Stalking Security Statistics

By Thornton, William E.; McKinnon-Fowler, Ellen et al. | Security Management, April 1991 | Go to article overview

Stalking Security Statistics

Thornton, William E., McKinnon-Fowler, Ellen, Kent, David R., Security Management

THE USE OF PUBLIC SAFETY organizations' criminal event records is becoming a necessary tool in companies' risk-management programs. Much like market surveys, crime statistics can be used effectively in commercial site selection, insurance and premium setting, and other evaluations traditionally associated with capital investments unrelated to routine protection needs. There was a time, for example, when a shopping center developer only had to secure a promising location and commission a market survey and traffic count in deciding on the site for a new mall. Now, a developer probably should hire a security consultant to analyze whether a prospective site could be designated as either a high-crime area or a low-crime area.

A security consultant--whether in-house or outside--is called on to do one or more of the following: assess what types of threats or risks affect the assets to be protected, render an opinion on the probability of those threats or risks, and recommend a security or loss prevention plan to reduce the probability of those threats or risks. While not all security risks are crime oriented (such as natural disasters or fires), for the most part security risks entail crimes against people or property.

Today premises liability considerations are almost a requirement in business. Crime must be evaluated in preparing a security program that meets the threat of existing levels of risk and deters foreseeable adverse criminal incidents. The mere possession of crime statistics, however, is not sufficient. Without the capacity to establish patterns of crime properly and evaluate the impact of past and future crimes on a commercial premises and its invitees, statistics by themselves offer no insights and may even be misleading.

The professional law enforcement community generates a variety of crime data: offense categories, occurrence times, offender and victim characteristics, clustering, frequency, and clearance rates. Police calls are sorted by several activities, such as traffic, nuisance, domestic, crime, order maintenance, medical emergencies, and assorted administrative and judicial assignments. Bigger law enforcement agencies use computer programs and information management procedures to pull out various tracking formats to help in personnel deployment and routine administrative decision making.

Crime statistics are available from a number of sources, the chief repository being the Uniform Crime Reporting (UCR) program managed by the FBI for the nation's law enforcement and criminal justice establishments. Crime in America is published each year and covers the various crime and police data for most cities and suburban communities. Urban police departments routinely offer aggregate crime statistics for Part I offenses (the most serious offenses) and Part II offenses (the least serious offenses).

While these figures are helpful in making comparisons between cities and states, little data is actually useful for determining whether a particular commercial site is more or less susceptible to crime. Proper analysis of crime statistics for security decisions involves at least some geographic mapping, comparative measures, and examination of percentages of change over time and of frequency distributions by per capita ratios. Unfortunately, this information is not found in the annual reports of police departments. The information has to be developed from dispatch records, which are then coded by completed offenses according to UCR subcategories and the disposition classification given by field officers responding to the initial call.

Law enforcement agencies normally release UCRs every fall and provide the previous year's data for the media to compare the annual changes. Some elective agency heads withhold crime statistics to reduce political consequences or allay the public's fear of crime. Others exclude some categories and deny any public access to the data. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)


1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Cited article

Stalking Security Statistics


Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.