Reference Hub21
Offender Mobility and Crime Pattern Formation from First Principles

Offender Mobility and Crime Pattern Formation from First Principles

P. Jeffrey Brantingham, George Tita
ISBN13: 9781599045917|ISBN10: 1599045915|ISBN13 Softcover: 9781616927288|EISBN13: 9781599045931
DOI: 10.4018/978-1-59904-591-7.ch010
Cite Chapter Cite Chapter

MLA

Brantingham, P. Jeffrey, and George Tita. "Offender Mobility and Crime Pattern Formation from First Principles." Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems, edited by Lin Liu and John Eck, IGI Global, 2008, pp. 193-208. https://doi.org/10.4018/978-1-59904-591-7.ch010

APA

Brantingham, P. J. & Tita, G. (2008). Offender Mobility and Crime Pattern Formation from First Principles. In L. Liu & J. Eck (Eds.), Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems (pp. 193-208). IGI Global. https://doi.org/10.4018/978-1-59904-591-7.ch010

Chicago

Brantingham, P. Jeffrey, and George Tita. "Offender Mobility and Crime Pattern Formation from First Principles." In Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems, edited by Lin Liu and John Eck, 193-208. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-591-7.ch010

Export Reference

Mendeley
Favorite

Abstract

Criminal opportunity in most cases is constrained by the fact that motivated offenders and potential targets or victims are not found at the same place at the same time. This ecological fact necessitates that offenders, potential victims, or both move into spatial positions that make crimes physically possible. This chapter develops a series of simple mathematical and agent-based models looking at the relationship between basic movement decisions and emergent crime patterns in two-dimensional environments. It is shown that there may be substantial regularities to crime patterns, including the tendency for crime to form discrete hotspots that arise solely from different movement strategies deployed by offenders.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.