See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/223263162
Crime reduction through simulation: An agentbased model of burglary
Article in Computers Environment and Urban Systems · May 2010
DOI: 10.1016/j.compenvurbsys.2009.10.005 · Source: DBLP
CITATIONS
READS
53
499
3 authors, including:
A.J. Heppenstall
Linda M. See
53 PUBLICATIONS 673 CITATIONS
187 PUBLICATIONS 2,943 CITATIONS
University of Leeds
SEE PROFILE
International Institute for Applied Systems A…
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
LandSense - A Citizen Observatory and Innovation Marketplace for Land Use and Land Cover
Monitoring View project
World Urban Database and Access Portal Tools (WUDAPT) View project
All content following this page was uploaded by A.J. Heppenstall on 23 April 2014.
The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document
and are linked to publications on ResearchGate, letting you access and read them immediately.
Computers, Environment and Urban Systems 34 (2010) 236–250
Contents lists available at ScienceDirect
Computers, Environment and Urban Systems
journal homepage: www.elsevier.com/locate/compenvurbsys
Crime reduction through simulation: An agent-based model of burglary
Nick Malleson *, Alison Heppenstall, Linda See
School of Geography, University of Leeds, Leeds LS2 9JT, United Kingdom
a r t i c l e
i n f o
Article history:
Received 30 April 2009
Received in revised form 25 August 2009
Accepted 22 October 2009
Keywords:
Agent-based modelling
Burglary
Computer simulation
Crime reduction
a b s t r a c t
Traditionally, researchers have employed statistical methods to model crime. However, these approaches
are limited by being unable to model individual actions and behaviour. Brantingham and Brantingham
(1993) described that in their opinion a useful and productive model for simulating crime would have
the ability to model the occurrence of crime and the motivations behind it both temporally and spatially.
This paper presents the construction and application of an agent-based model (ABM) for simulating
occurrences of residential burglary at an individual level. It presents a novel framework that allows both
human and environmental factors to be simulated. Although other agent-based models of crime do exist,
this research represents the first working example of integrating a behavioural framework into an ABM
for the simulation of crime. An artificial city, loosely based on the real city of Leeds, UK, and an artificial
population were constructed, and experiments were run to explore the potential of the model to realistically simulate the main processes and drivers within this system. The results are highly promising,
demonstrating the potential of this approach for both understanding processes behind crime and improving policies and developing effective crime prevention strategies.
Ó 2009 Elsevier Ltd. All rights reserved.
1. Introduction
Understanding the processes behind crime is an important research area in criminology which has major implications for both
improving policies and developing effective crime prevention
strategies (Brantingham & Brantingham, 2004; Groff, 2007a). Recent advances in criminology, such as routine activities theory
(Cohen & Felson, 1979), lifestyle exposure theory (Hindelang,
Gottfredson, & Garofalo, 1978) and crime pattern theory
(Brantingham & Brantingham, 1993) have highlighted a shift from
the study of the motivation of offenders to understanding the social and environmental contexts in which crimes occur. However,
in order to test these ‘‘opportunity theories”, it is essential to be
able model the complex, dynamic interactions of the individuals
involved in each crime event, their interactions with other agents
and the environment. Current approaches to modelling crime are
limited in their scope/usefulness due to an inability to model the
complex micro-level interactions that characterise this system
(Groff, 2007a).
The ability to more accurately represent, simulate and thus prevent and reduce crime is at the forefront of crime prevention policies in the UK. For example, in the city of Leeds, the public body
responsible for implementing and evaluating crime reduction
strategies, Safer Leeds, are involved in developing strategies to reduce residential burglary, which has been consistently the highest
* Corresponding author. Tel./fax: +44 113 343 6757.
E-mail address: n.malleson06@leeds.ac.uk (N. Malleson).
0198-9715/$ - see front matter Ó 2009 Elsevier Ltd. All rights reserved.
doi:10.1016/j.compenvurbsys.2009.10.005
when compared to any other local authority in England and Wales
(Shepherd, See, Kongmuang, & Clarke, 2004). However, one of the
central challenges of modelling a system as complicated as that
of residential burglary lies in simulating human behaviour within
a computer environment. Humans exhibit soft factors such as
seemingly irrational behaviour and complex psychology (Bonabeau, 2002); these characteristics are highly challenging to simulate in a computer model. This is compounded by the fact that
burglars can be classified as experts in their field (Nee & Meenaghan, 2006); they possess a range of both behavioural characteristics and specific knowledge that is unique to them. Many studies
have interviewed burglars (both incarcerated and active) to gather
qualitative evidence regarding their behaviour and motives (Brown
& Bentley, 1993; Cromwell & Olson, 2005, chap. 5; Hearnden &
Magill, 2003; Nee & Meenaghan, 2006; Wright & Decker, 1996).
While these studies have revealed valuable insights into the possible behaviour and motives of offenders (many of which have been
incorporated into the design of the model presented here), they often suffer from problems associated with sampling of a small population and lack of rigorous empirical testing. Quantitative studies
have helped to establish general trends in burglar behaviour
(Bernasco & Luykx, 2003; Massey, Krohn, & Bonati, 1989; Snook,
2004). However, these approaches are limited due to the use of
aggregated data and they are unable to represent the micro-level
human and environmental factors that dictate whether or not an
individual crime event will occur.
One technique that shows considerable promise for overcoming
these limitations is agent-based modelling (ABM). ABM represents
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
a shift in the social sciences towards the use of models that work at
the level of the individual. For a recent overview of applications,
see Paredes and Hernández (2008). ABMs are comprised of autonomous, decision making entities called agents that have the ability
to interact with each other and their environment (Bonabeau,
2002). Agents can represent individuals, groups of individuals
and, if appropriate, inanimate objects such as houses or cars. As
the model iterates, each agent has the ability to assess its circumstances, and based on a set of probabilistic rules, makes an informed/educated decision about its future course of action
(Bonabeau, 2002). Through this mechanism, more realistic human
behaviour can be incorporated (Moss & Edmonds, 2005).
Simulating residential burglary is a particularly challenging
problem, largely because the system can be regarded as highly
complex. Not only does it contain potentially unlimited entities
(broadly categorised as social, environmental and behavioural factors) linked by often unknown and non-linear relationships, this
system is highly dynamic, changing both over time and space.
For example, an occurrence of a residential burglary is affected
by the time of day, a combination of spatial and environmental factors (e.g. low security, easily accessible property) and individual
behaviour (opportunistic crime, individual motivation). One of
the most attractive elements of ABM is the ability to experiment
with different crime theories and reduction policies before implementation in the real system. Examples of this type of application
can be found in the areas of urban planning (Al-Ahmadi, Heppenstall, Hogg, & See, 2009) and education (Harland & Stillwell, in
press, chap. 16). The development and application of an ABM for
simulating residential burglary thus provides a unique opportunity
to both further understanding of the processes and dynamics of
this system as well as providing a platform for testing out crime
reduction policies.
Brantingham and Brantingham (1993) described that, in their
opinion, a useful and productive model for simulating crime would
include the ability to model the occurrence of crime and the motivations behind it in a dynamic time and space. This paper presents
the development and application of an ABM for simulating the
occurrence of crime (specifically residential burglary) at an individual level. A particular focus of this paper is the modification
and inclusion of the Physical conditions, Emotional states, Cognitive capabilities and Social status (PECS) framework for simulating
more realistic human behaviour within a computational/artificial
environment. The model is tested through the development of an
artificial city loosely based on the real city of Leeds, UK. Previous
approaches to crime modelling are discussed in Section 2, illustrating how this approach enhances existing work to date. The PECS
framework along with details of how this was integrated into the
ABM is outlined in Sections 3 and 4. A series of experiments testing
the behaviour and robustness of the model are presented in Section 5. Sections 6 and 7 conclude with a discussion of the results
and a critique of the methodology while future work is briefly outlined in Section 8.
2. Previous approaches to crime modelling
The crime system is driven by a large number of interrelating
factors. These include, but are not limited to, an offender’s individual perception and knowledge of the physical environment, the
suitability or attractiveness of the target, the offenders cognitive
representation of the environment, the layout of the physical environment and other factors relating to the surrounding community
(Brantingham & Brantingham, 1993).
Environmental criminology has employed numerous methods
for understanding and examining the most important environmental factors that influence how criminals choose their targets (Bran-
237
tingham & Brantingham, 1993). Early seminal work by Shaw and
McKay (1969) utilised mapping techniques to investigate the link
between juvenile delinquency and social or cultural characteristics. The authors found that juvenile delinquency rates were at
their highest in city centres and exhibited similar spatial patterns
to other indicators of social problems. Advances in geographical
information systems (GIS) and the availability of individual-level
data have catalysed the development of more advanced mapping
analysis techniques such as ‘‘hotspot detection (Grubesic & Murray, 2001). For example, Pain, MacFarlane, Turner, and Gill (2006)
overlaid crime hotspot maps with streetlight location maps to
investigate the impact that street lighting had on crime and fearof-crime levels; the results were used to inform existing street
lighting policies. Although these techniques are invaluable for
crime prevention practitioners (due in part to their ability to highlight areas with unusually high crime rates), they fail to provide insights into the dynamics and processes that govern these systems.
In addition to mapping techniques, statistical or mathematical
models have also been widely used. Early examples include the
use of principal components analysis to investigate the factors
related to social deprivation (Giggs, 1970) and cluster analysis to
search for associations between crime and environmental factors
(Brown, Mcculloch, & Hiscox, 1972) (although these approaches
are strongly criticised by Baldwin (1975) who describes them as
‘‘unilluminating”). More recent statistical modelling has been centred around the use of regression models. For example, Craglia,
Haining, and Signoretta (2001) compared high intensity crime
areas to census data whilst Dahlbäck (1998) found high population
density and weak social bonds to be associated with high theft
rates through application of longitudinal multivariate regression.
Other studies using regression include Gaviria and Pagés (2002)
research that linked the chance of being a victim to individual
and city-wide variables, and Meera and Jayakumar (1995) who
attempted to explain the relationship between rising levels of
crime and different demographic and economic variables. These
approaches have revealed interesting links between crime and
other variables, but they are unable to account for the motivations
and impact of individual actions upon both other individuals and
the environment.
Advances in software engineering catalysed by increases in
computer data storage and processing power has precipitated an
uptake in computational approaches to the modelling of crime. A
recent example can be found in the work of Kongmuang, Clarke,
Evans, and Ballas (2005) and Kongmuang (2006) who utilised spatial micro-simulation and spatial interaction models to investigate
urban residential burglary rates. This research both successfully
estimated offender flows within a city and predicted the risk of
being a victim of residential burglary at the individual level. Despite the advances that this technique provided, this work was limited by the inherent inability of micro-simulation to model
interactions between individual entities and most importantly
cannot represent human behaviour.
A central drawback common to each of the approaches discussed above is that they fail to address the importance of individual incidents located in a specific time and space. Instead, findings
are concerned with general, aggregate patterns; this makes it difficult to draw conclusions regarding how the individual behaviour of
victims or offenders may be affecting the occurrence and rate of
crime. Brantingham and Brantingham (1993) describe that, potentially, the most productive model in criminology will be the model
that ‘‘places both the actual criminal events at a specific site, situation and time and the individual committing the crime while in a
specific motivational state on (or in) an environmental backcloth,
that may itself be mostly stable, regular and predictable or may instead be irregular, rapidly changing and unpredictable.” Due to
their aggregate nature, traditional statistical modelling techniques
238
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
are limited in their ability to represent local variation present in
the ‘‘environmental backcloth”. Factors such as the individual location of houses (e.g. corner blocks) (Taylor & Nee, 1988), their visibility to neighbours and passers-by (Robinson & Robinson, 1997)
and the layout of the local street network (Bevis & Nutter, 1977)
will affect their propensity to be burgled; however, these factors
cannot be incorporated into models which do not operate at the level of the individual.
To improve our understanding of the trends and characteristics
of crime patterns, it is necessary to examine the individual actors
who play important roles in discrete crime events. ABM has been
applied to a vast number of subject areas including computer systems that assist car drivers (Miller, Hwang, Torkkola, & Massey,
2003), pedestrian movements (Castle & Crooks, 2006; Turner &
Penn, 2002), human immune systems (Jacob, Litorco, & Lee,
2004) and simulating processes and dynamics in the retail petrol
market (Heppenstall, Evans, & Birkin, 2005). Despite this uptake,
the potential benefits of ABM are only just beginning to be realised
in criminology; current work is briefly outlined below. For a detailed review of the theory and concepts behind ABM, the reader
is directed to Axtell (2000).
Early agent based crime models were relatively simple but began to show that the technique can hold promise in the field of
criminology. For example, Winoto (2003) investigated rational
choice and whether a society without crime is attainable, Gunderson and Brown (2000) presented a methodology for predicting
both physical- and cyber-crime and Melo, Belchior, and Furtado
(2005) modelled police patrol route reorganisation. More recently, even more advanced models have begun to emerge. Notable sources are the recent book entitled ‘‘Artificial Crime Analysis
Systems: Using Computer Simulations and Geographic Information Systems” (Liu & Eck, 2008) and a special issue of the Journal
of Experimental Criminology (Groff & Mazerolle, 2008). Models
found in these publications, and others, cover a wide range of
applications. Simulations which attempt to make predictions
about crime rates include drug market dynamics in Melbourne
(Dray, Mazerolle, Perez1, & Ritter, 2008), street robbery in Seattle
(Groff, 2006, 2007a, 2007b), crime patterns in Cincinnati (Liu,
Wang, Eck, & Liang, 2005) and burglary in an abstract environment (Hayslett-McCall et al., 2008, chap. 14). Agent-based crime
models are also under development whose aim is not to actually
predict crime rates but experiment with criminological ideas. For
example, Brantingham, Glasser, Kinney, Singh, and Vajihollahi
(2005b), Brantingham, Glässer, Jackson, Kinney, and Vajihollahi
(2008, chap. 13), have used the abstract state machine formalism
to represent agents who have memory, behaviour and motivations who can be situated in an abstract environment. The resulting simulation can be used as an interdisciplinary tool to assist
criminologists in investigating the dynamics of urban crime. In
a similar vein, Wang, Liu, and Eck (2008, chap 11) outlined a tool
to study the interactions between actors involved in a crime
event.
To improve upon the previous models, this research will present a model that includes a larger number of factors and a more
accurate model of human behaviour to better represent the real
burglary system. These factors include the effect of drug addictions
(Wright & Decker, 1996), offenders’ perceptions of their physical
environment (Brantingham & Brantingham, 1993; Beavon, Brantingham, & Brantingham, 1994) and physical characteristics of
the local area (Brown & Bentley, 1993). Furthermore, accurate human behaviour is incorporated via a comprehensive cognitive
framework which is the subject of the following section. However,
in one respect this model appears less evolved than others: it does
not include a realistic urban environment as accomplished in
Groff’s (and others’) work. Because this model is more advanced
in other areas, the first challenge is to ensure that the dynamics
are fully understood before increasing the complexity. This is
noted by Elffers and van Baal (2008, chap. 2) as an extremely
important step because an overly-complicated model might be
no easier to understand than the real system it is modelling. However, including a realistic backcloth is an eventual goal of this research because it will enable crime predictions that relate to the
real world and might be able to influence policy. The final part of
the paper will discuss the challenges of including a realistic backcloth in a model such as this.
3. Incorporating human behaviour into an ABM: The PECS
framework
An agent’s architecture determines how the functionality of the
agent is organised and how human or biological traits such as reasoning, beliefs, attitudes and behaviour can be replicated (Singh,
2005). A number of architectures have been proposed to address
how these traits should be mimicked; two of these are outlined.
Perhaps the most popular architecture used is the Beliefs–Desires–Intentions (BDI) model. This architecture has been used in
several areas, including air traffic management systems (Rao
et al., 1995), simulations of geo-political conflicts (Taylor, Frederiksen, Vane, & Waltz, 2004) and frameworks for models of crime
reduction (Brantingham et al., 2005b, Brantingham, Glasser,
Kinney, Singh, & Vajihollahi, 2005a). Despite its uptake, BDI has
been widely criticised. Some authors criticise the three core components (beliefs, desires, and intentions) of the architecture as
being too restrictive while others feel that they are overly complicated (Rao et al., 1995). Fundamentally, the architecture assumes
rational decision making; this is difficult to justify because people
rarely meet the requirements of rational choice models (Axelrod,
1997). Brailsford and Schmidt (2003) see the restriction of the
architecture to cognitive processes as a limitation; BDI cannot
integrate physical, emotional or social processes or the interactions
between them. Balzer (2000, chap. 5) also notes that the core
elements are difficult to observe directly: observation can only
be achieved in a laboratory setting which is unlikely to relate to
real situations.
An alternative, but rarely used, architecture is the PECS framework (Physical conditions, Emotional states, Cognitive capabilities
and Social status). Proposed by Schmidt (2000) and Urban (2000,
chap. 6), this architecture states that human behaviour can be
modelled by taking into account physical conditions, emotional
states, cognitive capabilities and social status. Personality is incorporated into the agents by adjusting the rate that internal state
variables change and also how these changes are reflected in agent
behaviour (Schmidt, 2002). The framework is modular, allowing
separate components to control each aspect of the agent’s behaviour (Martinez-Miranda & Aldea, 2005). Proponents of PECS cite
that as rational decision making is not required and the framework
is not restricted to the factors of beliefs, desires, and intentions
(Schmidt, 2000), it is an improvement on the BDI architecture.
To illustrate the PECS features, an example proposed by Urban
(2000, chap. 6) is adapted here. Consider a person in a shop who
is contemplating purchasing some goods. They might experience
physical needs (such as hunger), emotional states (such as surprise
at the available goods), cognition (such as information about
current prices) and social status (which could affect how the agent
reacts to the shop assistant). Schmidt (2000) and Urban (2000,
chap. 6) argue that every aspect of human behaviour can be
modelled using these components although, depending on the
application, it might not be necessary to incorporate all of them
(Schmidt, 2002).
Despite documented use of the framework being limited, the
applications that have incorporated it are diverse. For example,
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
PECS has been used to build emotions into a virtual learning environment (Ammar, Neji, & Gouardères3, 2006; Neji & Ammar,
2007). Here, non-verbal communication was incorporated in the
form of emotional facial expressions with the aim of improving
the relationship between a human learner and a computer-controlled tutor. In the field of health care, Brailsford and Schmidt
(2003) used the framework to improve a simulation of disease
screening. The authors noted that through the use of PECS they
were able to incorporate individual behaviour; an important determinant of a patient’s attendance at a screening session, a factor
that is absent from the majority of models in their field.
PECS places behaviour into two categories: reactive and deliberative. Reactive behaviour encompasses actions that are largely
instinctive; no deliberation is required. Schmidt (2000) describes
how reactive behaviour can be subdivided:
Instinctive behaviour. An automatic reaction to stimulus depending on the internal state of the agent, for example, a parent
reacting instinctively to a child’s cry. Instinctive behaviour can
be easily incorporated using pre-defined rules.
Learned behaviour. Here, rules are learnt dynamically, for example Schmidt (2000) cites the example of a car driver who instinctively brakes if a child runs in front of their car.
Drive controlled behaviour. This behaviour is directed by internal
drivers to satisfy needs. Needs range from basic, for example
preserving life (such as the need for food or safety) to social needs
and intellectual needs. The drivers determine an individual’s
behaviour as they attempt to satisfy the drive with the greatest
intensity. The following function is used to determine drive
intensity:
T ¼ f ðN; V; XÞ
where N is the need, V represents environmental influences and
X represents other influences. For example, if hungry, an individual will have a strong drive to eat if N is high. However, the environment also plays a part, the drive to eat may be stronger if the
person can smell food, even if N is not great.
Emotionally controlled behaviour. As with drives, if emotions are
strong enough this will dictate the behaviour of the agent. However, the key difference is that they are stimulated externally,
and not by internal state changes. Schmidt (2000) defines the
intensity of emotions, E as,:
E ¼ gðI; A; XÞ
where I represents the importance of the event that has generated the emotion, A the agent’s personal assessment of the event
and X represents other influences.
Schmidt (2000) also discusses deliberative behaviour. With reactive forms of behaviour the organism is not truly aware of the reasons that cause their behaviour. For example, they are not aware
that looking for food is a task which ultimately ensures survival.
Agents who engage in deliberative behaviour, however, do so in order to consciously pursue goals. These goals, such as take up a new
hobby, can be complex and might involve numerous intermediate
targets. As Section 4.1 will illustrate, the model presented here primarily uses reactive forms of behaviour to drive the agents, but the
agents then use deliberative techniques to satisfy their goals.
The next section will outline how the PECS framework is implemented in an agent-based model (ABM) to introduce realistic
behaviour into the agents (people).
4. An agent-based model of burglary
This section explains the framework of the agent-based model
of burglary, in particular the characteristics, behaviours and cogni-
239
tive maps of the offender agents and the model’s physical
environment.
4.1. The agents
The model is populated by ‘‘people” agents. All agents possess
the same basic structure and fundamental needs: the need to generate wealth and the need to sleep (more details will follow). These
people agents are further divided into two groups: those who can
always generate sufficient wealth through legitimate work
(termed ‘citizens’) and those who do not have sufficient employment and must burgle occasionally (the ‘potential burglars’). Potential burglars are assigned random amounts of work each day;
however the amount of work does not always fully satisfy their
need for wealth. This behaviour is consistent with the literature.
For example, Wright and Decker (1996) found that burglars are often employed and this employment can lead to them discovering
new, suitable targets that they would be otherwise unaware of.
As discussed later, we recognise that this is a vast simplification
and do not support the notion that all unemployed people are
burglars!
The roles of the agents do not change; a potential burglar agent
cannot become a citizen and vice-versa. Although this is a simplification of real life, whereby external circumstances might drive
people towards or away from burglary (effectively changing their
‘role’), the model is based on the burglar’s individual behaviour
and their relationship with the physical environment rather than
the social or political processes which drive people towards a life
of crime. This area of research will, however, inform future work.
The number of agents in each model run can be varied, but for
the experiments outlined here, was fixed at 300. This value was
chosen to ensure that the majority of the houses in the environment are occupied by an agent. However, there are also unoccupied houses: this allows for future examination of the difference
that citizen daily habits have on their burglary risk. When they
are created, each agent has a 5% chance of being a burglar agent
and a 95% chance of being a citizen. These percentages have been
chosen under the assumption that the number of burglars in the
population is small. As the model is not trying to predict actual
numbers but spatial patterns, this weighting is felt to be reasonable. The total number of agents and the probabilities of being a
burglar or citizen can be varied but they are kept constant for all
experiments outlined here. This results in approximately 15 burglar agents in each model, although (due to the probabilistic nature
of agent generation) the total number in each run will vary slightly.
Wealth is used to encompass factors that require money for satisfaction, for example, the need to buy food, socialise, support a
family or sustain a drug addiction. All agents also require sleep
which must be sought at home. Levels of wealth and sleep deteriorate at a constant rate throughout the simulation and can be
replenished by working, burgling or sleeping. Using these two
needs it is possible to create behaviour which can be generally
found in the daily patterns of employed people in most cities. An
avenue for future research is the transference of this work from a
homogenised case-study to an application based on a real city.
Fig. 1 and Table 1 illustrate how the needs of an agent drives
their actions. PECS intensity functions are used to calculate which
need is the greatest at each time step. For each agent, the intensity
functions take into account the current levels of wealth and sleep,
the agent’s personal preference for generating wealth or sleeping
and the current time of day. It should be noted that not all the possible features of the PECS framework have been included in the
model at this stage. For example, social variables do not play a part
in the model. As Schmidt (2000) notes, it is important to choose the
behavioural factors which are important in the chosen system, not
to try to include all possible variables. At this stage the effects of
240
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
Wealth
Work
f(N,E,X)
Intensity
Analyser
Sleep
Burgle
Action
Planner
f(N,E,X)
Sleep
PECS intensity
functions
Level of
need
Determine
goal
Fig. 1. Agent needs and behaviour. The agents’ needs and how their intensities determine the behaviour of the agents, adapted from Schmidt (2000).
Table 1
How actions are generated from PECS needs.
Need
Generate wealth
Sleep
Description of the need
The need to generate wealth: a proxy for any activity which requires
wealth to satisfy it.
Based on the time of day, T, the agent’s current level of wealth, W
and the agent’s personal preference for generating wealth, P:
The need to sleep.
Based on the time of day, T, the agent’s current level of sleep, S
and the amount of sleep the agent needs each day, A:
It ¼ f ðW t ; Pt ; T t Þ
It ¼ f ðSt ; At ; T t Þ
Try to obtain wealth, either through employment (if available) or
through burgling (if not employment is available).
Go home as soon as possible to sleep.
PECS intensity value, I, at
time, t.
Resulting agent behaviour
if intensity is strongest
social interactions are deemed too complex to be of use in the
model.
Personal preferences allow for the inclusion of heterogeneous
agents. For example, a drug addiction which requires considerable
wealth to satisfy could be simulated by including agents whose
personal preferences for generating wealth are higher than others.
At this stage of research, however, personal preferences are not
varied so the burglar agents are homogeneous.
Fig. 2 illustrates how T influences the overall intensity of the
wealth and sleep needs where time t = 0 is set to approximately
7am. The need to work is largest during the day whereas the need
for sleep is the strongest during the night.
It is worth noting that, at a first glance, it appears that the model only includes the most basic of human behaviours as stipulated
by PECS: that of reactive behaviour. The agents have simple needs
Fig. 2. Need intensities over time. How the time of day affects an agents need to
generate wealth or sleep where Time t = 0 is defined as approximately 7am.
that they must satisfy and the strongest of these needs drives their
behaviour. However, the behaviour required to satisfy a need is
more complex than simple reactive behaviours will allow for.
The agents use learned behaviour (they remember where they
have visited which influences future choices regarding where to
look for burglary targets) and even deliberative behaviour when
trying to find a burglary target as they are involved in ‘‘conscious
pursuit of goals” (Schmidt, 2000). So whilst the agents do not know
why they need to satisfy their goals (a reactive trait) the methods
they use to satisfy them are complex and involve the conscious
pursuit of goals with intermediate stages (a deliberative trait).
4.2. Cognitive maps and temporary employment
An important feature of the model is the inclusion of ‘cognitive
maps’. These maps represent each agent’s internal representation
of their environment. According to routine activities theory, crime
pattern theory and qualitative studies (Cromwell & Olson, 2005,
chap. 5; Wright & Decker, 1996), a potential offender is likely to
find a suitable target by passing one on their routine travels. The
model presented here uses this theory with the cognitive maps
adapted from Brantingham and Brantingham (1993) activity
spaces concepts. As the agents move around the environment
(whether they are looking for a burglary target, or simply travelling
to work or home) they remember each house that they have
passed. These houses and their locations in the environment are
stored internally by each agent as a list. The agents also remember
the levels of security and attractiveness of the houses that they
have stored in their map. These parameters will be explained in
the following sections along with a detailed description of how
the agents’ cognitive maps are used for burglary.
Assigning potential burglar agents temporary employment allows the agents to visit areas of the environment that they might
not do otherwise. This helps them to build up their cognitive maps.
Although employment is seen as an essential aspect of the burglary
system the different types of employment that agents can engage
in (for example industries that service houses such as delivery
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
companies) are not investigated in this iteration of the model
development. This will be a future research stream.
4.3. The model environment
The agents populate an artificial environment that is designed
to reflect many of the urban features found in modern cities. There
is a commercial area in the centre of the environment and this is
surrounded by residential properties. This environmental layout
does not represent an entire city, rather a small ‘‘micro” town centre. This type of pattern is repeated throughout modern cities,
where commercial and residential areas are fairly mixed (in Leeds,
for example, only 30% of employment is found in the city centre
Unsworth & Stillwell, 2004). Fig. 3 illustrates the layout of the environment. Although simple and hypothetical, the model environment was designed to allow comparisons with real urban
configurations. A central business district represents the centre of
employment for city residents, which is a feature found in many
modern cities. In this respect the model imitates part of the concentric ring model (Burgess, 1925), although later experiments
incorporate communities that are distributed in a less orderly fashion. This corresponds better to British historical housing developments which are often initiated by local councils who build
wherever they own land (Baldwin & Bottoms, 1976) and illustrates
that the model is highly flexible because the environment can be
adapted to reflect the type of city under examination.
The environment is constructed on a grid measuring 41 31
cells. Some squares are ‘‘empty” and play no part in the model because agents do not move diagonally, only horizontally or vertically. There are three types of cell in the environment: the
commercial district, roads, and residential properties. Agents use
roads to navigate the environment, always taking the shortest path
from their current location to their destination. Each cell in the
commercial district represents a single office that provides
employment for an unlimited number of agents. The residential
properties house the agents (maximum of one agent per house)
and also act as burglary targets (one cell represents one house).
The houses have two defining characteristics: security and attractiveness. The security variable is a measure of the level of security
of a property, encompassing both physical security and security
utilisation; attractiveness is a measure of the wealth of the property. As noted previously, agents remember properties that they
pass, along with their security and attractiveness values, by storing
them in an internal list (their ‘‘cognitive map”). It has been suggested that burglars in the real world will use environmental cues
to determine how attractive or secure a property is. This is accom-
Fig. 3. The model environment. Note that agents in the model cannot move
diagonally so empty spaces play no part in the simulation because they cannot be
accessed from a road.
241
plished in the model by providing agents with the exact security/
attractiveness values of the houses that they pass. A future research direction could be to investigate what would happen if
the agents did not know the exact security or attractiveness and
had to use their intuition to guess the values.
Levels of security and attractiveness are dynamic: if a burglary
is committed this results in the attractiveness of the victimised
property increasing along with smaller increases in the surrounding properties. The victimised property and those adjacent then remain at a higher risk for several days following the burglary. This
‘‘near repeat” phenomena has been found to exist in the criminology literature (Townsely, Homel, & Chaseling, 2003) and by police
force managers (Johnson, 2007). In the UK city of Leeds, there are
several proactive crime prevention initiatives which target properties in close proximity to a recent burglary. For this reason, the
security levels of the victim and the surrounding properties are increased along with attractiveness after a burglary is committed.
These levels of attractiveness and security gradually degrade as
the residents become complacent of the risks (from anecdotal evidence); if no further burglaries are committed, the security returns
to base levels.
Upon initialisation of the simulation, each agent is randomly assigned a home address and work place (which will be within the
commercial district). The experiments presented in this paper
place the potential burglar agents both in low-income areas and
also distributed evenly throughout the environment. The agents
use roads to travel between different addresses and can traverse
one square per model iteration. Agents always take the shortest
(optimal) route between their origin and destination. Further research will focus on a more accurate representation of travel
through the area. Time is measured in the simulation through
model iterations; one iteration is classified as 3 min. This means
that it will take agents between 10 and 60 min to travel to work
depending on their origin. There are therefore 20 iterations per
hour and 240 in a day.
4.4. Modelling offender behaviour
There are two main branches of research into understanding
how potential burglars behave, their motivations and their responses to environmental cues. These can be broadly classified as
qualitative using interview data and quantitative using large data
sets and statistical models to establish trends and patterns of potential burglar behaviour. Although different in methodology,
these studies draw very similar conclusions; these will be used
in the design and implementation of behaviour in the agents. Table 2 outlines findings from studies in the criminology literature
and how these will be incorporated into the model to provide a
sound theoretical foundation.
The burglary process works as follows:
1. The burglar agent decides that they must commit a burglary to
generate wealth because they do not have any temporary
employment.
2. The agent chooses a house to visit from the list of all those they
know about (the houses that are stored in their cognitive map).
A ‘‘roulette wheel selection” process is used so that each house
has a probability of being chosen based on its attractiveness.
3. The agent travels directly to the chosen house using the shortest path. As they pass houses they examine their security to
determine whether or not they are suitable for burglary.
4. If the agent reaches their chosen house and has not found a
suitable burglary target they choose another house from their
cognitive map (using the same roulette-wheel procedure) and
begin the process again.
242
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
Table 2
How the motives of potential burglars and their responses to environmental cues will be implemented in the model.
Behaviour/motive
Implementation in model
Need for money is the primary reason for burglary (Bennett & Wright, 1984;
Bernasco & Luykx, 2003; Nee & Meenaghan, 2006; Repetto, 1974; Rengert &
Wasilchick, 1985; Wright & Decker, 1996) and usually to buy drugs (Cromwell
et al., 1991; Hearnden & Magill, 2003; Scarr, 1973).
The decision to burgle is made away from the actual crime scene and the potential
offender then travels to a target noted previously (Hearnden & Magill, 2003;
Nee & Meenaghan, 2006; Wright & Decker, 1996).
Few burglars can be classed as ‘‘opportunistic” although most interviewees will
alter their usual routine if a particularly attractive target presents itself (Nee &
Meenaghan, 2006).
The expected ‘‘yield” is the most important consideration when selecting a target
(Hearnden & Magill, 2003; Nee & Meenaghan, 2006) which can range from $0
to $12,950 (Snook, 2004).
Burglars will not usually enter occupied properties (Cromwell et al., 1991; Nee &
Meenaghan, 2006; Wright & Decker, 1996).
Agents in the model burgle to satisfy the desire for wealth. Drug addiction can be
represented by increasing the personal preference for generating wealth. Agents
with these characteristics will quickly become desperate to generate wealth as if
they had a drug addiction to satisfy.
Agents build a cognitive map of their environment and choose targets from these
known areas.
Most burglars will return to previously burgled properties, usually because they
know what goods are available and how to enter the property. (Hearnden &
Magill, 2003; Wright & Decker, 1996).
Properties close to the burglar’s home are more likely to become victims
(Bernasco & Nieuwbeerta, 2005; Snook, 2004). This is partly because the
offender knows the area well and does not need to carry stolen objects too far
(Hearnden & Magill, 2003) and also because the potential burglar chooses
targets from within their cognitive awareness space (Bernasco & Nieuwbeerta,
2005).
Suitable targets are often found by passing them on their routine activities
(Cromwell & Olson, 2005; Wright & Decker, 1996)
Two criteria determine whether a target property will be burgled: occupancy and security. An occupied property will never be
burgled and the potential burglar is less likely to burgle a secure
property particularly if there are possible targets with lower levels
of security. These elements are consistent with many findings,
including Cromwell, Olson, and Avary (1991), Wright and Decker
(1996), Nee and Meenaghan (2006). There are no ‘‘unsuccessful”
burglaries at present, the burglar either commits a burglary or does
not, based solely on the security of the target property and whether
or not it is occupied. Therefore if the security of all houses is increased there will be fewer burglaries and the agents’ levels of
wealth will steadily decrease. In this sense, therefore, the number
of burglaries in the model is essentially fixed and the model is only
able to compare changing patterns of burglary, not overall rates.
Allowing for unsuccessful burglaries and other agent behaviours
(such as choosing not to burgle at all) will form interesting avenues
for future research.
Determining the amount of money which can be generated
from a burglary is non-trivial. Snook (2004) found that the average
amount was $900, but the range was $0–$12,950 and the value depended on the distance travelled. For simplicity, agents in the model are given the equivalent of one full day of employment. Although
this is less than might be expected from real data, it will cause the
agents to commit a larger number of burglaries in a given time
allowing results to be generated more quickly. This is an important
consideration with agent-based models: every agent must make
decisions at every iteration which can lead to very large execution
times.
The behaviour that is being examined in this model is a simplification of offending behaviour; for example, it is obviously too
simplistic to state that an individual will automatically turn to burglary if they have no money. However, there is a scientific basis for
not overcomplicating a model. Schmidt (2000) for example, notes
that a model does not need to replicate reality, if it did then it
would cease to be a model. Furthermore, Elffers and van Baal
(2008, chap. 2) note that crime models can become overcomplicated, making it difficult to understand and experiment with the
During the journey to their chosen target, agents examine properties which they
pass and will commit a burglary if the target is deemed suitable.
Potential burglars choose to travel to the most attractive property they are aware
of.
When occupants are at home a burglar agent will not victimise the property. The
burglars agents always ‘‘know” if a person is at home; they do not use
environmental cues as they might do in the real world.
Once a burglary has been committed, the attractiveness of the victimised property
increases which encourages the agent to return at a later date.
Properties close to a burglar agent’s home are more likely to form part of the
agent’s cognitive map and are therefore a higher burglary risk.
The agent’s cognitive map is built up from their routine activities and a target is
chosen from these known properties.
rules that underpin the model. For this model, the inclusion of different types of crime and a complex cognitive framework which
gives agents stronger control over how to behave when they lack
wealth (rather than always turning to burglary) are seen as unnecessary at this stage. The factors which have been chosen are
deemed, from the criminological literature, the most important
to the residential burglary system, not a general model of crime
and offending.
5. Model experimentation
The model will be applied to testing out crime theories and the
effectiveness of varying crime reduction strategies. As highlighted
earlier, the environment is artificial, but designed using the UK city
of Leeds as its template.
The following experiments will be performed:
Control experiment: The default parameters of security and
attractiveness of properties will be used to explore the basic
behaviour of the model. The values of the defaults were chosen
to coincide with the drive intensity functions which determine
how potential offenders should behave (see Sections 3 and 4).
The values were calibrated to allow, on average, an offender to
commit one burglary per day. This coincides with the expected
return of a single burglary which is the equivalent of a single
day’s work (discussed in Section 4.4).
Different types of community: To simulate the presence of different types of community, such as a deprived area, an affluent
area, and an area occupied predominantly by students, the environment will be adapted by modifying the security and attractiveness of property values.
Target hardening strategies: The model is used to test the effectiveness of the crime reduction strategy of target hardening. Target hardening is an intervention scheme whereby government
agencies offer additional security protection in the form of physical hardware or verbal/written advice to residents. In the
model, target hardening is simulated by increasing the security
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
120
100
80
40
60
Number of Burglaries
140
160
of a targeted property up to levels that match the most secure
properties in the environment. Two different target hardening
strategies are tested. The first is commonly used by local government agencies. The strategy involves targeting the most vulnerable people, which includes new and repeat burglary victims,
the elderly, single parents, those renting private houses and people who have recently moved into new properties (see Byron
(2003) for a practical example). In the model, vulnerable properties are identified by those that have the highest number of burglaries. The second strategy is an alternative method which is
not commonly used in practice. Here, all the properties in a community that has been identified as a high-crime area simultaneously undergo target hardening. The aim of the experiments
is to establish which strategy is the most effective at removing
a crime hotspot.
Different routine activity patterns: The addresses of potential burglars are altered to change their routine activity patterns. The
model is used to generate new crime patterns. This allows us
to examine routine activities theory and the effect that different
offender daily patterns will have on crime rates.
0−10
10−20
20−30
30−40
40−50
Days
Fig. 4. Crimes committed over different days. Boxplots describe the number of
crimes committed at different points over a run of 50 days varying the number of
burglars in the model for 100 model runs.
243
6. Results
6.1. The control experiment
The aim of the control experiment is to check that the model is
robust and that it produces sensible results, a process often termed
‘‘verification” (Gilbert & Troitzsch, 1999). Default values for security and attractiveness of properties are used throughout the environment and all agents (potential burglars and non-burglars) are
assigned randomly to houses. The model is run until it reaches a
dynamic equilibrium which refers to the state when aggregate
crime patterns are stable although individual crimes are still occurring and, therefore, small local variations are present (van Baal,
2004). For this model, we define dynamic equilibrium as being
reached when both the number of crimes committed each day
and the mean centre (average) of all burglary locations does not
change and we will show that 50 days is sufficient for the model
to reach dynamic equilibrium. Fig. 4 illustrates the number of burglaries committed at different intervals. The model was executed
100 times which allows the robustness and sensitivity to initial
starting conditions to be assessed. It was noted earlier that the size
of the population of burglars varies slightly for each run, but the
number of burglaries committed at different intervals remains
fairly consistent suggesting that, with respect to the number of
burglaries being committed, that the model has reached equilibrium. Further evidence for equilibrium is presented by the spatial
distribution of crimes illustrated in Fig. 5; the model reaches dynamic equilibrium in this time because the mean centre of the burglaries does not change. Fig. 5 suggests that, in fact, equilibrium
might be reached earlier than day 50, between days 20 and 30
for example. However, later experiments will require time to allow
the system to adapt to changes made during the course of a simulation so to ensure that all experiments reach equilibrium all simulations presented will run for 50 days.
Fig. 6 depicts the burglary rates at the end of a typical simulation run. Due to the probabilistic nature of the model, burglary patterns vary between runs. However, burglary levels are routinely
highest in the areas closest to the commercial area. These findings
are consistent with the principles of crime pattern theory. Brantingham and Brantingham (1993, page 18) note that crime clusters
at high activity nodes, along major paths and along edges, where
edges represent the boundary between areas that are noticeably
Fig. 5. Control experiment – burglaries. The mean centre of burglary locations at different time points during a typical run.
244
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
Table 3
The change from the default value for variables associated with different community
types.
Type of area
Default
Rich
Deprived
Student
Fig. 6. Control experiment – burglary rates. Burglary rates produced by a control
experiment after 50 runs.
Fig. 7. Burglary distance from centre Graph illustrates the distance from the centre
of the environment for each burglary committed. No crimes were committed within
three units of the centre because this area is occupied by the commercial district
and there are, therefore, no houses to target.
different such as the commercial and residential areas in our hypothetical environment.
Fig. 7 further illustrates that most crimes occur near the centre
of the environment. The Pearson correlation coefficient was calculated between the number of burglaries a property received and its
distance from the nearest commercial patch and resulted in a value
of 0.38. This implies that as the distance from the commercial
district increases the number of crimes committed decreases.
6.2. Different ‘‘Types” of community
Experimentation in Section 6.1 served to show that the model is
stable, producing expected results under default conditions. The
next stage is to increase the realism of the model by introducing
environmental factors. This added realism is achieved by altering
the attractiveness and security of each property to create different
communities. Three different areas have been chosen: an affluent
area, a deprived area and a student area. These sociotypes have
been chosen to reflect the different crime patterns that are prevalent in each of these areas. Offenders travel different distances
depending on the affluence of the target (Snook, 2004) and the
community type from which an offender originates influences
where they are likely to burgle. Shepherd (2006) also found evidence that burglary patterns depended on the type of community.
The author discovered that offenders would travel considerable
distances to burgle affluent areas, whereas burglaries in deprived
Percentage change from default value
Attractiveness (%)
Security (%)
–
150
50
150
–
150
50
50
areas were often committed by local residents travelling short distances. In addition, students were victimised by residents of nearby
deprived areas but not from within student communities (Shepherd, 2006). The relative variable values associated with each area
are shown in Table 3. These values have been chosen not on the basis of empirical evidence (determining how much more attractive a
‘‘student” area is compared to a ‘‘normal” area, for example, is nontrivial) but because they are different enough to sufficiently influence the burglars’ behaviour and lead to the creation of crime ‘‘hotspots”. The new areas created, therefore, are not designed to fully
represent ‘‘student” or ‘‘deprived” communities but provide a
method of experimenting with how the burglar agents respond
to changes in their environment.
Using these different types of area it is possible to investigate
how high-crime areas (often called hotspots) arise. Four different
layouts for the cityscape were used to ensure that hotspots do
not arise as a result of the arbitrary layout of the environment.
Fig. 8 illustrates these environments and the burglary rates produced by day 50. Regardless of the layout of the environment or
the initial starting positions of the agents, the student areas suffers
the highest victimisation rates. This is still evident when there are
multiple student areas as illustrated in environment 4.
Further evidence can be supplied through hotspot detection.
The nearest neighbour hierarchical spatial clustering algorithm
(NNH) is commonly used to search for areas with unusually high
crime rates by searching for clusters of points based on their spatial proximity. The CrimeStat application (Levine, 2006) was used
on the case-study data. Fig. 9 illustrates the hotspots found by
the algorithm when analysing the crimes committed near the
end of the simulation (days 40–50). The last ten days are used here
because this is the time at which the simulation is judged to have
reached equilibrium. The results illustrate that, regardless of the
physical layout of the environment, the student areas still suffer
the highest levels of burglary victimisation. This is consistent with
the criminology literature (Robinson & Robinson, 1997; Tilley,
Pease, Hough, & Brown, 1999) and data from the city of Leeds.
For example, in Leeds burglary hotspots are highly correlated with
areas that house large numbers of students during term-time. In
August, when the majority of the student population live outside
the city, the burglary clusters move to the poorer areas to the east
and west of the city centre.
6.3. Crime reduction: Target hardening strategies
As illustrated in Section 6.2, the layout of the environment does
not appear to influence the burglary hotspots found in student
areas. Target hardening was therefore applied to environment 1.
The strategies were implemented on day 20 and, as with other
experiments, the simulation was run to day 50. The area chosen
for the block-targeting method covered 50% of the student community (to allow comparisons between the hardened and non-hardened sections). This consisted of 46 properties. In order to test
both strategies fairly, it is essential that they increase the overall
security of the environment by the same amount. If this is not done
245
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
Environment 1
Environment 2
Environment 1
Environment 2
Environment 3
Environment 4
Key
Normal
Environment 3
Environment 4
Rich
Deprived
Student
Fig. 8. Altering security and attractiveness. The layout of different environments altering the community type and burglary rates produced by day 50 using different
community types.
Burglary clusters for environment 1
Burglary clusters for environment 2
Burglary clusters for environment 3
Burglary clusters for environment 4
Fig. 9. Security/Attractiveness experiment clusters. Clusters of burglary found by the NNH spatial clustering algorithm.
then the total number of crimes committed might differ between
experiments simply because the overall security changes so results
will not be comparable across different experiments. Equations in
Appendix A demonstrate that the victim-targeting method will increase the security of approximately one house every 2 days to be
comparable with the block-targeting method.
Fig. 10 illustrates the results of the victim targeting strategy.
The advantage of ABM to view a dynamic history of the model (Axtell, 2000) rather than a single, final equilibrium is utilised here
and crime hotspots and burglary rates are illustrated at different
points in the simulation. By observing the crime patterns at different points during the simulation we can gain an insight into how
crime hotspots arise. The results suggest that the strategy is ineffective at removing the crime hotspot found around the student
area. A crime hotspot is established early in the simulation and remains fairly constant throughout. Fig. 11 illustrates the results of
the block targeting strategy. It appears that crimes are displaced
south towards the remainder of the student area with no target
hardening. Although the hotspot produced between days 40 and
50 still covers the target hardened area, only three crimes were
committed in the area during that time period. This suggests that
if the NNH algorithm was configured differently the hotspot would
not cover the north area at all. Interestingly, towards the end of the
simulation a new hotspot has started to develop close to the city
centre as crimes are displaced away from the student area. This
provides further evidence that the hotspot around the student area
is less significant.
The patterns produced by the two experiments are very different. When individual houses are targeted, offenders are still attracted to the area because many appealing properties still exist,
even if some are now less appealing due to the target-hardening
initiative. This suggests that targeting single properties in isolation
is unlikely to tackle burglary hotspots because many insecure
properties remain in the area. This finding is consistent with the
expectations of crime reduction practitioners. Shepherd (2006)
notes that the administrators of the Burglary Reduction In Leeds
(BRIL) scheme (Safer Leeds, 2007) believe that targeting blocks of
properties rather than individuals might have an effect greater
than the sum of the parts.
6.4. Different routine activity patterns
The final experiment increases the realism of the model further
by investigating the effect that changing the addresses of the po-
246
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
Burglary clusters between
days 10 - 20
Burglary clusters between
days 20 - 30
Burglaries between days 20 - 30
Burglaries between days 10 - 20
Crime
Rates
Burglary clusters between
days 40 - 50
Burglary clusters between
days 30 - 40
Burglaries between days 30 - 40
Burglaries between days 40 - 50
High
Low
Fig. 10. Individual target-hardening results. Results of the individual victim target-hardening initiative: Hotspots produced by the NNH algorithm and burglary rates.
Burglary clusters between
days 10 - 20
Burglary clusters between
days 20 - 30
Burglaries between days 10 - 20
Burglaries between days 20 - 30
Crime
Rates
Burglary clusters between
days 40 - 50
Burglary clusters between
days 30 - 40
Burglaries between days 30 - 40
Burglaries between days 40 - 50
High
Low
Fig. 11. Block target-hardening results. Results of the entire community target-hardening initiative: hotspots produced by the NNH algorithm and burglary rates.
Number of Burglaries Originating from
"Constrained by Circumstances" Communities
Number of Burglaries
140
120
100
80
60
40
20
7 - Multicultural
6 - Typical Traits
5 - Constrained by
Circumstances
4 - Prospering Suburbs
3 - Countryside
2 - City Living
1 - Blue Collar
Communities
0
Fig. 12. Burglaries originating from ‘‘Constrained by Circumstances” communities. Graph illustrating the number of crimes committed in different community types which
have originated from ‘‘constrained by circumstances” communities using 2006/07 crime data and the ONS Output Area Classification.
247
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
Fig. 14 illustrates the burglary patterns over different intervals
of a typical simulation and also the hotspots produced by the
NNH clustering algorithm. Although there are large numbers of
burglaries committed in the deprived area, overall the student area
exhibits significantly more crimes than all other areas. Initially
crimes are spread throughout the area where the offenders live
and on the routes between the deprived area, the commercial area
and the student area. However, as the simulation progresses and
the potential offenders begin to recognise the attractiveness of
the student area it absorbs the majority of crimes. This has implications for criminological theory and crime reduction practitioners,
a point discussed further in the following section.
7. Conclusions
Fig. 13. Environment 2.
tential burglars has on crime rates. In the experiment it is hypothesised that most potential burglars live in the most deprived areas.
This notion follows that of the literature: numerous studies have
made reference to the link between crime and deprivation (Baldwin & Bottoms, 1976; Bowers & Hirschfield, 1999; Brantingham
& Brantingham, 1993; Hesseling, 1992; Sampson, Raudenbush, &
Earls, 1997; Shover, 1991; Wilkström, 1991). There is also supportive data from the city of Leeds. Using the Office of National Statistics Output Area Classification (Vickers & Rees, 2006) and over 700
pairs of the addresses of convicted burglars and their victims it was
possible to estimate which ‘‘type” of community most burglars
originated from. Fig. 12 illustrates that the most deprived communities (‘‘constrained by circumstances”) export the most crimes.
We can hypothesise, therefore, that most burglars live in constrained by circumstances communities.
The locations of the potential burglars in the model were altered from living in randomly chosen patches to the poorest area.
This represents a shift in the model towards the inclusion of real
geographies and people. This change will obviously also impact
on the routine activity patterns of potential burglars. We would
therefore expect to observe higher burglary rates in the poorest
neighbourhood and on the routes into the commercial district.
Environment 2 (illustrated by Fig. 13) was chosen because in this
environment the student area and the deprived area are a large distance apart. Therefore if the burglary hotspot still covers the student area we can conclude that the daily activities of the
offenders does not influence the location of burglary hotspots in
the model.
Burglary clusters between
days 0 - 10
Burglary clusters between
days 10 - 20
The aim of this paper has been to demonstrate the strengths,
flexibility and applicability of an individual-based model combined
with a behavioural model (the PECS framework) for simulating residential burglary. Within the scope of modelling crime theory,
there are few published examples of this type of work; the research
presented here represents initial modelling attempts to capture the
complex micro-level dynamics of this system using an advanced
behavioural model. Alternative approaches to modelling crime
were outlined, including some existing agent-based models of
crime. However there are many factors that are absent in other approaches which this research is able to account for.
Incorporating a detailed behavioural framework into an individual-level model is a relatively new approach in criminology. The
PECS framework (Schmidt, 2000; Urban, 2000, chap. 6) was chosen
because it does not require rational decision making as an assumption, a drawback of the BDI approach (Schmidt, 2000), and can
(theoretically) be extended to model the entire spectrum of human
behaviour. PECS uses the concept of intensity functions to determine, in any given situation, which drive is the strongest and
how the agent will behave. Two drives were used in this model:
the need to generate wealth and the need to sleep. Although the
range of drives is limited, they are adequate to loosely represent
the daily behavioural patterns of people employed in British or
American cities. In addition, the intensity functions can be enhanced to amalgamate different types of behaviour. For example,
drug addiction can be simulated by increasing the desire to generate wealth: in the model a burglar with a drug addiction will therefore be forced to commit more risky burglaries to satisfy their
greater needs.
Findings from both qualitative and quantitative studies (outlined in Table 1) were utilised to ensure that the behaviour of
Burglaries between days 0 - 10
Burglaries between days 10 - 20
Crime
Rates
Burglary clusters between
days 30 - 40
Burglary clusters between
days 40 - 50
Burglaries between days 30 - 40
Burglaries between days 40 - 50
High
Low
Fig. 14. Routine activities experiment results. Results of routine activities experiment: hotspots produced by the NNH algorithm and burglary rates.
248
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
offenders in the model reflected findings from the real world. One
of the most interesting features of the model are the cognitive
spaces which are individual to each agent and are built up dynamically during the simulation. Potential offenders do not have global
knowledge of their environment and they must choose to victimise
a property that they know about already, finding new properties as
they travel around the environment (whether on legitimate business or not). This feature reflects modern thinking in criminology
and has yet to be included in this type of model.
Four experiments were designed to test the validity of the model and then experiment further with it. In particular, two target
hardening approaches were tested. The first, which is an approach
commonly used in practice, targeted single properties that were
deemed a high burglary risk and the second targeted an entire
block of properties. Cluster analysis confirmed that targeting individual properties in isolation was insufficient at removing the hotspot as offenders in the model were simply able to burgle nearby
houses that have not undergone target hardening. Targeting an entire block, however, successfully removed the hotspot because the
entire area became unattractive to burglars. This demonstrates
that the model, through matching empirical findings, is both robust and able to simulate the important processes and trends within the system.
The final experiment examined what happened if the home
locations of potential burglars were altered. The effect was that
the agents’ routine activities no longer took them through the student area. However, as the simulation progressed a hotspot nevertheless formed around the student area. This suggests, for
criminologists, that although routine activities are important we
should not discount the pull of highly attractive areas which might
drive offenders away from their routinely travelled routes. Obviously a greater investigation is required before making any firm
conclusions, but the experiment nevertheless demonstrates the
utility of using even simple types of agent-based models in
criminology.
It should be noted that the total number of crimes in the environment remains unchanged. In other words, there is spatial crime
displacement but no other types of displacement such as a change
in modus operandi (MO), crime type (for example the offender
could move from burglary to drug dealing) or indeed the decision
to stop burgling altogether. Furthermore, the vast complexity of
human behaviour and the urban environment are extremely difficult (or even impossible) to capture in a computer model, thus
models such as these will never be able to account for everything
that can affect the real system. These are not necessarily limits of
a model, but a drawback of ABM in general. We do not subscribe
to the notion that this renders the individual-level approach useless; rather we recognise the drawbacks of the approach and consider these when making conclusions regarding the applicability of
the results to the real world.
the model framework could be modified to incorporate these types
of behaviours and more heterogeneous agents is ongoing.
There are also a number of ways in which the environment itself could be enhanced. These range from including ideas regarding
collective efficacy (Sampson et al., 1997) or ‘‘broken windows” theory (Wilson et al., 1982) to incorporating real GIS data similar to
that of Groff (2007a, 2007b). In addition, the availability of vehicle
transport (such as cars or public buses) could be included by adding different layers to the environment. There are a number of
challenges associated with incorporating a more realistic environment, however. Initially, it is necessary to obtain low-level, accurate physical and social environmental data to act as inputs to
the model. Furthermore, accurate individual-level crime data is
necessary to use in evaluating the accuracy of the model (comparing simulation results to real data). Assuming these data are available, the next challenge is to adapt the model to function in a much
more complex virtual environment. Routines to allow agents to
travel on the transport system must be implemented and it is likely
that the complexity of the agents must be increased to allow them
to perceive their new environment correctly. Regardless of the difficulties, including a more realistic urban backcloth is an ultimate
goal of this research (with the proviso that the simple model is
fully understood first). This will allow for crime predictions in
the real world which could ultimately influence policy.
This type of model has obvious benefits and has the potential to
form an integral part of a tool for policy makers to test the impact
of varying scenarios. The next stage is to translate the simple model into a more advanced framework and to incorporate a real
environment.
Acknowledgements
We would like to thank Safer Leeds, the local Crime and Disorder Reduction Partnership, for providing invaluable crime data and
their experiences in crime reduction.
Appendix A
The simulation is run for 50 days, so the overall increase in
security produced by the block-targeting method (which covers
46 houses and is instigated on day 20, thus running for 30 days)
can be calculated as:
46 30 4 ¼ 5520
where 4 is an arbitrary number of units which represents a 150% increase in security. Method 1 is also implemented on day 20, and will
target the x most vulnerable properties every day. The strategy
stops at day 40 so that the simulation is allowed 10 days to reach
equilibrium. Therefore, to ensure that both methods lead to the
same overall increase in security, the number of houses targeted
each day by method 1, x, between days 20 and 40 is:
8. Future work
One of the major benefits of the ABM approach is its flexibility.
Incorporating additional needs, such as the need to socialise, will
provide the agents with a greater range of behaviour and allow
us to implement different types of citizen such as students, unemployed people, and family members. These different types of people could also influence the behaviour of the potential burglars,
by acting as capable guardians for example. Anchor points could
also be included (such as friends’ houses or the addresses of drug
dealers) which would generate interesting cognitive environments.
The model at this stage does not consider the possibility for citizens to become opportunistic burglars, which could represent a
significant portion of burglaries committed. Consideration of how
x
i¼0
X
20
4ði þ 1Þ
!
¼ 840x
and this security increase is applied for a further 10 days (between
days 40 and 50), so:
840x 10 ¼ 5520
x ¼ 0:6571
so each day (between days 20 and 40) there is a 66% chance that a
house will be targeted which will, on average, increase the overall
security of the environment by the same amount as the block targeting strategy.
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
References
Al-Ahmadi, K., Heppenstall, A. J., Hogg, J., & See, L. (2009). A Fuzzy Cellular Automata
Urban Growth Model (FCAUGM) for the City of Riyadh, Saudi Arabia. Part 1:
Model structure and validation. Applied Spatial Analysis and Policy, 2(1), 65–83.
Ammar, M. B., Neji, M., Gouardères3, G. (2006). Conversational embodied peer
agents in affective e-learning. In G. Rebolledo-Mendez, E. Martinez-Miron
(Eds.), Workshop on motivational and affective issues in ITS. 8th International
conference on ITS 2006 (pp. 29–37).
Axelrod, R. (1997). Advancing the art of simulation in the social sciences. In R.
Conte, R. Hegselmann, & P. Terna (Eds.), Simulating social phenomena
(pp. 21–40). Berlin: Springer-Verlag.
Axtell, R. (2000). Why agents? On the varied motivations for agent computing in the
social science. Center on social and economic dynamics working paper no. 17.
<http://www.brookings.edu/es/dynamics/papers/agents/agents.htm> Accessed
January 2007.
Baldwin, J. (1975). British areal studies of grime: An assessment. The British Journal
of Criminology, 15(3), 211–227.
Baldwin, J., & Bottoms, A. E. (1976). The urban criminal: A study in Sheffield. London:
Tavistock Publications.
Balzer, W. (2000). SMASS: A sequential multi-agent system for social simulation. In
R. Suleiman, K. G. Troitzsch, & N. Gilbert (Eds.), Tools and techniques for social
science simulation (pp. 65–82). Physica-Verlag.
Beavon, D. J. K., Brantingham, P. L., & Brantingham, P. J. (1994). The influence of
street networks on the patterning of property offenses. In R. V. Clarke (Ed.).
Crime prevention studies (Vol. 2). New York: Criminal Justice Press.
Bennett, T., & Wright, R. (1984). Burglars on burglary: Prevention and the offender.
Aldershot, UK: Glower.
Bernasco, W., & Luykx, F. (2003). Effects of attractiveness, opportunity and
accessibility to burglars on residential burglary rates of urban neighborhoods.
Criminology, 41(3), 981–1002.
Bernasco, W., & Nieuwbeerta, P. (2005). How do residential burglars select target
areas? British Journal of Criminology, 45(3), 296–315.
Bevis, C., & Nutter, J. (1977). Changing street layouts to reduce residential burglary.
Paper presented to the American Society of Criminology, Atlanta.
Bonabeau, E. (2002). Agent-based modeling: Methods and techniques for
simulating human systems. Proceedings of the National Academy of Sciences,
99, 7280–7287.
Bowers, K., & Hirschfield, A. (1999). Exploring the link between crime and
disadvantage in north-west England: An analysis using geographical
information systems. International Journal of Geographical Information Science,
13(2), 159–184.
Brailsford, S., & Schmidt, B. (2003). Towards incorporating human behaviour in
models of health care systems: An approach using discrete event simulation.
European Journal of Operational Research, 150(1), 19–31.
Brantingham, P., & Brantingham, P. (1993). Environment, routine, and situation:
Toward a pattern theory of crime. In R. Clarke & M. Felson (Eds.), Routine activity
and rational choice. Advances in criminological theory (Vol. 5). New Brunswick,
NJ: Transaction Publishers.
Brantingham, P. L., & Brantingham, P. J. (2004). Computer simulation as a tool for
environmental criminologists. Security Journal, 17(1), 21–30.
Brantingham, P., Glasser, U., Kinney, B., Singh, K., & Vajihollahi, M. (2005a). A
computational model for simulating spatial aspects of crime in urban
environments. In 2005 IEEE international conference on systems, man and
cybernetics (Vol. 4, pp. 3667–3674).
Brantingham, P., Glasser, U., Kinney, B., Singh, K., & Vajihollahi, M. (2005b).
Modeling urban crime patterns: Viewing multi-agent systems as abstract state
machines. In Proceedings of the 12th international workshop on abstract state
machines, Paris (pp. 101–117).
Brantingham, P., Glässer, U., Jackson, P., Kinney, B., & Vajihollahi, M. (2008).
Mastermind: Computational modeling and simulation of spatiotemporal
aspects of crime in urban environments. In L. Liu & J. Eck (Eds.), Artificial
crime analysis systems: Using computer simulations and geographic information
systems (pp. 252–280). IGI Global.
Brown, B. B., & Bentley, D. L. (1993). Residential burglars judge risk: The role of
territoriality. Journal of Environmental Psychology, 13, 51–61.
Brown, M. J., Mcculloch, J. W., & Hiscox, J. (1972). Criminal offences in an urban area
and their associated social variables. The British Journal of Criminology, 12,
250–268.
Burgess, E. W. (1925). The growth of the city. In R. E. Park, E. W. Burgess, & R. D.
McKenzie (Eds.), The city (pp. 47–62). The University of Chicago Press.
Byron, C. (Ed.). (2003). Supplement 8 to findings 204. Reducing burglary initiative
project summary: Stockport. London: Home Office.
Castle, C. J. E., & Crooks, A. T. (2006). Principles and concepts of agent-based
modelling for developing geospatial simulations. UCL working papers series,
Paper 110. London: Centre for Advanced Spatial Analysis, University College.
<http://eprints.ucl.ac.uk/archive/00003342/01/3342.pdf>.
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine
activity approach. American Sociological Review, 44, 588–608.
Craglia, M., Haining, R., & Signoretta, P. (2001). Modelling high-intensity crime areas
in English cities. Urban Studies, 38(11), 1921–1941.
Cromwell, P., & Olson, J. N. (2005). The reasoning burglar: Motives and decisionmaking strategies. In P. Cromwell (Ed.), In their own words: Criminals on crime
(an anthology) (4th ed., pp. 42–56). Roxbury Publishing Company.
249
Cromwell, P. F., Olson, J. N., & Avary, D. W. (1991). Breaking and entering: An
ethnographic analysis of burglary. Studies in crime law and justice (Vol. 8).
Newbury Park, London: Sage Publications.
Dahlbäck, O. (1998). Modelling the influence of societal factors on municipal theft
rates in Sweden: Methodological concerns and substantive findings. Acta
Sociologica, 31, 37–57.
Dray, A., Mazerolle, L., Perez1, P., & Ritter, A. (2008). Policing Australias heroin
drought: Using an agent-based model to simulate alternative outcomes. Journal
of Experimental Criminology, 4(3).
Elffers, H., & van Baal, P. (2008). Realistic spatial backcloth is not that important
in agent based simulation: An illustration from simulating perceptual
deterrence. In L. Liu & J. Eck (Eds.), Artificial crime analysis systems
(pp. 19–34). Springer.
Gaviria, A., & Pagés, C. (2002). Patterns of crime victimization in Latin American
cities. Journal of Development Economic, 67(1), 181–203.
Giggs, J. A. (1970). The socially disorganised areas of barry: A multivariate analysis.
In H. Carter & W. K. D. Davies (Eds.), Urban essays (pp. 101–143). London:
Longman.
Gilbert, N., & Troitzsch, K. G. (1999). Simulation for the social scientist. Buckingham,
Philadelphia: Open University Press.
Groff, E. (2006). Exploring the geography of routine activity theory: A spatiotemporal test using street robbery. Ph.D. thesis, University of Maryland.
Groff, E. (2007a). Simulation for theory testing and experimentation: An example
using routine activity theory and street robbery. Journal of Quantitative
Criminology, 23, 75–103.
Groff, E. (2007b). ‘situating’ simulation to model human spatio-temporal
interactions: An example using crime events. Transactions in GIS, 11(4),
507–530.
Groff, E., & Mazerolle, L. (2008). Simulated experiments and their potential role in
criminology and criminal justice. Journal of Experimental Criminology, 4(3),
187–193.
Grubesic, T., & Murray, A. (2001). Detecting hot-spots using cluster analysis and gis.
In Paper presented at the 5th annual international crime mapping research
conference, Dallas, Texas, USA.
Gunderson, L., & Brown, D. (2000). Using a multi-agent model to predict both
physical and cybercriminal activity. IEEE International Conference on Systems,
Man, and Cybernetics, 4, 2338–2343.
Harland, K., & Stillwell, J. (in press). Commuting to school: A new spatial interaction
modelling framework. In Stillwell, J., Duke-Williams, O., Dennett, A. (Eds.),
Technologies for migration and commuting analysis: Spatial interaction data
applications. Springer.
Hayslett-McCall, K. L., Qiu, F., Curtin, K. M., Chastain, B., Schubert, J., & Carver, V.
(2008). The simulation of the journey to residential burglary. In Artificial crime
analysis systems. IGI Global.
Hearnden, I., & Magill, C. (2003). Decision-making by house burglars: Offender’s
perspectives. Home office research findings (Vol. 249). London: Home Office.
Heppenstall, A. J., Evans, A. J., & Birkin, M. H. (2005). A hybrid multi-agent/spatial
interaction model system for petrol price setting. Transactions in GIS, 9(1),
35–51.
Hesseling, R. B. P. (1992). Using data on offender mobility in ecological research.
Journal of Quantitative Criminology, 8(1), 95–112.
Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime:
An empirical foundation for a theory of personal victimization. Cambridge, MA:
Ballinger.
Jacob, C., Litorco, J., & Lee, L. (2004). Immunity through swarms: Agent-based
simulations of the human immune system. Lecture Notes in Computer Science,
3239, 400–412.
Johnson, D. (2007). Predictive analysis: Utilising the near repeat phenomena in
Bournemouth. Paper presented at the fifth national crime mapping conference,
London.
Kongmuang, C. (2006). Modelling crime: A spatial microsimulation approach. Ph.D.
thesis. Leeds, UK: School of Geography, University of Leeds.
Kongmuang, C., Clarke, G., Evans, A., & Ballas, D. (2005). Modelling crime
victimisation at small-area level using a spatial microsimulation technique.
Paper presented at the RSAIBIS 35th anual conference. <http://
www.geog.leeds.ac.uk/people/c.kongmuang/SimCrime2520Paper_RSAIBIS.doc>
Accessed May 2006.
Levine, N. (2006). Crime mapping and the crimestat program. Geographical Analysis,
38, 41–56.
Liu, L., & Eck, J. (Eds.). (2008). Artificial crime analysis systems: Using computer
simulations and geographic information systems. IGI Global.
Liu, L., Wang, X., Eck, J., & Liang, J. (2005). Simulating crime events and crime
patterns in a ra/ca model. In F. Wang (Ed.), Geographic information systems and
crime analysis (pp. 197–213). Reading, PA: Idea Publishing.
Martinez-Miranda, J., & Aldea, A. (2005). Emotions in human and artificial
intelligence. Computers in Human Behaviour, 21, 323–341.
Massey, J. L., Krohn, M. D., & Bonati, L. M. (1989). Property crime and the routine
activities of individuals. Journal of Research in Crime and Delinquency, 26(4),
378–400.
Meera, A. K., & Jayakumar, M. D. (1995). Determinants of crime in a developing
country: A regression model. Applied Economics, 27, 455–461.
Melo, A., Belchior, M., & Furtado, V. (2005). Analyzing police patrol routes by
simulating the physical reorganization of agents. In J. S. Sichman & L. Antunes
(Eds.), MABS. Lecture notes in computer science (Vol. 3891, pp. 99–114). Springer.
250
N. Malleson et al. / Computers, Environment and Urban Systems 34 (2010) 236–250
Miller, B. W., Hwang, C. H., Torkkola, K., & Massey, N. (2003). An architecture for
an intelligent driver support system. In Intelligent vehicles symposium (pp. 639–
644). IEEE.
Moss, S., & Edmonds, B. (2005). Towards good social science. Journal of Artificial
Societies and Social Simulation, 8(4). <http://jasss.soc.surrey.ac.uk/8/4/13.html>.
Nee, C., & Meenaghan, A. (2006). Expert decision making in burglars. British Journal
of Criminology, 46, 935–949.
Neji, M., & Ammar, M. B. (2007). Agent-based collaborative affective e-learning
framework. The Electronic Journal of e-Learning, 5(2), 123–134. <http://
www.ejel.org>.
Pain, R., MacFarlane, R., Turner, K., & Gill, S. (2006). ‘when, where, if, and but’:
Qualifying gis and the effect of streetlighting on crime and fear. Environment
and Planning A, 38, 2055–2074.
Paredes, A. L., & Hernández, I. C. (Eds.). (2008). Agent based modelling in natural
resource management. INSISOC, Spain.
Rao, A. S., & Georgeff, M. P. (1995). BDI agents: From theory to practice. In V. Lesser
& L. Gasser (Eds.), Proceedings of the first international conference on multi-agent
systems (ICMAS-95). San Francisco, USA: MIT Press.
Rengert, G., & Wasilchick, J. (1985). Suburban burglary: A time and a place for
everything. Springfield, IL: Charles Thomas Publishers.
Repetto, T. G. (1974). Residential crime. Cambridge, MA: Ballinger.
Robinson, M. B., & Robinson, C. E. (1997). Environmental characteristics associated
with residential burglaries of student apartment complexes. Environment and
Behaviour, 29, 657–675.
Safer Leeds (2007). Burglary reduction in leeds programme (bril). <http://
www.leeds-csp.org.uk/view.asp?id=54> Accessed November 2007. <http://
www.leeds-csp.org.uk/view.asp?id=54>.
Sampson, R. J., Raudenbush, S. W., & Earls, F. (1997). Neighborhoods and violent
crime: A multilevel study of collective efficacy. Science, 277, 918–924.
Scarr, H. A. (1973). Patterns of burglary. Washington, DC: US Govenrment Printing Office.
Schmidt, B. (2000). The modelling of human behaviour. Erlangen, Germany: SCS
Publications.
Schmidt, B. (2002). How to give agents a personality. In Proceedings of the 3rd
workshop on agent-based simulation, April 7–9. Passau, Germany.
Shaw, C. R., & McKay, H. D. (1969). Juvenile delinquency and urban areas. Chicago:
The University of Chicago Press.
Shepherd, P. J. (2006). Neighbourhood profiling and classification for community
safety. Ph.D. thesis. Leeds, UK: School of Geography, University of Leeds.
Shepherd, P., See, L., Kongmuang, C., & Clarke, G. (2004). An analysis of crime and
disorder in Leeds, 2000/01 to 2003/04. School of Geography, University of Leeds.
View publication stats
Shover, N. (1991). Burglary. Crime and justice: A review of research (Vol. 14,
pp. 73–113). University of Chicago Press.
Singh, K. (2005). An abstract mathematical framework for semantic modeling and
simulation of urban crime patterns. Ph.D. thesis, University of Dehli.
Snook, B. (2004). Individual differences in distance travelled by serial burglars.
Journal of Investigative Psychology and Offender Profiling, 1, 53–66.
Taylor, G., Frederiksen, R., Vane, R., & Waltz, E. (2004). Agent-based simulation of
geo-political conflict. In 16th conference on innovative applications of artificial
intelligence. San Jose, CA: AAAI Press.
Taylor, M., & Nee, C. (1988). The role of cues in simulated residential burglary. The
British Journal of Criminology, 28(3), 396–401.
Tilley, N., Pease, K., Hough, M., & Brown, R. (1999). Burglary prevention: Early
lessons from the crime reduction programme. Policing and reducing crime unit
crime reduction research series paper 1.London: Home Office.
Townsely, M., Homel, R., & Chaseling, J. (2003). Infectious burglaries: A test of the
near repeat hypothesis. British Journal of Criminology, 43, 615–633.
Turner, A., & Penn, A. (2002). Encoding natural movement as an agent-based
system: An investigation into human pedestrian behaviour in the built
environment. Environment and Planning B, 29, 473–490.
Unsworth, R., & Stillwell, J. (Eds.). (2004). Twenty-first century Leeds: Geographies of a
regional city. St John College, York: PLACE Research Centre.
Urban, C. (2000). PECS: A reference model for the simulation of multi-agent
systems. In R. Suleiman, K. G. Troitzsch, & N. Gilbert (Eds.), Tools and techniques
for social science simulation (pp. 83–114). Physica-Verlag.
van Baal, P. (2004). Computer simulations of criminal deterrence: From public policy to
local interaction to individual behaviour. Boom Juridische uitgevers.
Vickers, D., & Rees, P. (2006). Introducing the national classification of census
output areas. Population Trends, 125.
Wang, X., Liu, L., & Eck, J. (2008). Crime simulation using gis and artificial intelligent
agents. In Liu, L., Eck, J. (Eds.), Artificial crime analysis systems: Using computer
simulations and geographic information systems. Information Science Reference.
Wilkström, P. (1991). Urban crime, criminals and victims: The Swedish experience in an
Anglo-American comparative perspective. New York: Springer-Verlag.
Wilson, J. Q., & Kelling, G. L. (1982). Broken windows: The police and neighborhood
safety. The Atlantic Monthly, 249(3), 29–38.
Winoto, P. (2003). A simulation of the market for offenses in multiagent systems: Is
zero crime rates attainable? In J. S. Sichman, F. Bousquet, & P. Davidsson (Eds.),
MABS. Lecture notes in computer science (Vol. 2581, pp. 181–193). Springer.
Wright, R. T., & Decker, S. H. (1996). Burglars on the job: Streetlife and residential
break-ins. Boston: Northeastern University Press.