SlideShare a Scribd company logo
CRIMEON
CAMPUS
States
Population
HighestCampusCrimesinUnitedStates:2012-2014
(#ofarrests)
ThisDataiscollectedbytheCampusSafetyandSecuritySurveyasa
partoftheCampusSafetyandSecuritySurvey(CSSS)program.CSSS
wasacross-sectionalsurveythatcollectedinformationrequiredfor
benefitsaboutcrime,criminalactivity,andfiresafetyatpostsecondary
institutionsintheUnitedStates.Keystatisticsproducedfrom CSSSwere
onthenumberandtypesofcrimescommittedatrespondingpostsec-
ondaryinstitutionsandthenumberoffiresoninstitutionproperty.The
Datausedisrecordedoveraperiod3yearsfrom 2012to2014.Datausedisrecordedoveraperiod3yearsfrom 2012to2014.
TheDatahas11,554rowsand27columns.
CA NYIN MI NC PA TX
IN
MI
NY
PA
TX
ClearpatternoftheWeaponLaw Violation
beingtheleastcontributortothecrimeson
campus.Foralltheothersixstatesexceptfor
California.TheLiquorLaw Violationisthemajor
contributortothecampuscrimescloselyfol-
lowedbytheDrugLaw Violation.
NC
!!

More Related Content

Similar to TDK_IST711

What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?
IBM Analytics
 
Technical Seminar
Technical SeminarTechnical Seminar
Technical Seminar
nikita kapil
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mapping
Fred Zimmerman
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
Heta Parekh
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportJames Fisher
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docx
jeffreye3
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
Prodapt Solutions
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
Neo4j
 
Crime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and PredictionCrime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and Prediction
Fahad Almassoud
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
drennanmicah
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Xeneta
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
Sameer Darekar
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
Written Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docxWritten Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docx
odiliagilby
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
Rohit Dandona
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction
IRJET Journal
 

Similar to TDK_IST711 (20)

What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?
 
Technical Seminar
Technical SeminarTechnical Seminar
Technical Seminar
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mapping
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docx
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
Crime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and PredictionCrime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and Prediction
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Written Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docxWritten Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docx
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction