- Research
- Open Access

# Modelling patterns of burglary on street networks

- Toby P Davies
^{1, 2}Email author and - Steven R Bishop
^{1}

**2**:10

https://doi.org/10.1186/2193-7680-2-10

© Davies and Bishop; licensee Springer. 2013

**Received:**10 April 2013**Accepted:**18 November 2013**Published:**27 December 2013

## Abstract

A fundamental issue in crime prevention is the efficient deployment of resources and the effective targeting of interventions, both of which require some form of prediction of future crime. One crime for which this is feasible is burglary, the distinctive spatio-temporal signatures of which can be exploited to inform predictions. Mathematical models in particular are capable of both encoding concisely the theoretical foundations of criminal behaviour and allowing the quantitative analysis of specific scenarios, and their capacity to reproduce the general patterns of burglary suggests that the approach has considerable potential. Previous models, however, are situated on simplified representations of space and do not reflect realistically the built environment in which crime takes place; specifically, they do not incorporate urban street networks. Such networks are fundamental to situational theories of crime, in the sense that they determine the configuration of urban space and, therefore, shape those human activity patterns which are thought to give rise to crime. Furthermore, streets are the natural domain for many policing activities, and their structure is determined by planning decisions, so that insight into their relationship with crime is likely to be of immediate practical use. With this in mind, this paper presents a mathematical model of crime which is explicitly situated on a street network. After discussing theoretical considerations and specifying the model itself, examples of typical networks are explored.

## Keywords

- Burglary
- Street network
- Applied mathematics
- Modelling

## Background

Residential burglary has been, and remains, a significant criminal problem, and consequently has been the subject of academic research for some time. As with most analytical work concerning crime, the objectives of such research are both theoretical, in improving the understanding of the process leading to the crime, and practical, in using the insights gained in order to prevent future crime. With respect to the latter, this typically entails some form of prediction, either at the fine spatio-temporal granularity which, for example, might be required for a strategy of 'hotspot policing’ (Chainey and Ratcliffe2005), or in the more generalised terms which might be used to inform long-term policy. Previous work has shown predictive policing based on statistical analysis to have considerable potential (Johnson et al.2009a), and the desire to build on this is well-aligned with the desire of administrators to carry out policing more efficiently; a principle which is also a central theme of the field of crime science (Laycock2005). Modelling has much to offer here, through its ability to distil theoretical mechanisms to formal expressions and to afford both quantitative and rigorous analysis of hypothetical scenarios via well-established techniques. Indeed, this potential, along with the increased availability of geographical data and the development of a wide array of tools for the analysis of complex social systems, has inspired significant recent interest within the modelling community. Within this domain, attempts to model burglary range from mathematical approaches (Berestycki and Nadal2010; Pitcher2010; Short et al.2008) to those employing agent-based simulation (Birks et al.2005; Groff2007a; Johnson2008; Malleson et al.2009), with these playing complementary roles. This divergence is common to crime modelling as a whole: although the possibility of generalised analysis means that mathematical models might offer greater insight, they have so far failed to match agent-based approaches in terms of their scope for the incorporation of detailed individual-level behaviour, with only some examples occupying a middle ground (Davies et al.2013; Short et al.2008).

### Criminological theory

In the case of mathematical approaches, much previous work has focussed on one of two aims. The first of these is to explore whether hypothesised mechanisms for burglary, when encoded mathematically, are sufficient to generate the generalised patterns observed empirically (Berestycki and Nadal2010; Pitcher and Johnson2011; Short et al.2008), and this appears to indeed be the case in simplified mathematical representations. This general approach is also characterised by its versatility, and has been used as a starting point for more realistic extensions, such as those incorporating policing activity (Pitcher2010), which lend themselves to the exploration of simple policy questions. On the other hand, with a view to producing effective tools for short-term prediction, research elsewhere has sought to make specific predictions about the location of future risk, given a particular set of current burglary data (Mohler2011). Common to both approaches, however, is the intention to leverage the patterns observed in empirical burglary data in order to make predictions. Such patterns have been studied widely, and can generally be summarised as forms of clustering, though acting at varying scales and dimensions. Looking first at space, it has long been established that the locations of crimes are clustered (Shaw and McKay1969; Sherman et al.1989), and the importance of place in the study of crime has been emphasised accordingly (Eck and Weisburd1995). The importance here of scale, though, is considerable, since patterns can be subject to significant heterogeneity within units of analysis: previous studies have shown area-level crime rates to be driven largely by those of only a few streets (Weisburd et al.2004) and burglary risk to vary significantly between individual houses (Bowers et al.2005). In line with this, the importance of retaining fine spatial granularity in crime analysis has been stressed (Brantingham et al.2009).

As well as a location in space, however, all crime occurs at some point in time, and clustering is also evident here, most obviously manifested as daily and seasonal cycles. While valuable insight can be gained by considering this, however, of greater interest is the interaction between spatial and temporal dimensions; indeed, to ignore this may lead to incomplete understanding of each individual factor. Studies have consistently demonstrated that crime clusters in both space and time (Grubesic and Mack2008; Johnson et al.2007; Townsley et al.2003); that is, that the clustering is greater than would be expected if it were simply occurring independently in each dimension. In the case of burglary, this is exemplified by the phenomenon of *repeat victimisation*, whereby victimised properties, for a period after the initial event, are subject to a rate of further victimisation over and above that which would be expected by chance (Farrell2005). Indeed, the temporal component of this is particularly distinct, with risk appearing to decay exponentially with time after an initial event (Johnson et al.1997). In addition, the concept can be extended to that of *near-repeats* (Morgan2001), whereby properties close to an initial event also experience elevated risk for some period afterwards. These phenomena, which represent the primary drivers of burglary hotspots in urban environments, appear to be ubiquitous in data from several countries (Johnson et al.2007; Townsley et al.2003).

The near-repeat patterns observed empirically imply that burglary victimisation cannot be understood by considering properties in isolation, and that they must instead be considered in the context of their wider neighbourhood. In trying to account for repeat victimisation, much attention has focussed on two (non-mutually-exclusive) hypotheses, both of which seek to provide explanations based on factors acting at the level of individual properties. The first of these is the concept of *risk heterogeneity*, also known as the *flag* hypothesis, which suggests that patterns may arise due to differences in the time-stable risk of burglary at individual properties (Pease1998). This 'risk’ refers to any non-varying factor which may influence the probability of victimisation, such as the type of property, presence of security features, affluence or location. That repeat victimisation might arise from this can be understood by a simple statistical argument: even if burglaries occurred randomly, some repeat victimisation would occur by chance, and the fact that some properties are more attractive than others simply biases this process. The preferential victimisation of more attractive properties necessarily implies that the time between their victimisations will be shorter, and that more repeats will therefore occur on this basis. This can be extended easily to near-repeats by considering that nearby properties are likely to be of similar attractiveness.

The other explanation which is typically invoked is the *boost* hypothesis, which states that, for some period after an initial event, the risk to nearby properties is temporarily elevated (Pease1998). The natural explanation for this is that any repeat offence is likely to be the work of the same offender (since it is unlikely that another offender would have knowledge of the first incident). The reason for the elevation can be understood by considering the decision process of a rational offender (Cornish and Clarke1986): the commission of the first offence affords knowledge of both how to successfully burgle the property and the potential rewards available, making it a more attractive proposition than an 'unknown quantity’ when identifying a future target. This is lent further credence by interviews with offenders (Ashton et al.1998; Cromwell et al.1991; Summers et al.2010) and police detection data (Bernasco2008; Johnson et al.2009b), both of which support the identification of repeat incidents with the same offender. Again, this idea is easily extended to near-repeat victimisation: knowledge of one house is likely to offer insight into the characteristics of its neighbours (such as the layout and location) and, furthermore, the journey to and from the initial crime affords an opportunity to evaluate nearby properties. The question of the relative strength of these effects - flag and boost - has been considered in recent work using both simulation-based (Johnson et al.2009b) and statistical approaches (Short et al.2009), in which evidence was found in support of both hypotheses.

Both of these arguments can be cast in the light of more general theories of 'environmental criminology’ (Brantingham and Brantingham1981); an approach which focuses explicitly on the criminal act itself, and the circumstances which give rise to it, rather than the characteristics of the offender. Central to this is 'routine activity theory’, which builds on simple observations regarding the conditions under which a crime takes place. A fundamental idea is that a crime can only occur under the convergence in space-time of three factors - a motivated offender, a suitable target, and the absence of a capable guardian (Cohen and Felson1979) - and the question therefore naturally shifts to how such a concurrence might arise in a realistic setting. A popular explanation is built on the hypothesis that the majority of crime is essentially opportunistic; that offenders encounter targets whilst going about non-criminal activities and that crime patterns are simply a manifestation of heterogeneities in this target awareness. Conditions suitable for crime might therefore be best conceptualised as a result of the cumulative activity patterns of the public.

Building on this, 'pattern theory’ (Brantingham and Brantingham1993a) seeks to add more detailed geographic considerations to these explanations. It is based on the idea of situating the above concepts in a realistic urban environment, considering both how activity patterns are shaped by the configuration of space (*i.e.* the 'urban form’) and how the physical characteristics of certain areas can influence the decisions of a potential offender. The term 'urban backcloth’ is used in this context to refer to the layout of the built environment, with particular emphasis on those elements which relate to common activities (*e.g.* homes and workplaces), and the inferred activity patterns can then be reconciled with levels and types of criminality. Going further, and somewhat anticipating the use of network theory in crime analysis, the notions of "nodes, paths and edges" (Brantingham and Brantingham1993b) are introduced as a means of encoding the urban backcloth and the significant features within it.

### The role of the street network

The definition of the urban backcloth as the configuration of urban space immediately invites consideration of the street network, since this is the primary means by which towns and cities are arranged. Perhaps due to a lack of suitable geographical data, though, little work has sought to compare crime levels with features of the street network. Early work took a coarse-grained approach, comparing crime levels at the area level with street network density and finding a positive relationship with burglary risk (Bevis and Nutter1977). Moving to a more local level, later research used the street segment as the unit of analysis, classifying each according to the number of roads which connected to it directly and using the road type as a proxy for its 'flow’ (Beavon et al.1994). These factors both showed a positive relationship with crime, supporting the theory that more permeable roads were at greater risk (Newman1972).

The distribution of crime has also been considered in the context of the more general concept of 'space syntax’; an approach which has been applied in a variety of urban contexts and one which has been influential in arguing for the importance of incorporating street network constraints in urban-level social models. The approach itself is characterised by the principle that individual street segments cannot properly be understood in isolation, but must be considered in the context of the rest of the network and their position within it. In addition, the role of sight-lines in governing connectivity is emphasised, and indeed these are used in the definition of street segments themselves. Several metrics have been developed using these ideas, such as *integration*, which measures how close a given location is to all others in terms of paths through the network. Applying these methods to crime, and analysing data from urban areas in the UK and Australia, Hillier (2008) found that crime was positively related to connectivity but negatively related to integration. The conclusions drawn from this contradict the previous work, suggesting that permeable designs are favourable, but that where redundant connectivity is present (that which does not increase integration) the effect can be reversed, perhaps because of the provision of extra entry or escape routes.

Hillier’s work also includes observations at the level of individual properties, in particular relating to modes of access (*e.g.* proximity to alleys). These are also considered by Armitage (2007), whose work involved detailed assessment of the physical features of individual houses. These observations included the type of road on which the property was situated and a subjective estimate of its usage, both of which were then individually compared with crime levels. In this case it was found that increased activity and permeability was associated with higher risk, with the difference between isolated cul-de-sacs and those serviced by pedestrian alleys being a notable example.

Most recently, a more nuanced approach, employing a multi-level statistical approach to account for spatial nesting in the data, again found a positive relationship between permeability and burglary risk (Johnson and Bowers2010). In that study, the permeability of roads was evaluated either by the Ordnance Survey classification (a categorical factor, *e.g.* 'Minor Road’, 'B Road’) or by the number of roads to which they connected, and cul-de-sacs were treated as a special case and identified manually. The study found a steady increase in effect when moving through the hierarchy from minor roads to major, and also a notable finding that cul-de-sacs in particular were found to be at significantly lower risk.

As well as simply explaining some variation in crime rates, it has also been suggested by Johnson and Bowers (2007) that street networks may play a role in the spread of crime risk. Particularly considering the movements of offenders, and the hypothesised role of awareness spaces in repeat victimisation, it is suggested that networks are a natural substrate for such diffusion processes.

Recent advances in geographical information systems have, one one hand, facilitated modelling approaches which explicitly incorporate network data (Groff2007b), but have also been accompanied by the development of the field of network science, which uses ideas from graph theory to facilitate sophisticated analysis of real-world networks (Newman2010). The study of spatial networks, defined as those whose features are embedded in space in some sense, is a particularly active sub-field (Barthélemy2011) and includes the study of various properties of street networks (Porta et al.2006a;2006b). In order to discuss relevant results of this research, we first introduce some graph-theoretical terminology.

### The mathematics of networks

Networks, to the extent that they will be used in this paper, are relatively simple mathematical objects and many of the concepts used in their analysis are formalisations of intuitive ideas. In the most basic terms, they are collections of points and lines, where each line connects a pair of points, and typical analysis is no more complicated than considering how the network can be traversed by travelling along lines. To facilitate mathematical analysis, though, it is helpful to define these concepts symbolically.

*network*(or

*graph*)

*G*= (

*V*,

*E*) is a collection of

*nodes*,

*V*, and

*links*,

*E*(also referred to as

*edges*within graph theory). The set of nodes,

*V*= {

*v*}, is a non-empty set of

*N*elements, and

*E*= {

*e*} is a set of

*M*elements, each of which is an unordered pair of nodes. The nodes are labelled using the integers 1,…,

*N*, where the order is unimportant as long as the labelling is consistent and unique, and each node is then referred to by its label. Where a link exists between two nodes

*i*and

*j*, the nodes are said to be

*adjacent*and the link is therefore represented by the unordered pair of nodes (

*i*,

*j*). The information necessary to describe all such links in a network can be encoded as an

*adjacency matrix*

**A**, an

*N*×

*N*matrix such that

where, for clarity, the symbol ∈ denotes 'is a member of’. Various simple quantities can be defined for a node *i*, such as the *degree* *k*_{
i
}, which is the number of other nodes to which it is adjacent (*i.e.* the number of links connected to it); it is straightforward to see that this is equal to${\sum}_{j}{a}_{\mathit{\text{ij}}}$.

A *path* in a network is any ordered sequence of nodes such that every consecutive pair of nodes is connected by a link (that is, a sequence of nodes which can be traversed by following links). The length *l* of such a path can be defined as the number of links which feature in it (which is 1 fewer than the number of nodes in the path). For any pair of nodes *i*,*j* ∈ *V* it can be determined whether a path between the two exists, and indeed there may be more than one such path. A *shortest path* between *i* and *j* is one of these such paths of minimal length (though, again, there may be more than one such if several alternatives are equally short).

*Betweenness centrality*is a measure which seeks to quantify how regularly individual links are used during journeys through the network. Although we will formally define it below, its meaning can be most intuitively understood by describing how it is calculated. The main steps involved are:

- 1)
initialise all links with a betweenness centrality of 0;

- 2)
consider all pairs of nodes

*i*and*j*; - 3)
for each pair

*i*and*j*, find the shortest path(s) between them; - 4)
for every link that appears in the shortest path(s), increment its betweenness centrality by $\frac{1}{w}$, where

*w*is the number of shortest paths between*i*and*j*(so if there is only one shortest path between*i*and*j*, add 1 to the centrality of each segment in it).

Effectively, then, betweenness counts the number of times that each link is traversed, assuming that one shortest-path journey occurs between all possible pairs of nodes on the network. This can be regarded as a well-motivated proxy for the likely level of usage of each link when journeys are occurring on a network.

*σ*

_{ ij }as the total number of shortest paths between

*i*and

*j*, and then, more particularly,

*σ*

_{ ij }(

*e*) as the total number of shortest paths between

*i*and

*j*

**which pass through the link**

*e*∈

*E*, we can define the betweenness centrality${C}_{e}^{b}$ of a given link

*e*as:

*i*and

*j*’. The value can then be normalised by dividing by$\frac{N(N-1)}{2}$ (the maximum possible value) in order to allow comparison between networks. Figure1 gives a stylised example of a network for which betweenness can be used to discriminate between the roles of different links; it can be seen how the value changes between 'central’ links and those on the periphery.

*street segment*, so that two nodes are connected if there is a street segment between them). An example of this can be seen in Figure2.

Using this representation, it is possible to calculate betweenness values for each segment in a road network, and these values can also be seen in Figure2f. The highest values are seen to occur on main thoroughfares, which would be expected to see the greatest use. As has been pointed out elsewhere (Porta et al.2006a), it is worth noting at this stage that betweenness is susceptible to 'edge effects’: that is, the measured betweenness for segments towards the periphery of the study area is artificially low, since the starting points of many paths which would use such a segment are not included. This is unavoidable since the network considered must be geographically limited, but the problem can be ameliorated by establishing a 'buffer zone’ at the extremes of the network for the purpose of betweenness calculation, which is then discounted in any following analysis.

This technical perspective on the study of street networks has developed rapidly in recent years (Crucitti et al.2006), and the values of various measures of centrality (including betweenness) observed for many real-world networks have been well-studied. The concept of centrality can be defined in several well-motivated ways (concerning, for example, either the accessibility of places or their closeness to others) and particular metrics have been proposed to emphasise different perspectives. Building on these, the technique of 'Multiple Centrality Assessment’ has been developed by Porta et al. (2006a) as a method of combining several complementary metrics in order to give an overall measure of the centrality of parts of a street network. Taking this to the natural next step, and of particular relevance for this work, the same authors then sought to establish the relationship between these measurements and urban activities, looking specifically at the densities of retail and service premises in Bologna, Italy (Porta et al.2009) and Barcelona, Spain (Porta et al.2012). In both cases, a positive relationship was found between economic activity and street centrality, and such results suggest that the use of metrics such as these to predict urban activity is likely to be fruitful.

The purpose of this paper is therefore to propose an explicitly mathematical model (that is, based on differential equations) for burglary, situated on a network. After describing this model, we provide examples of its behaviour on realistic networks under various scenarios, corresponding to potential real-world uses or policy interventions. With a model such as this, interest is both theoretical and practical, necessitating different types of analysis. On the theoretical side, we aim to generate known generic patterns of crime, but the rare nature of burglary events (and multitude of factors not considered) also means that a comprehensive model may not be a sensible goal. From a practical perspective, however, the question of the risk diffusion patterns associated with individual shocks (*i.e.* burglary events) is likely to vary according to network structure and is of clear practical interest. By considering the qualitative behaviour of the model under both these motivating cases, we demonstrate the importance of considering the street network explicitly in crime modelling, and the significant effect which such consideration has on results.

## Methods

### Street network data

Street network data has been obtained from OpenStreetMap.org, a collaborative open-source mapping project. The data provide information relating to all roadways in a given area (according to a broad definition, which includes footpaths and private access roads, for example) and various levels of information about each, such as the road’s name, type and how it is used. An exported file is processed in order to arrive at the primal graph representation, and cleaned in order to remove features, such as roundabouts, which might distort analysis.

### Model specification

In previous attempts to model burglary mathematically, the fundamental spatial unit has been taken notionally to be the individual property, the implication therefore being that risk diffuses from house to house via intermediate properties. Here we use a coarser scale and take the street segment as the basic unit, considering therefore only segment-to-segment diffusion, and this is done for several reasons. Firstly, this is a scale at which real-world burglary data is widely available, and is also the scale at which potential police interventions (*e.g.* patrolling) are likely to be implemented. In addition, the determination of insurance premiums - which this model might also help to inform - is often based on postal codes, which typically correspond to street segments; this is the case in the UK, for example. From a more practical mathematical perspective, the street segment is a suitable unit since it is at that scale that the majority of variation in centrality indices, such as betweenness, takes place. If the individual property was used instead, all properties on a given segment would have exactly the same betweenness value: values are based on journeys, and for two adjacent properties on a given segment, the journeys which pass one property are exactly those which pass its neighbour. Individual properties are therefore indistinguishable on that basis, and so their inclusion represents unnecessary redundancy in the present setting.

*G*= (

*V*,

*E*), constructed as described in the previous section, so that each link represents a street segment. For convenience, we introduce an indexing

*e*

_{1},…,

*e*

_{ M }of the links and also define the matrix${\mathbf{A}}^{\mathbf{\prime}}=({a}_{\mathit{\text{ij}}}^{\prime})$, where

This matrix therefore encodes the structure of the network in terms of which pairs of links are coincident; in fact, it is just the adjacency matrix of the 'line graph’ of *G*, in which the roles of nodes and edges are inverted (as described by Diestel2010). As such, it does not introduce any further statistical properties beyond those of *G* itself, but simply allows for brevity in mathematical representations.

We model burglary risk *R*_{
i
}(*t*) at time *t* for each link *e*_{
i
} of *G*, and this quantity represents our main dependent variable. Specifically, it is the rate of burglary at the given point in space and time. Each link *e*_{
i
} can also be assigned *a priori* two values: a fundamental *basic attractiveness* *B*_{
i
} (summarising static features likely to have an influence on burglary, such as security and affluence) and a *centrality* measure *C*_{
i
} (such as betweenness) determined by the network structure. The notion of centrality is intended to be a broad one, and refers to the extent to which a given street features in activity patterns. Many such measures could be used within this framework; for the sake of concreteness when considering the model, it can be thought of as betweenness.

*S*

_{ i }and a dynamic component

*Q*

_{ i }(

*t*):

Regarding the static rate, for the purposes of this model we regard this as being dominated by opportunistic burglary and therefore driven by a combination of activity patterns and target attractiveness. At the time scale we consider - that over which repeat victimisation effects are seen - both activity and attractiveness can be taken to be constant (though spatially varying).

To calculate the static rate *S*_{
i
}, we require an estimate of the level of movement activity *W*_{
i
} on a link *e*_{
i
}, and the probability *p*_{
i
} that an opportunist offender would victimise the link in a given time unit, were they to be present. Criminological theory implies that the means by which the network will influence crime patterns is by shaping the activity patterns of individuals. In contrast to the random walk assumption used in previous work, this assumes that people are taking specific trips, between home and work for example, and that patterns are driven by the accumulation of these trips. One approach to modelling this might therefore be to expect that such patterns at segment level are revealed as emergent properties of offender behaviour, but including this is clearly very challenging in a simple mathematical framework (as opposed to within, say, an agent-based model).

*f*of centrality (the value itself could be used, but

*W*

_{ i }may need to be a modified/smoothed quantity due to the inherent non-linearity of betweenness); thus

*B*

_{ i }defined previously, implying a series of independent offender decisions based on the underlying attractiveness. Accordingly, the probability within a given time period [

*t*,

*t*+

*δ*

*t*) is

Leaving aside the precise form of this relationship, the key point is that an increase in the attractiveness *B*_{
i
} will raise the probability of an offence: the exponential term${e}^{-{B}_{i}\delta t}$ decreases, and *p*_{
i
} becomes closer to 1 (which corresponds to the offence occurring with certainty).

*background rate*of activity,

*D*

_{ i }, to encapsulate other constant factors not directly related to the network. We therefore have:

*Q*

_{ i }(

*t*), this term is intended to encapsulate 'boost’ effects; that is, those acting locally and at short time scales in response to previous victimisations. This value, for a given link, will again be composed of several parts: that which is due to 'new’ offending taking place; remaining boosts from earlier time; and boost effects acquired from neighbouring locations. For the first term - new offending - the boost will simply be proportional to the offending rate

*R*

_{ i }(

*t*) on the link, according to some boost parameter Γ which simply determines the magnitude of the effect. The latter two of the three terms have previously been modelled as a diffusion process with decay (Short et al.2008), and are done so again here. These can be put together to form a differential equation - an equation for the rate of change of

*Q*

_{ i }with time, denoted$\frac{d{Q}_{i}}{\mathit{\text{dt}}}$ - thus:

where *ω* is a decay parameter, *η* a coefficient of diffusion and the${a}_{\mathit{\text{ij}}}^{\prime}$ in the summation are elements of **A**^{′}. On the right hand side, the first term Γ*R*_{
i
} represents the increase in proportion to new offending, and -*ω* *Q*_{
i
} determines that *Q*_{
i
} decays in proportion to its present value. The latter term represents diffusion from link to link whenever both meet at a common node (recalling that${a}_{\mathit{\text{ij}}}^{\prime}=1$ if and only if *i* and *j* are coincident). Specifically, it encodes the idea that risk will flow from higher- to lower-risk segments: if segment *i* has a neighbour *j* which is at higher risk (*i.e.* *Q*_{
j
} > *Q*_{
i
}), the term${a}_{\mathit{\text{ij}}}^{\prime}({Q}_{j}-{Q}_{i})$ will be positive and drive an increase in *Q*_{
i
}. The summation simply averages this effect over all neighbours.

*R*

_{ i }can be re-written as (

*S*

_{ i }+

*Q*

_{ i }), and

*S*

_{ i }in turn as (

*D*

_{ i }+

*W*

_{ i })

*p*

_{ i }, so that we have a single dynamical equation for

*Q*

_{ i }:

Such a differential equation can be used to carry out numerical simulations, and the results of several of these will be shown in the following sections. To perform these, the differential equation is repeatedly applied at regular discrete time-steps, with parameters as specified in figure captions in each case. Unless otherwise specified, street network data from Toulouse, France, is used as the spatial setting, as depicted in Figure2. For each link, the equation for the rate of change, when coupled with the initial condition, is sufficient to determine the state of the system at all subsequent times.

## Results and discussion

### Response to burglary events

It is notable that when a relatively non-central segment is victimised in Figure3a, the spread is localised and one-directional, whereas risk spreads in a much more diverse manner when a highly central segment is victimised in Figure3b. It can also be seen that, when segments are far apart in terms of network distance, there is negligible spread of risk from one to the other, even if they are close in purely spatial terms; this is contrary to what is predicted by models which do not incorporate the street network, and arises simply because risk is constrained to spread only along links. This demonstrates a fundamental sense in which this model differs from those proposed previously.

### Modelling dynamic burglary events

We now move on to investigate numerically the behaviour of the system when levels of offending feed back into the system; that is, when crime is not taken as an exogenous initial condition, but the ongoing offending originates from within the model itself. We therefore consider the case where Γ ≠ 0.

*S*of each street segment (

*i.e.*each link in the network) is taken to be directly proportional to its betweenness centrality

*C*

^{ b }, in line with the reasoning outlined previously. It is also assumed that the basic attractiveness of street segments,

*B*, is uniform but non-negative across the system, and the background rate

*D*is taken to be 0 everywhere, in order to concentrate on repeat-victimisation effects. In addition, the system is initialised with a uniform initial condition of 0 for

*Q*. With initial values chosen in this way, and for suitable values of the other parameters, it is seen numerically that the system tends towards an equilibrium (in that the value for each link reaches a steady state), with the final state shown in the final frame of Figure4. The fact that equilibrium is reached implies that, for the parameters chosen, the final configuration shown is a sustainable pattern for the long-term distribution of crime; the value for each link is its long-term rate of crime.

*Q*are, as expected, those with highest betweenness centrality

*C*

^{ b }, it is also seen that it is not the case that there is a direct relationship between the two. This can be seen more explicitly in Figure5, in which betweenness values are plotted against the equilibrium values of risk. Behaviour of this form suggests that the diffusive pattern adds structure to the crime patterns, even in steady state, over and above that which would be predicted purely on the basis of the betweenness-based static risk (in which case a straight line would be expected in Figure5). Indeed, streets must be considered explicitly in the context of those around them and in the context of the urban space as a whole. In the configuration shown, because of heterogeneities in the way the network is connected, the underlying risk is 'smoothed’ in the equilibrium.

### Modelling policing interventions

A natural progression from the study of the long-term emergence of crime patterns is to consider how these react when the system is manipulated; considering this as a manifestation of a real-world intervention, this is of immediate relevance to policy. A natural intervention to study is the activity of police, via patrolling or otherwise, which is intended to have the direct effect of reducing crime in the area in which it is employed. To this end, we investigate the numerical behaviour of the model under such an intervention.

*Q*for segments according to their distance from the intervention, and it can be seen that there is considerable variance within groups: even among direct neighbours, the reduction is more pronounced in some than others. This again emphasises the way in which interventions must be considered in their proper spatial context, and is encouraging since it suggests that informed placement has the potential to compound the positive effect of policing.

### Modification of urban form

In addition to short-term interventions such as policing, one of the potential outcomes of analysing urban crime is to inform decisions taken by planners in relation to urban design. This might take the form of developing heuristics for future planning projects, but there is also the possibility to modify existing structures in order to address a crime problem.

*Q*as zero on every link and allow the system to reach equilibrium. It can be seen that, relative to the example in Figure4, burglary activity is displaced in an unanticipated way; the peak which was previously seen on the removed segment has not simply moved to neighbouring segments, but has appeared several segments away. The fact that such a central link has been removed means that its role in the network must be assumed by other links: in terms of betweenness, many paths passed through the deleted link and must be re-routed, with these routes possibly being quite distinct from the originals (in terms of the number of links shared by both the original and re-routed paths). This can cause a dramatic change in the betweenness of other links, perhaps several degrees of separation away, and this effect is seen in the changed pattern of crime in Figure9, where the main 'hot spot’ of criminal activity has moved to the upper left of the map.

### Variation between networks

The structure of street networks can vary widely both within urban areas and, at a larger scale, between cities and countries. Depending on its intended use, and on the dominant planning practices at the time of construction, the properties of networks can be measurably different. Given that our model is based partially on street-level metrics, such variation will clearly influence results. As well of being of theoretical interest, it also means that the model may have different implications according to local circumstances.

## Conclusions

Theories of environmental criminology emphasise the importance of urban configuration in determining patterns of crime, since it is the primary determinant of human movement patterns. The street network is the primary structure by which this configuration is determined, and there is evidence that it shapes patterns of crime. Despite recent interest in the mathematical modelling of burglary, however, few models have sought to explicitly include network effects. We have presented a novel mathematical model for residential burglary which takes such effects into account. The influence of the street network is manifested in two ways: by restricting the spread of crime to only occur along network connections, and by incorporating network metrics as a proxy for human activity.

We have presented several stylised examples demonstrating the qualitative behaviour of the model. These examples correspond to scenarios for which a model such as this are likely to be of use, ranging from 'real-time’ predictive circumstances to the general analysis of policy interventions. In all cases, the effect of the network is evident: there is a marked difference between model results and what would have been predicted by a non-network model, and the non-linear nature of network dynamics are illustrated.

The consideration of street networks in models of crime is well-motivated, and the results shown here illustrate its importance. From a practical point of view, this is encouraging, since networks (the properties of which are quantifiable) represent another means by which crime prevention efforts can be concentrated. Indeed, the non-linear effects shown here suggest that full understanding of network effects may amplify the effect of targeted policing.

The potential use of the model presented here is, of course, dependent on the existence of a relationship between network properties and crime rates of the expected form. Although an empirical base has been established in support of a general relationship, analysis has not yet been conducted using metrics of the type considered in this paper. Future research will involve the exploration of this question via statistical analysis, as well as considering the influence of network configuration on the phenomenon of near-repeat victimisation. This would then provide a basis for the implementation of the model proposed here in a practical setting. Research addressing the question of how the output of such predictive models can best be translated into police activity is currently ongoing, and represents the crucial stage in the evolution from abstract models to practical outcomes.

## Declarations

### Acknowledgements

We acknowledge the financial support of the Engineering and Physical Sciences Research Council (EPSRC) under the Security Science Doctoral Training Centre, reference EP/G037264/1. We also thank Shane Johnson for guidance and informative discussion.

## Authors’ Affiliations

## References

- Armitage R: Sustainability versus safety: confusion, conflict and contradiction in designing out crime. In
*Imagination for crime prevention*. Edited by: Farrell G, Bowers KJ, Johnson SD, Townsley M. Monsey: Criminal Justice Press; 2007:81–110.Google Scholar - Ashton J, Brown I, Senior B, Pease K: Repeat victimisation: offender accounts.
*International Journal of Risk Security and Crime Prevention*1998, 3(4):269–279.Google Scholar - Barthélemy M: Spatial networks.
*Physics Reports*2011, 499(1–3):1–101.View ArticleGoogle Scholar - Beavon DJK, Brantingham PL, Brantingham PJ: The influence of street networks on the patterning of property offences. In
*Crime prevention studies, vol. 2,*. Edited by: Clarke RV. Monsey: Criminal Justice Press; 1994:115–148.Google Scholar - Berestycki H, Nadal J-P: Self-organised critical hot spots of criminal activity.
*European Journal of Applied Mathematics*2010, 21(4–5):371–399. 10.1017/S0956792510000185View ArticleGoogle Scholar - Bernasco W: Them again?
*European Journal of Criminology*2008, 5(4):411–431. 10.1177/1477370808095124View ArticleGoogle Scholar - Bevis C, Nutter JB:
*Changing street layouts to reduce residential burglary. Paper presented to the American Society of Criminology annual meeting in Atlanta*. 1977. https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=51937Google Scholar - Birks D, Townsley M, Stewart A: Generative explanations of crime: using simulation to test criminological theory.
*Criminology*2005, 50(1):221–254.View ArticleGoogle Scholar - Bowers KJ, Johnson SD, Pease K: Victimisation and revictimisation risk, housing type and area: A study of interactions.
*Crime Prevention and Community Safety: An International Journal*2005, 7(1):7–17. 10.1057/palgrave.cpcs.8140205View ArticleGoogle Scholar - Brantingham PJ, Brantingham PL:
*Environmental criminology*. Beverly Hills: Sage Publications; 1981.Google Scholar - Brantingham PL, Brantingham PJ: Environment, routine and situation: Toward a pattern theory of crime.
*Advances in Criminological Theory*1993a, 5: 259–294.Google Scholar - Brantingham PL, Brantingham PJ: Nodes, paths and edges: Considerations on the complexity of crime and the physical environment.
*Journal of Environmental Psychology*1993b, 13(1):3–28. 10.1016/S0272-4944(05)80212-9View ArticleGoogle Scholar - Brantingham PL, Brantingham PJ, Vajihollahi M, Wuschke K: Crime analysis at multiple scales of aggregation: A topological approach. In
*Putting crime in its place*. Edited by: Weisburd D, Bernasco W, Bruinsma GJ. New York: Springer; 2009:87–107.View ArticleGoogle Scholar - Chainey S, Ratcliffe J:
*GIS and crime mapping, vol. 6*. Chichester: John Wiley & Sons Inc; 2005.View ArticleGoogle Scholar - Cohen LE, Felson M: Social change and crime rate trends: a routine activity approach.
*American Sociological Review*1979, 44(4):588–608. 10.2307/2094589View ArticleGoogle Scholar - Cornish D, Clarke R:
*The reasoning criminal: rational choice perspectives on offending*. New York: Springer Verlag; 1986.View ArticleGoogle Scholar - Cromwell PF, Olson J, Avary D:
*Breaking and entering: an ethnographic analysis of burglary, vol. 8*. Newbury Park: Sage; 1991.Google Scholar - Crucitti P, Latora V, Porta S: Centrality measures in spatial networks of urban streets.
*Physical Review E*2006, 73(3):036125.View ArticleGoogle Scholar - Davies TP, Fry HM, Wilson AG, Bishop SR: A mathematical model of the London riots and their policing.
*Scientific Reports*2013, 3: 1303.Google Scholar - Diestel R:
*Graph theory*. New York: Springer-Verlag; 2010.View ArticleGoogle Scholar - Eck J, Weisburd D: Crime places in crime theory. In
*Crime and place,*. Edited by: Eck J, Weisburd D. New York: Criminal Justice Press; 1995:3–31.Google Scholar - Farrell G: Progress and prospects in the prevention of repeat victimization. In
*Handbook of crime prevention and community safety,*. Edited by: Tilley N. Cullompton: Willan; 2005:143–170.Google Scholar - Groff ER: Simulation for theory testing and experimentation: An example using routine activity theory and street robbery.
*Journal of Quantitative Criminology*2007a, 23: 75–103. 10.1007/s10940-006-9021-zView ArticleGoogle Scholar - Groff ER: "Situating" simulation to model human spatio-temporal interactions: an example using crime events.
*Transactions in GIS*2007b, 11(4):507–530. 10.1111/j.1467-9671.2007.01058.xView ArticleGoogle Scholar - Grubesic TH, Mack EA: Spatio-temporal interaction of urban crime.
*Journal of Quantitative Criminology*2008, 24(3):285–306. 10.1007/s10940-008-9047-5View ArticleGoogle Scholar - Hillier B: Can streets be made safe?
*Urban Design International*2008, 9(1):31–45.View ArticleGoogle Scholar - Jiang B, Claramunt C: Topological analysis of urban street networks.
*Environment and Planning B: Planning and Design*2004, 31(1):151–162. 10.1068/b306View ArticleGoogle Scholar - Johnson SD: Repeat burglary victimisation: a tale of two theories.
*Journal of Experimental Criminology*2008, 4: 215–240. 10.1007/s11292-008-9055-3View ArticleGoogle Scholar - Johnson SD, Bowers KJ: Burglary prediction: theory, flow and friction. In
*Imagination for crime prevention*. Edited by: Farrell G, Bowers KJ, Johnson SD, Townsley M. Monsey: Criminal Justice Press; 2007:203–223.Google Scholar - Johnson SD, Bowers KJ: Permeability and burglary risk: are cul-de-sacs safer?
*Journal of Quantitative Criminology*2010, 26(1):89–111. 10.1007/s10940-009-9084-8View ArticleGoogle Scholar - Johnson SD, Bowers KJ, Hirschfield A: New insights into the spatial and temporal distribution of repeat victimization.
*British Journal of Criminology*1997, 37(2):224–241. 10.1093/oxfordjournals.bjc.a014156View ArticleGoogle Scholar - Johnson SD, Bernasco W, Bowers KJ, Elffers H, Ratcliffe J, Rengert G, Townsley M: Space–Time Patterns of risk: a cross national assessment of residential burglary victimization.
*Journal of Quantitative Criminology*2007, 23(3):201–219. 10.1007/s10940-007-9025-3View ArticleGoogle Scholar - Johnson SD, Bowers KJ, Birks DJ, Pease K: Predictive mapping of crime by ProMap: accuracy, units of analysis, and the environmental backcloth. In
*Putting crime in its place,*. Edited by: Weisburd D, Bernasco W, Bruinsma GJ. New York: Springer; 2009a:171–198.View ArticleGoogle Scholar - Johnson SD, Summers L, Pease K: Offender as forager? A direct test of the boost account of victimization.
*Journal of Quantitative Criminology*2009b, 25: 181–200. 10.1007/s10940-008-9060-8View ArticleGoogle Scholar - Laycock G: Defining crime science. In
*Crime science: new approaches to preventing and detecting crime,*. Edited by: Smith MJ, Tilley N. Uffculme: Willan; 2005:3–24.Google Scholar - Malleson N, Evans A, Jenkins T: An agent-based model of burglary.
*Environment and Planning B: Planning and Design*2009, 36(6):1103–1123. 10.1068/b35071View ArticleGoogle Scholar - Mohler GO: Self-exciting point process modeling of crime.
*Journal of the American Statistical Association*2011, 106(493):100–108. 10.1198/jasa.2011.ap09546View ArticleGoogle Scholar - Morgan F: Repeat burglary in a Perth suburb: indicator of short-term or long-term risk? In
*Repeat victimisation: crime prevention studies, vol. 12*. Edited by: Pease GF. Monsey: Criminal Justice Press; 2001.Google Scholar - Newman O:
*Defensible space; crime prevention through urban design*. New York: Macmillan; 1972.Google Scholar - Newman MEJ:
*Networks: an introduction*. Oxford: Oxford University Press; 2010.View ArticleGoogle Scholar - Pease K:
*Repeat victimisation: taking stock*. Home Office Police Research Group Crime Detection and Prevention Series, Paper 90. London, UK: Home Office; 1998.Google Scholar - Pitcher AB: Adding police to a mathematical model of burglary.
*European Journal of Applied Mathematics*2010, 21: 401–419. 10.1017/S0956792510000112View ArticleGoogle Scholar - Pitcher AB, Johnson SD: Exploring theories of victimization using a mathematical model of burglary.
*Journal of Research in Crime and Delinquency*2011, 48(1):83–109. 10.1177/0022427810384139View ArticleGoogle Scholar - Porta S, Crucitti P, Latora V: The network analysis of urban streets: a dual approach.
*Physica A: Statistical Mechanics and its Applications*2006a, 369(2):853–866. 10.1016/j.physa.2005.12.063View ArticleGoogle Scholar - Porta S, Crucitti P, Latora V: The network analysis of urban streets: a primal approach.
*Environment and Planning B: Planning and Design*2006b, 33(5):705–725. 10.1068/b32045View ArticleGoogle Scholar - Porta S, Latora V, Wang F, Strano E, Cardillo A, Scellato S, Iacoviello V, Messora R: Street centrality and densities of retail and services in Bologna, Italy.
*Environment and Planning B: Planning and Design*2009, 36(3):450–465. 10.1068/b34098View ArticleGoogle Scholar - Porta S, Latora V, Wang F, Rueda S, Strano E, Scellato S, Cardillo A, Belli E, Càrdenas F, Cormenzana B, Latora L: Street centrality and the location of economic activities in Barcelona.
*Urban Studies*2012, 49(7):1471–1488. 10.1177/0042098011422570View ArticleGoogle Scholar - Shaw C, McKay H:
*Juvenile delinquency and urban areas: a study of rates of delinquency in relation to differential characteristics of local communities in American cities*. Chicago: University of Chicago Press; 1969.Google Scholar - Sherman LW, Gartin PR, Buerger ME: Hot spots of predatory crime: Routine activities and the criminology of place.
*Criminology*1989, 27(1):27–56. 10.1111/j.1745-9125.1989.tb00862.xView ArticleGoogle Scholar - Short M, D’Orsogna M, Pasour V, Tita G, Brantingham P, Bertozzi A, Chayes L: A statistical model of criminal behavior.
*Mathematical Models and Methods in Applied Sciences*2008, 18(S1):1249–1267.View ArticleGoogle Scholar - Short M, D’Orsogna M, Tita G, Brantingham P: Measuring and modeling repeat and near-repeat burglary effects.
*Journal of Quantitative Criminology*2009, 25(3):325–339. 10.1007/s10940-009-9068-8View ArticleGoogle Scholar - Summers L, Johnson SD, Rengert GF: The use of maps in offender interviewing. In
*Offenders on offending: Learning about crime from criminals,*. Edited by: Bernasco W. Cullompton: Willan; 2010:246–272.Google Scholar - Townsley M, Homel R, Chaseling J: Infectious burglaries. A test of the near repeat hypothesis.
*British Journal of Criminology*2003, 43(3):615–633.View ArticleGoogle Scholar - Weisburd D, Bushway S, Lum C, Yang S-M: Trajectories of crime at places: a longitudinal study of street segments in the city of Seattle.
*Criminology,*2004, 42(2):283–322. 10.1111/j.1745-9125.2004.tb00521.xView ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.