Over the last few years, Predictive Policing has become more common in police departments around the world. With the rising interest in crime forecasting tools, important questions concerning ethics, privacy and fairness have been raised. We know that there are some misconceptions when it comes to the topic, and we want to dispel some of the common myths about Predictive Policing.
We invite you to join us as we walk through 7 Misconceptions of Predictive Policing. In this webinar, we aim to discuss some of the charged rhetoric and beliefs that surround the term. Also, we will highlight the some of the diverse crime modeling concepts that are used to make robust, predictions when forecasting crime.
This document presents a preview of the new version of HunchLab with a focus on geographic modeling. HunchLab 2.0 allows police departments to prioritize resource deployments by using predictive analytics that take into account many data sets and reflect the priorities of the police department. The webinar was recorded on September 25th, 2013.
Forecasting Space-Time Events - Strata + Hadoop World 2015 San JoseAzavea
This presentation uses the speaker’s experience in building a crime forecasting package to outline some tools and techniques useful in modeling space-time event data. While the case study focuses on modeling crime, the techniques and tools presented are applicable to a broad selection of domains.
This presentation was given at Strata + Hadoop World 2015 in San Jose by Jeremy Heffner.
PredPol: How Predictive Policing WorksPredPol, Inc
PredPol’s cloud-based predictive policing software enables law enforcement agencies to better prevent crime in their communities by generating predictions on the places and times that future crimes are most likely to occur.
PredPol’s technology has been helping law enforcement agencies to dramatically reduce crime in jurisdictions of all types and sizes, across the U.S. and overseas. Over the past year, Atlanta and Los Angeles have reduced specific crimes in targeted areas at rates ranging from nearly 20% to over 40%. Smaller jurisdictions, such as Norcross, Georgia, have seen nearly a 30% reduction in burglaries and robberies; in Alhambra, California, car burglaries have dropped 20% since the software technology was deployed.
Using advanced mathematics and computer learning, PredPol’s algorithms predict many types of crime, including property crimes, drug incidents, gang activity, and gun violence as well as traffic accidents.
Only three pieces of data are used to make predictions – type of crime, place of crime, and time of crime. No personal data is utilized in making these predictions.
Crime analysts and command staff using PredPol are 100% more effective than they are with traditional hotspot mapping at predicting where and when crimes are likely to occur. That means police have twice as many opportunities to deter and reduce crime.
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load ForecastingAzavea
http://www.azavea.com/hunchlab
This is a rather technical dive into the near repeat pattern analysis and load forecasting features that we've built into HunchLab. Both of these features are aimed at helping a law enforcement agency to better predict risk levels across their jurisdictions and allocate resources according. While no application of predictive analytics will be perfect, forecasting risk based on models of the past can help officers and analysts to anticipate the appropriate next steps.
Near repeat pattern analysis helps officers quantify the risk that arises from multiple incidents happening close to one another in space and time. What we are quantifying is how the fact that your neighbor's house is burgled raises your risk of a burglary in the coming days and weeks.
With load forecasting we are looking at cyclical temporal patterns in incidents. How does the time of year, time of day, and day of week change the levels of crime incidents that we should expect across a jurisdiction? By modeling these cyclical patterns we can project crime levels into the future, helping law enforcement agencies to allocate resources appropriately as well as better manage organizational accountability.
Predictive Policing on Gun Violence Using Open DataPredPol, Inc
This presentation is an abstract of a 2013 whitepaper published by PredPol.
PredPol delivers the same predictive accuracy for gun violence using unique mathematical methods. A study of Chicago data shows that PredPol successfully predicts 50% of gun homicides by flagging in real-time only 10.3% of city locations. Knowing where and when gun homicides are most likely to occur empowers law enforcement to use their knowledge, skills and experience to disrupt gun crime before it happens.
The study uses open government data from Chicago and predictive crime analysis.
For the full whitepaper, visit predpol.com & request information.
This document presents a preview of the new version of HunchLab with a focus on geographic modeling. HunchLab 2.0 allows police departments to prioritize resource deployments by using predictive analytics that take into account many data sets and reflect the priorities of the police department. The webinar was recorded on September 25th, 2013.
Forecasting Space-Time Events - Strata + Hadoop World 2015 San JoseAzavea
This presentation uses the speaker’s experience in building a crime forecasting package to outline some tools and techniques useful in modeling space-time event data. While the case study focuses on modeling crime, the techniques and tools presented are applicable to a broad selection of domains.
This presentation was given at Strata + Hadoop World 2015 in San Jose by Jeremy Heffner.
PredPol: How Predictive Policing WorksPredPol, Inc
PredPol’s cloud-based predictive policing software enables law enforcement agencies to better prevent crime in their communities by generating predictions on the places and times that future crimes are most likely to occur.
PredPol’s technology has been helping law enforcement agencies to dramatically reduce crime in jurisdictions of all types and sizes, across the U.S. and overseas. Over the past year, Atlanta and Los Angeles have reduced specific crimes in targeted areas at rates ranging from nearly 20% to over 40%. Smaller jurisdictions, such as Norcross, Georgia, have seen nearly a 30% reduction in burglaries and robberies; in Alhambra, California, car burglaries have dropped 20% since the software technology was deployed.
Using advanced mathematics and computer learning, PredPol’s algorithms predict many types of crime, including property crimes, drug incidents, gang activity, and gun violence as well as traffic accidents.
Only three pieces of data are used to make predictions – type of crime, place of crime, and time of crime. No personal data is utilized in making these predictions.
Crime analysts and command staff using PredPol are 100% more effective than they are with traditional hotspot mapping at predicting where and when crimes are likely to occur. That means police have twice as many opportunities to deter and reduce crime.
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load ForecastingAzavea
http://www.azavea.com/hunchlab
This is a rather technical dive into the near repeat pattern analysis and load forecasting features that we've built into HunchLab. Both of these features are aimed at helping a law enforcement agency to better predict risk levels across their jurisdictions and allocate resources according. While no application of predictive analytics will be perfect, forecasting risk based on models of the past can help officers and analysts to anticipate the appropriate next steps.
Near repeat pattern analysis helps officers quantify the risk that arises from multiple incidents happening close to one another in space and time. What we are quantifying is how the fact that your neighbor's house is burgled raises your risk of a burglary in the coming days and weeks.
With load forecasting we are looking at cyclical temporal patterns in incidents. How does the time of year, time of day, and day of week change the levels of crime incidents that we should expect across a jurisdiction? By modeling these cyclical patterns we can project crime levels into the future, helping law enforcement agencies to allocate resources appropriately as well as better manage organizational accountability.
Predictive Policing on Gun Violence Using Open DataPredPol, Inc
This presentation is an abstract of a 2013 whitepaper published by PredPol.
PredPol delivers the same predictive accuracy for gun violence using unique mathematical methods. A study of Chicago data shows that PredPol successfully predicts 50% of gun homicides by flagging in real-time only 10.3% of city locations. Knowing where and when gun homicides are most likely to occur empowers law enforcement to use their knowledge, skills and experience to disrupt gun crime before it happens.
The study uses open government data from Chicago and predictive crime analysis.
For the full whitepaper, visit predpol.com & request information.
As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable. Same is true for the crimes happening in a geographical area.
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...Tarun Amarnath
Throughout the world, people look to San Francisco as a hub for technology; however, this hides a hidden undercurrent of crime in the City by the Bay. My experiment uses Azure ML and Python to predict without bias the category of crime likeliest to occur at a certain time and location in San Francisco.
This presentation covers the requirements to get started with HunchLab 2.0's predictive policing system. It starts discussing technical requirements (security, authentication) and then proceeds to discuss guidelines for configuring meaningful predictive models of crime. The presentation concludes with information about related geographic and temporal datasets that are useful in forecasting crime with recommendations on how to prioritize data sets to use in HunchLab.
This paper focuses on finding spatial and temporal criminal hotspots. It analyses two different real-world crimes datasets for Denver, CO and Los Angeles, CA and provides a comparison between the two datasets through a statistical analysis supported by several graphs. Then, it clarifies how we conducted Apriori algorithm to produce interesting frequent patterns for criminal hotspots. In addition, the paper shows how we used Decision Tree classifier and Naïve Bayesian classifier in order to predict potential crime types. To further analyse crimes’ datasets, the paper introduces an analysis study by combining our findings of Denver crimes’ dataset with its demographics information in order to capture the factors that might affect the safety of neighborhoods. The results of this solution could be used to raise people’s awareness regarding the dangerous locations and to help agencies to predict future crimes in a specific location within
a particular time.
Anecdotes about real life usage of Analytics - research done on Google, hence no claims on accuracy. Please use this as a directional insights into the applications and benefits.
Presentation of the paper Event Recommendation in Event-based Social Networks at the 1st International Workshop on Social Personalisation (SP 2014) co-located with the 25th ACM Conference on Hypertext and Social Media
Changing the pattern of unrest: Social media and social networks in the UK riotsBodyspacesociety Blog
Sarabi, Yasaman, Tubaro, Paola and Antonio A. Casilli "Changing the pattern of unrest: The role of social media and social networks in the UK riots", présentation at the 9th UKSNA (UK Social Networks Analysis) Conference, London 28 June 2013. For more on the ICCU project: https://iccu.wikispaces.com/
Crime Analysis based on Historical and Transportation DataValerii Klymchuk
Contains experimental results based on real crime data from an urban city. Our set of statistics reveals seasonality in crime patterns to accompany predictive machine learning models assessing the risks of crime. Moreover, this work provides a discussion on implementation, design for a prototype of cloud based crime analytics dashboard.
Abstract : Crime prediction is a topic of significant research across the fields of criminology, data mining, city planning, law enforcement, and political science. Crime patterns exist on a spatial level; these patterns can be grouped geographically by physical location, and analyzed contextually based on the region
in which crime occurs. This paper proposes a mechanism to parameterize street-level crime, localize crime hotspots, identify correlations between spatiotemporal crime patterns and social trends, and analyze the resulting data for the purposes of knowledge discovery and anomaly detection. The subject of this study is the county of Merseyside in the United Kingdom, over a span of 21 months beginning in December 2010 (monthly) through August 2012. Several types of crime are analyzed in this dataset, including Burglary and Antisocial Behavior. Through this analysis, several interesting findings are drawn about crime in Merseyside, including: hotspots with steadily increasing crime levels, hotspots with unstable crime levels, synchronous changes in crime trends throughout Merseyside as a whole, individual months in which certain hotspots behaved anomalously, and a strong correlation between crime hotspot locations and borough/postal code locations. We believe that this type of statistical and correlative analysis of crime patterns will help law enforcement agencies predict criminal activity, allocate resources, and promote community awareness to reduce overall crime rates.
For more information, please visit: http://people.cs.vt.edu/parang/ or contact parang at firstname at cs vt edu
Growing Your Urban Forest: Using the OpenTreeMap Bulk UploaderAzavea
The "Growing Your Urban Forest: Using the OpenTreeMap Bulk Uploader" webinar was held on April 16, 2015. These slides provide an overview of that webinar.
OpenTreeMap is a platform that enables individuals and organizations to map and inventory their urban forest. This webinar provides an overview of OpenTreeMap's Green Infrastructure module and was given by Azavea on November 11, 2015. For more information on OpenTreeMap visit www.opentreemap.org or email us at opentreemap@azavea.com.
As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable. Same is true for the crimes happening in a geographical area.
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...Tarun Amarnath
Throughout the world, people look to San Francisco as a hub for technology; however, this hides a hidden undercurrent of crime in the City by the Bay. My experiment uses Azure ML and Python to predict without bias the category of crime likeliest to occur at a certain time and location in San Francisco.
This presentation covers the requirements to get started with HunchLab 2.0's predictive policing system. It starts discussing technical requirements (security, authentication) and then proceeds to discuss guidelines for configuring meaningful predictive models of crime. The presentation concludes with information about related geographic and temporal datasets that are useful in forecasting crime with recommendations on how to prioritize data sets to use in HunchLab.
This paper focuses on finding spatial and temporal criminal hotspots. It analyses two different real-world crimes datasets for Denver, CO and Los Angeles, CA and provides a comparison between the two datasets through a statistical analysis supported by several graphs. Then, it clarifies how we conducted Apriori algorithm to produce interesting frequent patterns for criminal hotspots. In addition, the paper shows how we used Decision Tree classifier and Naïve Bayesian classifier in order to predict potential crime types. To further analyse crimes’ datasets, the paper introduces an analysis study by combining our findings of Denver crimes’ dataset with its demographics information in order to capture the factors that might affect the safety of neighborhoods. The results of this solution could be used to raise people’s awareness regarding the dangerous locations and to help agencies to predict future crimes in a specific location within
a particular time.
Anecdotes about real life usage of Analytics - research done on Google, hence no claims on accuracy. Please use this as a directional insights into the applications and benefits.
Presentation of the paper Event Recommendation in Event-based Social Networks at the 1st International Workshop on Social Personalisation (SP 2014) co-located with the 25th ACM Conference on Hypertext and Social Media
Changing the pattern of unrest: Social media and social networks in the UK riotsBodyspacesociety Blog
Sarabi, Yasaman, Tubaro, Paola and Antonio A. Casilli "Changing the pattern of unrest: The role of social media and social networks in the UK riots", présentation at the 9th UKSNA (UK Social Networks Analysis) Conference, London 28 June 2013. For more on the ICCU project: https://iccu.wikispaces.com/
Crime Analysis based on Historical and Transportation DataValerii Klymchuk
Contains experimental results based on real crime data from an urban city. Our set of statistics reveals seasonality in crime patterns to accompany predictive machine learning models assessing the risks of crime. Moreover, this work provides a discussion on implementation, design for a prototype of cloud based crime analytics dashboard.
Abstract : Crime prediction is a topic of significant research across the fields of criminology, data mining, city planning, law enforcement, and political science. Crime patterns exist on a spatial level; these patterns can be grouped geographically by physical location, and analyzed contextually based on the region
in which crime occurs. This paper proposes a mechanism to parameterize street-level crime, localize crime hotspots, identify correlations between spatiotemporal crime patterns and social trends, and analyze the resulting data for the purposes of knowledge discovery and anomaly detection. The subject of this study is the county of Merseyside in the United Kingdom, over a span of 21 months beginning in December 2010 (monthly) through August 2012. Several types of crime are analyzed in this dataset, including Burglary and Antisocial Behavior. Through this analysis, several interesting findings are drawn about crime in Merseyside, including: hotspots with steadily increasing crime levels, hotspots with unstable crime levels, synchronous changes in crime trends throughout Merseyside as a whole, individual months in which certain hotspots behaved anomalously, and a strong correlation between crime hotspot locations and borough/postal code locations. We believe that this type of statistical and correlative analysis of crime patterns will help law enforcement agencies predict criminal activity, allocate resources, and promote community awareness to reduce overall crime rates.
For more information, please visit: http://people.cs.vt.edu/parang/ or contact parang at firstname at cs vt edu
Growing Your Urban Forest: Using the OpenTreeMap Bulk UploaderAzavea
The "Growing Your Urban Forest: Using the OpenTreeMap Bulk Uploader" webinar was held on April 16, 2015. These slides provide an overview of that webinar.
OpenTreeMap is a platform that enables individuals and organizations to map and inventory their urban forest. This webinar provides an overview of OpenTreeMap's Green Infrastructure module and was given by Azavea on November 11, 2015. For more information on OpenTreeMap visit www.opentreemap.org or email us at opentreemap@azavea.com.
Five Technology Trends Every Nonprofit Needs to KnowAzavea
Are you tired of hearing about big data, social media, web 2.0, and other buzzwords? This session will introduce five emerging technology trends that will fundamentally impact the independent sector. Join us and learn how to incorporate them into your current plans to better reach your donors, engage your constituents, and maximize your impact.
Using New Tools to Analyze and Plan Your Urban Forest Azavea
Planting locations are often determined by organization goals, available funding, practical logistics that influence the number of trees you can plant and where you can plant them, and dozens of other factors. With the new toolkit from OpenTreeMap you can use existing sociodemographic and land-use data to make more informed planting decisions, and estimate the future environmental and economic benefits of your trees.
Using Open Data and Citizen Science to Promote Citizen Engagement with Green ...Azavea
Presentation given at the Green Infrastructure and Water Management in Growing Metropolitan Areas conference on January 15, 2014 at the Patel College of Global Sustainability at the University of South Florida, Tampa, Florida.
Is it a Package or a Wrapper? Designing, Documenting, and Distributing a Pyth...Azavea
Andrew Thompson delivered this talk at the January 2014 joint meeting of the PhillyPUG Python User's Group and the GeoPhilly GIS Meetup group. Topics covered include Rest APIs, API wrappers, Python documentation tools, and Python module packaging practices and the Python Package Index.
Intelligence Led Policing for Police Decision MakersDeborah Osborne
Intelligence-Led Policing for Decision-Makers Webinar
Audio is at http://www.blogtalkradio.com/Deborah-Osborne/2009/09/23/Intelligence-Led-Policing-for-Decision-Makers-Webinar
This webinar, designed for law enforcement managers, covers the following topics:
* Intelligence: what it is, what it is not, and what it can be
* The role of the decision-maker in the intelligence cycle
* Defining Intelligence-Led Policing and the 3 i's cycle
* The 7 stages of Intelligence-Led Policing
* Resources for learning more about Intelligence-Led Policing
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxaudeleypearl
Mr. Friend is a
crime analyst
with the Santa
Cruz, California,
Police
Department.
Predictive Policing: Using Technology to Reduce Crime
By Zach Friend, M.P.P.
4/9/2013
Nationwide law enforcement agencies face the problem
of doing more with less. Departments slash budgets
and implement furloughs, while management struggles
to meet the public safety needs of the community. The
Santa Cruz, California, Police Department handles the
same issues with increasing property crimes and
service calls and diminishing staff. Unable to hire more
officers, the department searched for a nontraditional
solution.
In late 2010 researchers published a paper that the
department believed might hold the answer. They
proposed that it was possible to predict certain crimes,
much like scientists forecast earthquake aftershocks.
An “aftercrime” often follows an initial crime. The time and location of previous criminal activity helps to
determine future offenses. These researchers developed an algorithm (mathematical procedure) that
calculates future crime locations.1
Equalizing Resources
The Santa Cruz Police Department has 94 sworn officers and serves a population of 60,000. A
university, amusement park, and beach push the seasonal population to 150,000. Department personnel
contacted a Santa Clara University professor to apply the algorithm, hoping that leveraging technology
would improve their efforts. The police chief indicated that the department could not hire more officers.
He felt that the program could allocate dwindling resources more efficiently.
Santa Cruz police envisioned deploying officers by shift to the most targeted locations in the city. The
predictive policing model helped to alert officers to targeted locations in real time, a significant
improvement over traditional tactics.
Making it Work
The algorithm is a culmination of anthropological and criminological behavior research. It uses complex
mathematics to estimate crime and predict future hot spots. Researchers based these studies on
In Depth
Featured Articles
- IAFIS Identifies Suspect from 1978 Murder Case
- Predictive Policing: Using Technology to Reduce
Crime
- Legal Digest Part 1 - Part 2
Search Warrant Execution: When Does Detention Rise to
Custody?
- Perspective
Public Safety Consolidation: Does it Make Sense?
- Leadership Spotlight
Leadership Lessons from Home
Archive
- Web and Print
Departments
- Bulletin Notes - Bulletin Honors
- ViCAP Alerts - Unusual Weapons
- Bulletin Reports
Topics in the News
See previous LEB content on:
- Hostage Situations - Crisis Management
- School Violence - Psychopathy
About LEB
- History - Author Guidelines (pdf)
- Editorial Staff - Editorial Release Form (pdf)
Patch Call
Known locally as the
“Gateway to the Summit,”
which references the city’s
proximity to the Bechtel Family
National Scout Reserve. More
The patch of the Miamisburg,
Ohio, Police Department
prominently displays the city
seal surroun.
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxroushhsiu
Mr. Friend is a
crime analyst
with the Santa
Cruz, California,
Police
Department.
Predictive Policing: Using Technology to Reduce Crime
By Zach Friend, M.P.P.
4/9/2013
Nationwide law enforcement agencies face the problem
of doing more with less. Departments slash budgets
and implement furloughs, while management struggles
to meet the public safety needs of the community. The
Santa Cruz, California, Police Department handles the
same issues with increasing property crimes and
service calls and diminishing staff. Unable to hire more
officers, the department searched for a nontraditional
solution.
In late 2010 researchers published a paper that the
department believed might hold the answer. They
proposed that it was possible to predict certain crimes,
much like scientists forecast earthquake aftershocks.
An “aftercrime” often follows an initial crime. The time and location of previous criminal activity helps to
determine future offenses. These researchers developed an algorithm (mathematical procedure) that
calculates future crime locations.1
Equalizing Resources
The Santa Cruz Police Department has 94 sworn officers and serves a population of 60,000. A
university, amusement park, and beach push the seasonal population to 150,000. Department personnel
contacted a Santa Clara University professor to apply the algorithm, hoping that leveraging technology
would improve their efforts. The police chief indicated that the department could not hire more officers.
He felt that the program could allocate dwindling resources more efficiently.
Santa Cruz police envisioned deploying officers by shift to the most targeted locations in the city. The
predictive policing model helped to alert officers to targeted locations in real time, a significant
improvement over traditional tactics.
Making it Work
The algorithm is a culmination of anthropological and criminological behavior research. It uses complex
mathematics to estimate crime and predict future hot spots. Researchers based these studies on
In Depth
Featured Articles
- IAFIS Identifies Suspect from 1978 Murder Case
- Predictive Policing: Using Technology to Reduce
Crime
- Legal Digest Part 1 - Part 2
Search Warrant Execution: When Does Detention Rise to
Custody?
- Perspective
Public Safety Consolidation: Does it Make Sense?
- Leadership Spotlight
Leadership Lessons from Home
Archive
- Web and Print
Departments
- Bulletin Notes - Bulletin Honors
- ViCAP Alerts - Unusual Weapons
- Bulletin Reports
Topics in the News
See previous LEB content on:
- Hostage Situations - Crisis Management
- School Violence - Psychopathy
About LEB
- History - Author Guidelines (pdf)
- Editorial Staff - Editorial Release Form (pdf)
Patch Call
Known locally as the
“Gateway to the Summit,”
which references the city’s
proximity to the Bechtel Family
National Scout Reserve. More
The patch of the Miamisburg,
Ohio, Police Department
prominently displays the city
seal surroun ...
Advanced Search February 2015Back to Archives B.docxdaniahendric
Advanced Search
February 2015
Back to Archives | Back to September 2010 Contents
Proactive Patrolling through the Use of Patrol Scripts
By David A. Rivero, Chief of Police, University of Miami Police Department, Coral Gables, Florida; and John P.
Pepper, Crime Prevention and Emergency Management Coordinator, University of Miami Police Department,
Coral Gables, Florida
Click to view the digital edition.
atrol has been, is, and will continue to be the backbone of college and local policing. Response to
emergency and nonemergency calls to patrol officers for service is a primary component of policing or,
more specifically, reactive policing. Most law enforcement commanders would say they try to eliminate the need
for their patrol officers to be reactive through the institution of various proactive patrol initiatives. It’s a valid
concept in theory and in proven practice: prevent the crimes before they happen so reactive, after-the-fact
response becomes unnecessary. The result is fewer persons victimized, less financial and personal loss, less
overall crime, and more police recognition and appreciation. Everyone wins.
Though many college and local law enforcement agencies are often busy with reactive call response, most
agencies would cite that, at any given time, there is at least one officer available and not assigned to any call.
The question then becomes how to best utilize these limited available patrol resources to proactively prevent
future reactive responses.
Random patrol has long been an accepted allocation of these available patrol resources. The University of
Miami in Coral Gables, Florida, sought a better and more effective methodology for preventing crime that is
focused and targeted at the times and locations where crimes are likely to occur.
Crime is often cited as unpredictable. To some extent, it is, but to some extent, it is not. It is basically impossible
to know exactly when and where a specific crime is going to occur without good intelligence. It is, however,
possible to identify general locations and corresponding times when crimes may be more likely to occur. Some
law enforcement agencies have recognized this through crime analysis and crime mapping techniques. At
certain times, in certain areas, and under certain conditions, crime will occur at an above-average rate; often,
such situational convergences are referred to as “hot spots.” Some agencies use this information to direct
available patrol resources to hot spots during the times of high crime incidence. Specific planned events also
recognized the need for additional attention from current patrolling officers, as more people means more
potential for crimes. Often, crime analysis data and event scheduling data lead to the issuance of general be-on-
the-lookout (BOLO) notices and watch orders for regular on-duty officers. These are effective guidance tools. At
the University of Miami, it was decided to institutionalize daily guidance to the officers thro ...
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.Francesco D'Orazio
"Big data" has been around for a few years now but for every hundred people talking about it there’s probably only one actually doing it. As a result Big Data has become the preferred vehicle for inflated expectations and misguided strategy.
As always, language holds the key and the seed of the issue is reflected in the expression itself. "Big Data" is not so much about a quality of the data or the tools to mine it, it’s about a new approach to product, policy or business strategy design. And that’s way harder and trickier to implement than any new technology stack.
In this talk I look at where Big Data is going, what are the real opportunities, limitations and dangers and what can we do to stop talking about it and start doing it today.
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech onePulsar Platform
"Big data" has been around for a few years now but for every hundred people talking about it there’s probably only one actually doing it. As a result Big Data has become the preferred vehicle for inflated expectations and misguided strategy.
As always, the seed of the issue is in the expression itself. Big Data is not so much about a quality of the data or the tools to mine it, it’s about a new approach to product, policy or business strategy design. And that’s way harder and trickier to implement than any new technology stack.
In this talk we look at where Big Data is going, what are the real opportunities, limitations and dangers and what can we do to stop talking about it and start doing it today.
Applying advanced analytic techniques to enable rapid real-time enterprise threat intelligence and awareness. This presentation looks at how data + algorithms can help enterprises improve their overall threat posture.
Law enforcement can adopt this technology to essentially walk into a search warrant anywhere there is a gig connection and have a remote expert preview/capture data from the machine in question. Imagine having a "Forensic Operations Center" for local/state/federal law enforcement staffed with experts who can respond to multiple agencies at a given moment. Jonathan Rajewski, Champlain College
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
Most of us learned cybersecurity practices based on the application of controls that were part of a framework. Once the framework was implemented then the controls didn’t change often. It’s time to adjust our thinking and recognize that on-going adjustment of controls may be a better indicator of cyber-maturity than adherence to any framework.
(Source: RSA USA 2016-San Francisco)
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech onePulsar
"Big data" has been around for a few years now but for every hundred people talking about it there’s probably only one actually doing it. As a result Big Data has become the preferred vehicle for inflated expectations and misguided strategy.
As always, the seed of the issue is in the expression itself. Big Data is not so much about a quality of the data or the tools to mine it, it’s about a new approach to product, policy or business strategy design. And that’s way harder and trickier to implement than any new technology stack.
In this talk we look at where Big Data is going, what are the real opportunities, limitations and dangers and what can we do to stop talking about it and start doing it today.
Similar to 7 misconceptions about predictive policing webinar (20)
November 12, 2014 Webinar: Hackers, Beer Geeks, and Arborly Love - Reaching o...Azavea
In this webinar based on our 2014 Partners in Community Forestry conference presentation, Andrew Thompson (OpenTreeMap), Erica Smith Fichman (TreePhilly), and Lee Mueller (Friends of Grand Rapids Parks) talked about three outreach events our organizations have done in urban forestry, and discussed tips and tricks your urban forestry group can use with your events and marketing to expand to new audiences. This webinar covered:
- A general framework for organizing events and campaigns geared toward exciting audiences and communities with little experience with urban forestry
- Pointers, tips, caveats, and potential downfalls to keep in mind to organize a successful event
- "Lessons learned" from three specific case studies organized by a government, nonprofit, and commercial company
PhillyHistory.org - Tracking Metrics for a Digital ProjectAzavea
Presentation given at the Delaware Valley Archivists Group meeting on March 21, 2013. The slides provide an overview of how visitor statistics and user engagement are measured on PhillyHistory.org and how similar tracking may be done on other digital history projects.
Data Philly Meetup for 2/19/2013 on geospatial data science with crime data and applications of GeoTrellis to solve challenges related to large data sets.
Modeling Count-based Raster Data with ArcGIS and RAzavea
This presentation outlines the conceptual framework for building regression models of event counts where the unit of analysis is small. It explains how ArcGIS for Desktop can be used to build raster data sets that are modeled as generalized linear models within the open source R package.
This overview of OpenTreeMap, software for collaborative, geography enabled urban tree inventory, was given as part of the Alliance for Community Trees webcast training on January 17, 2013 - Tree Technology - Part V: Urban Forest Mapping. For more information, visit www.opentreemap.org.
How to Conquer your Post-Election Data Chaos with the Cicero APIAzavea
This presentation has minimal words and lots of visuals (like any good presentation, though less interesting on slideshare!). If you would like to see the slides in context with audio, watch the Youtube video at: http://www.youtube.com/watch?v=B03WDe41uQg
Held on December 14, 2012, this webinar takes a look at five "data chaos" factors that many nonprofits and political advocacy groups are facing after the 2012 US elections. For each, we discuss ways that organizations can mitigate these challenges through district-matching, spatial analysis, technology, and the Cicero API for address-based elected official contact information.
For more info, visit http://www.azavea.com/cicero
Exploring Data Preparation and Visualization Tools for Urban ForestryAzavea
This webinar was held on December 12, 2012 and provided an overview of free and low-cost tools for cleaning and preparing data and building useful and beautiful data visualizations.
Exploring Mobile Technology with OpenTreeMap MobileAzavea
This webinar was held on September 25, 2012 and provided an overview of the mobile version of OpenTreeMap. We also discussed how smartphones and tablet computers can be used in urban forestry projects.
OpenTreeMap is a web-based system for collaborative, geography-enabled urban tree inventory. The mobile version of OpenTreeMap enables users to search, add, and edit tree information via their iPhones and Android devices.
Exploring Urban Forestry Modeling and Prioritization ToolsAzavea
The Urban Forest Modeling and Prioritization Toolkit is a prototype web-based tool that enables users to generate heat maps identifying key planting locations and then estimate the long-term impacts of trees planted in those locations.
This webinar was held on June 28, 2012 and provides an overview of the research and initial features of the system.
NTEN Webinar - Data Cleaning and Visualization Tools for NonprofitsAzavea
Slides from a webinar we conducted for NTEN that covers tools that nonprofits can use to clean and prepare their datasets and then visualize them via charts, maps, and graphs.
Exploring Community Engagement with OpenTreeMapAzavea
On Tuesday, June 12, we hosted "Exploring Community Engagement with OpenTreeMap," a webinar that provided an introduction to the public engagement features in OpenTreeMap, the open source system for collaborative tree inventory. Kelaine Vargas from Urban Forest Map and Phil Silva from TreeKIT joined us to discuss their experiences with community urban forestry initiatives, particularly in terms of the accuracy of citizen generated data and encouraging long-term engagement in tree care.
Exploring Collaborative Tree Inventory with OpenTreeMapAzavea
OpenTreeMap is an open source, tree data management system that enables organizations to work with the public to map and inventory the urban forest. This webinar provides an overview of OpenTreeMap's features and was given by Azavea on March 8, 2012.
For more info, visit http://www.azavea.com/opentreemap
As we develop our crime analysis software, HunchLab, we are always on the look out for ways of examining and improving data quality as well as new academic research that shows promise to enhance crime analysis.
In this one-hour webinar, we first explain some of the ways we examine data quality when we utilize historic incident datasets for research and analysis and how you can use these techniques in your department. Then, we walk through a series of analytic techniques and practices that can help your department improve your crime analysis processes.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
5. B Corporation
• Civic/Social impact
• Donate share of profits
Research-Driven
• 10% Research Program
• Academic Collaborations
• Open Source
• Open Data
8. Predictive Missions
• Determines high risk areas each shift
• Intelligently allocates patrol resources
• Uses multiple data sets to ‘explain’ patterns
23. “Crime analysts and police departments say the
same thing: The new, predictive maps just
repackage old intelligence. One criminologist called
it “old wine in new bottles.””
– Excerpt from ‘Minority Report’ Is real – And It’s Really
Reporting Minorities on Mic
29. • Crime predictions based on:
– Baseline crime levels
• Similar to traditional hotspot maps
– Near repeat patterns
• Event recency (contagion)
– Risk Terrain Modeling
• Proximity and density of geographic features
• Points, Lines, Polygons (bars, bus stops, etc.)
– Collective Efficacy
• Socioeconomic indicators (poverty, unemployment, etc.)
30. • Crime predictions based on:
– Routine Activity Theory
• Offender: proximity and concentration of known offenders
• Guardianship: police presence (AVL / GPS)
• Targets: measures of exposure (population, parcels, vehicles)
– Temporal cycles
• Seasonality, time of month, day of week, time of day
– Recurring temporal events
• Holidays, sporting events, etc.
– Weather
• Temperature, precipitation
31. We hold back the most recent 90 days of data…
1 Year 3 Years
Several
Months
Warm-up
Variables
Training
Examples
Testing
Examples
32. Cells ranked highest to lowest
0% 100%
Percent of Patrol Area to Capture All Crimes
Average Crime Rank
0%
50%
100%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Percent of Crimes Captured vs. Percent of Patrol Area
33.
34. Example Areas Under ROC Curve
94.5%
Robbery
93.0%
Residential Burglary
95.6%
Gun Crimes
93.8%
DWI
95.3%
Aggravated Assault
--%
Homicide
93.5%
Larceny from Vehicle
91.2%
Vehicle Accidents
91.7%
Trespassing
92.1%
Simple Assault
38. “Miami police say HunchLab is basically an enhanced
version of PredPol, because it adds other relevant
elements to crime data — like weather, social media
and school calendars.”
–Excerpt from Non Fiction: Miami Looking to Adapt ‘Pre-Crime’
Fighting System
39. “Cops are using software programs that use algorithms
to analyze surveillance, GPS coordinates, and crime
data to pinpoint specific areas where, and specific
people who, might at some point commit a crime.”
–Peter Moskowitz, The Future of Policing Is Here, and It’s
Terrifying
41. Data Type Explaination
id Unique event ID
Datetimefrom when the event started
datetimeto when the event ended
class the type of crime
point x, point y geocoded location
reporttime the time the event was reported
address the address of the event
lastupdated when the record was last updated
48. The quality of making judgments that are free
from discrimination. Comes from the Old
English faeger meaning “pleasing, attractive.”
term: fairness
Practices may be discriminatory if they have a
disproportionate adverse impact on members
of a protected class.
term: theory of disparate impact
52. Example Deployment
101 100 2
2 2 50
1 1 1
101 100 2
2 2 50
1 1 1
101 100 2
2 2 50
1 1 1
If deploying to an area increases events,
then we form a feedback loop.
53. Example Deployment
101 100 2
2 2 50
1 1 1
101 100 2
2 2 50
1 1 1
101 100 2
2 2 50
1 1 1
If deploying to an area increases events,
then we form a feedback loop.
Using officer-initiated events to identify areas is a bad idea.
57. Percentage of unreported violent crime
victimizations not reported because the victim
believed the police would not or could not
help doubled from 1994 to 2010
Over 20% of unreported violent victimizations
against persons living in urban areas were not
reported because the victim believed the
police would not or could not help
From 2006 to 2010, the highest percentages of
unreported crime were among household
theft (67%) and rape or sexual assault (65%)
victimizations.
67. “There are widespread fears among civil liberties
advocates that predictive policing will actually
worsen relations between police departments
and black communities.”
—Excerpt from Policing the Future
Source: Whitney Curtis for The Marshall Project
68.
69. “Yet big data invites provocative questions about
whether such predictive tips should factor into the
reasonable suspicion calculus.”
71. “St Louis County Police Officer: “Being in the box alone was not a
good enough reason to stop someone. “Does the data give me
grounds to stop just because they’re walking around? No.”
—Excerpt from Policing the Future,
Maurice Chammah & Mark Hansen, The Marshall Project
73. “By placing your officers in the right place at the
right time, you will reduce crime in your
community.”
—Donald Summers, PredPol CEO in Predictive
Policing: Seeing The Future