Skip to main content
Log in

Crime prevention of bus pickpocketing in Beijing, China: does air quality affect crime?

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

In recent years, along with the development of the urban public transport system, bus pickpocketing crimes have garnered increasing attention. In this paper, a complete and clear structure including finding patterns based on data, applying criminological theory to explain patterns, and using empirical investigation method to verify theoretical explanation are presented. We found that temperature and season are not clearly correlated with bus pickpocketing. The AQI and PM2.5 indices, however, demonstrated significant correlations with daily bus pickpocketing incidents: the worse the air quality, the more bus pickpocketing occurred. Then two empirical investigations were carried out to verified that crime pattern theory and rational choice theory can be used to explain the impact of air quality on bus pickpocketing crime. Furthermore, we utilized the SVM method to predict daily bus pickpocketing crime risk with an accuracy rate of 81%. The results of this paper can provide early warnings of urban bus pickpocketing and help police reduce crimes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Barnett, J., and W.N. Adger. 2007. Climate change, human security and violent conflict. Political Geography 26 (6): 639–655.

    Article  Google Scholar 

  • Brunsdon, C., J. Corcoran, G. Higgs, and A. Ware. 2009. The influence of weather on local geographical patterns of police calls for service. Environment and Planning B: Planning and Design 36 (5): 906–926.

    Article  Google Scholar 

  • Chang, W., D. Zeng, and H. Chen. 2005. Prospective spatio-temporal data analysis for security informatics. In Proceedings of the 2005 IEEE intelligent transportation systems, 2005, 1120–1124. IEEE. http://ieeexplore.ieee.org/abstract/document/1520208/.

  • Chen, H., Y. Lin, Q. Su, and L. Cheng. 2017. Spatial variation of multiple air pollutants and their potential contributions to all-cause, respiratory, and cardiovascular mortality across China in 2015–2016. Atmospheric Environment 168: 23–35. https://doi.org/10.1016/j.atmosenv.2017.09.006.

    Article  Google Scholar 

  • Chen, P., and Y. Lu. 2017. Exploring co-offending networks by considering geographic background: An investigation of electric bicycle thefts in Beijing. The Professional Geographer. https://doi.org/10.1080/00330124.2017.1325753.

    Article  Google Scholar 

  • Chen, P., H. Yuan, and D. Li. 2013. Space-time analysis of burglary in Beijing. Security Journal 26 (1): 1–15.

    Article  Google Scholar 

  • Cohen, L.E., and M. Felson. 1979. Social change and crime rate trends: A routine activity approach. American Sociological Review 44: 588–608.

    Article  Google Scholar 

  • Cornish, D.B., and R.V. Clarke. 1987. Understanding crime displacement: An application of rational choice theory. Criminology 25 (4): 933–948.

    Article  Google Scholar 

  • Horrocks, J., and A.K. Menclova. 2011. The effects of weather on crime. New Zealand Economic Papers 45 (3): 231–254.

    Article  Google Scholar 

  • Hu, X., P. Chen, H. Huang, T. Sun, and D. Li. 2017. Contrasting impacts of heat stress on violent and nonviolent robbery in Beijing, China. Natural Hazards 87 (2): 961–972. https://doi.org/10.1007/s11069-017-2804-8.

    Article  Google Scholar 

  • Kianmehr, K. and R. Alhajj. 2006. Crime hot-spots prediction using support vector machine. In IEEE international conference on computer systems and applications, 2006, 952–959. IEEE. http://ieeexplore.ieee.org/abstract/document/1618468/.

  • Kianmehr, K., and R. Alhajj. 2008. Effectiveness of support vector machine for crime hot-spots prediction. Applied Artificial Intelligence 22 (5): 433–458.

    Article  Google Scholar 

  • Kuo, F.E., and W.C. Sullivan. 2001. Environment and crime in the inner city: Does vegetation reduce crime? Environment and Behavior 33 (3): 343–367.

    Google Scholar 

  • Lee, Y.C., G. Calori, P. Hills, and G.R. Carmichael. 2002. Ozone episodes in urban Hong Kong 1994–1999. Atmospheric Environment 36 (12): 1957–1968.

    Article  Google Scholar 

  • Loukaitou-Sideris, A. 1999. Hot spots of bus stop crime: The importance of environmental attributes. Journal of the American Planning Association 65 (4): 395–411.

    Article  Google Scholar 

  • Loukaitou-Sideris, A., R. Liggett, H. Iseki, and W. Thurlow. 2001. Measuring the effects of built environment on bus stop crime. Environment and Planning B: Planning and Design 28 (2): 255–280.

    Article  Google Scholar 

  • Mares, D. 2013. Climate change and levels of violence in socially disadvantaged neighborhood groups. Journal of Urban Health 90 (4): 768–783.

    Article  Google Scholar 

  • Matus, K., K.-M. Nam, N.E. Selin, L.N. Lamsal, J.M. Reilly, and S. Paltsev. 2012. Health damages from air pollution in China. Global Environmental Change 22 (1): 55–66.

    Article  Google Scholar 

  • Murray, A.T., and V. Estivill-Castro. 1998. Cluster discovery techniques for exploratory spatial data analysis. International Journal of Geographical Information Science 12 (5): 431–443.

    Article  Google Scholar 

  • Murray, A.T., I. McGuffog, J.S. Western, and P. Mullins. 2001. Exploratory spatial data analysis techniques for examining urban crime: Implications for evaluating treatment. British Journal of Criminology 41 (2): 309–329.

    Article  Google Scholar 

  • Nath, S.V. 2006. Crime pattern detection using data mining. In WI-IAT 2006 workshops. 2006 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology workshops, 2006, 41–44. IEEE. http://ieeexplore.ieee.org/abstract/document/4053200/.

  • Newton, A.D. 2004. Crime on public transport: ‘Static’ and ‘non-static’ (moving) crime events. Western Criminology Review 5 (3): 25–42.

    Google Scholar 

  • Niu, H., W. Hu, W. Pian, J. Fan, and J. Wang. 2015. Evolution of atmospheric aerosol particles during a pollution accumulation process: A case paper. World Journal of Engineering 12 (1): 51–60. https://doi.org/10.1260/1708-5284.12.1.51.

    Article  Google Scholar 

  • Pearlstein, A., and M. Wachs. 1982. Crime in public transit systems: An environmental design perspective. Transportation 11 (3): 277–297.

    Article  Google Scholar 

  • Peng, C., S. Xueming, Y. Hongyong, and L. Dengsheng. 2011. Assessing temporal and weather influences on property crime in Beijing, China. Crime, Law and Social Change 55 (1): 1–13.

    Article  Google Scholar 

  • Pu, H., K. Luo, P. Wang, S. Wang, and S. Kang. 2017. Spatial variation of air quality index and urban driving factors linkages: Evidence from Chinese cities. Environmental Science and Pollution Research 24 (5): 4457–4468.

    Article  Google Scholar 

  • Quetelet, A. 1842. A treatise on man. Franklin. http://ocw.abuad.edu.ng/courses/literature/21l-017-the-art-of-the-probable-literature-and-probability-spring-2008/readings/quetelet_exce.pdf.

  • Ranson, M. 2014. Crime, weather, and climate change. Journal of Environmental Economics and Management 67 (3): 274–302.

    Article  Google Scholar 

  • Rohde, R.A., and R.A. Muller. 2015. Air pollution in China: Mapping of concentrations and sources. PLoS ONE 10 (8): e0135749.

    Article  Google Scholar 

  • Santos, R.B. 2016. Crime analysis with crime mapping. Thousand Oaks, CA: Sage. https://books.google.com/books?hl=zh-CN&lr=&id=G1O0DAAAQBAJ&oi=fnd&pg=PP1&dq=Crime+Analysis+with+Crime+Mapping&ots=TiDwofR4pt&sig=kH7VFrPLxPZQeYZIwakyCiBnJFE.

  • Sathyadevan, S., S. Gangadharan, et al. 2014. Crime analysis and prediction using data mining. In 2014 first international conference on networks & soft computing (ICNSC), 406–412. IEEE. http://ieeexplore.ieee.org/abstract/document/6906719/.

  • Tie, X., G.P. Brasseur, C. Zhao, C. Granier, S. Massie, Y. Qin, et al. 2006. Chemical characterization of air pollution in Eastern China and the Eastern United States. Atmospheric Environment 40 (14): 2607–2625.

    Article  Google Scholar 

  • Wang, Y., Q. Ying, J. Hu, and H. Zhang. 2014. Spatial and temporal variations of six criteria air pollutants in 31 provincial capital cities in China during 2013–2014. Environment International 73: 413–422.

    Article  Google Scholar 

  • Xing, Y.-F., Y.-H. Xu, M.-H. Shi, and Y.-X. Lian. 2016. The impact of PM2.5 on the human respiratory system. Journal of Thoracic Disease 8 (1): 69.

    Google Scholar 

  • Ye, W.J., and S. Wu. 2014. Identifying crime patterns of bus pickpocketing using weighted spatial-temporal association rules mining. Journal of Geo-Information Science 04: 537–544.

    Google Scholar 

  • Zhang, F., L. Wang, J. Yang, M. Chen, Z. Wei, and J. Su. 2015. The characteristics of air pollution episodes in autumn over the southern Hebei, China. World Journal of Engineering 12 (3): 221–236. https://doi.org/10.1260/1708-5284.12.3.221.

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (71904194) and National Key R&D Program of China (No. 2018YFC0822800).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiming Zhai.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Principles of SVM

When using SVM to classify two types of data, training samples are divided into “1” and “− 1” categories that are then trained to get a hyperplane that is maximally distant from the positive samples and negative samples. Test samples are plotted in a high-dimensional space to distinguish whether they are positive or negative according to an optimal separating hyperplane. This study employed a training set:

$$\{ (x_{i} ,y_{i} )[x_{i} \in R^{n} ,y_{i} \in R,i = 1,2,3 \ldots ,]\}$$
(1)

where xi ϵ Rn represents the eigenvector, and yi ϵ {+ 1, − 1} is the category mark. In this paper, “+ 1” indicates a high crime rate, whereas “− 1” is low. Most real-world problems are not linearly separable; SVM uses the kernel technique to automatically realize nonlinear mapping on a feature space. SVM uses the kernel function Φ(x) to map the training set data xi to a high-dimensional linear feature space to find an optimal hyperplane:

$$\varPhi (x) \cdot \omega + b = 0$$
(2)

where ω ϵ Rn and x ϵ Rn, b is the offset. Therefore, two samples can be separated properly with the largest distance between the two sample types. The discriminant function is

$$y(x) = {\text{sign}}[\omega \cdot \varPhi (x) + b].$$
(3)

The problem of an optimal regression hyperplane can be transformed into a programming function as follows:

$$\hbox{min} \left\{ {\frac{1}{2}||\omega ||^{2} } \right\} + C\sum\nolimits_{i = 1}^{n} {[C(\xi_{i} ) + C(\xi_{{}}^{*} )]} .$$
(4)

The constraint of the function is

$$\left\{ {\begin{array}{*{20}c} {y_{i} - \left( {\omega \cdot x_{i} } \right) - b \le \varepsilon + \xi_{i} } \\ {\left( {\omega \cdot x_{i} } \right) + b - y_{i} \le \varepsilon + \xi_{i}^{*} } \\ \end{array} \quad i = (1,2,3, \ldots ,n)} \right.,$$
(5)

where \(\xi_{i} \ge 0\) and \(\xi_{i}^{*} \ge 0\) are each slack variables, \(c(\xi_{i} )\) is the loss function, and C is the penalty term constant. By using the Lagrangian multiplier to solve the dual form of the quadratic programming problem with linear constraints, we get:

$$\hbox{max} \left\{ {L_{\text{D}} = \mathop \sum \limits_{i = 1}^{l} a_{i} - \frac{1}{2}\mathop \sum \limits_{i = 1}^{l} \mathop \sum \limits_{j = 1}^{l} a_{i} a_{j} y_{i} y_{j} \varPhi (x_{i} ) \cdot \varPhi (x_{j} ) = \mathop \sum \limits_{i = 1}^{l} a_{i} - \frac{1}{2}\mathop \sum \limits_{i = 1}^{l} \mathop \sum \limits_{j = 1}^{l} a_{i} a_{j} y_{i} y_{j} K(x_{i} , x_{j} )} \right\}$$
(6)

with the following restrictions:

$$0 \le a_{i} \le C,\quad \mathop \sum \limits_{i = 1}^{l} a_{i} y_{i} = 0 ,$$
(7)

where \(K(x_{i} , x_{j} ) = \varPhi (x_{i} ) \cdot \varPhi (x_{j} )\), called a kernel function with the discriminant function of

$$y(x) = {\text{sign}}\left[ {\omega^{*} \cdot \varPhi (x) + b^{*} } \right] = {\text{sign}}\left[ {\mathop \sum \limits_{{x_{i} \in SV}} a_{i}^{*} y_{i} K(x_{i} , x) + b^{*} } \right],$$
(8)

where \(\omega^{*} ,b^{*} ,a_{i}^{*}\) are the optimal solutions.

There are several common kernel functions of the SVM method:

  1. (1)

    Linear kernel function: \(Kx_{i} ,x = x \cdot x_{i}\)

  2. (2)

    Polynomial kernel function: \(Kx_{i} ,x = [(x \cdot x_{i} ) + 1]^{q} ,q = 1,2, \ldots ,n\)

  3. (3)

    Radial basis function (RBF):\(Kx_{i} ,x = \exp \left( { - \frac{{\left| {x - x_{i} } \right|^{2} }}{{2\sigma^{2} }}} \right)\)

  4. (4)

    Cauchy kernel function: \(Kx_{i} ,x = \tanh (v(x \cdot x_{i} ) + C)\)

The RBF kernel is most often used in the above function because of its good learning ability. It is an ideal classification function for any type of sample (low-dimensional, high-dimensional, small, large, etc.). This study used the RBF kernel as well.

Principles of Naive Bayes

The probability that the quantity level of the number of bus pickpocketing on a certain day belongs to category c is:

$$P(c|d) \propto P(c)\mathop \prod \limits_{{1 \le k \le n_{d} }} P(t_{k} |c),$$
(9)

where P(c) is the prior probability that the number of bus pickpocketing on a certain day belongs to category c, \((t_{1} ,t_{2} , t_{1} , \ldots ,t_{{n_{d} }} )\) is the characteristic attribute of day d, and nd represents the total amount of all feature attributes of d. After knowing that the number of bus pickpocketing on a certain day belongs to the prior probability of category ci, it is necessary to find the most likely category for a certain day d. For Naive Bayes, it is the category of the estimate of maximum a posteriori (MAP). i.e. the formula (2) (where c ϵ C):

$$c_{\text{map}} = \arg \hbox{max} \,\hat{P}(c|d) = \arg \hbox{max} \hat{P}(c)\mathop \prod \limits_{{1 \le k \le n_{d} }} \hat{P}(t_{k} |c).$$
(10)

Calculating the product of the conditional probability using Eq. (2) may cause the lower bound of the floating point number to overflow, so introduce the logarithm to get the formula (3) (where c ϵ C):

$$c_{\text{map}} = \arg \hbox{max} \hat{P}(c|d) = \arg \hbox{max} \left[ {\log \hat{P}(c) + \mathop \sum \limits_{{1 \le k \le n_{d} }} \log \hat{P}(t_{k} |c)} \right].$$
(11)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, N., Zhai, Y. Crime prevention of bus pickpocketing in Beijing, China: does air quality affect crime?. Secur J 34, 262–277 (2021). https://doi.org/10.1057/s41284-019-00226-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-019-00226-1

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy