University of New Mexico Brian Soller University of Maryland, Baltimore County
  • 3. Background Violent victimization: ‣ As a health outcome ‣ Not randomly distributed ‣ Importance of social ties
  • 4. Prior Research Violent victimization: Predicted by arrest with other victims ‣ Exposure to similar risk factors Gunshot and homicide victimization ‣ Generalizability to more common types of violence? Chicago, IL; Boston, MA; Newark, NJ ‣ Generalizability to different geographic locations?
  • 5. Our Goal: Network Approach to Violent Victimization Primary data ‣ Law enforcement Supplementary data ‣ Criminal courts ‣ State criminal history databases ‣ Emergency room visits ‣ U.S. Census
  • 6. Pilot Project Violent victimization in criminal networks ‣ Approximately three years of crime-related data ‣ Information on both offenders and victims ‣ Albuquerque, New Mexico
  • 7. Current Goals 1) What can we learn about violence in criminal networks? ‣ Do offending networks link violent offenders and victims? 2) Assess feasibility of a larger project ‣ Do these data support a network approach?
  • 8. Data: Overview ‣ Criminal event data ‣ Case numbers ‣ Suspects, arrestees, and victims: Unique identifiers ‣ Approximately three years of coverage ‣ 2011 into 2014 ‣ Albuquerque, New Mexico
  • 9. Albuquerque ‣ Population size ‣ Mobility ‣ City borders & Law enforcement jurisdiction
  • 10.
  • 11.
  • 12. Data at a Glance: Cases Records (case/person combination): 155,906 ‣ Cases: 120,675 ‣ Single offender: 45,348 ‣ Multiple offenders: 4,150
  • 13. Data at a Glance: People Unique person identifiers: 120,345 ‣ Offenders (suspects/arrestees): 40,858 ‣ Multiple cases: 8,441 ‣ Victims: 86,677 ‣ Both offender and victim: 7,190
  • 14. Violent Offenses: Examples Battery/Aggravated battery/Aggravated assault ‣ 8,946 cases Robbery/Commercial armed robbery/Auto car jacking ‣ 552 cases Forcible rape/Attempted rape/Sexual assault with an object ‣ 490 cases Murder and nonnegligent manslaughter/Justifiable homicide ‣ 83 cases
  • 15. Building the Network Offenders: Linked through crimes ‣ One-mode projection from two-mode data ‣ Assumption: Co-offending signifies social connection ‣ Case removal: > 10 offenders ‣ Case removal: Individual is both offender and victim ‣ Time dimension collapsed: Cross-sectional
  • 16. Offender Network: Offenders Offenders: 40,499 ‣ Isolates: 32,637 ‣ Connected offenders: 7,862
  • 17. Offender Network: Ties Ties: 5,990 ‣ Average ties: 0.30 ‣ Average ties, excluding isolates: 1.52 ‣ Degree distribution: 1 2 3 4 5 6 7 8 - 18 5,476 1,444 534 219 81 67 27 14
  • 18. Offender Network: Groups Components, excluding isolates: 3,151 • Average component size, excluding isolates: 2.50 • Component distribution: 2 3 4 5 6 7 8 9 - 53 2,364 488 151 54 34 22 18 20
  • 19.
  • 20. How are different offender-types connected? Do victims of violence have ties to violent offenders? ‣ Do links within offending network suggest “spread”?
  • 21. How are different offender-types connected? Non-victim Victim Non-violent offender Non-violent offender, non-victim1 Non-violent offender, victim3 Violent offender Violent offender, non-victim2 Violent offender, victim4
  • 22. Non-violent offender, non-victim1 Violent offender, non-victim2 Non-violent offender, victim3 Violent offender, victim4 Non-violent offender, non-victim1 001001 001102 001013 001114 Violent offender, non-victim2 102001 102102 102013 102114 Non-violent offender, victim3 013001 013102 013013 013114 Violent offender, victim4 114001 114102 114013 114114
  • 23. Non-violent offender, non-victim1 Violent offender, non-victim2 Non-violent offender, victim3 Violent offender, victim4 Non-violent offender, non-victim1 0 Violent offender, non-victim2 0 0 Non-violent offender, victim3 0 013102 0 Violent offender, victim4 0 114102 114013 114114
  • 24.
  • 25.
  • 26. Exponential Random Graph Models Y: Random variable for state of network g(y): Vector of network statistics for model 𝜃: Vector of parameters k: Normalizing constant Conditional log-odds of a single tie between two actors: 𝑝 𝑌 = 𝑦 = 𝑒𝑥𝑝(𝜃′ 𝑔 𝑦 ) 𝑘 𝜃 𝑙𝑜𝑔𝑖𝑡(𝑌𝑖𝑗 = 1|𝑦𝑖𝑗 𝑐 ) = 𝜃′𝛿(𝑦𝑖𝑗)
  • 27. Exponential Random Graph Models Parameter Estimate Std. Error Edges -9.891*** 0.032 Isolates 1.695*** 0.027 Actor covariate: Number offenses 0.159*** 0.004 Attributes mixes: Offender type Non-violent offender, victim3 x Violent offender, victim4 0.205 0.147 Violent offender, non-victim2 x Non-violent offender, victim3 -0.626*** 0.111 Violent offender, non-victim2 x Violent offender, victim4 0.617*** 0.070 Violent offender, victim4 x Violent offender, victim4 1.138*** 0.146
  • 28. Non-violent offender, non-victim1 Violent offender, non-victim2 Non-violent offender, victim3 Violent offender, victim4 Non-violent offender, non-victim1 0 Violent offender, non-victim2 0 0 Non-violent offender, victim3 0 — 0 Violent offender, victim4 0 + n.s. +
  • 29. Conclusions 1) Presence of offender network ‣ Ties: Sparse but not insignificant 2) Clustering of violence within network ‣ Violent offenders and victim ties: Victims are violent ‣ “Selection” vs. “Spread”
  • 30. Next Steps 1) Continuing work: ERGMs ‣ Model specification & Goodness of fit 2) Pilot project: Future directions ‣ Projection of crime network 3) Larger project feasibility ‣ Current mood: “Cautiously optimistic”