SlideShare a Scribd company logo
Crimes Project
ACC637 Winter 2018
Teri Grossheim, Lisa Kimbrough-Carr, Brinda Patel, Keman Wang, Michael Cody
Introduction
This report contains recommendations for scheduling security officers in properties owned by the
client. The goal is to provide appropriate protection against violent and property crimes for the properties
owned in the most cost effective manner. The scope of the analysis covers all major crimes occurring in
several wards during 2001 through 2017 reported to the Chicago Police Department. Crime data was
matched with the Chicago Ward where the client has property in order to understand how crime incidents
correlate with redacted addresses provided. This report contains four sections including an executive
summary, outlined results, and finally recommendations for scheduling security. An appendix at the end
of this report contains raw data used in this analysis.
Executive Summary
These properties present an excellent investment opportunity. After analyzing the past ten years
of data, it has been uncovered cost saving opportunities and strategies for value creation. It appears many
of the properties are located in Wards 27, 3, and 4. Of these three wards, Ward 27 is the highest crime
area . This makes investing in security slightly less complicated, since Ward 27 is of primary focus. It will
1
be important to allocate security there while less frequent security would be needed for wards with fewer
amounts of properties such as Ward 21.
Results
The approach was to examine crime in Chicago for all wards during 2001-2017 to learn the
overall factors associated with Crime in Chicago and then reexamine those factors by ward to understand
the unique conditions affecting areas surrounding the client’s properties. IDEA and Stata software as well
as The City of Chicago Crime Portal were used to analyze data. The factors examined could impact
security scheduling. The first condition examined was crime by month. Crime in Chicago follows a
1
Appendix: Ward / No. of Records
cyclical pattern with the greatest amount occurring between May and September per the graphs from data
provided as well as from the City of Chicago Crime Portal.
​Crimes - 2001 to present – Dashboard 
Crime incidences sharply decreased after 10:00 pm and increased after 8:00 am. However,
homicides peaked from 11:00 pm until 3:00 am. Crime is committed fairly evenly throughout the week
for crime in general. However, Friday through Sunday was the most prevalent time for the violent crimes
of homicide, criminal sexual assault and battery.
1
Crime is committed fairly evenly throughout the week for crime in general. However, Friday through
Sunday was the most prevalent time for the violent crimes of homicide, criminal sexual assault and
battery.
Crime location was identified based on building type, street parking lot as well as locations within
buildings such as porch, stairwell and lobby. The most prevalent location of all crime in Chicago is street
at 26.64%. Other areas of concern to the client are elevator - .39%, parking lot – 2.87%, sidewalk –
9.97%, apartment – 10% and alley. These locations will be further examined by crime type and ward.
2
High crime wards such as 27. 4, and 3 were given extra focus while reviewing trends over ten- and
five-year periods.
In the overall analysis, a dataset was used containing almost three million observations. The
graphs below provide an overview of this dataset, showing the high crime wards of 27, 4, and 3 over time
2
.
In latter year trends, Wards 2, 3, 28, and 24 revealed high crime incident numbers. While Ward 27
showed consistent data over time Wards 28, 2, and 3 also demonstrated considerable activity. Since Ward
2
​tabulate Ward Year if Ward <=49 (Stata)
3
27 is a focused area for security recommendations, nearby Ward 28 should be included with guard
coverage.
For Wards 1 through 4, the team focused on the five most recent years of data from 2013 through
2017 . The data revealed that out of
3
these four wards, Ward 2 had the highest
crime incidents across this five year
period, peaking in 2017 at 11,420
incidents. Ward 3 had the next highest
rate across the five year period, peaking
at 8,317 in 2013. Wards 1 and 4 had less
incidents across the same five-year
period and 2016 seemed to have the least amount of incidents overall as compared to the other four years.
Next, the team explored the type of crime and amount between the same five-year period.
Crime trends of the same four wards also offered interesting results. Theft and battery were the
two most common crime types between 2013-2017 . Narcotics and assault crimes seem to be the two
4
additional crime types that are common in Wards 1 through 4. While theft is a serious offense, battery
involves physical safety of a person and as a result, it will be included in recommendations for security
personnel coverage, especially in Ward 3. Other crimes of substantial consideration include burglary,
criminal damage, robbery, and motor vehicle theft. Deceptive practice and motor vehicle theft also have
noticeable numbers in the analysis. In addition to battery, assault includes physical safety of a person and
will also be included in the recommendation section for security personnel coverage. Consequently, the
3
​tabulate Ward Year if Ward <= 4 (Stata)
4
​tabulate Primary_Type if Ward==[1,2,3,4] | Year >=2013 (Stata)
4
average time these crimes took place across all four wards were between 1 p.m. - 2 p.m., which will also
be included in security coverage in the final recommendations .
5
When graphing ten-year historical crime data in the city, there is a clear weather pattern
associated with crime. In January and February, crime tends to be relatively low, accelerating in April and
May to a July peak. From July through the end of the year, the graph slopes downward indicating less
crime as the temperature decreases. This proves to be a benefit to your firm as fewer security guards will
be needed in the colder months. Perhaps seasonal staff can help in the summer for a discounted “seasonal
employee” type rate. The weather relationship holds true for our biggest concern, Ward 27.
5
​summarize admithour if Ward==[1,2,3,4] | Year >=2013 (Stata)
5
Ward 27, where most of the properties are located, is important since property crimes are on the
low end of total crimes in the neighborhood according to our graph below of historical crime. Arson
comprises an extremely low percentage of total neighborhood crime, meaning the crime occurring in this
neighborhood is less likely to cause damage,
costing money for repair. However, violent
crime such as battery is quite high in Ward
27 and must be addressed but perhaps is
also presents an opportunity to invest in low
value properties.
Recommendations
There are several recommendations to improve security for these areas and properties. The most
common day for a crime to occur, according to the city’s data, was during the weekend. The investment
firm should consider having a smaller staff during the week and slightly increasing the staff on the
weekends. The staff can be reduced during the weekday during the hours of 4:00 am until 8:00 am.
Devices should be installed to restrict access to stairways. Much of the crime in Chicago as well as in the
area surrounding the client’s property occurs on the street which is outside of the client’s jurisdiction.
The client can install cameras to monitor the perimeter of property and have security perform periodic
perimeter and parking lot patrols from 10:00 pm until 8:00 a.m.
A seasonal, hourly staff which fluctuates in staff by time and day of the week, strategically spread
over the properties’ words in relation to level of crime could drastically reduce costs and make this a
profitable endeavor. Expense analysis is important but also consider future value. Another factor of
interest when determining the expected cost of security is time of day. Certainly security will be needed
24 hours per day, however, we believe you can save money by reducing the number of security guards on
duty in the early morning hours. As shown below, a lower staff may be maintained each day between 5
6
a.m. and 7 a.m. With the data presented in results section, the peak time between 1 p.m. - 2 p.m. should be
considered for security coverage in Wards 2 and 3.
Even more specifically in Wards 27 and 3, there were significant findings regarding the location
of crime incidents. This data provided accurate location information for security personnel utilization. It’s
recommended placing security personnel to patrol the streets, apartment complexes, residential areas, and
sidewalks of Wards 27 and 3 . Perhaps this can be allocated to two different security personnel teams,
6
street (vehicle, foot, bicycle) and then residential areas containing families and apartments, patrolling with
vehicles. Social media has also become popular tools for crime prevention, especially the use of Twitter
and Facebook . It’s recommended either creating new accounts for both of these wards and using
7
hashtags, or another alternative is to leverage the security personnel’s company account and also using
hashtags, such as #ward27 and #ward3. Ward 28 also reflected similar location trends .
8
Given this data, it’s recommended funding security that is at a reasonable price point. It’s
recommended that a seasonal, hourly staff which fluctuates in quantity by time and day of the week,
strategically spread over the properties’ location in relation to level of crime could drastically reduce costs
and make this a profitable endeavor. Expense analysis is also important as well as considering future
value.
6
​tabulate Location_Description if Ward == 27 | Year >=2013
7
​www.nnw.org/publication/social-media-and-crime-prevention
8
​tabulate Location_Description if Ward == 28 | Year >=2013
7
Appendix
8
9
10
Ward 27
Ward 3
11
Ward 28
12

More Related Content

Similar to Crimes Project - Data Mining & Analytics

Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
Heta Parekh
 
report
reportreport
report
Peter Kim
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project report
sarthakkhare3
 
Technical Seminar
Technical SeminarTechnical Seminar
Technical Seminar
nikita kapil
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
Prodapt Solutions
 
georgia-tech-atlanta
georgia-tech-atlantageorgia-tech-atlanta
georgia-tech-atlanta
Peter Kim
 
KF 7032 Big Data And Cloud Computing.docx
KF 7032 Big Data And Cloud Computing.docxKF 7032 Big Data And Cloud Computing.docx
KF 7032 Big Data And Cloud Computing.docx
stirlingvwriters
 
Units 4, 5, 24, 31 task 4 secondary evidence (1)
Units 4, 5, 24, 31   task 4 secondary evidence (1)Units 4, 5, 24, 31   task 4 secondary evidence (1)
Units 4, 5, 24, 31 task 4 secondary evidence (1)
lrosenfeld1
 
Secondary Evidence
Secondary EvidenceSecondary Evidence
Secondary Evidence
MilliesMedia1
 
GIS based Decision Support System for Crime Mapping, Analysis and identify H...
GIS based Decision Support System for Crime Mapping, Analysis  and identify H...GIS based Decision Support System for Crime Mapping, Analysis  and identify H...
GIS based Decision Support System for Crime Mapping, Analysis and identify H...
IJMER
 
DWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of Ireland
DWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of IrelandDWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of Ireland
DWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of Ireland
Shrikant Samarth
 
Crime Analysis at Chicago
Crime Analysis at ChicagoCrime Analysis at Chicago
Crime Analysis at Chicago
Roshik Ganesan
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime Analysis
Rohit Dandona
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysis
Sameer Darekar
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018
Laura Po
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
Jonas Mercier
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
James Fisher
 
Units 4, 5, 24, 31 task 4 secondary evidence
Units 4, 5, 24, 31   task 4 secondary evidenceUnits 4, 5, 24, 31   task 4 secondary evidence
Units 4, 5, 24, 31 task 4 secondary evidence
lrosenfeld1
 
Secondary evidence task 4
Secondary evidence task 4Secondary evidence task 4
Secondary evidence task 4
nikonmedia
 
Secondary evidence
Secondary evidenceSecondary evidence
Secondary evidence
karrass1
 

Similar to Crimes Project - Data Mining & Analytics (20)

Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
report
reportreport
report
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project report
 
Technical Seminar
Technical SeminarTechnical Seminar
Technical Seminar
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
georgia-tech-atlanta
georgia-tech-atlantageorgia-tech-atlanta
georgia-tech-atlanta
 
KF 7032 Big Data And Cloud Computing.docx
KF 7032 Big Data And Cloud Computing.docxKF 7032 Big Data And Cloud Computing.docx
KF 7032 Big Data And Cloud Computing.docx
 
Units 4, 5, 24, 31 task 4 secondary evidence (1)
Units 4, 5, 24, 31   task 4 secondary evidence (1)Units 4, 5, 24, 31   task 4 secondary evidence (1)
Units 4, 5, 24, 31 task 4 secondary evidence (1)
 
Secondary Evidence
Secondary EvidenceSecondary Evidence
Secondary Evidence
 
GIS based Decision Support System for Crime Mapping, Analysis and identify H...
GIS based Decision Support System for Crime Mapping, Analysis  and identify H...GIS based Decision Support System for Crime Mapping, Analysis  and identify H...
GIS based Decision Support System for Crime Mapping, Analysis and identify H...
 
DWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of Ireland
DWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of IrelandDWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of Ireland
DWBI - Criminalytics: Entities affecting the Rate of Crime in Republic of Ireland
 
Crime Analysis at Chicago
Crime Analysis at ChicagoCrime Analysis at Chicago
Crime Analysis at Chicago
 
San Francisco Crime Analysis
San Francisco Crime AnalysisSan Francisco Crime Analysis
San Francisco Crime Analysis
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysis
 
Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018Building an urban theft map by analyzing newspaper - SMAP 2018
Building an urban theft map by analyzing newspaper - SMAP 2018
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
 
Units 4, 5, 24, 31 task 4 secondary evidence
Units 4, 5, 24, 31   task 4 secondary evidenceUnits 4, 5, 24, 31   task 4 secondary evidence
Units 4, 5, 24, 31 task 4 secondary evidence
 
Secondary evidence task 4
Secondary evidence task 4Secondary evidence task 4
Secondary evidence task 4
 
Secondary evidence
Secondary evidenceSecondary evidence
Secondary evidence
 

More from Teri Grossheim

T. Grossheim - Value Curve.pdf
T. Grossheim - Value Curve.pdfT. Grossheim - Value Curve.pdf
T. Grossheim - Value Curve.pdf
Teri Grossheim
 
KMG Cisco Case Competition - IoT Marketing Group.pptx
KMG Cisco Case Competition - IoT Marketing Group.pptxKMG Cisco Case Competition - IoT Marketing Group.pptx
KMG Cisco Case Competition - IoT Marketing Group.pptx
Teri Grossheim
 
T. grossheim perceptual mapping
T. grossheim   perceptual mappingT. grossheim   perceptual mapping
T. grossheim perceptual mapping
Teri Grossheim
 
T. grossheim ethnographic study
T. grossheim   ethnographic studyT. grossheim   ethnographic study
T. grossheim ethnographic study
Teri Grossheim
 
T. grossheim conjoint analysis - final
T. grossheim   conjoint analysis - finalT. grossheim   conjoint analysis - final
T. grossheim conjoint analysis - final
Teri Grossheim
 
Hyatt Hotels Case Study
Hyatt Hotels Case StudyHyatt Hotels Case Study
Hyatt Hotels Case Study
Teri Grossheim
 
Risk & Compliance: Futureproof IT
Risk & Compliance: Futureproof ITRisk & Compliance: Futureproof IT
Risk & Compliance: Futureproof IT
Teri Grossheim
 
Cisco VP Letter of Recommendation
Cisco VP Letter of RecommendationCisco VP Letter of Recommendation
Cisco VP Letter of Recommendation
Teri Grossheim
 
Teri Grossheim - Amazon Presentation
Teri Grossheim - Amazon PresentationTeri Grossheim - Amazon Presentation
Teri Grossheim - Amazon Presentation
Teri Grossheim
 
Vendor Management & AP Audit Report - Data Mining & Analytics
Vendor Management & AP Audit Report - Data Mining & AnalyticsVendor Management & AP Audit Report - Data Mining & Analytics
Vendor Management & AP Audit Report - Data Mining & Analytics
Teri Grossheim
 
'Bing365' Group Case Presentation - Microsoft Competition
'Bing365' Group Case Presentation - Microsoft Competition'Bing365' Group Case Presentation - Microsoft Competition
'Bing365' Group Case Presentation - Microsoft Competition
Teri Grossheim
 
Tips & Tricks for Creative Computing
Tips & Tricks for Creative ComputingTips & Tricks for Creative Computing
Tips & Tricks for Creative Computing
Teri Grossheim
 
BI Practices Overview - Amazon
BI Practices Overview - AmazonBI Practices Overview - Amazon
BI Practices Overview - Amazon
Teri Grossheim
 
Precision Marketing Presentation
Precision Marketing PresentationPrecision Marketing Presentation
Precision Marketing Presentation
Teri Grossheim
 
Consulting Report - Ethnographic Study Techniques
Consulting Report - Ethnographic Study TechniquesConsulting Report - Ethnographic Study Techniques
Consulting Report - Ethnographic Study Techniques
Teri Grossheim
 
Repositioning of Wendy's
Repositioning of Wendy'sRepositioning of Wendy's
Repositioning of Wendy's
Teri Grossheim
 
Consulting Report - Revolution Brewing
Consulting Report - Revolution BrewingConsulting Report - Revolution Brewing
Consulting Report - Revolution Brewing
Teri Grossheim
 
Tools, Frameworks, & Swift for iOS
Tools, Frameworks, & Swift for iOSTools, Frameworks, & Swift for iOS
Tools, Frameworks, & Swift for iOS
Teri Grossheim
 

More from Teri Grossheim (18)

T. Grossheim - Value Curve.pdf
T. Grossheim - Value Curve.pdfT. Grossheim - Value Curve.pdf
T. Grossheim - Value Curve.pdf
 
KMG Cisco Case Competition - IoT Marketing Group.pptx
KMG Cisco Case Competition - IoT Marketing Group.pptxKMG Cisco Case Competition - IoT Marketing Group.pptx
KMG Cisco Case Competition - IoT Marketing Group.pptx
 
T. grossheim perceptual mapping
T. grossheim   perceptual mappingT. grossheim   perceptual mapping
T. grossheim perceptual mapping
 
T. grossheim ethnographic study
T. grossheim   ethnographic studyT. grossheim   ethnographic study
T. grossheim ethnographic study
 
T. grossheim conjoint analysis - final
T. grossheim   conjoint analysis - finalT. grossheim   conjoint analysis - final
T. grossheim conjoint analysis - final
 
Hyatt Hotels Case Study
Hyatt Hotels Case StudyHyatt Hotels Case Study
Hyatt Hotels Case Study
 
Risk & Compliance: Futureproof IT
Risk & Compliance: Futureproof ITRisk & Compliance: Futureproof IT
Risk & Compliance: Futureproof IT
 
Cisco VP Letter of Recommendation
Cisco VP Letter of RecommendationCisco VP Letter of Recommendation
Cisco VP Letter of Recommendation
 
Teri Grossheim - Amazon Presentation
Teri Grossheim - Amazon PresentationTeri Grossheim - Amazon Presentation
Teri Grossheim - Amazon Presentation
 
Vendor Management & AP Audit Report - Data Mining & Analytics
Vendor Management & AP Audit Report - Data Mining & AnalyticsVendor Management & AP Audit Report - Data Mining & Analytics
Vendor Management & AP Audit Report - Data Mining & Analytics
 
'Bing365' Group Case Presentation - Microsoft Competition
'Bing365' Group Case Presentation - Microsoft Competition'Bing365' Group Case Presentation - Microsoft Competition
'Bing365' Group Case Presentation - Microsoft Competition
 
Tips & Tricks for Creative Computing
Tips & Tricks for Creative ComputingTips & Tricks for Creative Computing
Tips & Tricks for Creative Computing
 
BI Practices Overview - Amazon
BI Practices Overview - AmazonBI Practices Overview - Amazon
BI Practices Overview - Amazon
 
Precision Marketing Presentation
Precision Marketing PresentationPrecision Marketing Presentation
Precision Marketing Presentation
 
Consulting Report - Ethnographic Study Techniques
Consulting Report - Ethnographic Study TechniquesConsulting Report - Ethnographic Study Techniques
Consulting Report - Ethnographic Study Techniques
 
Repositioning of Wendy's
Repositioning of Wendy'sRepositioning of Wendy's
Repositioning of Wendy's
 
Consulting Report - Revolution Brewing
Consulting Report - Revolution BrewingConsulting Report - Revolution Brewing
Consulting Report - Revolution Brewing
 
Tools, Frameworks, & Swift for iOS
Tools, Frameworks, & Swift for iOSTools, Frameworks, & Swift for iOS
Tools, Frameworks, & Swift for iOS
 

Recently uploaded

The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
thesiliconleaders
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
onlyfansmanagedau
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Neil Horowitz
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
BBPMedia1
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
HumanResourceDimensi1
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
Profiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdfProfiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdf
TTop Threads
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 

Recently uploaded (20)

The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
Profiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdfProfiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdf
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 

Crimes Project - Data Mining & Analytics

  • 1. Crimes Project ACC637 Winter 2018 Teri Grossheim, Lisa Kimbrough-Carr, Brinda Patel, Keman Wang, Michael Cody Introduction This report contains recommendations for scheduling security officers in properties owned by the client. The goal is to provide appropriate protection against violent and property crimes for the properties owned in the most cost effective manner. The scope of the analysis covers all major crimes occurring in several wards during 2001 through 2017 reported to the Chicago Police Department. Crime data was matched with the Chicago Ward where the client has property in order to understand how crime incidents correlate with redacted addresses provided. This report contains four sections including an executive summary, outlined results, and finally recommendations for scheduling security. An appendix at the end of this report contains raw data used in this analysis. Executive Summary These properties present an excellent investment opportunity. After analyzing the past ten years of data, it has been uncovered cost saving opportunities and strategies for value creation. It appears many of the properties are located in Wards 27, 3, and 4. Of these three wards, Ward 27 is the highest crime area . This makes investing in security slightly less complicated, since Ward 27 is of primary focus. It will 1 be important to allocate security there while less frequent security would be needed for wards with fewer amounts of properties such as Ward 21. Results The approach was to examine crime in Chicago for all wards during 2001-2017 to learn the overall factors associated with Crime in Chicago and then reexamine those factors by ward to understand the unique conditions affecting areas surrounding the client’s properties. IDEA and Stata software as well as The City of Chicago Crime Portal were used to analyze data. The factors examined could impact security scheduling. The first condition examined was crime by month. Crime in Chicago follows a 1 Appendix: Ward / No. of Records
  • 2. cyclical pattern with the greatest amount occurring between May and September per the graphs from data provided as well as from the City of Chicago Crime Portal. ​Crimes - 2001 to present – Dashboard  Crime incidences sharply decreased after 10:00 pm and increased after 8:00 am. However, homicides peaked from 11:00 pm until 3:00 am. Crime is committed fairly evenly throughout the week for crime in general. However, Friday through Sunday was the most prevalent time for the violent crimes of homicide, criminal sexual assault and battery. 1
  • 3. Crime is committed fairly evenly throughout the week for crime in general. However, Friday through Sunday was the most prevalent time for the violent crimes of homicide, criminal sexual assault and battery. Crime location was identified based on building type, street parking lot as well as locations within buildings such as porch, stairwell and lobby. The most prevalent location of all crime in Chicago is street at 26.64%. Other areas of concern to the client are elevator - .39%, parking lot – 2.87%, sidewalk – 9.97%, apartment – 10% and alley. These locations will be further examined by crime type and ward. 2
  • 4. High crime wards such as 27. 4, and 3 were given extra focus while reviewing trends over ten- and five-year periods. In the overall analysis, a dataset was used containing almost three million observations. The graphs below provide an overview of this dataset, showing the high crime wards of 27, 4, and 3 over time 2 . In latter year trends, Wards 2, 3, 28, and 24 revealed high crime incident numbers. While Ward 27 showed consistent data over time Wards 28, 2, and 3 also demonstrated considerable activity. Since Ward 2 ​tabulate Ward Year if Ward <=49 (Stata) 3
  • 5. 27 is a focused area for security recommendations, nearby Ward 28 should be included with guard coverage. For Wards 1 through 4, the team focused on the five most recent years of data from 2013 through 2017 . The data revealed that out of 3 these four wards, Ward 2 had the highest crime incidents across this five year period, peaking in 2017 at 11,420 incidents. Ward 3 had the next highest rate across the five year period, peaking at 8,317 in 2013. Wards 1 and 4 had less incidents across the same five-year period and 2016 seemed to have the least amount of incidents overall as compared to the other four years. Next, the team explored the type of crime and amount between the same five-year period. Crime trends of the same four wards also offered interesting results. Theft and battery were the two most common crime types between 2013-2017 . Narcotics and assault crimes seem to be the two 4 additional crime types that are common in Wards 1 through 4. While theft is a serious offense, battery involves physical safety of a person and as a result, it will be included in recommendations for security personnel coverage, especially in Ward 3. Other crimes of substantial consideration include burglary, criminal damage, robbery, and motor vehicle theft. Deceptive practice and motor vehicle theft also have noticeable numbers in the analysis. In addition to battery, assault includes physical safety of a person and will also be included in the recommendation section for security personnel coverage. Consequently, the 3 ​tabulate Ward Year if Ward <= 4 (Stata) 4 ​tabulate Primary_Type if Ward==[1,2,3,4] | Year >=2013 (Stata) 4
  • 6. average time these crimes took place across all four wards were between 1 p.m. - 2 p.m., which will also be included in security coverage in the final recommendations . 5 When graphing ten-year historical crime data in the city, there is a clear weather pattern associated with crime. In January and February, crime tends to be relatively low, accelerating in April and May to a July peak. From July through the end of the year, the graph slopes downward indicating less crime as the temperature decreases. This proves to be a benefit to your firm as fewer security guards will be needed in the colder months. Perhaps seasonal staff can help in the summer for a discounted “seasonal employee” type rate. The weather relationship holds true for our biggest concern, Ward 27. 5 ​summarize admithour if Ward==[1,2,3,4] | Year >=2013 (Stata) 5
  • 7. Ward 27, where most of the properties are located, is important since property crimes are on the low end of total crimes in the neighborhood according to our graph below of historical crime. Arson comprises an extremely low percentage of total neighborhood crime, meaning the crime occurring in this neighborhood is less likely to cause damage, costing money for repair. However, violent crime such as battery is quite high in Ward 27 and must be addressed but perhaps is also presents an opportunity to invest in low value properties. Recommendations There are several recommendations to improve security for these areas and properties. The most common day for a crime to occur, according to the city’s data, was during the weekend. The investment firm should consider having a smaller staff during the week and slightly increasing the staff on the weekends. The staff can be reduced during the weekday during the hours of 4:00 am until 8:00 am. Devices should be installed to restrict access to stairways. Much of the crime in Chicago as well as in the area surrounding the client’s property occurs on the street which is outside of the client’s jurisdiction. The client can install cameras to monitor the perimeter of property and have security perform periodic perimeter and parking lot patrols from 10:00 pm until 8:00 a.m. A seasonal, hourly staff which fluctuates in staff by time and day of the week, strategically spread over the properties’ words in relation to level of crime could drastically reduce costs and make this a profitable endeavor. Expense analysis is important but also consider future value. Another factor of interest when determining the expected cost of security is time of day. Certainly security will be needed 24 hours per day, however, we believe you can save money by reducing the number of security guards on duty in the early morning hours. As shown below, a lower staff may be maintained each day between 5 6
  • 8. a.m. and 7 a.m. With the data presented in results section, the peak time between 1 p.m. - 2 p.m. should be considered for security coverage in Wards 2 and 3. Even more specifically in Wards 27 and 3, there were significant findings regarding the location of crime incidents. This data provided accurate location information for security personnel utilization. It’s recommended placing security personnel to patrol the streets, apartment complexes, residential areas, and sidewalks of Wards 27 and 3 . Perhaps this can be allocated to two different security personnel teams, 6 street (vehicle, foot, bicycle) and then residential areas containing families and apartments, patrolling with vehicles. Social media has also become popular tools for crime prevention, especially the use of Twitter and Facebook . It’s recommended either creating new accounts for both of these wards and using 7 hashtags, or another alternative is to leverage the security personnel’s company account and also using hashtags, such as #ward27 and #ward3. Ward 28 also reflected similar location trends . 8 Given this data, it’s recommended funding security that is at a reasonable price point. It’s recommended that a seasonal, hourly staff which fluctuates in quantity by time and day of the week, strategically spread over the properties’ location in relation to level of crime could drastically reduce costs and make this a profitable endeavor. Expense analysis is also important as well as considering future value. 6 ​tabulate Location_Description if Ward == 27 | Year >=2013 7 ​www.nnw.org/publication/social-media-and-crime-prevention 8 ​tabulate Location_Description if Ward == 28 | Year >=2013 7
  • 10. 9
  • 11. 10