Professional Documents
Culture Documents
Indicators of Crime and Criminal Quantitative Studies: Justice
Indicators of Crime and Criminal Quantitative Studies: Justice
Indicators of Crime and Criminal Quantitative Studies: Justice
Department of Justice
Indicators of crime
Quantitative studies
Edited by
STEPHEN E. FIENBERG
Department of Statistics
and Department of Social Science
Carnegie-Mellon University
ALBERT J. REISS, JR.
Department of Sociology
Yale University
PROPERTY OF
National Crimina! Justice Aelerence Service (PdCJRS)
Box 6003
Wockville, hPD
i 20849-66'00
For sale by the Superintendent of Doculuents, U.S. Government Prilltiug OWce, Wasliington, D.C. 20402
U.S; Department of Justice
Bureau of Justice Statistics
Harry A. S u m , Ph. D.
Director
Abstract, iv
Report of a conference, 1
of crime, 4 1
victimization, 54
Howard Wainer
Kinley Lurntz Linear logistic models for the parole decisionmaking
problem, 63
Report of a conference*
DAVIDSEIDMAN**
Social Science Research Council
Washington, D. C.
The quantitative study of crime and crimi- discussions d o not represent the full range Sparks presented one version of this distri-
nal justice is a rapidly developing field of of research in criminal justice carried out bution, based on his London victimization
research. While perhaps most of this devel- by workshop participants since the sum- survey. (See Sparks, Table 1.)' What is a t
opment can be attributed at least indirectly mer of 1975, but focus on the three areas of issue here is the sense in which the overall
to the apparent rise in crime beginning in research discussed above and emphasize victimization rate characterizes the risk of
the 196OYs,advances in particular areas can research supported by the Law Enforce- victimization for individuals in the group.
be traced to more proximate causes. The ment Assistance Administration grant to If it is assumed that the overall rate repre-
creation of major new data bases is perhaps the Social Science Research Council which sents the risk faced by individuals, then the
the most obvious stimulus to quantitative made the workshop possible. distribution of individuals by number of
research, and here the invention and insti- victimizations ought to fit a Poisson distri-
This report draws upon both the written bution. The last column of Sparks's table
tutionalization of victimization surveys conference papers and the discussions t o
have been particularly notable. There has shows the expected number of individuals
present highlights of the conference in the by number of victimizations for a Poisson
been, within the criminal justice system the three mainareas considered. It does not
itself, increased self-awareness, and this process. The standard finding emerges:
pretend to capture the full richness of the "the numbers reporting no victimization a t
has stimulated attempts to rationalize the presentations, and the reader should turn
decisionmaking process .within the system. all, and the numbers reporting several inci-
to the conference papers for the complete dents, are both greater than would be pre-
The basis of rationalization, in a number of picture. Together, the report and the
instances, has been quantitative study of dicted by a Poisson distribution" (Sparks).
papers provide a n overview of current
the. actual operations of the system, research on the frontiers of the quantitative This result is a starting point for specula-
combined with attempts to develop predic- study of crime and criminal justice and a n tion and investigation. Sparks, for exam-
tion methods which would allow for new assessment of current problems and ple, points out that slightly more compli-
approaches to decision making. Finally, directions for future research. cated models fit the data better. In particu-
there has been increasing questioning of lar, models based on either "contagion" o r
the effects of the criminal justice system on heterogeneity of victim proneness in the
offenders, on the crime rate, and on society Victimization studies population work reasonably well. Unfor-
as a whole; this questioning has led to tunately, the two models cannot be dif-
MOST PUBLISHED reports of victimization
attempts to analyze quantitatively what ferentiated in cross-sectional data, which
surveys amount to little more than calcula-
those effects are, in ways which may points to the importance of exploiting the
tions of "victimization rates" for popula-
provide guidance for criminaljustice policy longitudinal features of NCS. Sparks finds
tions and subpopulations for particular
in the future. the contagion notion an implausible
time periods. While these calculations may
These three areas of research were intensely be useful, they leave unresolved certain explanation of the data, and this discussion
studied at the Social Science Research conceptual issues, contribute little to an will pursue the victim proneness direction.
Council's Workshop in Criminal Justice understanding of crime and victimization, If the explanation of the lack of fit of the'
Statistics during the summer of 1975. Sub- and fail to exploit the full potential of the Poisson model is that individuals differ in
sequent to the workshop, participants surveys (in particular, the longitudinal their victim proneness, a logical next step is
carried out research in these areas and features of the National Crime Panel to sort out individuals by their degrees of
others. The conference held in October Survey are underexploited). Several work- victim proneness, and see if the Poisson
1977 provided an opportunity for presen- shop participants have been studying vic- model fits within subgroups of the popula-
tation of research results and for discussion timization surveys in ways which probe tion. Sparks tried this with his London
of research plans. The presentations and more deeply into the structures and proc-
'Cltat~onsw ~thoutdates refer to papers and other mate-
* A report to the Bureau of Justice Statistics by the
esses underlying the data. The primary rials which served as the basis for conference presenta-
Social Science Research Council, 605 Third Avenue, focus has been on problems related to mul- tions. Other citations are to materials included in the
New Y ork, N Y 10016, pursuant to Order Numbers- tiple and series victimization and the inter- l ~ s tof references at the end of t h ~ sreport.
0073-J-LEAA. This report is based upon working actions of survey design features and
papers presented at the conference. The quotations
and materials discussed will therefore not neces-
resulting data. Considerable time at the
sarily coincide with the versions of the papers conference was devoted to presentation
published in this volume. and discussion of this work.
**In September 1978 David Seidman left the Social
Science Research Council forthe Rand Corporation, A useful introduction to problems of mul-
Washington. D.C. tiple victimization is a well-known finding
concerning the distribution of individuals
by number of reported victimizations
within the reference period. Richard
data. but could not find any combination which, as a result of the random process, Second, the matrix depends upon the time
of attributes, such as age, sex, race, or was not victimized in the reference period. sequence of victimizations. NCS incident
social class, which could be used to cate- reports record the month of nonseries vic-
gorize individuals to produce subgroups The plausibility of an absolutely immune
group declines when a time perspective timizations. Victimizations of a household
within which the Poisson model ade- within a month, however, lack the informa-
quately fit the data. As he notes, it is not longer than the reference period of a single
cross-sectional survey is adopted. This tion required to establish the time sequence.
surprising that these simple demographic The timing of series victimizations presents
variables would be insufficient. begins to suggest the importance of ex-
ploiting the over-time features of the Na- a more complicated problem, as the NCS
It is possible that the observed pattern tional Crime Panel Survey. There are, of records only the month of occurrence of
actually results from measurement prob- course, other reasons for relying upon lon- the first incident in the series (and if the
lems in the surveys. One such measurement gitudinal files of the NCS for analysis of series began before the reference period,
problem has to do with series incidents. multiple and series victimimtion. For one the date recorded is the first month of the
Typically the number of incidents in a thing, the large number of incidents avail- reference period). Reiss therefore had t o
series is estimated by the victims, and there able in such files allows disaggregation to impose an arbitrary time order so as t o
appears to be a tendency to overestimate crime-specific victimization. For another, establish a sequence for all reported victim-
the number-a phenomenon common to a repeated interviews can be used to build izations. He did this by randomly assigning
number of different areas of investigation. long sequences of victimization experience, dates within months to events, with series
For a variety of reasons, incorporation of which allow, among other things, investi- treated as single events. The error intro-
series victimizations into the distributions gation of the stability of patterns. Finally, duced into the ordering by this random
here considered is difficult, and their exclu- longitudinal files allow investigation of the procedure is likely to be relatively small for
sion may substantially affect the shape of time between victimizations, which may be nonseries incidents, as incidents occurring
the distribution. Some indication of the important to an understanding of multiple in different months are unaffected. The
effect can be obtained by examining such victimization. errors introduced by treating series victim-
questions as whether series victims also izations as single incidents and then placing
report other victimizations, but this exami- Albert J. Reiss, Jr., has constructed what them (at a randomly selected date) in the
nation is difficult in a small cross-sectionalwe believe to be the only extant working month the series begins (or the first month
survey. Another measurement problem is longitudinal file of NCS data. He presented of the reference period) are harder to assess
nonreporting. It may be, for example, that some results of analysis of this file to the because of the general paucity of informa-
most nonreporting is by people who have conference. These results concerned the tion about series victimizations. However,
been victims only once. Since the depar- relatively limited question of whether in Reiss has found that those who report
tures from the Poisson distribution are repeated victimization of a given unit there series victimizations are highly unlikely to
largely in the zero and one victimization is a propensity for repeated victimization report other victimizations, so that the
groups, this would account for much of the by the same type of crime, or whether re- primary effect of his treatment of series vic-
lack of fit. Accounting for that pattern of peated victimization is random as to crime timizations is likely to be a reduction in the
nonreporting, however, is difficult. type. While the question is limited, it ap- proportion of cases in a crime switch'
pears central to an understanding of victim matrix which fall on the diagonal of the
If the deviation from the Poisson distribu- proneness and multiple victimization. matrix (since events within a series are in
tion appears to be mainly a matter of too theory all of the same kind). The signifi-
many people reporting no victimizations, it The analytical tool Reiss used is a crime cance of this will become clear as the results
seems reasonable to fit a Poisson distribu- switch matrix consisting of pairs of victjmi- are discussed.
tion to the distribution of those reporting zations, where a preceding victimization by
a t least one victimization, and then project type of crime is compared with a following A preliminary examination of the data
backwards to estimate the number "be- victimization by type of crime. (Reiss's "Victim Proneness") enables one
longing" in the zero victimization group The construction of such a matrix presents to compare the distributions of victimi.za-
under Poisson assumptions. The 'excess" a number of questions and problems. First, tion incidents by type of crime where both
actually found in that category might then what is the unit at risk? Confining his anal- incidents occurring in sequences and single
be thought of as drawn from a population ysis to households as units, Reiss notes that victimizations are included with equivalent
somehow lacking vulnerability to crime. victimization of individuals within house- distributions not including singli victimi-
The source of this immunity to crime-or holds may symbolically represent victimi- zations. It is apparent that the distributions
a t least to certain kinds of crime-is not zation of the household. (Similarly, are substantially similar, which leads Reiss
immediately obvious. Presumably it has individuals may not sharply distinguish to conclude that "multiple or repeat house-
something to do with residential location household victimization from personal vic- hold victims are on the whole no more
or life style. Of course, while a model pos- timization when the focus is on personal prone to victimization by certain types of
tulating an immune group and a group victimizations. Because of the choice of crime than are all victims." If multiple
subject to Poisson process may fit thedata, focusing on households, Reiss's analysis is victimization reflects victim proneness, it
isolating the immune group for analysis unaffected by this problem.) It follows that nevertheless seems not to reflect proneness
may not be possible, since there is no obvi- if the household is the unit of analysis, a re- to particular types of crime.
ous way to separate it from the group searcher may either limit the analysis to
household victimizations or include as well
victimizations of individuals within the
household. Reiss examined the data both
ways.
Reiss's crime switch matrix further exposes experience at the prior location. (That is, sketch of this approach is contained in sec-
the structure of multiple victimization. As information is obtained which, depending tion 5 of his "Victimization and the Na-
is perhaps clearer from a chi-squared upon the time of the move, may relate to tional Crime Survey: Problems of Design
analysis of the matrix, the major element of the new resident's prior residence, but there and Analysis." He expanded upon these
structure in the matrix is the heaping of is, in the recorded data, no way to distiil- ideas in a presentation at ehe conference.
incidents along the diagonal. The implica- guish between victimization at the old loca-
tion is that "the chances that a household In Fienberg's view, analysis of questions of
tion and victimization at the new one.) The multiple victimization depends upon mod-
or one or more of its members will be second question cannot be addressed at all,
successively victimized by the same type of els for the occurrence of victimizations
because no attempt is made to follow
crime are greater than one would expect movers to their new residential locations. It over time. Without necessarily suggesting
given the chances all households and their might be possible to approach the problem that it represents the true underlying struc-
members have of being victimized by that relatively cheaply by adding to interviews ture, Fienberg proposes modelling victimi-
type of crime." The analysis continues by with new residents a set of questions de- zation as a particular form of stochastic
examining whether the frequency of signed to elicit retrospective information point process, a semi-Markov process.
particular pairs depends upon which about victimization experiences, though (The Poisson process, discussed above, is a
element of the pair occurs first. For special case of the semi-Markov process.)
recall decay problems would be a substan- Such a process has two main features.
example, is the sequence assault-personal tial obstacle to obtaining reliable infor-
larceny more or less frequent than the First, the probability that one is next vic-
mation.
sequence personal larceny-assault? Reiss's timized by a crime of type j depends only
Table 4 strongly suggests that the order Also important to questions of victim and upon the crime type of which one was last a
within pairs makes no difference; that the location proneness is the character of the victim. That is, the transition from victimi-
structure is symmetrical with respect to neighborhood of the interview location. zation state to victimization state is gov-
order of occurrence. Reiss has merged certain neighborhood erned by a matrix of probabilities resem-
characteristics onto his victimization tape, bling Reiss's crime switch matrix. Second,
Reiss's paper merely establishes these ele- but what is perhaps the most important the interval between victimizations is ran-
ments of structure. Conference partici- neighborhood characteristic for these pur- dom, though the distribution of time
pants offered some speculative explana- poses, the neighborhood crime rate, is between victimizations depends upon the
tions. Some possible explanations turn on unavailable. current victimization state. A convenient
methodological artifacts: reporting defini- feature of semi-Markov processes is that,
tions, response bias, interviewing tech- Some questions about these patterns of for many purposes, the transition matrix
niques, and the like. More substantive multiple victimization relate to the length and the time interval distributions can be
explanations focused on the characteristics of time in panel for respondents. The Reiss studied separately. The model is based on
of locations, patterns of communication, data set contains a high proportion of re- continuous time, while victimization data
and the elusive concept of victim proneness. spondents interviewed only a small number collection is one month at a time. Integrat-
of times. It seems likely thatthe proporiion ing these two different approaches presents
It was noted that, because the NCS is a sur- of single victimizations would decline as,
vey of household locations, there is in modelling,problems.
the sample "ages." It is also possible that
theory the opportunity to explore victim some of the concentration on the diagonal Fienberg also notes that the hierarchical
proneness and location proneness by of the crime switch matrix would decline, structure of the victimization surveys (in-
examining over time (1) victimization ex- the pattern of victimization followed by dividuals within families, families within
periences at locations where there is a victimization of the same kind declining as households, households within locations,
change in individuals, and (2) victimization time between victimizations increases. locations within neighborhoods) compli-
experiences of individuals who move out of Reiss in other work is examining time be- cates the modelling approach. These adqed
a survey location. The importance of this tween victimizations, but results of that complications will not be discussed here.
kind of examination is suggested by the re- work were not presented at the conference. A fundamental question is whether the
lationship between being victimized and process is time homogeneous, or whether
moving. Reiss pointed out that both series Stephen Fienberg has been developing
models for analysis of victimizationdata in there are shifts in the process related to,
victims and other multiple victims are say, time in panel or other causes. To an-
highly likely to move. The questions which their full longitudinal structure, with par-
ticular attention to problems of multiple swer this question and others relating to
need to be answered are whether the high time between events, Fienberg proposes a
rate of victimization continues with a new victimization and various time-related
effects in the data, such as the effects of research approach along the following
household at the surveyed location and lines. In order to obtain the required long
whether the high rate of victimization con- month of collection, time lag to reference
month, and time in panel. A preliminary records, he begins with a subfile of respon-
tinues for the mover at a new location. dents with full 3%year records. Assume we
While in theory the survey design might start by considering the household as the
permit the first question to be addressed, in unit of interest. Then there are 42 months
practice it does not, because the records do in which an incident of victimization may
not carefully distinguish between new and be reported. As a first step, consider only
old tesidents in continuing locations and whether the household has or has not been
because, in the case of new residents, no victimized within a given month, ignoring
information is sought about victimization differences among types of crime and mul-
tiple victimization within a month. (Note
that the NCS treatment of series victimiza- or starts with completely aged cohorts: the have bearing well beyond questions of mul-
tion causes difficulties here.) Then there are same records are included. And starting in tiple victimization. The overriding problem
242 possible time sequence patterns, a either place one might compare different is that longitudinal analysis is required,
number far too large for analysis. In prac- cohorts at similar points in their "life cy- while the attention of LEAA and the Bu-
tice, the number of patterns found would cles" in the panel to investigate stationarity reau of the Census has been directed almost
probably be much smaller; Fienbergguesses of victimization apart from the question of entirely to cross-sectional analysis. Related
that about 20 patterns would account for time homogeneity Fienberg discussed. The to this are several problems resulting from
95 percent of the records. It would then be question separating the two approaches, selective attrition of panels, largely caused
possible to examine the time patterns for then, is how long a record is necessary to by residential mobility and changes in
shifts associated with time in panel. As a investigate time homogeneity. That, how- family composition. Alteration in survey
next step, households could be scored each ever, cannot be answered a priori. In the design is required to (1) provide informa-
month according to whether there has been absence of adequate prior investigations, tion about the continuity of respondents
household victimization, personal victimi- the only way to know whether it is within household locations, and (2) allow
zation, or no victimization, and the same necessary to use Fienberg's approach as investigation of patterns of movers, pre-
kind of analysis could be done. The analy- compared with relying upon shorter and post-move.
sis would then continue, examining finer records is to compare findings based on the
Conferees commented upon the Census
grain structure at each step. The informa- longest possible records with those based
Bureau's "Description of Activities," a
tion on time sequencing of victimizations on shorter ones.
proposed research agenda for fiscal years
generated in this way feeds back into the The discussion of the two possible starting 1978 through 1982. This Description treats
models of generation of multiple victimiza- points for the investigation Fienberg pro- the matters mentioned in the previous
tion which are at the heart of the investiga- posed pointed once again to the problem of paragraph, and it is worth quoting the
tion. The discovery of time heterogeneity in panel attrition. It has already been noted entire treatment:
long records would likely allow for various that those with high victimization are rela-
transformations inducing homogeneity. In 3. Quesrionnaire design research
tively likely to move from the household Research on the most effective questionnaire
addition to casting light on the underlying location and therefore be lost to the panel.
processes, such transformations would design will focus on the following areas:
There are at least three different reasons for ...
provide important information about the this. First, high victimization and house- d. A method of identifying respondents so
interpretation of aggregate victimization hold propensity to move may independ- they can be traced across time.
rates in cross-sectional analysis. The prob- ently be related to other causal variables, ...
lem of the ill-fitting Poisson can be ad- such as low income. Second, it seems plau- 12. Conceptual issues regarding NCS
dressed, and records sorted in ways allow- sible that some households may move ...
ing examination of victim proneness. because of high victimization. Presumably b. Mover/Nonmover Study (including a
Several of the conferees questioned whether in .such cases the household has decided comparison of in-migrants with out-migrants).
it was wise to begin with a subfile of those there is location proneness. Third, the 13. Analyrical issues
with 3% years of data, suggesting instead young are relatively likely to leave the ...
household, going off to college or setting a. Longitudinal studies. An exploration of
starting with an entering cohort and ex- techniques and difficulties of exploiting NCS
amining it over a six-month period. Reiss up their own households. Since the young crime features to do longitudinal analyses.
suggested that there will be sufficient mul- have relatively high victimization rates,
tiple victimization within a six-month this process will reduce the victimization It is noteworthy that mention of the longi-
period to allow the kind of analysis rates for the household considered as a col- tudinal features of the design and their im-
Fienberg had proposed for the longer lection of individuals. Either starting point portance for analysis does not appear until
records. The suggested advantages of the for the Fienberg investigation will, pro- the final page of the document. It was the
entering cohort approach are that it avoids vided it ultimately deals with complete long clear sense of the conferees both that the
gaps in records (which Fienberg had noted records, lead to an examination of a limited placement of that brief discussion a t the
as a complication facing his approach) and subset of the original panels, and the vic- end indicated the priority attached to lon-
it significantly reduces problems associated timization experience of the movers is gitudinal analysis by those responsible for
with panel attrition. And, of course, the likely to differ systematically from the ex- NCS, and that such low priority was totally
number of possible patterns is substantially perience of those who remain. Further- inappropriate.
smaller with 12 months than with 42 more, if, as is sometimes the case, it is im-
months. possible to tell from the data records Decisionmaking
whether the occupants of a household have
Fienberg's answer was that time hetero- changed from interview to interview, some Considerable attention at the workshop
geneity was more likely to be discoverable of the "complete" long records will actually had been given to aspects of decision-
with the longer records. The conferees then be spliced records of more than one house- making in parole and sentencing. Several
suggested starting with entering cohorts hold (in the nonlocational sense). Given the of the workshop participants continued re-
and "aging" them. It is clear that if they are likelihood that the victimization experi- search in this area and presented results to
aged far enough, with movers deleted, it ences of the various households comprising the conference.
makes no difference whether one starts the spliced record will systematically differ,
with entering cohorts and works forward The Salient Factor Score system used by
these "completed" records will provide the Federal Board of Parole approaches
misleading information. the parole prediction problem by assigning
While the presentations and discussion a t scores for each individual on nine categori-
the conference focused on questions of cal variables and adding the scores (equally
multiple victimization, they pointed to sev-
eral important problems in the design and
analysis of victimization surveys which
weighted) to produce a single Salient Fac- squared statistics for each. In addition, he The group of individuals with predicted
tor Score, which is used to predict parole computed the likelihood ratio chi-squared probabilities above the cutpoint will pre-
outcome. Herbert Solomon (1976) reana- for an equally weighted model ("Burgess sumably include some parole failures and
lyzed the data earlier used to develop the scale," the salient factor method). While some parole successes. The group below
Salient Factor Score system. He showed models which include the interaction term the cutpoint wil! also include some suc-
that, for a subset of four predictor varia- d o better than models which do not, cesses and some failures. The difference
bles, logit models, which weight the varia- differences in goodness of fit among the between the proportion of all successes
bles unequally, can achieve better prediction various models without the interaction who fall above the cutpoint and the pro-
than the equal weighting of the Salient term are exceedingly small. That is, it does portion of all failures who fall above the
Factor Score system, in the sense of fitting not seem to matter much whether one uses cutpoint is a measure of the ability of the
the observed proportion of successes. (In four or eight variables (presumably because model to discriminate properly. As the cut-
part, no doubt, this better prediction of high collinearity among the variables). point is varied, this difference is likely t o
occurs because Solomon's method pro- Nor does it seem to matter much whether change, and the proportion of the whole
duces a larger number of prediction cate- one uses the equal weights of the salient group falling above the cutpoint will surely
gories than the Salient Factor system, factor method or a more sophisticated change. For each of the models Larntz
given the same number of predictor weighting scheme. varied the cutoff point and examined the
variables.) Kinley Larntz felt that analysis Larntz then removed the restriction of the key difference. These results are presented
could be pushed further (or at least beyond analysis to categorical variables. Several of as a series of graphs. T o facilitate compari-
the published description of Solomon's the categorical variables of the first analy- son across models, Larntz graphed the dif-
work) and that it would be useful to ap- sis were produced by categorizing measured ferences not as functions of the cutoff
proach a different data base with the same scales, and Larntz therefore restored the point, but rather of the proportion of the
general questions. He described his work original scales. Removing the restriction total sample below the cutoff point.
on this problem at the conference.
called for changing the analysis technique It is to be expected that the logistic models
The State of Minnesota had undertaken a to logistic regression, and Larntz applied will perform relatively well in this test, be-
parole project similar to the federal effort, this technique to seven variables which are cause the variables had initially been
developing its own salient factor score sys- quite similar to the variables used in the selected on the basis of their performance
tem on the basis of an extensive body of earlier analysis. See Larntz, for partial in the combined validation and construc-
data concerning released prisoners. Larntz results. Once again, the number of varia- tion samples. Performance of the logistic
obtained data for about 1000 released pris- bles included in the model did not have a regressions near this level would, because
oners from the State of Minnesota, the striking effect on goodness of fit. Indeed, a less preselection of variables was involved,
data used in the development of the salient model containing only two variables, age at indicate that they are of a relatively high
factor system, and reanalyzed it using mul- first conviction and number of previous quality. The high peak associated with a
tivariate log-linear methods. (Tables and parole failures, performed nearly as well as logistic regression based on only two
graphs from Larntz's analysis are in his a seven-variable model. Larntz tested inter- variables is therefore particularly striking.
"Linear Logistic Models for the Parole actions, but did not include any in the
Decisionmaking Problem.") reported models because they seemed to In principle, analysis of this kind could be
have little effect. It is striking that even the used to select an optimal cutpoint value.
Larntz begins with a logit analysis using the seven-variable model does not represent an However, that selection depends upon
eight categorical variables of the salient enormous increase in goodness of fit overa criteria for optimality, and it is not entirely
factor scores applied to 485 cases selected model using no variables except a constant clear what those criteria should be. Maxi-
from the full file (this reduced sample is the term. It is difficult to compare the logistic mum separation is obviously an attractive
"construction sample"). This analysis par- regressions with the logit models in terms candidate. However, one might want to,
allels that of Solomon, except for the larger of goodness of fit, since the variables used say, sacrifice some degree of separation for
number of variables. In addition, Larntz in the logit models were selected by the a larger proportion of the total sample
tested for two-factor interactions (which Minnesota parole project precisely because below the cutpoint.
Solomon does not report having done). they produced a salient factor score which Larntz next asked whether the effects of
Only a n age a t first conviction-burglary seemed to "work" well for the data Larntz preselection of variables distorted the
interaction seemed to have much effect, was using. The variables used in the logistic results, so that the estimated probabilities
with those first convicted at higher ages regressions were somewhat less preselected.
more likely to be parole failures if qhe were in fact not very good estimates. He
instant offense is burglary, while whether The point of parole prediction models, of tested this possibility by taking the esti-
the instant offense is burglary matters little course, is not to fit observed probabilities mated probabilities from each model and
for those first convicted at age 19 or of parole failure for categories of potential using them to generate a binomial random
younger. Larntz estimated models using parolees. It is rather to provide predictions variable (success or failure) for each indi-
the full eight variables, the,eight variables of success or failure which may serve as the vidual. He then repeated the cutpoint and
with the one interaction, a subset of four basis for parole decisions. The important difference analysis for each model, using
variables (equivalent to the Solomon question, therefore, is how well the model
model), and four variables with the is able to separate parole successes from
interaction, computing three kinds of chi- parole failures. Larntz turned to the other
half of the data set, the validation sample,
for an approach to this question. The logic
is roughly as follows. For each individual
in the sample, the model will generate a
prediction of success. The analyst then
chooses a cutpoint on the probability scale.
the generated outcome scores rather than a difficult thing to do. It is therefore not than the probability model would suggest.
the actual outcomes. Graphs for three surprising that it appears difficult to im- Furthermore, even if they are expected t o
models are presented in Larntz. The first prove upon Larntz's two-variable logistic happen, they cause difficulty for the esti-
two graphs are for logistic models. It is regression model. mation of individual probity, particularly
clear that in both czses the curve has shifted if the item is far from the individual's pro-
upwards, which suggests that the distribu- Wainer in fact told the conferees that he bity, because information about individual
tion of estimated probabilities is too spread had given up hope of accurately predicting probity decreases with distance of the item
out. Application of these models to a new recidivism (or parole failure), and in his from the individual probity while its in-
data set should reveal considerable shrink- work on what appeared to be the parole fluence on the estimate of probity in-
age. There is noticeably less upward prediction problem was actually address- creases. The problem, then, is how t o
shifting for the one logistic regression ing a different question. From the perspec-
reduce or eliminate the effects of these
model included, indicating that the esti- tive of his analytic approach, events (or the
errors in estimating probity.
mated probabilities are reasonably good. variables involved in parole prediction) are
And it should be emphasized that the viewed much like items in a test, and each The statisticians a t the conference discussed
logistic regression involved here has only event is characterized by its "rarity" ("dif- this estimation problem at some length,
two predictor variables. The conclusion is ficulty" in the testing context). Recidivism, providing Wainer with some useful sugges-
that a very simple model, involving only or parole failure, is viewed simply as a n tions, but not reaching a clear solution.
two variables, performs quite satisfacto- event with a certain amount of rarity. In- While predictions of success are important
rily-at least in comparison with the other dividuals in the testing context are char-
in modern methods of parole decisionmak-
models tested. It is obvious, however, that acterized by their level of ability, which, in ing, they are not the sole basis for t h e
there remains considerable error in predic- the parole context, Wainer refers to as decision. The Federal probation guidelines
tion. "probity." The statistical methods yield combine salient factor scores (i.e., predic-
estimates both of the rarity of events and of tions) with offense characteristics ("seri-
Howard Wainer has also worked on the the probity of individuals. ousness'') to produce "average total time
parole prediction problem, using data from served before release. " Wainer applied
Wainer wants to beable todescribe institu-
the Federal parole system. Since his two-way table decomposition methods t o
tions, say in the criminal justice system, by
attempts t o improve upon the predictive the matrix showing the midpoints of rec-
the characteristics of the individuals enter-
performance of the salient factor system by
ing them. Then, if one saw that recidivism ommended sentence intervals for each
use of alternative estimation procedures
among the products of some institution combination of salient factor score and
had earlier been considered by most of the
were declining, one could ask whether the offense characteristic category in the
conferees, they were not discussed exten-
decline resulted from a change in the nature salient factor system. His results indicate
sively at the conference. But it is worth
of the institutional population o r from that "the existing parole policy corresponds
mentioning that, by using psychometric
something else, such as a new program closely to a multiplicative model in which
methods applied to the variables used in
which had been instituted. In other words, seriousness of offense seems to count
the Federal salient factor scores, Wainer
one would want to examine recidivism of almost three times as much as offender
was able to improve on the salient factor
score predictions. However, as with the institutional population controlling for characteristics among adults" (Perline and
the probity of the population. The focus, Wainer). The relativeIy small effect of the
Larntz's various models, the improvement salient factor scores (that is, the measure of
in predictive power was relatively small, then, .is shifted from prediction of
individual behavior to system character- offender characteristics or of probability of
and the resulting predictions are not very recidivism) suggests either that the inac-
accurate. As Wainer and Perline have writ- istics.
curacy of the predictions of recidivism is
ten, "our results are a t least as good with Having introduced this perspective to the taken into account in decisonmaking, or
this approach as with any other, but still conferees, Wainer presented a problem for that characteristics of the offense are
leave a great deal to be desired." their consideration. In estimating rarity considered more important in determining
The conferees were in general agreement as and probity, he has found occasional item- time served. Wainer suggests that the two
to why none of the approaches leads to very person interactions, or instances in which dimensions of the guideline scheme, salient
good prediction of parole success or particular item-person combinations are factor scores and offense characteristics,
failure. Leaving aside such common prob- badly fit by the model. The analogy in the correspond to two schools of thought on
testing context is to those occasions o n incarceration, rehabilitation, and retribu-
lems of prediction as, say, the influence of
which a n individual with low ability never- tion. It could be argued, then, that his
chance events on behavior, there is the
theless gets a difficult item right, or an in- finding concerning the relative importance
problem that the parole prediction prob-
dividual with a high ability misses an easy of the two factors indicates the relative
lem is considered only in the context of a
highly homogeneous population represent- item. Because of the probabilistic nature of importance of the two views of the purpose
ing a very small and extreme portion of the the event-person combinations, some of incarceration in parole decisionmaking.
distribution of behavioral characteristics. "errors" of this kind are bound to happen.
The prison population is itself extremely However, they seem to happen more often Before parole boards can consider the de-
restricted in its range of variation, and pre- cision to release a prisoner, there must be a
sumably a n extreme portion of the prison decision to incarcerate the individual in the
population is seen as "obviously" unsuit- first place. David Britt and Kinley Larntz
able for parole, so the parole data base is have investigated judicial sentencing deci-
even more restricted. As Leslie Wilkins put sions, using a sample of 200 cases from the 1
it, parole prediction is an attempt to predict Denver, Colorado, courts, originally col-
far out in the tail of a distribution, which is lected under the auspices of the State
Courts Sentencing Project and provided by Deterrence because it is reasonable to suppose that im-
Leslie Wilkins. After elimination of cases The problem of estimating the deterrent prisonment decisions are influenced by
because of inadequate data or because they effect of criminal sanctions occupied con- such factors as prison crowding. If impris-
involved "victimless crimes," 138 cases siderable time a t the workshop and consid- onment rates and crime rates are simulta-
were analyzed t o determine the major fac- erable effort by workshop participants neously determined, as this suggests, then
tors used by judges in reaching thedecision since then. The major work on deterrence simultaneous equations models may be-
of whether or not to incarcerate a n individ- since the workshop has been that of the Na- come appropriate. Estimation of simulta-
ual convicted of a criminal offense. Logit tional Research Council's Panel on Re- neous equations models requires appropri-
models were used in the analysis. search on Deterrent and Incapacitative ate identification restrictions, that is,
Effects (1978). The panel was chaired by variables which influence sanctions but not
In brief summary, the results indicate that crimes, or variables which influence crime
dispositions of crimes against property workshop participant Alfred Blumstein
and included two other workshop partici- but not sanction risk. The choice of identi-
appear related to variation in the serious- fying restrictions is a difficult problem,
ness of the crime and the offender's previ- pants, Gary Koch and Albert J . Reiss, Jr.
Daniel Nagin, staff to the panel, spent sev- which, in the panel's view, has not been
ous record in a straightforward way. "As adequately resolved.
the crime becomes more serious and the eral weeks a t the workshop, and Brian
offender's previous record becomes poorer, Forst, co-author of one of the panel's com- In sum, a deterrent effect is not clearly
the chances of the individual's being incar- missioned papers, reported on his research demonstrated in existing studies. This brief
cerated increase." (Britt and Larntz). to the workshop. It is appropriate, there- presentation sparked considerable discus-
Furthermore, seriousness of offense does fore, that the conference discussion of de- sion among the conferees. A number of
not seem to lead to incarceration for those terrence began with a brief statement by them argued that treatment of the simul-
with a good prior record. For crimes Blumstein summarizing the panel's work. taneity problem involves far more than
against persons, seriousness of offense did Blumstein noted that the panel had focused choosing appropriate identifying restric-
not play a large role in incarceration, pre- on general deterrence, where the issue is the tions and separating deterrence and inca-
sumably because nearly all the offenses association between crime rates and sanc- pacitation. The argument is that the rela-
involved were relatively serious ones. A tions. Virtually all the research on this issue tionship between imprisonment and crime
two-variable model using the nature of the has found, after controlling for other rates is more complicated than the aggre-
plea and whether the charge was reduced determinants of crime, a negative associa- gate statistical models suggest. The ways in
best fit the data. No characteristics of the tion between crime and sanctions. Whether which adaptation to the pressures of
offender affected the chances of being there is a causal relationship is a more diffi- changing crime rates affects prisons over
jailed once these two variables were taken cult question. The panel considered three time, and the related question of how
into account. principal aspects of this question: changes in prisons affect crime rates, have
not been studied to any substantial extent.
The contrast between sentencing decisions, The composition of prison populations
1. Single equation models typically use, o n
at least a s they appear to be made in Den- may shift, the social environment of the
the left-hand side of the equation, a frac-
ver, and parole decisions under modern
tion in which crime is the numerator, while prisons may change (arguably making pris-
guideline systems is worth noting. The
the sanction risk on the right-hand side of ons more-or less-attractive places t o
parole decision system explicitly builds in a the equation is a fraction with crime in the be), the symbolic meaning of imprison-
variety of characteristics of the individual ment may change as prisons become polit-
denominator. If there is error in the meas-
in determining release. The sentencing icized, and so forth. Further, it is
urement of crime, it will generate a negative
decisions incorporate no individual char-
association between crime rate and sanc- reasonable t o expect that the effects of
acteristics (but for prior record in the case
tion risk, even in the absence of a deterrent imprisonment on crime rates depend upon
of property offenses) in determining when
effect. Without good estimates of the mag- prison release rates and the character of the
to incarcerate. prisoners released. At the very least, dis-
nitude of the error, therefore, it is difficult
Several qualifications should be intro- to know what t o make of the association entangling these factors requires disaggre-
duced. First, the sentencing study did not found in the data. gation of the available data by offense-a
investigate length of sentence. Second, in- recommendation with which the panel
2. Imprisonment is typically the sanction agrees and which is followed in a number of
dividual characteristics may be incorpo-
used in deterrence studies. However, while
rated into prior events in the criminal jus- the studies. Whether modifications t o
the risk of imprisonment may have a deter-
tice system: the Denver data concern only account for the other problems and ques-
rent effect, the fact of imprisonment may
convicted individuals. Individual charac- tions can be built into the kind of aggregate
affect crime rates through kcapacitation of analysis common in the study of deterrence
teristics may play a far larger role in the
active criminals. An estimated effect of im- is another matter. In any event, the requi-
decisions to arrest, prosecute, and convict.
prisonment, therefore, may combine both site data are not available to d o so now
A full investigation of the various factors
deterrent and incapacitative effects in un- even if in principle it can bedone. The ques-
determining outcomes in the criminal
known proportions.
justice process would have to begin at a tion of whether valid conclusions about the
much earlier stage than the sentencing 3. A negative association between crime deterrent effect of sanctions can be reached
stage. It seems likely that the development and sanction may result from deterrence of through the use of aggregate models which
of OBTS data will make such investigations crime by sanction, but it may also result d o not include these complex problems was
easier to conduct in the future. from the inhibition of sanction by rising not resolved in conference discussion.
crime rates. This is particularly a problem
in studies which, like most published
studies of deterrence, rely on cross-
sectional data a t the state level. It is also a
particular problem to the extent that stud-
ies rely on the sanction of imprisonment,
Discussion then turned to the problem of In objecting to Blumstein's hypothetical A strong theme of much of the discussion
estimating deterrent effects in single equa- experiment, conferees noted that by fixing of this problem was that the specification
tion models. Blumstein had noted that if values of C and using them in the model to of deterrence models common in the litera-
crime is measured with error in the stand- generate values of C/ N, the experimenter ture may not allow thedetermination of de-
ard models for the problem, estimates of would in effect be generating simply values terrence effects. Considerable complexity
deterrent effects are biased. The standard of the reciprocal of N. This suggested to must be added to the models. The "crime
model would take the following form: some of the conferees that the problem was rate" needs to be decomposed. It might b e
incorrectly formulated. As one conferee viewed as a function of a distribution of in-
said, "You cannot fix Cand then talkabout dividual rates of offending. As Reiss has
Where C = number of crimes generating crime rates." written, "there are three general kinds of
N = population Another approach to the question formu- change that affect the incidence of crime in
I = number of sanctions lates the basic equation in terms not of the a population. They are changes in the
e = random error term quantities actually used in the standard prevalence of offenders in a population,
A = parameter to be estimated approaches, but rather in conceptual changes in individual incidence of offend-
terms. Thus "crime rate,"or something like ing, and inferactions between prevalence
Estimates of A are biased if C i s measured
it, is seen as a function of "sanction risk," and incidence rates" ("Understanding
with error. Blumstein added, however, that
if C is measured without error, then un- among other things. Call the coefficient of Changes in Crime Rates''). In effect, theleft-
biased estimates of A are possible. The "sanction risk" B. Then the standard equa- hand side of the deterrence equation must
statement generated considerable contro- tion is seen as a particular realization of the consider all of these. Both prevalence of
versy, less because conferees believed it to conceptual model, using proxies for the offenders and individual rates of offending
be false (it is not clear that any of them felt conceptual variables. Then there are two may be influenced by the criminal justice
it was false, when properly qualified) than separate questions which can be asked of system in a number of ways, and these
because its implications for the study of de- the estimation. First, is the estimate of A would need to be considered on the right-
terrence are problematic. In other words, unbiased? That question, which has hand side. I n addition t o the general
presuming a n unbiased estimate of A, is apparently preoccupied the literature, deterrent effect of imprisonment, one
that estimate a measure of the deterrent appears to have the answer Blumstein sug- should consider the incapacitation effect,
effect of criminal sanctions? The question gested: if C is measured without error, a n the effects of differential release rates, and
can be approached through two hypotheti- unbiased estimate of A is possible. The other complications. In the opinion of
cal experiments, the first proposed by second question, however, concerns the some of the conferees, unless decomposi-
Blumstein and the second by other con- relationship between A and B. And it tions of this sort are essayed, it will be im-
would appear that the particular structure possible to disentangle the various effects
ferees.
of the variables used in the estimation- of sanctions and therefore impossible t o
Blumstein's experiment is roughly this. that is, the presence in the denominator of estimate a deterrent effect. Analysis along
Pick a value for A. Generate data for I a n d the sanction risk variable of the numerator these lines, however, is not a short-term
C, without error. (These may be real or project. The data simply d o not now exist
of the crime rate variable-means that A is
hypothetical data.) Generate a random not an unbiased estimate of B. to implement it.
variable e. Then use the equation to gener-
ate values of C/ N. Label I/C "imprison- If the answer to the second question sug- There remains the possibility that, short of
ment rate" and C/ N (as generated by the gested above is correct, it immediately implementing the more complex model
model) "crime rate." Give these variables to raises another problem. How does one esti- described above, one can consider esti-
a statistician and ask him to estimate A . mate B? Colin Loftin, drawing upon his mates derived from the standard deter-
The statistician should be able to produce own deterrence research, suggests using rence model as measures of the aggregate
an unbiased estimate of (the known value sanctions rather than sanction risk as the effect of sanction risk, without worrying
of) A. The structure of the model suggests explanatory variable. He noted that the too much about what proportion, if any, of
that A is a measure of the effect of the im- deterrence research has generally found the aggregate effect is actually deterrence.
prisonment rate on the crime rate. that measures of theseverity of punishment Taking that approach raises the question of
have less of a n effect on crime rates than d o whether the findings of deterrence research
The second experiment uses a random can be accepted, subject to this rather sub-
measures of the certainty of punishment.
number generator t o produce values for C, stantial limitation.
Severity measures, unlike certainty ("risk")
I, and N. Then the two variables C/ N and measures, d o not share a common element
I / C are formed. The correlation between Stephen Fienberg has taken a close look at
with crime rate measures. Loftin has used some of the deterrence studies, and the
them is calculated. Given the construction
number of executions as a sanction results he reported to the conference sug-
of the variables, there should be a negative
variable in his capital punishment research. gest that estimates of the deterrent effects
correlation, even though number of crimes,
This removes the common term, but it of sanctions should be treated with some
number of incarcerations, and population
leaves somewhat open the question of the caution. (Fienberg subsequently supplied a
are random numbers. In other words,
underlying behavioral model. written version of his report, Brier and
Blumstein's statistician, given "crime rate"
and "incarceration rate" and asked to esti- Fienberg, "Recent Econometric Modelling
mate (the unknown value of) A, will pro- of Crime and Punishment: Support for the
duce a n estimated negative value. Since the Deterrence Hypothesis?".)
data are purely random, it is difficult to see Fienberg first examined lsaac Ehrlich's
why A should be considered a measure of (1973) well-known analysis of 1960 data
the deterrent effect of incarceration. from 47 states and the reanalysis of these
data done by Vandaele (1978) for the Na-
tional Academy panel. Fienberg first notes
the well-known shortcomings of Uniform Brian Forst (1976) attempted to replicate This reinforces the argument of other
Crime R e ~ o r t sdata as measures of the Ehrlich's study using 1970 data. There are analysts that the relationship among the
variables ;equired by Ehrlich's supply of differences in some of the variables used by variables has changed over time, so that it
offenses function and suggests that it Forst and Ehrlich, and Forst did not follow is misleading to compute the deterrent
would be appropriate to use statisticai EhriichS specifications. in particular, effect based on the entire series. Second,
methods designed for the "errors in varia- Forst used more sociodemographic vari- analysis of residuals points to 1934 as a n
bles" problem and for multiple indicators ables than Ehrlich. Further, Forst analyzed outlier in the data. Deleting that one
of unobservable variables. Ehrlich's 1960 only the aggregate crime rate, while Ehrlich observation has a substantial impact on the
data were unavailable and published re- used rates for individual crimes. Forst's re- estimated coefficients. In the original scale
ports do not fully specify the simultaneous sults differ strikingly from those of Ehrlich, of the variables, the coefficient of the
equations model actually used, so it was as he found the coefficients of the deter- execution variable is negative but not
not possible to replicate the Ehrlich analy- rence variables insignificant. It is, of statistically significant. In a logarithmic
sis. Vandaele had reanalyzed the Ehrlich course, possible that these differences are specification, the estimated coefficient is
data and concluded that inferences about to be explained by a change in patterns of positive. The data for 1934 show a small
deterrence are not sensitive to changes in criminal behavior over a 10-year period, value for the murder rate and a high value
the specification of the model. Using the but it is not clear what would explain such for the execution variable (number of
data reported by Vandaele, Fienberg was a change. The extra sociodemographic executions for murder in year t + 1 divided
able to duplicate the results. However, he variables may also explain the difference. by the number of convictions in year t).
questions the conclusion that inferences Fienberg obtained most of the Forst data Fienberg suggests that the 1934 data are
are not sensitive to changes in specifica- and reanalyzed it. He was able to duplicate "suspect." Whatever the explanation, the
tion, noting that Vandaele's published re- Forst's results quite closely. However, one fact that a single observation has such a
sults for murder, rape, and assault do seem key variable, a measure of income disper- substantial effect on the estimates reduces
sensitive to the choice of specification. This sion, could not be obtained from Forst, confidence in the findings generally.
is no small problem, because the correct and Fienberg therefore used several Ehrlich's specification of the "murder sup-
specification cannot be. determined by different measures of income dispersion. ply" function is linear in logarithms, with
analysis of the data themselves. He discovered that the choice of a measure one major exception. Time, used as a sur-
One of the kev variables in the analvsis is had substantial effects on most of the rogate for improvements in medical tech-
probability o f incarceration, measured by estimated coefficients. That is, the model is nology, enters the transformed equation
the ratio of the number of commitments to extremely sensitive to minor differences in (that is, the equation after converting t o
the number of offenses. Vandaele had the definition of a single variable. Since linearity in the logarithms) untransformed.
noted that for several states this ratio is there are no strong grounds for preferring The reason for treating time differently
greater than one, which, of course, is the one definition to another, this suggests from all the other variables is not clear.
upper limit for probabilities. This is not extreme caution in accepting the results of Fienberg reestimated the murder supply
necessarily an indication of error in the the analysis of deterrence effects. function using a fully logarithmic specifica-
data, because there are a number of plausi- tion (that is, using logT instead of T). The
One of the most widely discussed deter-
ble and reasonable explanations for ratios effect was to change the sign of the coef-
rence studies is Ehrlich's (1975) longitudi-
greater than one. It does, however, suggest ficient of the execution variable. Fienberg
nal study of the deterrent effect of capital
that the ratio may not be a reasonable meas- then tried various other transformations of
punishment. Ehrlich's data could not be
ure of the perceived probability of incar- obtained, and Fienberg therefore reana- time and discovered that by this means he
ceration. Vandaele reestimated the equa- could change the results of the estimation
lyzed the closely related data of Bowers and
tions deleting states with ratios greater almost at will. This might not be a great
Pierce. While Fienberg discusses a number
than one and found little change in the problem if there were some logical defense
of methodological problems which raise
results. Fienberg argues that to treat the for the choice of any particular transforma-
questions about Ehrlich's specifications
data in this way is to assume that, while and conclusions, only two aspects of the re- tion, but none is apparent. Stated in very
ratios greater than one may be bad data, strong form, the appropriate conclusion
analysis will be discussed here.
there is nothing wrong with ratios less than would appear to be that longitudinal anal-
one. However, Fienberg continues, the fact The Ehrlich data cover the years 1933-1969, ysis of the Ehrlich capital punishment data
that the underlying process produces prob- and, because of the use of lags, analysis is can produce virtually any conclusion about
ability estimates greater than one suggests limited to 1934-1969. Other analysts have the deterrent effect of capital punishment,
that there is something very wrong in the noted that if the years 1963-1969 are depending upon the arbitrary choice of a
process as a whole, and therefore that there deleted, the coefficient of the probability of scale for time.
is no more reason to accept ratios less than execution variable loses statistical signifi-
The final paragraph of the Brier-Fienberg
one than to accept those greater than one. cance. To this Fienberg adds two points.
paper baldly presents their overall conclu-
Using an analogy, he suggests that if a com- First, by redesigning aspects of the analy-
sions: "We can find no reliable empirical
puter program computes 100 correlations, sis, so that the model was recursive, not
support in the existing literature either for
and 5 of them have values greater than 1 .O, simultaneous, he was able to analyze resid-
or against the deterrence hypothesis.
wisdom may dictate throwing out all 100 uals, and these analyses show that the
Moreover, we believe that little will come
values, and not just the 5 impermissible observations for 1963-1969 are discrepant.
from further attempts to model the effects
ones. The impermissible values serve as evi- of punishment on crime using the type of
dence that none of the values are to be data we have described in this paper." This
trusted. Fienberg's logic strongly suggests reinforces the lessons suggested above: a
the conclusion that no deterrence studies reformulation of the problem must precede
relying upon such data can be accepted as a n y advances in the study of deterrence.
providing reliable evidence of a deterrent
effect.
Conference participants Conference papers and other materials
Ehrlich, lsaac (1975) . Alfred Blumstein Brier, Stephen S. and Stephen E. Fienberg
"The deterrent effect of capital punishment: A Urban Systems Institute Recent econometric modelling of crime and
question of life and death." American Economic Carnegie-Mellon University punishment: Support for the deterrence hypoth-
Review 65:397-417. esis?
David W. Britt
Ehrlich, lsaac (1973) Criminal Justice Program Fienberg, Stephen E.
"Participation in illegitimate activities: A Nova University Victimization and the National Crime Survey:
theoretical and empirical investigation." Journal Problems of design and analysis
Stephen E. Fienberg
of Political Economy 8 1521-565. Department of Statistics Larntz, Kinley and David W. Britt
Forst, Brian E. (1976) and Department of Social Science The effects of plea bargaining on the disposi-
"Participation in illegitimate activities: Fur- Carnegie-Mellon University tion of person and property crimes: A research
ther empirical findings." Policy Analysis 2477- note
Kinley Larntz
492. Department of Applied Statistics Larntz, Kinley
National Research Council (1978) University of Minnesota Linear logistic models for the parole decision-
Deterrence and incapacitation. (Panel on Re- making problem
Colin Loftin
search on Deterrent and lncapacitative Effects.) Department of Sociology and Loftin, Colin
Edited by Alfred Blumstein, Jacqueline Cohen, Center for Research on Social Organization Alternative estimates of the impact of cer-
and Daniel Nagin. Washington, D.C.: National University of Michigan tainty and severity of punishment o n levels of
Academy of Sciences. homicide in American states
Albert J. Reiss, Jr.
Solomon, Herbert (1976) Department of Sociology Reiss, Albert J., Jr.
"Parole outcome." Journal of Research in Yale University Understanding changes in crime rates
Crime and Delinquency, July, 107-126.
Richard F. Sparks Reiss, Albert J., Jr.
Vandaele, Walter (1978) School of Criminal Justice Victim proneness by type of crime victimiza-
"Participation in illegitimate activities: Ehr- Rutgers University tion over time
lich revisited." In National Research Council,
Deterrence and incapacitation, Washington, Howard Wainer Sparks, Richard F.
D.C.: National Academy of Sciences. Bureau of Social Science Research Criminal opportunities and crime rates
Washington, D.C. Wainer, Howard and Richard Perline
Leslie T. Wilkins Quantitative approaches to the study of
School of Criminal Justice parole
SUNY at Albany
Guests
Charles R. Kindermann
Bureau of Justice Statistics
U.S. Department of Justice
Paul D. White
Bureau of Justice Statistics
U.S. Department of Justice
staff
David Seidman
Social Science Research Council
Center for Coordination of Research on
Social Indicators
Criine rates and victimization
ALBERT3. REISS, JR .
Department of Sociology
Yale University
Much of the empirical research in crimi- the offenders acdount for only a single Changes in the prevalence
nology is based on. explaining changes in crime event (even though the police under- of offenders
crime rates and much of the research evalu- stand that multiple arrests for a single
ating law enforcement or criminal justice incident clear osly that incident, barring Any change in the prevalence of offenders
programs depends upon measuring changes admissions by the offenders to other crime in a population comes about as a conse-
in crime rates. The choice of measures of events). quence of changes in replacement rates for
crime is much debated and their validity or a population of offenders. Changes in entry
Likewise, where there is more than one o r exit from a population of offenders o r of
reliability critically reported. Yet the rela- offender and more than one criminal act in
tionship among measures of crime, e.g., be- age a t onset and desistance from a popula-
an event, different offenders may commit tion affect replacement rates. We may iden-
tween crime incident rates and aggregate different acts in that event. While these dif-
rates of individual offending, is not well ar- tify several sources of change in replace-
ferences may be reflected in different ment rates.
ticulated. This stems in part from a lack of charges or indictments for offenders in-
understanding of the nature of crime volved in a common event, they will not be First, it has long been understood that
events, of the criteria for selecting measures reflected in measures that assign each changes in the size ofbirth cohorts or of co-
based o n such events, and of the sources of offender the same crime incident classi- horts at .risk in the population affect the
change in measures of crime. This paper fication. prevalence of offenders in a population if
attempts to clarify some of these problems the probabilities of age a t onset and desis-
in the measurement of crime using exam- We shall not pursue here other implications tance and individual rates of offending
ples primarily from research on deterrence of multiple offenses, offenders, and victims remain constant. Even when the prevalence
and incapacitation. in crime events since we shall have occasion rate for a cohort remains constant, any in-
to draw the reader's attention to some of crease or decrease in the size of birth
them in presenting a simple model for un- cohorts affects the prevalence of offenders
Understanding crime events derstanding changes in crime rates. in a total population after the cohort
Any occurrence of crime is a complex reaches the age- of onset of offending.
Understanding changes
event. Scanting most elements in the occur-
in crime incident rates Second, while it is understood that changes
rence of crime events, the three critical ones
for measuring crime are that an event may Whether a crime event is classified as a sin- in length of offending career may have a n
comprise one or more criminal acts, one or gle incident or as multiple incidents, there effect on the crime rate, it is not generally
more offenders, and one o r more victims. are three kinds of change that affect the appreciated that both changes in age at
Of less critical significance are variation in incidence of crime in a population. They onset and at desistance can affect the re-
duration of events in time and the number are changes in the prevalence of offenders placement rate of offenders in a population
of settings involved in the criminal activity. in a population, in individual incidence of and, therefore, the prevalence of offenders
offending, and in interactions between in a population.
Now it is commonly understood that when
prevalence and incidence rates. Assuming Third, changes in the number, size, degree
a crime event is counted as a single crime
no changes in individual incidence of of openness, composition, and territory of
act or incident, the number of victims and
offending (or interactions), for example, a n social networks may affect the prevalence
of offenders on the average exceed the
aggregate crime incident rate may change of offenders in a population, since these
number of crime incidents since some
solely due to changes in the prevalence of changes affect the potential for recruitment
events involve more than one victim
offenders in a population. Correlatively, if of offenders t o offending groups. Both
and/or more than one offender. But what
the prevalence rate remains constant, changes in market networks for the goods
often is overlooked is that when there is
changes in the individual incidence of and services of crime a s well as changes in
more than one offender for any incident,
offending will affect the aggregate crime formal and informal social networks mav
- - -
Total 22,107
Percent 10e.O
Given the limitations in these data that we tion by high-rate lone offending persons or individual's crime rate, then it would be
d o not know how many different offenders unless high-rate offending persons who more reasonable to assume that on t h e
are involved in the reported incidents (we commit group offenses have a substantial average incapacitation would avert only
would assume that minor assaults without mix of individual offenses, a substantial one-half a crime for each person crime in
theft would involve fewer different offend- number of offenders must be removed the individual's rate of offending. i3ut this
ers than rape, for example) nor the mix of from a population to affect substantially would be a reasonable estimate only if we
individual and group offenses in an indi- the crime rate. also assumed that for group offenses the re-
vidual's rate of offending, we cannot esti- Research on the effects on the crime rate of placement rate for incapacitated members
mate with any precision what on the aver- incapacitating offenders generally makes a is 0 and that there are no deterrent effects
age any offender contributes to crime simple presumption that each offense in an on the other group offenders a s a
incidents. We can say, however, that if a n individual's rate of offending is a single consequence of incapacitating one of its
offender were involved in a group incident, offender offense. Thus, it is assumed that members.
it is not certain whether removing that the number of,crimes averted by incapaci-
If we are reasonably correct in the fore-
offender from that population of offenders tating a n offender is equal to the individ-
going argument, some more general infer-
would have averted that incident. We can ual's rate of offending. Clearly that is not
ences can be drawn. In investigating the
also say that where offenders are largely generally the case when a n individual com-
effects of incapacitation on the crime rate,
involved in group incidents, unless there is mits an offense as a member of a n offend-
it is assumed that incapacitation effects c a n
a deterrent effect on co-offenders in the ing group. Were we to assume that ouresti-
be separated from, and investigated apart
event, it is unlikely that any crimes are mate of 2.1 offenders per crime against the
averted by removing any single member of person holds for the person offenses in an from, deterrent effects. Clearly that is not
the offender -g r o w.. We mav also infer that the case where group offending is involved.
unless offenses committed ky lone offend- Whenever an individual is involved in
group offenses, unless incapacitation of
ers are committed in substantial propor-
that member has a deterrent effect on the
Percent distribution of incidents by size of offending group for selected types of crime incidents:
All National Crime Survey incidents reporting offender information,
July 1, 1972, to December 31, 1975
percent
36.8 35.2 16.2 3.9 2.8 4.1 0.3 0.5 0.1 99.9
44.8 23.7 15.3 6.0 4.2 5.4 0.3 0.2 0.2 100.1
49.7 22.8 12.7 5.6 3.4 4.1 0.9 0.4 0.5 100.1
59.7 12.6 9.1 6.1 3.1 5.8 1.4 0.7 1.5 100.0
70.8 10.1 7.3 4.0 2.4 3.9 1.1 0.4 0.2 100.2
67.2 12.4 7.6 4.1 2.7 4.2 0.7 0.4 0.8 100.1 .
70.6 11.0 6.7 4.0 2.6 3.9 0.5 0.3 0.4 100.0
other offenders involved with him, the groups with fairly open boundaries in a The effect of incapacitation on replace-
effect of his incapacitation could easily be larger social network, then replacement ment rates is undoubtedly complex not
zero crimes averted, as the co-offenders follows somewhat the principles of replace- only for the reasons already mentioned but
could continue to account for the same ment in a vacancy chain (White 1970). A because replacement occurs over a period
number of crime incidents. if, however, the vacated position in a high offending group of time. Replacement is not always a n
incapacitation of an offender has a deter- is more likely to be filled by marginal immediate response to vacancy. All other
rent effect on co-offenders, incapacitation offenders than by new offenders. Recruit- things being equal, the longer a vacancy
may contribute substantially to reducing ment of new entrants to an offending popu- exists, the more likely any vacancy is to be
the crime rate. Any model of the effects of lation thus is unlikely to occur by direct filled by processes of internal shifts into
incapacitation on the crime rate should re- replacement in high offending groups but vacancies with a final closure by recruit-
flect deterrent effects on the network of indirectly in a chain of replacement; such ment from outside. Unless there are deter-
offenders as well. direct effects on replacement will depend rent effects or substantial discontinuities in
Models of the effect of incapacitation on very much on the structure and extent of social networks that affect recruitment
the crime rate assume that decreasing the social networks. One might expect that net- levels, one would expect replacement to be
prevalence rate of offenders in a popula- works are more extensive and open in high fairly high.
tion has a corresponding effect on the population density areas and areas where Nonetheless, one way that any organiza-
crime rate. There are several reasons why crime rates are high. Thus one might expect tion may close off a vacancy is to vacate the
this may be a weak assumption. higher replacement rates in large cities than
in;ural areas. Similarly, replacement may position. Thus, it is possible that the effect
The models generally ignore replacement be higher in young than older age groups
rates of incapacitated offenders. The size of since the boundaries of the former are more
an incapaciktion effect depends upon the permeable and fluid.
size of the group, the fluidity of its bound-
aries, and the rate of replacement. To
measure the rate of replacement is difficult,
since much depends upon the age of the
offender, the mix of offenses, the group
contribution to an individual's rate of
offending, the structure of social networks,
and any other factors that affect changes in
replacement rates. If we assume that indi- Table l a :
viduals are inducted into criminal careers
largely in co-offending and that offending
networks are reasonably large, we would
expect high replacement rates. Indeed,
since within any offending group, or within Type of crime
- Not
a network of any reasonably large size, say known
ten or more, any individual offender is Rape. w/theft
quite likely to be linked with different Rape, no theft 1.8
offenders in different offenses, it is possible Att. rape, w/theft
Att. rape, no theft 0.9
that this condition of relatively free substi-
Robbery, w/weapon 2.2
tution of group members in committing Robbery, no weapon 4.6
any given group offense may work against Att. robbery, w/weapon 1.4
Att. robbery, no weapon 2.5
replacement if any member is selectively
Ser. assault, theft, weapon 4.2
withdrawn, i.e., the group is simply re- Ser. assault, theft, no weapon 12.3
duced in size. But it also is possible that Ser. assault, weapon, no theft 4.6
ease of substitution in offending may gen- Ser. assault, no weapon, no theft 2.4
Minor assault, theft 2.6
erate recruitment and actually increase Minor assault, no theft 1.3
group size. Att. assault. w/wea~on.no theft 5.2
Att. assault; no weapon, no theft 2.4
Just how replacement takes place is qot Purse snatch. no force 20.7
well understood. It seems unlikely that any Att. purse snatch, no force 3.3
Pocket picking 56.5
high offending group recruits directly from
the nonoffending population and thereby Burglary, forced entry, something taken 98.0
Burglary, forced entry, 0 taken, damage 88.3
increases the prevalence rate of offenders in Burglary, forced entry, 0 taken, 0 damage 86.8
a population. Rather, if one thinks of Burglary, unlawful entry, 0 force 93.4
- .. att. forced entrv
Buralarv. 91.6
- ..-
Car theft
Att. car theft
Theft, other vehicle
A n . theft, other vehicle
Total number
Percent 80.4
Percent distribution of number of reported offenders by type of crime for all National Crime Survey incidents:
July 1, 1972, to December 31,1975
Percent distribution of estimated numJber of offenders by type of crime and mean number of offenders per incident
for all National Crime Survey incidents where number of offenders was reported.
July 1, 1972, to December 31, 1975
RICHARDF. SPARKS
School of Criminal Justice
Rutgers University
A statistic very commonly used by crimi- infrequently seen as a n indication of in- It seems intuitively obvious that each of
nologists is the crime rate-e.g., the creased depravity o r decreased probity, or these four objectives requires the calcula-
number of crimes known to the police per as a sign of a usually ill-defined "social tion of crime rates-that is, the number of
100,000 population. In recent years, with pathology." Somewhat similarly, Taylor, crimes committed in a given place and time
the development of victimization survey- Walton, and Young (1975:42) have argued period must be standardized for the popu-
ing, similar use has been made of the vic- that from a radical perspective crime sta- lation in that place a t that time period. I t
timization rate-e.g., the number of vic- tistics can be used as an "examination of seems prima facie absurd to compare the
timizations reported per 1,000 persons or the extent of compliance in industrial number of homicides in the United King-
households. It is argued here that such society (in quite the same way . . . as it isdom with the number of homicides in t h e
rates need very careful interpretation and possible to use statistics on strikes as an United States, given that the United States
that for many purposes they may be ex- index of dissensus in direct class relations has about four times as large a resident
tremely misleading. It is also argued that in a t the work-place)." population as the United Kingdom; simi-
the calculation of such rates it is generally larly, not much can be inferred from a com-
desirable to take into account opportuni- 2. A second purpose for measuring crime
parison of the number of thefts in the
ties for committing illegal acts as well as the
has been the evaluation of the effectiveness
United States in 1933 with the number of
population of potential offenders a t risk. of the machinery of social control. As is
thefts in the United States in 1977, given
well-known, Bentham (1778) was one of
that the U.S. resident population rose by
the first t o urge that accurate measurement
over 70 percent in that time period.
Purposes for which crime rates of crime was a necessary adjunct for the
Whether our concern is with social moral-
are calculated legislator; he urged the collection of sta-
ity, social control, the assessment of risk o r
tistics on convictions and prisoners as "a
The purpose of this paper is to consider the testing of theory, it is necessary t o
kind of political barometer, by which the
some conceptual and statistical properties control for variations in crime which are
effects of every legislative operation rela-
of crime and/ or victimization rates. Before due to differences in the numbers of per-
doing that, however, it is necessary to tive to the subject may be indicated and
sons able to commit crimes; criminological
review briefly the reasons why such rates made palpable."
theories, for example, are theories about
are used as measures of criminal behavior 3. A third reason for measuring crime is the causes of crime,-and not about popula-
or its consequences and, more generally, the estimation of the risk of becoming a tion growth. Similarly, we would not con-
why it has been thought important to victim. This concern is present, though clude that people were becoming more
measure crime or victimization in particu- often implicit, in contemporary efforts to dishonest, social control less effective, o r
lar times or places. There appear to be four develop "social indicatorsV(cf.Bauer 1964, life moredangerous, without standardizing
main reasons: esp. chap. 2). As victimization surveying for population size.
1. Historically, the first purpose for col- has developed over the past decade, the
letting statistics on crime and criminals assessment of risk has become increasingly
The calculation of crime
appears to have been the measurement of prominent; indeed' it appears have been and victimization rates
the health,. of nations, cities, etc. one of the main objectives of the National
The names given by the earliest demog- Crime Surveys (NCS) now being conducted A simple rate, like a crime or victimization
raphers and statisticians to their measures by the Census Bureau for the Law Enforce- rate, is a function of only two elements: (I)
ment Assistance Administration (see Penick a number of acts, events, situations, etc.,
of crime-Moralstatistik, statistique mo: and Owens 1976:143-45).
which occur in a given place and time
rule-give a sufficient indication of this
period; and (2) a number of persons o r
objective; if the numbers of crimes orcrim- 4. Finally, the measurement of crime has other elements present in the same place
inals increased, then in some sense the been a necessary preliminary to the devel-
moral "health" of the nation was growing bpment and testing of criminological
worse. Something of this concern appears theories. Typically the testing of such
to linger on In popular InterPretatlons of theories has involved comparisons of crime
crime statistics: a rising crime rate is not rates in different places or types of place
(for example, cities versus suburbs), or
over time, or attempts at correlating
changes in candidate independent o r ex-
planatory variables with changes in crime
rates.
and time period. Thus a crime rate R is Crime and victimization rates raise a ing as within-group descriptions of experi-
typically defined by number of well-known problems of meas- ence or risk. For example, if every white
urement. Typically we are interested in the male aged 21 on his last birthday had a n
numbers of crimes which are actually approximately equal chance of contracting
committed; but statistical series like the smallpox by his 22nd birthday, a n age-
where C = number of crimes committed, Uniform Crime Reports of course give only specific rate of infection of smallpox would
P = number of persons available the numbers of crimes "known to the give an accurate measure of risk to each
to commit crimes, police." Similarly, victimization surveys individual, though of course it would n o t
k = a number chosen either to aim to measure the numbers of victimiza- describe any individual's actual experience
give a convenient rate or a tions which actually occur; what they get (since either he catches smallpox or hedoes
convenient base (e.g., 100,000 instead is the number of victimizations not). The same thing is true for phenomena
persons). correctly recalled by survey respondents, like crime or victimization, which can in-
Thus a rate R.has a natural verbal transla- reported to interviewers, etc. Each rate volve the same individual more than once
tion: "For every k persons, R, crimes were thus has, in its numerator, a "dark figure" in any noninfinitesimal time period. If
committed." of incidents which are not counted. Similar every member of a given subgroup were t o
A victimization rate R, is typically defined problems can also occur with the denomi- commit or suffer (say) exactly two crimes
in a similar fashion, but with two differ- nators of these rates, through underenu- per year, then the resulting rate would
ences. First, the numerator of the right- meration in a census; typically, however, necessarily reflect each individual's exper-
hand side contains the number of victimi- these are much less serious. Having noted iencce in that year. Though this is of course
zations rather than the number of crimes; these problems of measurement, I shall unlikely to happen, a crime rate would still
depending on the definitions of these two from now o n ignore them; my interest is in not be too misleading, provided that t h e
things, and the "counting rules" used for the interpretation of crime and/ or victim- within-group variance were small, relative
each, they need not be identical.' Second, ization rates, and not with the accuracy of t o the subgroup mean(i.e., in proportion a s
the denominator is typically the number of the counts of incidents o r persons which the coefficient of variation approached
persons, organizations, etc. capable of they may involve. zero). Finally, even if the within-group
being viclirns. Thus the current NCS The first of these problems of interpreta- variance were considerable, the rate might
surveys, for example, compute commercial tion is a purely statistical one. It is obvious not be too misleading, provided t h e
victimization rates to a base of (nongovern- that a rate defined as in (I) is a kind of aver- distribution were approximately normal
mental) recognizable businesses; no ac- age; it is in fact a function of the arithmetic (or more generally were symmetrical about
count is taken of the population of persons mean number of crimes committed per its mean).
able to rob or burgle those businesses. (See, person. But such an average, taken over the It seems clear that this is generally not the
e.g., National Criminal Justice Informa- whole of a population, clearly need not rep- case, however, either for crimes committed
tion and Statistics Service 1976: 123.) resent the experience of any individual or o r victimizations experienced. Data from a
Rates of this kind measure the incidence of subgroup within that population. A death number of studies to date strongly suggest
crime o r victimization, since their numera- rate for the whole of a population-some- that the frequency distributions of crime-
tors contain (essentially) numbers of times called a "crude" death rate-may related events are typically extemely
events. But analogous rates can be conceal considerable variations in the in- skewed, with the majority of the population
constructed which measure the prevalence cidence of death in various subgroups of having no crimes o r victimizations in a
of crime-committing or being a victim; for that population. For this reason it is cus- given time period, and a t the other extreme
such rates the numerator is usually the tomary to calculate separate rates for sub- a small proportion of the population
number of persons (organizations, etc.) groups whose experience is known to be having a great many. It follows that a crime
who had committed one or more crimes, or different; e.g., age-specific or race-sex- or victimization incidence rate will be a n
been a victim on one or more occasions, in specific rates, or rates associated with dif- extremely misleading descriptor of the
a given time period. Since a single offender ferent causes of death as well as withdiffer- group's experience, o r of the risk of crime
may commit more than one offense in a ent populations. (Cf. Reiss 1967:22-23.) or victimization.
given time period, o r a person or organiza- Such rates make possible between-group
This point can be illustrated with data
tion may be a victim o n more than one comparisons; for instance, of the risk of
taken from a victimization survey which I
occasion, incidence and prevalence rates dying of heart disease at age 15 compared
conducted in three Inner London areas in
are not necessarily identical. (Compare with the risk at age 75. Moreover, if the
1973 (see Sparks, Genn, and Dodd 1977,
death rates, where the number of deaths is subgroups used to calculate such "specific"
chap. 4). Table 1 gives the numbers of re-
rates are reasonably homogeneous with re-
necessarily identical with the number of spondents reporting 0, 1,2, .. . incidents of
persons who die.)2 spect to the phenomenon being measured,
victimization of various types as havinge
the resulting rates will not be very mislead-
lForadiscussion ofthedefinitionsand "countingmies"
happened within the survey reference
used in the Unform Crime Reports, and their relation period (approximately the calendar year
to those used in the National Crime Surveys, see 1972), together with sample victimization
Hindelang (197639-97). rates per person. It will be seen that for two
'In the case of phenomena which have some temporal of the three areas, and for the sample as a
duration (e.g., diseases), a further distinction is some- whole, the total victimization rate is in
times drawn between "point-prevalence" rates and
"period-prevalence" rates. Crime and victimization excess of 1.0 per person. A naive interpre-
prevalence ratesare of the latter type, i.e.. they give the tation of these rates might suggest that
percent of the population at risk who were criminals or
victims within a time period such as a year.
II T a b l e 1. Distribution o f victimization incidents in three Inner London areas in 1972, and e x p e c t e d numbers based o n Poisson
distribution (all three areas)
Area I
I
Number o f
incidents
Number
Brixton
Percent Number
Hackney
Percent
Kensington
percent
numbers
( A = 1.07) i
I
None 201 56 104 58 93 51 298 55 187
1 40 22 40 22 40 22 120 22 200
2 13 7 11 6 32 17 56 10 107
3 14 8 18 10 8 4 40 7 38
4 6 3 2 1 3 2 11 2 10
5 2 1 3 2 1 1 6 1 2
6+ 6 3 1 1 7 4 14 3 1
I Totals
Total numbers
o f incidents: 208
151 223 582 -
Mean Numbers
-
o f incidents: 1.14
.84 1.21 1.07
everyone in the sample was a victim at least assumptions of "contagion" or increasing, such a measure completely masks the ex-
once in the year; or, alternatively, that the probability of victimization (Coleman treme cases of multiple victimization which
risk of victimization in those areas was i964:299-305) or of heterogeneity of occur; if this is to be avoided, then the full
about 100 percent, i.e., virtual certainty; "proneness" to victimization (Greenwood frequency distribution must be presented.3
yet, a s the table shows, over half of the re- and Yule 1920) give a somewhat better fit
spondents in each area reported no to data like those of Table 1; so does the Opportunities
incidents at all. skew distribution first described by Yule
and rates
(1924) and discussed by Simon (1957: 145-
Similar findings have emerged from a 64), which is based on slightly different The concept of opportunity is familiar in
number of other victimization surveys assumptions. Using the London survey criminology, chiefly through the work of
done in recent years (see, e.g., Aromaa data a n attempt was made to identify em- Merton (1938) and Cloward and Ohlin
1971, 1974; Wolf and Hauge 1975; Rey- pirically (following a suggestion in Cole- (1960).4 Though seldom explicitly referred
nolds 1973). The same general picture man 1964:378-80) subgroups of the sample to, the concept has also played a part in
appears to be emerging from the NCS with different mean rates of victimization, many less elaborate attempts to explain
surve.ys. In the commercial victimization for whom the distributions of incidents variations in crime rates over time or place.
survey conducted in Houston, Texas, for could be adequately described by separate Thus, for example, it has often been noted
example, the aggregate rate for robbery simple Poisson processes. Unfortunately, that there are well-marked seasonal varia-
and burglary was 1.278 incidents per estab- this attempt was unsuccessful. No set of tions in observed patterns of crime, with
lishment; yet nearly 60 percent of the busi- criteria-based on attributes such as age, crimes of violence typically being more
nesses surveyed reported no incidents at all common in the summer months and crimes
sex, race, or social class, either singly or in
as having occurred within the I-year refer- combination-was found by which the such as burglary being more common in
ence period (see Penick and Owens sample could be subdivided into groups in the winter: a common explanation for such
1976: 127-30; Hindelang 1976:22). In the which the frequency distribution of multi- findings is that social interaction is greater
case of the NCS surveys this problem is ple victimization was no greater than in the summer, thus providing greater
especially serious, since in LEAA's pub- opportunity for interpersonal violence,
would be expected by chance. (See Sparks,
lished reports to date on these surveys, the
Genn, and Dodd 1964:166-67; for a similar
victimization rate is virtually the only sta- 'Though the evidence is much less complete, it appears
analysis with no better result, see Aromaa that the committing of crimes is distributed inasimilar
tistic used.
1973.) fashion. Carr-Hill (1971) found that convictions for
Given a skewed distribution of the kind In summary, in the present state of our crimes of violence among adult males in England and
disclosed by Table 1, the victimization rate Wales displayed a distribution not unlike that of Table I:
knowledge, even specific subgroup rates most of the population had no convictions, while a
might still have some readily interpretable are apt to be extremely misleading as de- small proportion had many. As with victimizat~on,a
meaning in terms of victimization experi- scriptors of theexperience of, or the risk of, crime rate based on such a distribution would be ex-
ence and/or risk, if the occurrence of mul- victimization. A prevalence measure- tremely misleading: it would greatly overstate the in-
tiple victimization were approximately volvement in crime of the majority, while, of course,
such as the percentage who are victimized understating the activity of the "crime-prone"
random, i.e., if it more or less conformed to on one or more occasions in a given time minority.
a Poisson distribution with the overall period-is somewhat less misleading. But 4Though it is interesting to note that, in general, both
mean as a transition rate. As the right-hand Merton and Cloward and Ohlin tended to regard le-
column of Table 1 shows, however, this is gitimate and illegitimate opportunities as alternatives,
not the case: the numbers reporting no vic- and thus mutually exclusive: either one obtained a
legitimate job or he joined the rackets. But-at least in
timization at all, and the numbers report- Western industrial societies-the major opportunities
ing several incidents, are both greater than for illegitimate gain open to most people involve theft
would be predicted by a Poisson distribu- of some kind from their places of employment: thus
tion. Compound distributions-based on legitimate and illegitimate opportunity structures are
intimately connected. For a study of blue-collar theft
illustrating this point, see Horning (1964).
whereas longer hours of darkness in the It follows that, for any of the four objectives situation. Such models assume that crime-
winter months provide greater opportunity of measurement mentioned earlier, oppor- proneness is not uniform in the population;,
for undetected entry into others' property. tunities for crime need to be taken into and while the evidence for this proposition'
account in calculating crime rates for com- is admittedly thin, the proposition itself is
More recently, a few researchers have
parisons across time o r place. Thus, if the intuitively reasonable. This point has been
explicitly considered the relations between
crime rate is to be used as an indicator of neglected in some recent attempts at mod-
crime and opportunities for it. Before con-
sidering these approaches, however, we social morality, probity, violence-prone- elling criminal behavior (see, for example,
need t o examine the relations between an ness, collective wickedness, etc., it is in Avi-Itzhak and Shinnar 1973; Shinnar
opportunity for committing a crime, and effect being interpreted as an average 1975,1977). Shinnar does refer to the aver-
the commission of crime itself. It is clear tendency in the population to behave in age number of crimes committed (which h e
that, a s a matter of ordinary language, the certain illegal ways; but a person's actually designates by A) as a random variable; b u t
existence of an opportunity for a crime to behaving in those ways presupposes that he since he deals constantly in theexpectation
be committed is a logically necessary con- has the opportunity to d o so. Suppose that of this variable, he often seems to assume
dition of that crime's occurring. That is, if we associate with each person in the popu- that it is literally the same for every mem-
we are prepared to assert that a n opportun- lation a tendency to steal, assault others, ber of the population of "criminals." This
ity to commit, e.g., a theft at a particular etc.; borrowing a bit of economists'jargon, assumption may suffice for the purpose of
time and place did not exist, then we should we might speak of a propensity to steal, making overall estimates of the hcapacita-
normally be compelled to say that no theft assault, defraud, etc. Such a propensity can tive effect of imprisonment: as Blumstein e t
did in fact take place. Thus it is a necessary be defined as the conditional probability al. (1978:69) have noted, most models of
truth, and not merely a very well-confirmed that an individual .will steal, assault, etc., the incapacitative effect can be generalized
hypothesis, that no motor cars were stolen given that he has the opportunity to d o so. to incorporate distributions of parameters
in the United States (or anywhere else) in The evidence discussed earlier suggests that such as A. (See also Greenberg 1975; Cohen
the distribution of this propensity in the 1978.) But the assumption of a homogene-
the year 1850; that no room air-conditioners
population will be skewed rather than ous A or proneness seems mistaken, if what
were stolen in the year 1900; that no color
television sets were stolen in 1930; and that normal. The unconditional probability is wanted is to model individuals'criminal
no credit-card frauds were committed in that an individual will steal, p(T), would careers (which is in fact important for some
1940. The opportunities for those crimes then be given by the product of this condi- incapacitative strategies, e.g., those aimed
simply did not exist in those years. tional probability o r propensity, and the a t "high-risk" offenders). A further compli-
probability p ( 0 ) that he has the necessary cation is that what may be called the "ve-
The proposition that changes in opportuni- opportunity: locity" of individuals' criminal behavior
ties to commit crime will lead to changes in probably varies; that is, A is probably not
the numbers of crimes actually committed constant over time. For a discussion see
appears to be a hypothesis-to involve a But p ( 0 ) = 0 by definition, when no op- Green (1978); and for a discussion of
contingent matter of fact, and not a truth of portunities exist; thusp(T) will also neces- models which can be used to tackle such
logic. But the matter is more complicated sarily be zero under those conditions. Thus problems, see Fienberg (1977); Bartholo-
than that. Certainly it is not necessarily if the average (or marginal) propensity to mew (1973).
true that if the amount of stealable prop- steal remains constant in a population be-
erty increases, the number of thefts will, tween t~and t:, but opportunities for thefts The point being made here, however, is
ceteris paribus, increase. However, a de- increase, the probability of theft (and that p ( T ) is itself a function not merely of
crease in the quantum of stealable probably the numbers of thefts actually individuals' propensities to behave in cer-
property, social interaction, etc., may of committed) will increase; but that is not a n tain ways (i.e., p(TI 0 ) , which is the "real"
necessity lead to a decrease in thefts, indication that the population is becoming proneness a t issue), but also of their oppor-
assaults, etc., if it results in some individ- any more dishonest. In somewhat old- tunities to exercise those propensities. The
uals who formerly had opportunities to fashioned language, we might describe social and spatial distributions of those op-
commit these acts no longer having them. such a situation by saying that the number portunities need to be taken into account,
Thus, suppose that in a time period 11 every of temptations had increased (so that some in any full attempt to describe or explain
member of a population of N persons has who formerly had n o such temptations criminal behavior.
some opportunities to steal; a further in- available now had them); not that people A similar consideration applies if the crime
crease in opportunities in that population were becoming any more susceptible to rate is to be used as a measure of the system
may lead to more thefts, or it may not. Sup- such temptations as they had. of social control, or as a dependent variable
pose a t 12 the number of opportunities for The unconditional probability p ( T ) can in a criminological theory or its testing. In
theft is reduced, so that k individuals are obviously serve as a transition rate in a each case, what the crime rate is supposed
completely without opportunities (so that Poisson process leading to actual thefts. to measure is (approximately) the tendency
thefts can only be committed .by N - k The numbers of thefts occurring would in of the population to behave in certain ille-
members of the population); all other this case be a random variable depending in gal ways, under specified control arrange-
things being equal, the number of the thefts part on "theft-proneness" and in part on ments (e.g., a particular set of penalties) or
will necessarily decrease. Evidently if we chance factors; models such as those of specified social-structural or other condi-
are comparing numbers of thefts com- tions (e.g., a given level of unemployment,
Greenwood and Yule (1920) would fit this
mitted a t 11 and 12 we must take account of status integration, or relative deprivation).
changes in opportunities between those Plainly variations in opportunities must be
two periods; and this is so whether tl pre- controlled for, if changes in crime rates are
cedes 12 or follows it. to be interpreted correctly: a sharp decrease
in opportunities for crime, for example,
could be expected to lead to a decrease in
Wilkins (1964:55).
Washington, D. C. *
The first part of this paper describes short- we are, in the design of the NCS, neglecting to be many incidents, each qualifying
comings in victimization surveys in provid- almost totally gaining information on under the definition of a criminal victimi-
ing data for the measurement of the preva- criminal victimization that is more readily zation used by the survey. To make a threat
lence (rather than the incid.ence) of crime. approached as a condition than as a n credible to the victim and to continue a
The second part discusses the immunizing incident. We are also neglecting the state of terrorization, the terrorist must
effects of victimization experiences to durable consequences, that is, the changes neither continually repeat his threat nor
future experiences, and how the concept of in condition, produced by point-in-time demonstrate his willingness to carry it out
immunization may be applied to the assess- incidents. In other words, NCS pursues an by actually inflicting violence.
ment of risk of victimization. incidence, rather than prevalence, rationale.
Among the kinds of victimization that may Albert J. Reiss, Jr. (1972) also illustrates a
be conceived and measured in prevalence somewhat different type of continuing vic-
The significance of measurements timization by the case of the tenant inhabit-
of events and conditions rather than in incidence terms are various
forms of continuing terrorization and ing a dwelling affected by building code
Incidents and conditions. Among many extortion, for example, the worker who is violations. The "crime" of the landlord in
failures of the National Crime Survey kept in line by union or company "goons," this instance is similarly a state, rather than
(NCS) t o derive the full potential of the school children who must regularly yield incident form of crime, that continues in
victimization survey method that stem their lunch money to fellow student toughs, duration through time, so long as the con-
from the carryover into its conception and the merchant subject to a shakedown dition of the structure remains uncorrected.
design of Uniform Crime Reports (UCR) racket, the prostitute terrorized by her Bigamy has the same continuing character
rationales is its emphasis on crimes as pimp, or the spouse or sexual partner kept and involves a victimization where the big-
incidents occurring at points in time. The from separating from a hated relationship amist keeps a partner ignorant of the other.
survey method is more effective as a tool for by fear of violence. Such victimization states are subject to in-
gaining respondents' reports of their cidence measurement with regard to points
current states than of recalled events in To some degree, victimization surveys of entering or leaving the state, but preva-
even very recent and brief periods of their yield information about these kinds of situ- lence measures are applicable to the obser-
life histories. To a considerable degree, the ations through tabulations of what are vation of such victimization in a population.
significance of crime from a disaggregated, called "series victimizations." In the NCS
these are defined as three or more similar The series form of incident may also be a n
individual-oriented perspective (as opposed indicator of a condition of victim prone-
to a collective perspective) resides in incidents of victimization mentioned by a
respondent, but which, because of fre- ness, that is, a person vulnerable to offenses
durable consequences of victimization, of a similar character by different offenders
rather than events of ephemeral conse- quency and/or similarity, the respondent
cannot individually date in time or differ- on frequent occasions. Among such condi-
quences for the individual. While we must tions mentioned in victimization survey re-
work toward developing elaborate proce- entiate descriptively from one another.
(Were each incident of a series counted as sults are the shopkeeper in a high-crime
dures for stimulatipg recall in order to
one, they would form a very appreciable area or the resident of a highly burglary-
provide a survey instrument that will not
portion of all personal victimizations in the prone dwelling unit or the person who is
grossly undercount even UCR Index
National Crime Survey; I would hazard a forced to park his automobile where it is
crimes (conventionally labeled "serious"),
minimum of 20 percent of the total number regularly subject to vandalization.
of incidents.) Thus, the terrorized spouse
may be identifiable in a victimization sur-
vey through repeated incidents of spouse
beating, and the terrorized school child by
repeated incidents of robbery.
It is not necessary for a durable condition
of victimization to exist, however, for there
While the NCS utilized the panel technique circumstances, indicators from the data of The discussion earlier showed that"trivia1"
primarily to institute a control on "tele- compensation would, of course, no longer crimes can be significant, however. O n e
scoping," the value of the panel feature be of individual concern, since the costs significance they can have is when they a r e
probably will reside more in the elucidatiqi? would be sccialized by perfect compensa- not isolated events but rather are associated
of those forms of victimization best char- tion. The social costs also would greatly with a status of the person making him vul-
acterized in terms of prevalence, rather exceed the aggregate value of individual nerable to continuing or repeated victimiza-
than incidence, measures. As indicated harms because of the expense of operating tion. Public victim compensation systems,
earlier, because inquiry can be made of cur- the compensation system.) like private casualty insurance systems, a r e
rent conditions of victimization, recall exclusively incident oriented and would b e
problems are avoided. Conditions are In current (as well as in conceivable) reality, blind to such cases, .bowever. Compensa-
more accessible to survey detection than we deal with limited systems of compensa- tion would also not deal with such costs t o
past events. In addition, their very duration tion. ~ h e o r e t i c a l i ~victimization
, surveys the victim as anxiety and the effects o n
or frequency in the individual life space would be needed primarily to measure the behavior proceeding from anxiety. Private
makes the former more significant for indi- gaps, in scope and degree, between the casualty insurance does have one form of
viduals than are the many incidents with actual occurrence of harms and the reach interest in victim vulnerability, multiple
highly ephemeral consequences for indi- of the system of compensation. In actual- victimization, and the hazards of local
viduals with which victimization surveys ity, however, the systems of social compen- social environments-its interest in avoid-
have been preoccupied. Finally, as Reiss sation are terribly poor at generating good, ing insuring anyone who might fall within a
has pointed out, such victimizations usually comprehensive statistics. In the United high risk class.
present a much higher potential for effec- States, the factors of decentralization and
tive system intervention than is the case the mixture of public and private systems A similar rationale applies to agencies for
with point-in-time incidents. make social and casualty insurance data social control. The victimization survey
close to useless for the purposes of social should be necessary for data only with re-
Another facet of victimization subject to a indicators of the "output" type. These de- gard to instances of failures of (transgres-
prevalence, rather than incidence measure- fects of agency data place a n additional sions against) social controls which result
ment rationale, is the durable consequence burden on the victimization survey-that in people being victimized by events that
of a point-in-time crime event. This is the is, the survey is the only means currently control systems aim to prevent, but which
rationale 1employed in my feasibility study available for gaining data on harms dealt go totally unnoticed by these systems. I n
of injury-produced handicaps and pain with by systems of compensation, even actuality, the survey is useful precisely be-
prevalence among A randomly sampled though, with only modest perfections of cause it helps compensate for the imperfec-
population. (Biderman 1975) the statistical operations of such institu- tions of control agencies as recorders and
Ideal control and compensation models. tions, such phenomena should be revealed processors of information o n their own
Elsewhere; I have discussed ideal models of with far greater scope and accuracy by data transactions.
society which can be posited by taking from transactions of the systems them- Individualistic and reductionistic conlra-
current ideas of crime control and victim selves. dictions. The recall problems of the victim-
compensation to their logical extremes. Two aspects of our earlier discussion bear ization survey point to two contradictions
The "perfect" condition from which the on victimization surveys as a source of in using the victimization survey for social
victimization survey can be seen as measur- guidance for victim compensation systems. indicators, where one seeks indicators
ing departures is one in which social life is Data from the NCS havealready been used which have the value standard of concrete
so regulated that no one ever harms any to estimate the costs of operatingcrirnevic- harm to specific individuals.
other. To perfect a social order that is less- tim compensation systems. The orientation
than-perfect in this regard, a perfect com- First, the relatively trivial and ephemeral
of casualty compensation, with a n excep- consequences of most individual incidents
pensation system can be posited; that is, tion which will be discussed shortly, is en-
one in which any victim of harm receives of victimization which the surveys (and
tirely toward specific incidents of idss. T o other offense statistics) seek to measure are
compensation (from the doer of harm or be administered economically, a crime
from the state) that makes him "whole" precisely a major source of the recall diffi-
compensation system would have to oper- culty that affects survey data and that
again. ate with a lower limit of liability, since by makes expensive, brief-reference-period,
Our data problems can perhaps be under- far the largest proportion of all incidents large sample panel techniques necessary
stood in this way: we are able to construct entail losses that are too minor to be worth for their conduct. As was pointed out, were
intellectual models of social welfare that the costs of processing them. The bulk of the survey oriented solely to victimizations
are much more integrated, comprehensive, the data gathered by a victimization survey having serious and lasting consequences to
and logical than are any institutions or would fall below a reasonable threshold individuals, many of its methodological
social welfare we can actually bring into and therefore prove to be irrelevant to a problems would be greatly alleviated.
being. If we had (or could possibly have) feasible system of compensation. Surveys restricted in this way could becon-
the ideal welfare state with a perfect system ducted far more economically and reliably
of comprehensive social insurance, all than those which attempt to bring into
harms befalling individuals would be re- their scope even just those incidents that
corded and measured as part of the process qualify as "serious" by being in the set used
of social compensation (or state-enforced by Uniform Crime Reports for a "Crime
recompense by offenders). (Under these Index," or which are felonious o r indicta-
ble under law. An early finding of the vic-
timization survey method was that the bulk-
of such incidents entailed relatively minor misses most of the significance of most There is a n explanation for an immunizing
effects on the health or economic well- crime to the individual. effect of intersvecies victimization t h a t is
being of victims, relative, that is, to a host captured in everyday speech by the phrase,
There is a second contradiction in the indi-
of other common hazards of daily life. "Once bitten, twice shy." There may be
vidualistic, disaggregated orientation to some virtue, however, in exploring the
They nonethe!ess were clearly s e r i ~ u from
s victimization indicators which the vrob-
the standpoint of the offense given to legal, application of a medical analogy to crimi-
lems of recall also bring to our attentibn. It nal victimization. Considering such a n
moral, and social norms. Aggregates of is implicit in a n assumption about motiva-
such incidents, furthermore, are of greater analogy suggests some additional signifi-
tion inherent in the survey approach. Co- cant elements of immunization that are not
interest. For vulnerable individuals re- operation with a public survey by a re-
peated victimization can be of major con- suggested by the folk wisdom we have
spondent makes little rational sense from
sequence as can be the fear of repeated cited. Indeed, it is questionable whether
the standpoint of individual self-interest avoidance behavior is a good analogy t o
victimization. The former-repeated vic- for most respondents. For a few, partici-
timization-directs attention, not to indi- the concept of immunization in medicine.
pating in a lengthy interview on the subject
vidual incidents, but rather to a pattern of Learning, or even unconscious avoidance,
of victimization may be a welcome intellec-
vulnerability to victimization over spans of as a result of slight negative reinforcements
tual and social diversion in lives otherwise
individual lives. While the latter-that is does indeed produce less vulnerablility t o
barren of such experiences, but to most re-
fears which may lead to costly alterations more szvere perils from the same harmful
spondents, presumably, the survey consti-
of people's life patterns-can result from a agency or class of agencies as was the
tutes an intrusion into a preferred round of
single and even minor incident of victimi- source of the original insult. For it to fit the
activities. Cooperation with a survey does
zation, they arise when one's victimization medical analogy better, however, the vic-
make rational sense, however, as a civic
is seen as related to a persisting condition timizing experience has to result in some
act; a citizen duty. If a n interview is
of vulnerability specific to the individual or change in the subject that makes it less vul-
couched solely in terms of private signifi- nerable to actual attacks by the criminal
general to the community. For social indi- cance, what should motivate respondents to
cators, particularly important are fears agent, rather than a behavioral change in
recall and report in that interview events of the direction of avoiding that agent. Locks
resting on perceptions of the extent to
relatively small private significance? In-
which norms and laws with regard to re- on doors, bars on windows, a burglar
deed, is it not a contradiction in itself to alarm system and other so-called "target
spect for persons and their property d o or
conduct surveys which depend upon a col- hardening measures" as well as such steps
do not control the conduct of fellow in-
lective sense and a civic regard, and which as training in self-defense measures, carry-
habitants of one's community.
are in themselves of value only in a collec- ing weapons on the part of individuals, a n d
One way in which we may seek to avoid tive way, yet have these surveys guided by a
criminal victimization is by individual various adjustments on the part of mer-
rationale to which nothing makes sense but chants with regard to rearranging patterns
action; that is, by being guarded in expos- private self-interest?
ing one's property and one's person to of customer movement and merchandise
others; by retreating, figuratively, into a display could all be illustrative here.
constricted life behind defensible walls. T o Immunizing effect Another form of immunization is the im-
the extent that such guarded and constricted of exposure munization from exDosures which controls
behavior becomes general and is success- Early observations in victimization surveys overreactive respon'ses of a self-defensive
ful, indexes of offenses and victimization found empirical distributions of the num- sort. An analogy here can possibly be made
would be kept down, but at vast costs in ber of persons ( N i ) victimized a given to immunization from exposure to the
real freedom and in the richness of life. number of times (VI]in a time interval in effects of allergies. Experience with some
Another manner of protection is collective which N,, was lower for all Vi > I than forms of victimization: for example, petty
means; that is, through a normative system would be expected o n the basis of a theft or minor assaults, can develop the re-
internalized by the processes of socializa- probability model that assumed a n equal action, "It is not as bad as all that," and
tion and reinforced by both private and or random distribution of risk among the actual exposures to crimes of low conse-
public sanctioning of deviance from the entire population and given the mean in- quence may eliminate relatively incapaci-
norms. It is upon these collective means, cidence for population. While refinements tating adjustments such as extreme fear
rather than individual guardedness, that of the victimization survey method have and behavioral circumspection. Residents
we are mostly dependent for organized life produced distributions of n's of victimiza- and merchants in areas of fairly pervasive
in society. The role of crime counts as indi- tion having different shapes than this, and disorder may have such immunizing ex-
cators of this social condition, of the vital- while there are many plausible post hoc posures against overreactive defense mech-
ity of the normative order, is what has interpretations in terms of both phenomena anisms.
elevated them as indexes to the major posi- and method for the distributions of As in the case of medicine, however, both
tion as "social indicators" that they have multiple victimizations that are observed,
analysis and treatment in criminology con-
always occupied since men first sought nonetheless, the problem invites considera- front the problem that a given exposure
quantitative measures of the state of their tion of a possible immunizing effect of can lead to the mobilization of either appro-.
society. Indicators of the extent to which victimization.1 priate or inappropriate defense reactions,
-
people and organizations are guarded or IWe are concerned here only with "natural immuniza- depending upon complex relationships be-
trusting in their relations with each other, tion." tween the individual and his exposure to
o r feel they must be, would serve this pur- the agent.
pose as well as offense o r victimization data
do. To look for the significance of crime Thus far we have touched only on individual-
exclusively in the concrete harm resulting level immunization. Two kinds of social or
from a given event to a specific individual collective perspectives can also be taken.
The first is the development of a popula-
tion immunity. This takes place when a suf-
ficient number of individuals reach a suf-
ficiently high level of immunity so that the
survival of the offending species is affected. Risk of victimization Determining which components of a com-
It takes place only when the offending munity may be those most vulnerable pre-
Consideration of the concept of immuniz- sents very different statistical problems if a
agent is dependent for its survival on a ing victimization may also help guard
population of hosts subject to immuniza- large proportion of all the victimization (in
against tempting fallacies inherent in the the real world or in that time slice of It that
tion. It requires the creation of a very high frequent tendency to equate incidence rates
level of long lasting immunity of a very we can capture in our measurements) stems
with "risk." from many repeated victimizations of the
large percentage of the population. This re-
moves the opportunities for the criminal "Risk," first of all, conveys a future, rather same individuals than it is where repeated
agent to survive and reproduce so that it than a past, temporal implication. If there victimizations are rare or nonexistent (as in
approaches extinction. Levels of immuni- is a high immunizing effect of exposure, the the case with homicide "risks"). The last
zation in extent and efficacy below this verv individuals who contribute to inci- case is analogous to the fatal or usually
level of population immunity can generate deice during any period of observation fatal disease. The only possible immuniz-
increased vulnerability. may be precisely those who will be found to ing effect is one of population immuniza-
have been at low risk during some later tion by selective elimination of the more
Population immunities also develop by the vulnerable. Rare multiple victimization
period of observation (i.e., there will be few
differential survival of its more immune can also be a function of extremely low
instances of repeated victimization). This
members. This can occur with or without may be the case even with no change, or levels of relatively randomly distributed in-
change in the prevalence of the-agentin the even some increase, in the total rate for the cidence. High multiple victimization can be
territory of the community or the mean community or class to which the victimized found associated with either very high but
virulence of the agent. An example of selec- individuals belong, provided only that the widely dispersed total incidence or with
tive survival resulting in elevated popula- supply of those vulnerable to victimization highly concentrated (ncnrandom) inci-
tion immunity would be decreased ecologi- is very large relative to the actual incidence dence.
cal burglary and robbery incidence rates of victimization.
occurring in a community as the most vul- If multiples are rare, then we have no
nerable small business establishments fail Secondly, statistical risk inferred from an means for estimating a given individual's *
because of crime losses. There may be no incidence rate for a population is expressed vulnerablility other than by categorically
associated decrease in the prevalence of as a probability value for a member of that associating him with some class that has a n
offenders in the territory of that commu- population. Distributions of individual observed rate of incidence. (If multiples are
nity (they may prey more outside its con- risk, in the sense of future vulnerzbility, rare because of fatality, we must use a sta-
fines) and the offenders remaining may be can be very unevenly distributed among the tistical logic of nonreplacement.) If multi-
more likely to use extreme measures in the population, however. If the concept of risk ples are common, however, and if we are
offenses they do commit among the re- is to be associated with an incidence rate, capable of making sufficiently long-term
maining "harder" targets. either there must be empirical and theoreti- observations of individuals, then we can
cal grounds for assuming a high degree of state empirical vulnerability rates for indi-
Another way in which the social analogy homogeneity of vulnerability among the viduals and observe the stability of predic-
can be pursued is by regarding the commu- population or care must be taken to use tions of future victimization from observa-
nity's defenses as the immunizing effects of words that suggest the "risk" of aggregates, tions of past victimization for each individ-
exposure rather than individuals'. Most of rather than individuals; ual. If multiples are common because of
the defensive adaptions to crime that are concentration, this may yield only slight
possible are collective ones taken at the This suggests additional difficulties with
improvement over "risk" estimates based
community rather than the individual the risk concept. If there is a high concen-
on-aggregate incidence for subclasses, pro-
level. "Social defense" presumably requires tration of victimization among some por-
viding the correlations of incidence with
prompt, effective immunizing reactions to tion of a community, an inaccurately low
the ciassifications available are very high.
low levels of attack. measure of incidence for the entire com-
If there is great dispersion, however, indi-
munity may more accurately reflect the risk
Most of the attention in criminology has vidual measures will be required for accu-
rate for the large majority of the members
been given to the effects of measures of racy, as they will also be if there are im-
of the population (or the median or modal
social defense. "Victimology," however, munizing effects of any great consequence.
"risk") than would an incidence rate based
concentrates its attention on the individual. on a more exhaustive measure of incidence.
Some recent evaluation studies, for exam- There are good indications that this is References
ple, in Portland, Oregon, have attempted indeed the case with rates based on victimi- Biderman, Albert D . (1975)
to analyze the consequences of individial zation survey data in that small, but highly "Victimology and victimization surveys." In
defensive measures for aggregate levels of vulnerable, components of the population 1. Drapkin and E. Viano (eds.) Victimology: A
crime incidence. Such studies logically are most subject to underenumeration. For newfocus(vol. 111, Crimes, victims, and justice),
present the statistical requirement for an aggregate risk level indicator most often Lexington, Mass.: Lexington Books.
taking into account the effects of victimiza- most applicable by members of a commu- Reiss, Albert J., Jr. (1973)
tion subsequent individual and popula- nity, that is, one descriptive of the "chances "Surveys of self-reported delicts." A paper
tion vulnerability to victimization-a diffi- of my being victimized if the future resem- presented for the Symposium on Studies of
cult and as yet untouched analytic problem. bles the past," an incidence rate that ne- Public Experience, Knowledge, and Opinion of
glects the experience of both the most and Crime and Justice, Washington, D.C., March
least vulnerable components of the com- 17-18, 1972, revised July 1973.
munity would serve best. From the stand-
point of social problem concerns, it may be
only or mostly those who suffer frequent
victimization and who benefit from no
immunizing effects, who suffer appreciably
at all. This is true where the effects of any
one victimization are small, but repeated
victimization may be costly or fatal.
Victimization and the National Crime Survey:
Problems of design and analysis
STEPHEN E. FIENBERG
Department of Statistics
and Department of Social Science
Carnegie-Mellon University .
1. Introduction (4) A set of city commercial surveys to of LEAA resources devoted to the statisti-
parallel (3).
cal analyses of NCS data was one of the
Crime and its impact on society have long principal findings of the Panel for the
been the subject of public interest and social In this chapter we restrict our attention
Evaluation of Crime Surveys appointed by
concern. While the study of crime has solely to the continuing national survey of
the Committee on National Statistics
proved profitable to social scientists over household locations.
(Penick and Owens 1976, p. 3). This report
the years, the limitations of police crime The NCS has been designed and executed contains considerably more detailed de-
statistics (e.g., see Biderman and Reiss, for LEAA by the U.S. Bureau of the scriptions of the NCS survey and question-
1967) have always been viewed as being so Census and it includes personal interviews naire design than we provide here. It
great as to make it virtually impossible to at six-month intervals with individuals in describes the developmental research be-
measure criminality in a population. Hood up to 65,000 households. Given the mag- hind the design, and it suggests areas for
and Sparks (1970) note that "Questions nitude of the NCS and the massive files of further investigation. The conclusions of
about criminality, like those about sexual data collected since the initial field work the report overlap considerably with ours
behavior, are especially liable to distorted began in mid-July of 1972, it is remarkable regarding the need for extensive ongoing
and untruthful answers." Thus it was with that the NCS has received so little attention methodological research.
great anticipation that the social science from professional statisticians outside of
community heralded the adoption of the Bureau of the Census. Any assessment of the NCS must look
survey research methods to find the victims closely at its objectives and determine to
of crime, and to learn of their experiences. Central to an examination of victimization what extent they are being met. The pri-
As a result of some small-scale attempts at and the concepts underlying the NCS is the mary purpose of the NCS as described
victim surveys in the United States and notion of a crime or criminal incident and actually has several components:
Great Britain, and after considerable how it gets recorded by various criminal (1) To measure the incidence of crime.
planning and preparation, the Law Enforce- justice agencies. The dictionary definition (2) To measure the changes in crime
ment Assistance Administration (LEAA) of crime offers little in the way of a starting rates over time.
initiated a major new social statistics series point. For example, a recent edition of the (3) To characterize socioeconomic as-
based on a national victimization survey. Random House Dictionary defines crime pects of criminal events and their victims.
as
The primary purpose of the national vic- an action or an instance of negligence that is Closely related to item (3) are the aims
timization survey, as stated in a planning deemed injurious to the public welfare or morals (4) To identify high-risk subgroups in
document developed by LEAA, is "to or to the interests of the state nnd that is legally the population and to estimate the rate of
measure the annual change in crime in- prohibited. multiple victimization.
cidents for a limited set of major crimes and To shed some light on this matter, Section (5) To provide a measure of victim risk.
to characterize some of the socioeconomic 2 describes in detail a single criminal inci-
aspects of both the reported events and dent, and notes how it would be recorded in From its inception, the NCS was viewed as
their victims (Penick and Owens 1976, p. statistics gathered by the police and in the a multipurpose survey that would produce
220)." Henceforth, we refer to this survey NCS. not only the general-purpose victimization
as the National Crime Survey (NCS), but rates already described, but also data for
the reader should bear in mind that the Section 3 contains a brief summary of the policy-oriented problems; for example,
focus of the N CS is upon victims and their survey and questionnaire design of the (6) To calibrate the Uniform Crime Re-
experiences with crime, not on crime itself. NCS, and describes some aspects of its exe- ports data produced by the FBI.
cution. Special attention is focused on the (7) To index changes in reporting
Actually the NCS consists* of four panel structure of the survey design, with a
behavior.
separate surveys: rotation plan for households. The major (8) To measure the effectiveness of new
(1) A continuing national survey of shortcomings of the design are then noted. criminal justice programs (the city surveys
household locations. Sectipn 4 is brief and it summarizes the were initiated for exactly this reason).
(2) A continuing national survey of published analyses from the NCS. The lack
.commercial establishments. To determine if the NCS properly fulfills
(3) A separate set of single or duplicated aims (1)-(4) special attention needs to be
surveys of household locations in selected Copyright @ 1978 by Academic Press, Inc. All rights of
cities. reproductionin any form reserved. ISBN:O-12-513350-2.
Reprinted by permission, with minor changes, from
'Since this paper was prepared, all but the continuing Surve.rSoti1plinl: and Measurement (K.Namboodiri, ed.).
national survey of households has been discontinued.
focused on questions that utilize the longi- How one records crime is a function of Let us begin with the police record of t h e
tudinal structure of the NCS. Section 5 one's perspective. A single criminal incident event as it is transmitted to the FBI for use
outlines a number of substantive questions or social encounter can involve one or in its Uniform Crime Reports (UCR). In a
regarding victimization and victim-survey more offenders, one or more victims or multiple offense situation, the police clas-
methodology that in principle should be possibly no victims a t all, and multiple vio- sify each offense, and then locate the of-
answerable by analysis of NCS data. A lations of the law leading to multiple indict- fense that is highest on the list of what is
major stumbling block to the successful ments of a single offender or several known as Part I Offenses (the ranking is
completion of these analyses is the highly offenders who have participated in the criminal homicide, forcible rape, robbery,
complex NCS survey structure, designed to event. There may even be mutual offending aggravated assault, burglary, larceny-theft,
produce descriptive statistics rather than and victimization, for example, in cases of and motor vehicle theft). The highest
data
-~ amenable to analvtical studies of in-
~
assault. Thus a particular configuration of offense is entered and the others are ignored.
terrelationships and their changes over crimes aggregated over a given time period Multiple offenses need to be separated in
time. Although the NCS is a rotating panel may well look dramatically different when time and place to lead to multiple entries in
in form, the primary purposes of the panel viewed from the perspective of offense the UCR. The exeption to this rule involves
structure are to get more stable rate com- rates as opposed to victimization rates, and crimes against the person (criminal homi-
parisons from one period to the next, and neither set of ratesis likely to reveal the true cide, forcible rape, and aggravated assault)
to bound the time frame under consider- nature of the criminal events that have where one offense is entered for each vic-
ation. taken place. tim. Thus the UCR record will contain o n e
offense of forcible rape (against the
A single hypothetical example can illus- woman) and one offense of aggravated
2. Recording crime trate the comolexitv associated with crirni- assault (against the man). Had the youths
nal incidents and tGe manner in which they only robbed but not assaulted the man, there
Criminal incidents are events or social en- are recorded. A.young couple living in the
counters involving one or more offenders would only be one offense entered. These
household of the woman's parents in Stam- offenses would be recorded by the New
and one o r more victims, in one or more ford, Connecticut, go to New York City on
locations for specific periods of time. The York City police, and 1 a m unclear as t o
December 3 1 to celebrate New Year's Eve. which day (and thus which year) they will
duration of a single criminal incident may They park their car in a lot on the east side
be 10 minutes, a n hour, a day, a week, or be attributed. The UCR record will also
of Manhattan and have a leisurely dinner show that the offense(s) have been cleared
even a month. Nonetheless, when put into a at a nearby restaurant. After dinner when
larger timeframe a criminal event is quite (i.e., "resolved") by the arrest of the three
they return to their car, they are accosted youths in New Jersey. Although this event
profitably viewed as the realization of a by five young males just outside the park-
point process distributed over time and led to one or two UCR offenses, it might
ing lot and are taken into an adjacent alley- well lead to the prosecution of the five
space, and we d o so in Section 5. What way, at approximately 11:OO p.m. One of
complicates the modeling of a large num- youths on up to a total of five counts of
the youths threatens the couple with a re- rape, 10 counts of aggravated assault and
ber of crimes is the interpenetrating social volver, and the other four take turns raping
networks linking offenders and victims, robbery, and five counts of motor vehicle
the woman. When the woman resists, one theft.
both within a single incident and across of the youths assaults her with a knife, and
several incidents, and giving rise to multi- then he also assaults the man. Following Suppose now that the couple's household is
ple offending and multiple victimization. the acts of rape the youths take the chosen as part of the NCS so that the event
Reiss (1980). describes some of the impact woman's purse and the man's wallet, and will also be recorded from the victim's per-
of such networks and associated group they appear to flee. It is now about 1:00 spective. Both the man and the woman
structures on crime rates with special atten- a.m., January I . The couple have to travel would be interviewed separately and the
tion to the implications for measuring the several blocks to report the incident to the NCS would record two victimizations in
effects of deterrence and incapacitation. police. When they finally return to the December: one for the woman "assaultive
The stochastic structure of criminal social parking lot with a police officer a t 3:00 violence with theft-rape,"one for the man
networks and the resulting lack of in- a.m., they discover that their automobile is "assaultive violence with theft-serious
dependence of criminal incidents also has missing. A week later three young males assault with weapon." Even if the man had
potentially important implications for are stopped by the police in Newark, New only been robbed but not assaulted there
both the design and analysis of victimiza- Jersey, driving the couple's car through a would still be two victimizations recorded
tion surveys. It is for this reason that we red stoplight and they are arrested. (as compared with a single offense). More-
discuss some first steps in the stochastic over, because of the separation of house-
model of victimizations for individuals The incident just described involved five hold victimizations from individual vic-
over time in Section 5. offenders, two victims, three arrests, and timizations, when the woman's father
numerous offenses including forcible rape,
robbery, aggravated assault, and moior
vehicle theft. It spanned several hours (and
two calendar years!) and took place in at
least two locations. How would it be classi-
fied by various recording systems?
reports the household victimizations, he 3. Design of the NCS For estimating various rates, a series of
may well report the theft of the car sepa- a. Sample design weights and adjustment procedures are
rately, and the month of victimization may applied to the raw data. The weighting pro-
be given as Janwry, and thus it could go The NCS is a sample survey of households cedures are standard practice for surveys of
into a separate calendar year. and their occupants, and as such it closely this sort and are basically designed t o ad-
resembles the Current Population Survey just for the differential probabilities of
In summary, our single criminal incident (CPS), which is also conducted by the including various household locations in
involving five offenders and two victims, Bureau of the Census, in almost all aspects. the survey, and to reduce bias and variance
leads to one or two offenses recorded in In fact, descriptions of the designation of of sample estimators. The final adjustment
New York and two or three victimizations housing units for the CPS (e.g., see involves the use of ratio estimation so that
recorded in Connecticut. The perspectives Thompson and Shapiro 1973) are almost the distribution of individuals (or house-
are clearly different, and so too are the identical to those for the NCS (e.g., see holds) in the sample is in accord with inde-
records of the event. U.S. Department of Justice 1976a,b), the pendent estimates of the current popula-
Because a large proportion of criminal in- major exceptions being the sample sizes, tion in each 72 age-sex-race categories.
cidents is never reported to the police, the the interview schedules, and the panel and By reporting only adjusted rates, for both
discrepancy between all criminal offenses rotation group structures. the NCS and the CPS, Census has removed
and those reported to the police has been The structure of the NCS is that of a strati- from public scrutiny many of the actual
described by Biderman and Reiss (1967) as fied multistage cluster sample. The first defects of the sample design when it is
the "dark figure" of crime, and one of the stage consists of dividing the United States actually implemented. Since all aggregate
original purposes of victimization surveys into approximately 2000 primary sampling counts have essentially the same totals for
was"to bring more of the dark figure to sta- units (PSUs) comprising counties or various categories, we can never tell when a
tistical light." Biderman and Reiss go on to groups of contiguous counties. The PSUs given sample is badly off the mark, nor in
note: are then separated into 376 strata and one what directions.
In exploring the dark figure of crime, the pri- PSU is selected from each stratum with
mary question is not how much of it becomes Although the NCS is basically a sample of
probability proportional to population household locations, a t the same time it
revealed but rather what will be the selective
properties of any particular innovation for its size. Within each PSU so selected, a sys- yields both a sample of households or fami-
illumination. As in many other problems of tematically chosen group of enumeration lies and a sample of individuals. Household
scientific observation, the use ofapproaches and districts is selected, and then clusters of locations are of little substantive interest in
apparatuses with different properties of error approximately four housing units each are the study of victimization. While the NCS
has been a means of approaching truer approxi- chosen within each enumeration district. allows for the study of differential rates of
mations of phenomena that are difficult to For 1973, this process led to the designa- victimization by type of household location
measure. tion of about 80,000 housing units, and in- (e.g., house, apartment, rooming house,
Any set of crime statistics, including those of the terviews were obtained from occupants of
survey, involves some evaluative institutional
mobile home), not one of the 100 tables in
about 65,000. Most of the remainingdesig- the LEAA report for 1973 (U.S. Depart-
processing of people's reports. Concepts, defini- nated housing units were vacant or other-
tions, quantitative models, and theories must be ment of Justice 1976b) deals with such
wise ineligible for inclusion in the NCS. information. The primary reason that the
adjusted to the fact that the data are not some
objectively observable universe of "criminal The basic sample is divided in six subsam- NCS is a sample of locations rather than
acts," but rather those events defined, captured,
ples or rotation groups of a little over households or individuals appears to be
and processed as such by some institutional 10,000 households each. (Actually there because Census has available a detailed
mechanism [pp. 14-1 51. are seven subsamples, but the data for the frame only for locations.
Much controversy has centered on the newest one are not incorporated into the The NCS primarily measures victimization
comparability of police statistics on offense reported rates. Rather these data are used while the CPS primarily measures employ-
rates and NCS survey statistics on victimi- for bounding purposes, as described in Sec- ment and unemployment. Since both un-
zation rates (e.g., see Biderman 1967; tion 3, a.) The occupants 12 years of age or employment and victimization are relatively
Biderman and Reiss 1966; Penick and older are interviewed at six-month inter- rare phenomena, a naive person might
Owens 1976, pp. 152-154; U.S. Depart- vals for a total of three years. Every six suggest that a sample design that has
ment of Justice 1976b), but the utility (or months a new rotation group enters the proved successful for measuring unemploy-
lack thereof) of the NCS data for such com- sample and the "oldest" existing rotation ment should, with only minor modifica-
parisons should not obscure the richness of group from the previous sample is dropped. tions, do a good job of measuring
information about victimization available Each rotation group is divided into six victimization. Such a suggestion is naive
in the NCS. It is for this reason that the panels, with one panel being interviewed in because, among other things, it ignores the
NCS data must be collected and organized each month of the six-month period. considemble knowledge we have available
in a manner that will make it amenable to regarding crime and its physical as well as
standard forms of statistical analysis. socioeconomic characteristics. In central
Otherwise the rich veins of information on cities, crime rates vary dramatically from
such topics as high-risk segments of the block to block, and a limited amount of
population and multiple vicfimization, or fieldwork might lead to cluster boundaries
the way that deviance is perceived and dealt that differ dramatically from those that
with in various social contexts, may never
be mined.
would seem appropriate for unemployment. c. Reference period and bounding ' no bounding for the new household or for
It may well be that the NCS sampling plan One of the most crucial prbblems in the its members as individuals. Murphy and
is most sensible given budgetary constraints, design of a victimization survey is eliciting Cowan (1976) report that unbounded
but an exploration of alternatives and accurate information on the time of households in returning rotation groups
variants io the current plan should occurrence of criminal incidents. The comprise (for 1974-1975) 13.3 percent of
probably be included in the research, problem has at least two components: the interviewed sample. In addition, only
development, and evaluation program of about 95 percent of the interviews in the
the Bureau of the Census. (1) Recall decay. The longer the time bounded households are themselves bounded
lapse between a criminal incident and the due to considerable transience for house-
b. Questionnaire design date of interview, the greater the probabil-
holds in heavily urban areas. As a result, a s
The questionnaire administered every six ity that the event will not be reported to the few as 20 percent of the individuals over a
months at each household consists of two interviewer. three-year period in a given set of house-
parts: a basic screen and crime incident ( 2 ) Telescoping. Events occurring in one hold locations may produce complete vic-
reports. The basic screen includes house- time period can be reported as occurring in
timization records for the period. These
hold location information, household or a different one. The displacement of tele- design characteristics drastically impair the
family information, the personal character- scoped events can be forward or backward utility of the NCS data for longitudinal
istics of all of the individuals in the in time. analysis of individual victimization profiles.
household (who may change from interview It is especially difficult to model recall
Considerable methodological interest is
to interview), plus household or individual decay and telescoping, since such evidence
centered on the differences in victimization
screen questions on crime. The report of seems to point to differential rates ofdecay
experience for migrants and nonmigrants.
the Panel for the Evaluation of Crime and telescoping for different types of
In addition to follow-up studies of out-
Surveys (Penick and Owens 1976) gives a crimes, and for different types of respon-
migrants (which are quite costly), it seems
detailed critique of the basic screen, and we dents. Moreover, there can be no check on
reasonable to do special analyses of the in-
refer the interested reader to their discus- a crime that has never been reported, either
migrants to the sample locations since their
sion. For each crime incident detected by to the police or the NCS. Thus the only way
the screen, a crime incident report to get a handle on these two phenomena is data are already in the NCS (see Penick
containing answers to almost 100 questions via a sample of crimes reported to the and Owens 1976; Reiss 1977b). For every
is completed. out-migrant household there is an in-
police and the subsequent inclusion of vic- migrant one. Of course the current lack of
The questionnaire distinguishes between tims of these reported crimes in a victim
bounding for in-migrants would compli-
individual identifiable incidents and series survey. Such "reverse record checks" were cate such analyses, but it should be feasible
of a t least three similar incidents which the part of the pretests of the NCS survey in- to do a special study of in-migrants where a
respondent is unable to separate in time strument (see U.S. Department of Justice bounding period would be included along
and place of occurrence. For individual 1972, 1974). The problem with drawing in- with additional interviews beyond the
victimizations, the questionnaire records ferences from reverse record checks is that standard three-year period for the house-
the month in which the crime took place, they are aimed at data which are missing hold location.
but for series victimizations the respondent from the victimization survev. but which
only needs to indicate the quarter(s) in are not missing at randome(see Rubin
which the incidents took place (i.e., spring, 119761for a discussion of the importance of 4. Published analyses
summer, fall, winter), the number of inci- the missing at random assumption). of the NCS data
dents ( 3 4 5 - 1 0 , 1I+, or don't know), and A consideration of both recall decay and Not only does the formal responsibility for
the details for the most recent event in the telescoping is necessary for the determina- the design and execution of the NCS lie
series. We discuss the distinction between tion of the optimal reference period for a with the U.S. Bureau of the Census, but the
single and series victimization in more de- victim survey. The NCS reference period is analysis of the collected data is also the re-
tail in Section 4, where we note how the six months, and Census uses the first in-. sponsibility of a small staff of Census em-
Bureau treats series victimizations and why terview and six-month period of a, house- ployees. This analysis by LEAA and Cen-
we believe series victimizations should be hold location for bounding, that is, estab- sus involves the periodic preparation of
the topic of extensive and analytical inves- lishing a time frame to avoid duplication of two- and three-dimensional cross-tabula-
tigation. What is unclear to us from pub- incidents in subsequent interviews. For a tions of estimated victimization rates and
lished documents and various unpublished detailed study of theeffects of boundingon estimates of their standard errors. The
memoranda is the extent to which series telescoping, see Murphy and Cowan cross-tabulations produced are basically
victimization is a true phenomenon or an (1976). A major problem in the design of those requested in advance by professional
artificial construct resulting from the NCS the NCS arises because the bounding pro- staff at LEAA, and not as a result of a more
questionnaire design. cedures bound household locations, not detailed and complex statistical analysis.
Not only does the NCS questionnaire households or individuals. If one house- Suppose for simplicity that NCS employed
solicit information on the details of a n hold replaces another during the course of a simple random sample and that the data
incident, the offender, and any resulting the three-year period during which a loca- (which are primarily categorical in nature)
physical injury and how it was treated, but tion is included in the NCS sample, there is for any year were analyzed using some vari-
it also inquires whether the incident was ant of loglinear model analysis for a k-
reported to the police and if not, why not. dimensional cross-classification (e.g., see
Bishop et al. 1975). Then one of the impli-
cations of finding a model that gives a good
fit to the data would be that the k-dimen-
sional table may be succinctly summarized
by a series of tables of smaller dimension, while only 26.6 percent of all victimizations may well simplify the modelling process,
from which the original table can be recon- not in series. Thus, series victimizations This is clearly the case if we are interested in
structed with essentially zero information may have accounted for over one-third of the structure of individual reported victim-
loss. Such analyses can thus provide a all crimes of violence. ization patterns over time.
rationale for reporting certain cross-tabw
The Panel for the Evaluation of Crime Sur-
lations and not others. This point is de- We note that despite the panel structure of veys gives several suggestions for analytic
scribed in more detail by Fienberg (1975). the survey, LEAA has yet to make use of
research on the existing NCS data. One of
Even though the NCS does not employ the full longitudinal structure of the data
these suggestions deals with the relation-
simple random sampling, the idea of care- base. The construction of a panel tape
ship between series victimization and mul-
ful statistical analyses leading to the choice tracking individuals and households over tiple victimization, a topic we discussed in
of cross-tabulations to be published is one time was not deemed to be a central goal of
Section 4. To investigate this relationship,
which should be considered more seriously the NCS, and the preparation of such a
tape was only belatedly arranged through a however, we need models for the occur-
by LEAA and Census.
contract with a group at a private univer- rence of victimizations over time, and we
How many reports has LEAA published sity. It might beargued that the panel struc- propose one such model in siction 5b. A
on the results of the NCS national house- ture of the NCS sample is intended to second suggestion deals with analyses t o in-
hold sample? As of December 1976*, handle certain technical problems and to vestigate under- and over-reporting of inci-
several preliminary but only two final give more accurate year to year compari- dents as they relate to the month of incident
reports had been released: a 162-page sons, and not for longitudinal analysis of and the month of interview. In Section 5a
report on the 1973 survey (U.S. Depart- individual files. Thiscan be true only in this we take up some aspects that need to be
ment of Justice 1976b), and a much briefer narrowest of senses because without a de- considered in such analyses.
73-page report comparing findings for tailed longitudinal analysis we can never a. Reporting biases and time-in-panel
1973 and 1974 (US. Department of Justice know whether the aggregate annual re-
1976a). Since both final reports also ported victimization rates are at all accu- For several characteristics on which data
contain data on separate commercial rate. For example, Reiss (1977), reporting are collected in the Current Population
surveys, the interested reader is left with on some preliminary longitudinal analyses, Survey, Bailar (1975) notes that there is a
very slim pickings from what appeared to notes that highly victimized individuals are higher level for the first interview than for
be a sumptuous meal. Moreover, these two much more likely to be out-migrants than succeeding ones, and so on. The effect of
reports contain only weighted data or those with low victimization rates, and such variation is usually referred to as "ro-
proportions. No raw counts are available. series victims are more likely to move than tation group bias," and there is reason to
Thus it is almost impossible for the skilled nonseries victims. Moreover, a high per- expect such biases in the NCS data as well.
statistician to do extensive secondary centage of individuals reporting series vic- In the NCS the rotation group bias prob-
analysis of the published data. timizations in a given six-month period lem is compounded by several factors in-
report no victimizations in the subsequent cluding the elapsed time between the inci-
When preliminary versions of the 1973 re- dent and the interview (recall that inter-
six-month period. These observations call
port were distributed by LEAA, several in- views provide data for the preceding six-
into question the accuracy of the published
vestigators noted that series victimizations month period).
victimization rates.
were not included in the computation of
any published rates or calculations. Thus What we would like to do is develop a
all reported numbers and rates of victimi- 5. Modelling victimization model which compares the victimization
zation may be severe underestimates. For rates for specific crimes for a series of refer-
example, LEAA estimated for 1973 (U.S. To understand reported annual victimiza- ence months as a function of the number of
Department of Justice 1976b) that there tion rates and the implications of changes interviews, the time-lag from incident to in-
were approximately one million series vic- in the'm from one year to the next, we need terview, and other possibly relevant tem-
timizations in the personal sector and just a detailed understanding of how victimiza- poral variables. We build up to this in
over 20 million victimizations not in series. tion varies among individuals and sub- stages.
A series consists of three or more victimiza- groups within the population. This detailed In Table 1 we show the list of panels being
tions, and an average of five victimizations understanding will necessarily have to interviewed by month of collection for a
per series is likely an underestimate for the come from the analysis of disaggregated full three-year collection cycle, where the
NCS data. (Some calculations based on an data, and of individual victimization rec- months have been labeled from 31 to 66.
unpublished tabulation suggest that the ords over time. Such analyses will be com- Panels 1-6 form a subsample that was first
average is in excess of six victimizations per plicated by the complex structure of the interviewed in months 1-6 (we ignore the
series.) This then means that at least 20 per- NCS sample design, but the effects of strati- initial interview for bounding purposes
cent of all victimizations in the personal fication and clustering on analyses will vary here) and leaves the sample after the inter-
sector have been excluded from the re- greatly from problem to problem. For views in months 31-36. Note that the dif-
ported calculations. This matter becomes many problems the use of unweighted data ference between the month of collection
even more serious when we note that, in and the number of a panel being inter-
1973,46.3 percent of all personal series vic- viewed equals the number of months the
timizations involved crimes of violence- panel has been in the sample (time-in-
*The final draft of this paper was completed then. panel). All three variables bear examina-
tion in terms of their effects on reported
rates. The time-in-panel variable yields the
rotation group bias information, while
month of collection measures seasonality
and other unique temporal effects, and
panel number represents temporal charac-
Table 1. A n illustration of the NCS panel rotation structure
by type of crime*
ALBERTJ. REISS , JR .
Department of Sociology
Yale University
@
This paper explores whether victimization (3) Excluding proneness to repeat vic- selection of victims. D o offenders, for
by crime is a random occurrence o r timization by the same type of crime, any example, select victims for their vulnerabil-
whether some households and persons in a crime occurs about as frequently with any ity to victimization? Similarly, while it is
population are more vulnerableor prone to other type of crime over time as would be known that the risk of victimization varies
victimization and repeat victimization than expected from the joint probability of their considerably across territorial space, among
are others. T o d o so: a crime-switch matrix occurrence. Four symmetrical pairs of different social aggregates, and over time,
is constructed for repeat victimizations and crimes occur less frequently than expected, there is too little information on repeat vic-
that distribution is compared with one however: assault with personal larceny, timization and the behavior proneness of
expected under a simple assumption of assault with household larceny, personal victims.
random occurrence of repeat victimization larceny with burglary, and personal lar-
by type of crime. Both households and ceny with household larceny. These are sig- There are two major related and competing
their members are considered as units a t nificant changers in a mover-stayer model. explanations f o r differences in the risk of
risk. victimization and repeat victimization: vic-
(4) The order of occurrence of a type of
tim proneness and victim vulnerability.
The paper also explores the error structure crime has no effect on the probability of
The victim proneness explanation selects
in a crime-switch matrix. The major types occurrence of a pair.
(5) The probability of consesutive vic- personal, social, and behavior character-
and sources of error are: istics of persons as potential victims a n d
(1) Errors in reporting month of occur- timization by the same type of crime varies
their relationship to offenders as explana-
rence of incidents and the absence of infor- directly with the probability of occurrence
tory variables while the victim vulnerabil-
of that type of crime among all victims.
mation on date of occurrence. ity explanation selects situations and char-
(2) The absence of information o n oc- acteristics of offenders, their networks,
currence of series incidents so that their The problem behavior and relationships to potential
occurrence may be ordered in time and in victims as explanatory variables.
Considerable interest attaches to the
relation to nonseries incidents. Simply put, victim proneness models
question of whether victimization by crime
(3) Multiple reporting from members of explain high risk of victimization and re-
is a random occurrence or whether some
a household. peat victimization by victim behavior and
households and persons in a population are
I n examining observed switches in type of more vulnerable or prone to victimization relationships with potential offenders that
crime in repeat victimization, the following and repeat victimization than are others. precipitates crimes or increases their vul-
are noted: The question is not easily answered since nerability to potential offenders. The
(1) Among repeat victims, given prior theoretically one would want to model the vulnerability models are more offender
victimization by one of the most frequently distribution and behavior of both victims oriented, explaining repeat victimization in
occurring crimes (assault, personal larceny and offenders. Too little information is terms of such factors as the offender's prior
without contact, household larceny, and available a t present to construct such a relationship with victims, selection of crim-
burglary) the most likely next victimization model. There is too little information on inal opportunities, and the organization of
is by the same type of crime; for repeat vic- the distribution of offenders in a popula- networks of offending. The considerable
timization for the less frequently occurring tion and almost none on their networks o r overlap of the models not only makes it dif-
crimes (motor vehicle theft, robbery, purse- ficult to test them as competing explana-
snatching/pocket-picking, and rape), the tions but argues for a more general model.
most likely next victimization is the most A more precise general model, however,
frequently occurring of all major crimes, depends upon yet to be acquired informa-
personal larceny without contact. tion o n the behavior of both victims and
(2) Nonetheless, there is substantial offenders.
household proneness t o victimization by *This paper is based on research supported by LEAA
the same type of crime. Grant #SS-99-6013.
We can begin to answer our initial question Risk of victimization household, a not uncommon condition, it
of whether victimization by crime is a ran- and victim proneness seems unlikely that the member distin-
dom occurrence or rather whether some guishes the household collectively from his
The question of what unit is at risk in vic- or her individual membership in it. House-
persons or households in a population are timization by any given type of crime or in
more prone (or vulnerable) to victimiza- hold and person crimes are probably ex-
repeat victimization by crime is not easily perienced as personal victimizations in
tion by crime by investigating the extent to resolved. Among major types of crime
which repeat victimization within the U.S. single-person households.
measured in the NCS, a household is con-
population conforms to a random model of sidered at risk for the offenses of burglary, Selection of the unit at risk in repeat vic-
occurrence. The National Crime Survey household larceny, and auto theft while its timization then is no simple matter. From
(NCS) makes it possible to examine repeat one perspective the unit at risk is a house-
individual members are considered at risk
' victimization and the characteristics of
for offenses against the person, viz., rape, hold and its members; from another, it is its
repeat victims to determine whether certain robbery, assault, larceny with contact individual members. Yet in selecting either
kinds of victims are more a t risk than as the unit at risk, somewhat different
others. This paper limits the examination (purse-snatching and pocket-picking), and
personal larceny without contact. Yet, assumptions are possible. Selecting the
to whether in repeat victimization of a household as the unit at risk, one assump-
where each member of the household may
household and its members, or of house- tion is that it is at risk only for household
purchase and own an automobile from in-
holds only, there is a propensity to repeat and not person victimizations. An equally
dividually earned income, an auto theft
victimization by the same type of crime. plausible assumption, however, is that the
mav svmbolicallv represent more of a per-
The answer to the question, by what type of sonal ihan a household crime. This m& be household as a collectivity is at risk s o that
crime is repeat victimization most likely to particularly the case where the household household and person victimizations of its
occur, given victimization by a prior type member is a young person who has pur- members are regarded as household vic-
of crime, is obtained by constructing a chased a n automobile for his journey to timizations. Selecting the person as the unit
crime-switch matrix for repeat victimiza- work and personal use. Larceny of a pay- at risk, one assumption is that each mem-
tions and determining whether it conforms check from the principal wage-earner of a ber of the household experiences both
to anexpected model of occurrence under a household, on the other hand, may sym- household and person crimes as personvic-
simple assumption of random occurrence bolically represent a household rather than timizations so that household victimiza-
of repeat victimization by type of crime. a personal Victimization. Similarly, an tions should attach to each member of the
The crime-switch matrix consists of pairs assault that incapacitates the principal household. An equally plausible assump-
of victimization where a preceding victimi- wage-earner may be regarded as a family or tion perhaps is that only the personvictimi-
zation by type of crime is compared with a a househgld victimization rather than a zations should attach to the person as the
following victimization by type of crime. single member's victimization. unit a t risk.
When the effect that victimization by a Many, though not all, households consist Each of these assumptions can be exam-
previous type of crime has on the occur- of families who appear to regard any ined a s the unit a t risk for repeat victimiza-
rence of the next type of crime is examined household crime as a victimization in tion. Refinements in the unit at risk are also
in repeat victimization, the question arises which they share. On the averageanyadult possible, such as by size of household
whether the order in which the prior event member of the household can report more (single-person, two-person, and three-or-
occurs has an effect on the next reported accurately the crimes against the house- more-person households) or for their com-
type of crime. For example, in sequential hold than the personal crimes against all position in terms of families and unrelated
or repeat victimization by a pair of any two members of the household. The NCS thus individuals. The preliminary inquiry re-
types of crime such as personal larceny and uses only a single member of the household ported in this paper is limited to examining
robbery, is one as likely to be victimized by to respond to the Household Screen Ques- the household as the unit a t risk. Crime
a personal larceny following a robbery a s tionnaire to obtain information o n crimes switch matrices are constructed for the
by a robbery following a personal larceny, against the household while it asks each household as the unit a t risk using all
given that the probability of occurrence of member the questions in the Individual offenses against the household and its
either a robbery o r a personal larceny re- Screen Questionnaire to obtain informa- members (Tables 2-5) and for the house-
mains the same a t both points in time? Or, tion on crimes against the person. Never- hold using only household crimes (Tables
is one more prone to robbery following a theless, the NCS provides evidence that the 7-8).
Table 1. Percent o f each type of crime by order of reporting victimizations of households and their members: AII household
and person victimizations, July 1,1972, t o December 31,1975
Order o f reporting victimization
Type of crime
Reported as
first incident
Number Percent
~
Number
~ ~
Percent
Reported as
~preceding
Number
n r
incident
of a aair
Percent
Reported as
~ following
~ e incident
o f a pair
~
Number Percent
A l l reported
Number Percent
I
Rape 63 0.1 67 0.1 77 0.1 81 0.1 144 0.1
Attempted rape 161 0.3 161 0.3 196 0.3 197 0.3 358 0.3
Serious assault 959 1.7 932 1.7 1,346 2.3 1,316 2.3 2,279 2.0
Minor assault 1,028 1.9 994 1.8 1,473 2.6 1,437 2.5 2,471 2.2
Attempted assault 3,646 6.6 3,775 6.9 5,767 10.1 5,892 10.3 9,558 8.5
Robbery 653 1.2 594 1.1 799 1.4 741 1.3 1,395 1.2
Attempted robbery 429 0.8 384 0.7 649 1.1 606 1.1 1,037 0.9
Purse snatch/pocket picking 752 1.4 715 1.3 610 1.1 573 1.0 1,328 1.2
Attempted purse snatch 120 0.2 115 0.2 93 0.2 87 0.1 209 0.2
Personal larceny, $50 and over 5,481 10.0 5,525 10.0 5,054 8.8 5,100 8.9 10,613 9.4
Personal larceny, under $50 14.712 26.7 14,658 26.6 15,999 27.9 15,941 27.8 30,732 27.3
Attempted personal larceny 1,428 2.6 1,483 2.7 1,463 2.6 1,517 2.6 2,954 2.6
Burglary, forced entry 3,357 6.1 3,331 6.1 3,026 5.3 2,995 5.2 6,362 5.7
Burglary, n o force 4,646 8.4 4,689 8.5 4,375 7.6 4.41 7 7.7 9,074 8.1
Attempted burglary 2,300 4.2 2,257 4.1 2,194 3.8 2,153 3.8 4,458 4.0
Household larceny, $50 and over 3,350 6.1 3,307 6.0 3.31 1 5.8 3,269 5.7 6,621 5.9
Household larcany,under $50 8,997 16.4 9,046 16.4 8,234 14.3 8,271 14.4 17,286 15.3
Attempted household larceny 858 1.6 886 1.6 827 1.4 854 1.5 1,713 1.5
Motor vehicle theft 1,331 2.4 1,403 2.6 1,151 2.0 1,223 2.1 2,562 2.3
Attempted motor vehicle theft 730 1.3 704 1.3 763 1.3 737 1.3 1,469 1.3
, Total 55,001 100.0 55,026 100.0 57,407 100.0 57,407 100.0 112,623 100.0
*The entries for "Reported as first incident" and "Reported as following incident o f a pair" d o not always sum t o the Total, "All
reported incidents." for each tvpe o f crime; there are 21 5 incidents for which month o f occurrence is unreDorted.
Table 2a.
Purse
Type of crime
Att. Serious Minor Att. Att. snatch,
"reported as
Rape rape assault assault assault robbery pocket
preceding incident
picking
Rape 6 3 8 1 5 2 2 1
Attempted rape 1 16 6 9 21 1 6 2
Serious assault 2 11 119 75 212 37 19 18
Minor assault 4 8 83 152 244 22 20 21
Attempted assault 11 29 199 228 1,685 59 81 37
Robbery 2 4 50 30 76 89 27 23
Attempted robbery 1 5 30 21 72 27 54 12
Purse snatchlpocket picking 1 2 21 19 47 26 9 46
Attempted purse snatch 3 2 10 2 3 1
Personal larceny, $SO+ 7 15 110 99 401 61 44 44
Personal larceny, under $50 16 33 238 292 1,314 126 136 144
Attempted personal larceny 1 3 25 34 115 22 24 15
Burglary, forced entry 7 17 90 59 199 42 25 27
Burglary, n o forcible entry 9 11 85 107 319 45 34 41
Attempted burglary 8 46 46 166 30 15 23
Household larceny, $50+ 4 8 62 61 238 43 24 30
Household larceny, under $50 7 18 89 154 554 75 49 64
Attempted household larceny 1 4 11 8 74 4 11 3
Motor vehicle theft 1 1 29 24 78 20 11 16
Attempted motor vehicle theft 1 12 16 62 8 12 5
Total number 81 197 1,316 1,437 5,892 741 606 573
One would expect, therefore, considerable persons reporting single victimizations. NCS survey procedures separate the re-
similarity in the type of crime distributions Actual burglaries fit the opposite pattern, porting and classification of household and
for the first and second incidents in pairs of being less common among repeat than all person incidents. Whenever a single event
crime incidents since they can differ only in victims. In the aggregate, crimes against of victimization involves both a household
the distributions for first and last incidents the household occur only somewhai less and a person crime, e.g., a barglary f o b
in a sequence of victimizations. Any selec- frequently among repeat than among all lowed by a rape, they are reported a s two
tive influence in proneness to type of crime victims while the opposite is the case for separate incidents. Our procedure will err
for multiple or repeat victimization of a crimes against household members, i.e., in assigning them as separate events in
household and its members will be re- crimes against persons. time. Moreover, NCS procedures take a
flected largely in differences between the separate incident report from each member
The degree to which there are switches in of the household who was "robbed,
distribution for all first reported incidents victimization by type of crime for a house-
and that for the first incident of a pair or harmed, or threatened" in the same event.
hold and its members in multiple or repeat Since these incidents are identified only by
the distribution for last reported incidents
victimization depends in part upon the sys- month of occurrence, our procedure again
and that for the last incident of a pair or in tem of classification for crime incidents.
differences with the distribution for all re- will err in assigning them as separate events
The procedure followed was to classify in time. Although members to a common
ported victimizations. each crime event by the most serious event can be classified in a separatedetailed
What is most apparent in Table 1 is the offense reported. A rape with theft, for criine category, e.g., an assault on one and
striking similarity in the distributions by example, was classified only as a rape and an attempted assault on the others, in gen-
type of crime for all first and last reported not as two separate incidents of a rape and eral such events will contribute dispropor-
and all preceding and following incidents theft. Sequences of incidents that occur tionally to the diagonal cells of the crime-
of a pair with that for all reported incidents. within the same crime event are thus ex- switch matrix. Relative to the aggregate of
Although this similarity is determined to cluded from the crime-switch matrix. all multiple victimization over time, these
some degree by the relative frequency of events are relatively uncommon so that the
types of crime among all victimizations, it amount of error should be small. These
is apparent that multiple or repeat victims sources of error could be eliminated were
of households aregenerally no more or less NCS procedures to clearly separate inci-
prone to victimization by certain types of dents that occur in the same event in time
crime than are all victims. There are some from those that do not and also identify
exceptions. Assaulp, particularly attempted members of the household to a common
assaults, occur more frequently among event.
repeat than among all victims and by de-
duction they occur less commonly among
Number of crime incident pairs of preceding and following detailed major types of crime reported by a household and
its members: All households reporting two or more victimizations while in survey, July 1, 1972, t o
December 31, 1975
Per- House-
Per- House- hold Att.
Att. sonal Att'
per- Bur- Bur- Att. house- motor Total
purse sonal larceny sonal glary, glary,
no bur- larceny hold
larceny under vehicle vehicle number
Inat* $50+ S50 larceny force force glary: ; ; a l u ; ~ larceny theft theft
7 16 5 2 4 2 9 1 3 77
3 11 43 5 7 8 13 7 27 2 5 3 196
2 100 233 26 78 92 53 68 145 16 32 8 1,346
4 93 315 30 64 83 32 82 163 16 25 12 1,473
3 371 1,244 141 196 301 184 230 557 72 87 52 5,767
1 76 130 21 41 54 23 41 78 5 15 13 799
55 156 21 26 37 16 27 63 7 13 6 649
4 48 141 22 38 42 26 30 48 8 17 15 610
10 9 18 5 4 4 1 3 10 2 6 93
9 859 1,385 173 231 337 159 317 544 55 133 71 5,054
13 1,428 7,067 474 436 960 363 637 1,749 158 247 168 15,999
4 156 446 149 53 72 47 68 142 19 35 33 1,463
4 212 450 53 666 237 198 183 394 53 79 31 3,026
7 354 917 74 258 993 134 253 550 58 88 38 4,375
151 395 43 192 172 360 116 327 39 33 32 2,194
4 350 636 65 179 261 121 475 552 68 82 48 3,311
14 544 1,779 133 378 597 297 555 2,526 171 149 81 8,234
2 65 161 24 33 49 47 62 164 73 16 15 827
2 134 253 25 74 76 48 74 127 8 122 28 1,151
1 77 156 33 36 40 27 39 96 23 36 83 763
87 5,100 15,941 1,517 2,995 4,417 2,153 3,269 8,271 854 1,223 737 57,407
i
>
The crime-switch matrix in Tables 2-5 pre- matrix. The reader is cautioned, in any most likely events. The other major crimes
sents shifts in type of crime for repeat or case, against interpreting the ordering of against persons or households occur much
multiple victimization of households re- personal crime incidents as applying to the less frequently: motor vehicle theft (3 per-
porting two or more victimizationsbetween same person. cent); robbery (2 percent); purse-snatching
July 1, 1972, and December 31, 1975. The or pocket-picking ( l percent); and the least
matrix is presented in two different ways. frequent, rape (0.4 percent). Yet, amongre-
Observed switches in type of crime peat victims, given prior victimization by
Table 2 presents the frequency distribution in repeat victimization
for the crime-switch matrix. Table 3 dis- one of the most frequently occurring
of a household and its members crimes (assault, personal larceny without
plays the percent of each type of crime that
follows a preceding reported type of crime There is considerable mutliple and repeat contact, household larceny, and burglary).
in a sequence of eight major types of crimes victimization by crime. The longer the time the most likely next victimization is by the
against- households interval for which victimization is meas- same type of crime. Roughly a third of all
-- -... - -and --
persons.
-
ured, the greater the propensity to repeat assaults and of all burglaries, 38 percent of
The reader s h o ~ l dbear in mind that these .victimization. all household larcenies and 54 percent of all
reports of victimization are for a household personal larcenies are preceded and fol-
and its members. Where crimes against Given the distribution of all reported vic- lowed by reports of victimization by that
persons are involved, the two incidents in a tim incidents or of that for repeat victims same type of crime (Tables 2 and 3). In re-
pair might be for the same or for different only (Table l), the most likely victimiza-
members of the same household. Thus, a tion by a major type of crime is a personal peat victimization for the less frequently
occurring crimes (motor vehicle theft, rob-
robbery followed by robbery could be re- larceny (39 percent) with household lar-
ported for the same or for different mem- ceny (22 percent), burglary (17 percent) bery, purse-snatching or pocket-picking,
bers of the same household. Unfortunately, and assault (15 percent) among the next and rape), the most likely next victimiza-
tion is the most frequently occurring crime
we are unable to distinguish victims within of personal larceny without contact.
the same household to a common event, Roughly 3 in 10 of these less frequently
e.g., an assault, and our procedure for occurring crimes are followed by a per-
ordering events will treat them as separate sonal larceny (Table 2).
victimizations occurring at different, though
closely related, points in time. There is,
therefore, a conf9unding of some preced-
ing and following events in the crime-switch
Table 2b.
Purse
Type of crime Att. Serious Minor Att. Att. snatch,
preceding next Rape rape assault assault assault robbery pocket
reported type of crime picking
Rape 9.5
Assault 0.8
Robbery 0.8
Burglary 0.5
Total 0.5 15.1 2.3 1.1 39.3 16.7 21.6 3.4 100.0 57,407
There i s considerable variation in patterns of all reported victimizations. 9 percent of Since rape is a form of assault, some
of repeat victimization for the different all rapes occurring in households reporting interest attaches to victim proneness to
major types of crime, however, as the fol- two or more victimizations were followed rape and other types of assault (serious,
lowing summary based on Tables 2 and 3 by a rape. There appear to be differences in minor, and attempted assault). Somewhat
discloses. victim proneness to actual and attempted more rapes than expected in households
(I) Despite the fact that rape is an infre- rape. Most rapes preceded or followed by reporting two or more victimizations were
quent event accountingfor only 0.4percent an attempted rape are also attempted
tapes, and a substantial majority of rapes
preceded or followed by an actual rape are
actual rapes.
Percent distribution by next reported type of crime for major preceding types of crime reported by households
with two or more victimizations of the household and i t s members: All household
and person victimizations, July 1, 1972, to December 31, 1975
larceny under
theft
Total
9.1 20.8 6.5 2.6 5.2 2.6 11.7 1.3 3.9 100.1
1.5 5.6 21.9 2.6 3.6 4.1 6.6 3.6 13.8 1.O 2.6 1.5 100.1
0.2 7.4 17.3 1.9 5.8 6.8 3.9 5.0 10.8 1.2 2.4 0.6 100.0
0.3 6.3 21.4 2.0 4.3 5.6 2.2 5.6 11.1 1.1 1.7 0.8 100.0
0.1 6.4 21.6 2.4 3.4 5.2 3.2 4.0 9.7 1.2 1.5 0.9 100.0
0.1 9.5 16.3 2.6 5.1 6.8 2.9 5.1 98 0.6 1.9 1.6 100.0
8.5 24.0 3.2 4.0 5.7 2.5 4.2 9.7 1.1 2.0 0.9 100.1
0.7 7.9 23.1 3.6 6.2 6.9 4.3 4.9 7.9 1.3 2.8 2.5 100.1
10.8 9.7 19.3 5.4 4.3 4.3 1.1 3.2 108 2.1 6.5 100.0
0.2 17.0 27.4 3.4 4.6 6.7 3.1 6.3 10.8 1.1 2.6 1.4 100.1
0.1 8.9 44.2 3.0 2.7 6.0 2.3 4.0 10.9 1.O 1.5 1.0 100.0
0.3 10.7 30.5 10.2 3.6 4.9 3.2 4.7 9.7 1.3 2.4 2.3 100.1
0.1 7.0 14.9 1.8 22.0 7.8 6.5 6.0 13.0 1.8 2.6 1.0 100.0
0.2 8.1 21.0 1.7 5.9 22.7 3.1 5.8 12.6 1.3 2.0 0.9 100.0
6.9 18.0 2.0 8.7 7.8 16.4 5.3 14.9 1.8 1.5 1.4 100.0
0.1 10.6 19.2 2.0 5.4 7.9 3.7 14.3 16.7 2.0 2.5 1.5 100.0
0.2 6.6 21.6 1.6 4.6 7.2 3.6 6.7 30.7 2.1 1.8 1.0 100.0
0.2 7.9 19.5 2.9 4.0 5.9 5.7 7.5 19.8 8.8 1.9 1.8 100.0
0.2 11.6 22.0 2.2 6.4 6.6 4.2 6.4 11.0 0.7 10.6 2.4 99.9
0.1 10.1 20.5 , 4.3 4.7 5.2 3.5 5.1 12.6 3.0 4.7 10.9 100.0
0.1 8.9 27.8 2.6 5.2 7.7 3.8 5.7 14.4 1.5 2.1 1.3 100.0
87 5,100 15,942 1,517 2,995 4,417 2,153 3,269 :8,271 854 1,223 737 57,407
followed (18 percent) by an assault. Of member of the household reporting the hold larceny, or assault being equally likely
some interest also is the fact that actual same kind of victimization. There is a as next reported events.
rapes were far more likely than expected to strong tendency for reports of actual to be (5) There is considerable victim prone-
occur in households that next reported a followed by actual purse-snatching o r nessfor victims ofpersonal larcezy without
serious assault (10 percent). pocket-picking and attempted to be fol- contact. Although personal larceny with-
(2) Repeat victims are only slightly lowed by attempted purse-snatching o r out contact is the most frequently occurring
more prone to assault than are victims re- pocket-picking. major crime against a household and its
Among repeat victim households report- members accounting for 39 percent of all
porting only a single victimization. For
households reporting two o r more victimi- ing a purie-siatching or pocket-pickikg by victimizations, 54 percent of all personal
zations, 15 percent of all victimizations one of their members. the risk of victimiza-
were an assault while about 13 percent of tion is greatest for personal larceny without
all single victims reported a n assault. contact (35 percent), with burglary, house-
There is substantialproneness to assault
among victims reporting an assault. Given
the occurrence of a n assault on a household
member, 35 percent of all preceding and
following incidents reported for the house-
hold are a n assault. Serious and minor
assaults were about as likely to be followed
by a serious o r minor as by a n attempted Table 4.
assault, but attempted assaults followed by
a n assault are ordinarily followed by a n
attempted assault.
(3) Repeat victims are only slightly
more prone to robbery than aresingle-time
victims. Of all reported victimizations, 2.1
percent are robberies while 2.4 percent of Type of crime
all incidents reported by multiple victim- reported as Rape
ized households are robberies. preceding incident and Serious Minor Att.
att. assault assault Robbery
There is substantial proneness to rob- assault
bery among victims of robbery. Given the rape
relatively low probability of a robbery, a
substantially greater proportion (14 per-
Rape and attempted rape +461 +10 +1 -* -*
cent) of all robberies reported against Serious assault +6 +252 +51 +40 +22
household members in households with Minor assault +3 +72 +360 + 57 +*
two or more victimizations were preceded Attempted assault -5 +34 +49 +2019 -3
o r followed by a robbery of a member. Robbery -* +600
Moreover, actual robberies are generally
Attempted robbery +l +55 +5
+1 +* +41
Purse snatchlpocket picking -*
+3 +I5
+4 +1 -3 +39
preceded and followed by actual robberies and attempts
and attempted by attempted robberies. Personal larceny, $50 and over -+ -* -6 -27 -*
Among repeatedly victimized house- Personal larceny, under $50 -11 -45 -29 -65 -32
holds reporting robbery, their risk of Attempted personal larceny -1 -2 -* -8 +*
repeat victimization by robbery is less than Burglary, forced entry +6 +6 4 -40 +*
Burglary, no force -* -2 -* -38 -2
their risk of victimization by the major Attempted burglary -1 -* -1 -1 6 +*
crimes of personal larceny without contact Household larceny, $50 and over -1 -3 -6 -31 +*
(32 percent) o r assault (19 percent), but Household larceny, under $50 -6 5 3 -13 -100 -9
about the same as that for the much more Attempted household larceny +* -3 -8 -1 -4
frequently occurring crimes of burglary Motor vehicle theft -2 +* -1 -1 4 +3
Attempted motor vehicle theft -2 -2 -* -3 -*
and household larceny.
Rape and attempted rape 2.6
(4) Purse-snatching and pocket-picking Serious assault 1.4
are relatively infrequent events accounting Minor assault 2.1
for only 1.4 percent of all crime incidents Attempted assault 11.6
Robbery 3.4
reported in the victim survey and an even Attempted robbery
smaller proportion of those for multiple Purse snatchlpocket picking
victimized households (1.1 percent). Yet, and attempts
much as in the case for the infrequent event Personal larceny, $50 and over
picking incidents were followed by some Household larceny, $50 and over
x2 =17,461;d.f. = 289
* = less than .5
+ = Observed > expected frequency; - = < expected frequency.
*
Goodmen-Kruskal Index ( 0 ) .20 .004.
<
larcenies without contact were followed by Minor personal larcenies show thegreat- (6) There is likewise considerable victim
that same type of crime. Major ($50 or est propensity to repeat victimization by proneness among victims of burglary.
more), minor (under $50) and attempted minor personal larceny and are less likely About a third of all burglaries of house-
personal larcenies without contact are all than the other types of personal larceny holds reporting two or more victimizations
most likely to be followed by a minor per- without contact (major and aiiempted) to were preceded or followed by a burglary.
sonal larceny without contact in repeat be followed by an attempted or major per- Attempted burglaries were about as
larceny victimization. Nonetheless, a major sonal larceny. This propensity perhaps re- likely to be followed by an actual as a n
personal larceny is more than twice as flects differences in the victim composition attempted burglary but actual burglaries
likely t a be followed by another major per- of larceny victims by type of larceny. A with or without force were quitelikely to b e
sonal larceny as would be expected from substantial number of minor personal lar-
the risk of major personal larceny for all cenies involve school-age victims where
victims. repeat victimization involves minor per-
sonal larcenies at school.
Actual and percent cell contribution t o chi square of pairs of victimizations in a crime-switch matrix
for repeat household victims of detailed person and household crimes: All household
and person victim@ations for households reporting two or more victimizations,
July 1,1972, t o December 31,1975
Purse
snatch,
per-
sonal
Per-
sonal
Att. Bur- Bur-
Att.
House-
House- hold Att.
I
Att.
robbery larceny, larceny,
under per- glary, glary, bur- larceny, house- vehicle vehicle
motor
sonal forced no hold
plcklng $50+ larceny, under
and att. $50 larceny entry force 'Iary $50+ $50 larceny theft theft
Table 5. Actual and percent cell contribution of chi square of pairs of victimizations in a crime-switch matrix for repeat household
victims of major household and person crimes: All household and person victimizations for households reporting two or more
victimizations, July 1,1972, to December 31,1975
Rape t460 +3 -3 -6 -1 -2 -*
Assault +13 +2
i2.246 +7 -2 -200 -84 +I37 -20
Robbery +4 +17 t782 +22 -21 --8 -27 -I
Purse snatching, pocket picking -8 -* +33 t346 --4 -* -1 7 +8
Personal larceny, without contact -1 1 -172 -25 -3 + 1,223 -319 -283 --9
Household larceny
Motor vehicle theft 4
-5 -201
-1 6
-25
+1 3 -251
-7
-5
-1
+1,460
-5
-2
+635
Rape 4.1
Robbery 7.0
Burglary
~ouseholdlarceny
Motor vehicle theft
x2 = 11,190;d.f.
*Less than .5
+ = Observed
= 49;Goodman-Kruskai Index (G) = .26f.005.
> exuected freauencv I
followed by the same kind of actual bur- other mqjor types of crimes are about as where the observed frequency is substanti-
glary. Thus, 22 percent of all actual bur- likely events as is motor vehicle theft in ally greater than the expected frequency.
glaries with force were followed by a n their repeat victimization. Indeed, the diagonal cells in Table 4
actual burglary with force compared with 8 account for 78.1 percent of the total value
This brief description of victim proneness of chi-squared and in Table 5, for 78.4 per-
percent followed by burglary with no force in repeat victimization of a household and
and 7 percent followed by attempted bur- cent. We can conclude then that the
its members has emphasized the proneness chances a household or one or more of
glary. Similarly, 23 percent of all actual to repeat victimization by the same type of
burglaries without force were followed by its members will be successively victimized
crime despite substantial differences in the by the same type of crime are greater than
a n actual burglary without force compared probability of victimization among the
with 6 percent followed by a n actual one w~ouldexpect given the chance aN
types of crime. The test of proneness has households and their members have of
burglary with force and 3 percent followed
been the departure of these patterns from being victimized by that type of crime. By
by attempted burglaries.
expected frequency of occurrence, given this measure, then, in repeat victimization.
(7) Households victimized by house- the distribution of types of crime among all there is household victim proneness to the
hold larceny are prone to repeat victimiza- repeat victimized households. The test of same type of crime. The chances of next
tion by household larceny. While 22 per- divergence between the actual crime-switch being victimized by a robbery, for example,
cent of all households reported a house- matrix and a n expected one based on the are greater if the previous victimization
hold larceny, 38 percent of all households
victimized by household larceny reported a
types of crime reported by repeat victims
used was the chi-square test for homogene-
a
was robbery than if it was some other type
of crime.
preceding o r following incident of house- ity of proportions. The chi-square test for
hold larceny. As for personal larceny, any an 18 by 18 detailed type of crime matrix is Readers should take note that proneness t o
household larceny followed by a household presented in Table 4 and for a n 8 by 8 major victimization by the same type of crime
larceny is most likely to be a minor house- type of crime matrix in Table 5. does not predict the most likely next vic-
hold larceny with a loss of $50 or less. But a timization by a major type of crime. That
Given the substantial number of pairs,
substantially greater proportion of major is, proneness to victimization by the same
57,407, in the matrices, the chi-square is
household larcenies ($50 and over) are fol- type of crime does not say that whenever a
expected to be significant. Our attention in
lowed by a major household larceny than household o r one of its members is victim-
these tables, therefore, focuses on the cells ized by any major type of crime, it has a
expected. A similar pattern holds for in the crime-switch matrix that contribute
attempted household larcenies. greater chance of next being victimized by
significantly to the chi-squared. the same rather than by some other type of
(8) Motor vehicle theji victims also The diagonal cells in Tables 4 and 5 are crime. The chances that a victim of a rob-
show a propensity to repeat victimization those where the same type of crime is re-
by the same type of crime. This propensity poited in a pair. Each of these cellscontrib-
holds for both attempted and actual motor utes significantly to the value of chi-squared
vehicle theft. As for other infrequently and they are the only cells in these tables
occurring crimes, motor vehicle theft is
most likely to be preceded or followed by a
personal larceny without contact but the
bery o r a motor vehicle theft will next be household members were victimized by The second condition for symmetry is t h a t
victimized by a personal larceny are greater, robbery, the propensity tostay home might the probability of any two pairs that differ
for example, than victimization by the reduce the risk of it being followed by a only by order of occurrence differ f r o m
same type of crime. Rather, for a n y major robbery. that of all other pairs. This condition o f
type of crime, the chances of next beingvic- symmetry is more o r less satisfied for major
timized by any major type of crime are An answer to the question of the effect of types of crime though it is less apparent f o r
greater than chance only for the same type prior or subsequent victimization by type many of the pairs for detailed types o f
of crime. of crime is provided by examining the ex- crime. Generally, however, there is sym-
tent of symmetry in paired victimizations metry in the pairs involving major crimes
There are eight cells in Table 5 where the by type of crime. When any two types of against .persons and households.2
observed frequency of pairs is significantly crime are paired by their order of occur-
less than expected, given the type of crime rence, the pairs aresymmetrical if the prob- There is considerable variation, however,
distribution for all multiple victimized ability of their occurrence is the same and it in the probability that any two types o f
households and their members. These cells differs from other crime pairs. Even if the crime incidents will be consecutive victimi-
account for an additional 16.8 percent of full conditions of symmetry are not met but zations. The probability of consecutive vic-
the total value of chi-squared or all but 5 the probability of occurrence remains the timization by the same type of crime varies
percent of the remaining variance. They in- same for paired orders, there would be little directly with the probability of occurrence
volve selected combinations among the four evidence that prior victimization has had a of that type of crime among all victims.
most frequently occurring crimes of per- substantial effect on type of crime victimi- Moreover, the greater the probability o f
sonal and household larceny, burglary, and zation in repeat victimizafion. victimization by any type of crime, t h e
assault. The eight cells can be regarded as more likely it is to occur in consecutive vic-
four symmetrical pairs with (1)assault with Among the 12 person and 8 household timization with any other type of crime.
personal larceny, (2) assault with house- detailed types of crime in Table 2 that can
hold larceny, (3)personal larceny with bur- be reported as victimizations by households
glary, and (4) personal larceny with house- and their members reporting two or more Switches in type of household
hold larceny occurring lessfrequently than victimizations, there are 400 possible pairs crime in repeat victimization
expected. Thus a n assault, for example, is of incidents by type of crime when each in- of households
less likely to be followed by a personal lar-cident is paired with the next succeeding in- We shall next consider briefly the house-
ceny than expected and a personal larceny cident by type of crime. Twenty of these hold as the unit at risk in repeat victimiza-
is less likely to be followed b y a n assaultpairs occur when the same type of crime is tion for household crimes only-those of
than expeAed. Just why multiple victim- reported for two consecutive incidents. The burglary, household larceny, and motor
ized households and their members should remaining 380 pairs of consecutive inci- vehicle theft. In general, repeat victims of
be less prone to these four symmetrical dents could comprise 190 symmetrical household crimes are no more or less prone
patterns of victimization is not apparent. pairs. Similarly, among the five person and to victimization by certain household
three household major types of crime in crimes than are all victims (Table 6). Motor
All other pairs of victimization by type of Table 3, there are 64 possible pairs of inci-
vehicle theft may occur somewhat less
crime occur about as often as expected. A dents; eight of these occur when the same
rape followed by a n assault or a n assault type of crime is reported for two consecu- often amongrepeat than among all victims,
but the difference is very small.
followed by a rape, for example, occurs tive incidents. The remaining 56 pairs of
about a s often as expected. consecutive incidents could comprise 28 Among major crimes against households,
When examining the effect that victimiza- symmetrical pairs. When the 400 and the 64 the most likely household victimization is
tion by a type of crime has on the chances pairs are ordered by their actual rate of that of household larceny (52 percent) with
of victimization by any other type of crime occurrence among 10,000 pairs among burglary somewhat less common (40 per-
in repeat victimization, the question arises households reporting two o r more victimi- cent) and motor vehicle theft least common
whether the order of victimization by a zations, the order o f occurrence ofa type of (8 percent). Actual household crimes occur
type of crime has a n effect. Such effects crime in a pair has little effect on theprob- with greater frequency than d o attempted
could be presumed to occur were victims to ability of occurrence o f a pair. One of the ones. Attempted household crimes are par-
alter substantially their behavior to avoid conditions of symmetry with respect to pair ticularly un;ommon for household larEeny
repeat victimization by a serious type of order thus is satisfied; any two types of where only about I in 14 household larcen-
crime, and take precautions that reduce the crime have essentially the same probability ies is reported as an attempt. The compara-
likelihood of victimization by even less of occurrence regardless of the order of vic- ble odds for burglary are that 1 in 4 is a n
serious types of crime which would not be timization. For example, the probability of attempt while almost 1 in 3 motor vehicle
taken were one previously victimized by a household larceny less than $50 being thefts is a n attempt. The odds areabout the
the less serious crime. Thus, if one or more followed by a personal larceny less than same for repeat as for all victims during the
$50 is 310 in 10,000 pairs, while it is 305 for three and one-half years for which victimi-
a personal larceny less than $50 being fol- zation was reported.
lowed by a household larceny less thanS50. ?A more succinct test for symmetry is presented in the
There is no evidence then that victims o r companion paper by Fienberg.
offenders have any effect on the order of
victimization by different types of crime for
repeat victimization. Where there is repeat
victimization by the same type of crime,
however, it is quite possible that victims
and offenders have an effect, given their
significant departure from chance occur-
rence.
Table 6. Percent of each type of crime for order of reporting household victimizations: All household victimizations, July 1,1972,
to December 31,1975
Order ,of reporting victimization
Number Percent Number Percent Number Percent Number Percent Number Percent
Burglary, forced entry 4,140 12.7 4,102 12.6 2,257 13.4 2,215 13.1 6,362 12.8
Burglary, no force 5,978 18.3 6,005 18.4 3,062 18.1 3,087 18.3 9,074 18.3
Attempted burglary 2,914 8.9 2,891 8.9 1,565 9.3 1,541 9.1 4,458 9.0
Household larceny, $50 and over 4,359 13.4 4,323 13.2 2,295 13.6 2,262 13.4 6,621 13.4
Household larceny, under $50 11,387 34.9 11,403 34.9 5,881 34.8 5,889 34.9 17,286 34.9
Attempted household larceny 1,107 3.4 1,I 26 3.4 587 3.5 606 3.6 1,713 3.4
Motor vehicle theft 1,740 5.3 ' 1,816 5.6 740 4.4 816 4.8 2,562 5.2
Attempted motor vehicle theft 999 3.1 970 3.0 497 2.9 468 2.8 1,469 3.0
Totals 32,624 100.0 32,636 100.0 16,884 100.0 16,884 100.0 49,545 100.0
*The entries for "Reported as first incident" and "Reported as following incident of a pair" do not always sum to the total, "All
Reported Incidents," for each type of crime because there are 37 incidents for which month of occurrence is unreported.
There is some variation in patterns of zation by the same type of crime (stayer or joint probability of victimization. That is,
repeat victimization for the different diagonal cells in Table 8) is substantial. excluding victimization by the same type of
detailed and major types of household These are the only cells where the observed crime, for every major type of household
crime (Table 7). frequency is signficantly greater than the crime, the probability that it will occur with
expected and they account for 8 1 percent of every other major type of household crime
There is substantial proneness to repeat the variance in chi-squared for repeat vic-
in repeat victimization varies directly with
victimization by the same major type of timization by detailed types of crime and 68
their expected probability of occurrence
household crime. While the odds of house- percent of the variance in major types of
based on the experience of all victims.
hold larceny are roughly 5 in 10 for all crime. One other pattern is worth noting.
household victims, they rise to between 6 Actual burglaries-occur significantly leis
and 7 in 10 for households previously vic- often with actual household larcenies than Conclusion
timized by a household larceny. Similarly, one would expect given the chances of vic- Within a population of victims, there is
while the burglary odds are 4 in 10 for all timization for all households. This is sur- considerable multiple or repeat victimiza-
household victims, they are almost 6 in 10 prising given the close relationship between tion. Evidence on repeat victimization
for households previously victimized by the two types of crime and the possibilities makes it clear that victimization is not a
burglary. The odds for victimization by for misclassification. random occurrence but that there is prone-
motor vehicle theft are less than I in 10 for ness to repeat victimization. Moreover, in
all victimized households, but almost 3 in As one might expect from the substantial repeat victimization, there is a proneness to
10 when a motor vehicle theft is previously differences in the probability of victimiza- repeat victimization by the same type of
reported. tion among different types of household crime. Apart from a marked proneness to
crimes, there is considerable variation in victimization by the same type of crime in
Regardless of the type of burglary, the odds
the probability that any two types of house- repeat victimization, most patterns of vic-
are that the next household victimization hold crime will be consecutive victimiza-
will be a burglary. There is, moreover, a tions. The probability of consecutive vic- timization by type of crime in repeat vic-
substantial propensity for victimization by timization occur about as often as
timization by the same type of household expected.
the same type of burglary. The same
crime generally varies directly with the
pattern holds for household larceny. For probability of occurrence of that house- The order of occurrence of a type of crime
motor vehicle theft, however, the odds are in a pair has little effect on the probability
hold crime among all victims. Moreover,
that the next victimization will be a house- of occurrence of a pair. There is, moreover,
the greater the probability of victimization
'hold larceny or burglary, though there is by any type of household crime, the more a general symmetry in the pairs involving
nonetheless a substantial propensity for re- likely it is to occur in repeat victimization major types of crimes against persons and
peat victimization by motor vehicle theft. households. The probability of consecutive
The odds on repeat victimization by motor with every other type of household crime. victimization by the same type of crime
vehicle theft are four times greater for those For every major type of household crime varies directly with the probability of
previously victimized by motor vehicle also, the probability that it will occur con- occurrence of that type of crime among all
theft than they are for all household victims secutively in repeat victimization with any victims. The greater the probability of vic-
and more than seven times greater for other type of crimes is a function of their timization by any type of crime, the more
attempted motor vehicle theft. likelv it is to occur in consecutive
The chances that a household will be vic- victimization with any other type of crime.
timized by the same type of household
crime, then, are substantially greater than Reference
one expects given the chances all house-
holds havefor victimization by that type of Dodge, Richard W. (1975)
National Crime Survey: Comparison of vic-
crime. Further evidence for this is found in timizations as reported on screen questions with
Table 8. The propensity to repeat victimi- their ,final class~fication. 1974. Washington,
D.C.: U.S. Bureau of thecensus Memorandum,
December 1, 1975, p. 5.
#
Table 7. Percent distribution by next reported for precedingdetailed and major types of household crime for households reporting two
or more householdvictimizations: A l l householdvictimizations, July 1, 1972, t o December 31, 1975'
Type o f crime
Type of crime reported as following incident
I Table 8. Actual and percent cell contribution to chi square of pairs of household crimes i n a crime-switch matrix for repeat household
victims of crime: All detailed household victimizations. Julv 1.1972 to December 31 1975
- -
1
I T v m of
house6bld ceime
Burglary, Bu:Fyl
Type of household crime reported as following incident
Household Attempted
Household Motor
-1
Attempted
reported as
preceding incident forcible forcible I ~ $ ~ household
~ ' vehicle L
i;:
entry entry over $50 larceny theft theft
Burglary, forcible entry
Burglary, no forcible entry
Attempted burglary
Household larceny, $50 and over
Household larceny, under $50
Attempted household larceny
Motor vehicle theft
Attempted motor vehicle theft
- - --
x2 = 4,826; d.f.
Less than .5
= 49; Goodman-Kruskal Index = .22 * .008.
Statistical modelling in the analysis
of repeat victimization
STEPHEN E. F~ENBERG
Department of Statistics
and Department of Social Science
Carnegie-Mellon University
The National Crime Survey's panel struc- from one victimization to subsequent ones, individual's "victimization propensities"
ture allows for the longitudinal analysis of from the timing of the victimizations (i.e., given his current victimization state, i.e.,
individual victimization records. In this information on the inter-victimization time his value of Y(t).
paper, further details are provided on a intervals). If the Markov-chain component (2) Ajamily of waiting time distribu-
semi-Markov model for such longitudinal of the semi-Markov process is of order one, tions, 9 = { Gll(t), G12(t), . , G~r(t) ..
analysis proposed in Fienberg (1978). The
'relationship between this model and some
then we only need to examine a one-step
transition matrix for repeat victimization.
..
G21(t), . , Grr(t)}, that characterize the,
inter-victimization intervals (i.e., the times
analyses of Reiss (1980) on data for repeat Thus a version of the model of Section 2 is between victimizations) and which depend
victimization are noted. Finally, Reiss's consistent with the analysis of the crime- on the future victimization state as well as
.data are reanalyzed using a variety of log- switch matrix presented by Reiss (1980) in the current state of the Markov chain.
linear models. The resulting models are in- the preceding paper. The link between
terpreted in the context of victim vulner- Reiss's approach and the use of semi-
ability or proneness. Markov models is outlined in Section 3. of waiting times,
Then in Section 4 we present a reanalysis of
Reiss's crime-switch matrices using multi- the Markov chain. We also note that this
1. Introduction, plicative (or loglinear) models of the sort modelling approach can be extended to
The National Crime Survey (NCS) has a discussed in Bishop, Fienberg, and Holland handle more complicated processes involv-
longitudinal structure that potentially (1975). This method of analysis leads to a ing m-step (for m >
2) transition prob-
allows for the analysis of individual and more systematic exploration of patterns of abilities in place of M, and corresponding
household victimization records over time. repeat victimization and risk than has been wsiting time structures in place of 9 or
In particular, this longitudinal structure proposed to date. The results of our reanal- 9.
can be used for the examination of the yses lead to a somewhat different and more A useful way to think of this semi-Markov
extent of repeat victimization, and for an parsimonious interpretation of the crime process is in terms of a sequence of random
explorat!on of the concept of victim prone- switch data than that presented by Reiss variables
ness. Fienberg (1978) briefly outlined a (1980).
~ r o ~ o s for
a l the use of a semi-Markov ..
(XI, SI, X2, s2.\. , Xn, Sn) (2)
*oiel for multiple victimization over time. where n itself may be a random variable.
2. Semi-Markov models
In Section 2 of this paper we give more de-
for multiple victimization The Xi's take values 1,2, ...
, r, and they
tails for this model and point out some of form a discrete-time, first-order Markov
its implications for the analysis of longi- The basic idea suggested by Fienberg chain with transition matrix M , where
tudinal victimization records. This paper (1978) was the modelling of victimization
' k-l k
presumes a knowledge of various concepts for an individual or household as a point
and phenomena related to the NCS and process p ( t ) > 01, where Y(t) = j at Y ( t ) = X k f o ri=OC S t < t < 2 ;i-oS I . (3)
victimization surveys, as presented e.g., by time t if t e individual was last a victim of
Fienberg (1978) or Penick and Owens crime type j. A starting point for such The Sk's are positive random variables with
(1976). modelling is the semi-Markov process with
transition probabilities,
An interesting and well-known conse-
quence of the .use of the semi-Markov Pt,(t) = Pr { Y(t) = jl Y(0) =i}, (1)
model of Section 2 is the separation, for where i and j run over the possible crime
estimation purposes, of the transitions types under consideration, say 1 < i, j < r.
(For details, see Cinlar 1975).
for 1 < i Gr.
These transition probabilities can be ex-
pressed directly in terms of two sets of
quantities:
(1) A matrix, M = { m ,
transition probabilities whic
Corresponding to the sequence of random most individuals are fragmentary, with as The two tables reanalyzed in Section 4 a r e
variables in (2) is a vector of observed ' few as 20 percent of all sample members taken from Reiss (1980) and are based o n
values having complete 3-year records. The ob- household data for all households report-
served data are further complicated by ing two or more victimizations between
several features of the NCS: Ji11ji i, 1972, and December 3 i, 1975. Thus
and the likelihood of this vector given the (a) Time is discretized, i.e., measured by the data have been aggregated across
model is months. households, and no attempt has been made
(b) Since victimizations are recorded to control for the size of the household o r
only by month of occurrence, multiple vic- for any other household characteristics
timizations within a given month are not that might affect the transition probabili-
sequenced in order of occurrence. ties. While this aggregation implicitly
whereJ(t) is the probability density func- (c) Series victimizations (see Fienberg assumes a homogeneity of households s o
tion corresponding to the distribution 1978 or Penick and Owens 1976 for a that the transition matrix M of Section 2
function R(r). Here we have ignored xu, the detailed discussion of this phenomenon) does not depend at all on household char-
unobserved victimization state at the time yield no information about individual acteristics, neither Reiss nor we in fact
we begin to observe the process, and so, the inter-victimization times, only about their believe in such assumptions. Rather the
corresponding inter-victimization interval sum (at least within quarters of the year). aggregation of households has been done
which is observed only in a censored form. (d) When both series and nonseries vic- for the purposes of exploratory analysis
If n, the number of observed victimizations, timizations are reported during a given and illustration. More refined analyses are
is substantial, then the loss of information interval, the incidents cannot be ordered by not only possible, but also desirable.
by ignoring the time lapse s8 (<so) from the time of occurrence. In constructing the crime-switch matrices
beginning of the observation to the first In the following section we briefly outline used in Section 4, Reiss (1980) needed t o
recorded victimization is negligible. the approach adopted by Reiss (1980) for handle many of the problems related to the
The important feature of the likelihood of the handling of these problems to construct recording of multiple victimizations dis-
expression in (6) is that it factors into two an observed crime-switch matrix in order cussed at the end of the last section. In par-
parts, the first involvifig the transition to make inferences about the transition ticular he chose to record series victimiza-
matrix M, and the second involving the probabilities in the matrix M. tions as single incidents in the month of
first re~ortedoccurrence. or at the begin-
ning o i a reference period if that month'iies
3. Constructing a crime-switch
outside it. Whenever multiple unordered
matrix
incidents were recorded, the incidents were
can estimate the parameters of M sepa- As Reiss (1980) notes we can adopt any one ordered using a randomization procedure.
rately from those underlying the { ~ ( t ) } . of four choices regarding the unit at risk for described by Reiss (1980). The randomiza-
The first component of the likelihood can our analysis of repeat victimization: tion procedure clearly introduces consid-
be rewritten as (1) The household, using both personal erably more symmetry into the data than
victimizations for all household members we would expect to be present in the origi-
and household victimizations. nal unobserved victimization sequences.
(2) The household, using only house- The symmetry in the constructed crime-
hold victimizations. switch matrices is discussed in the course of
where n , is the number of transitions (3) The individual, using only personal our analyses.
observed from victimization state i to victimizations. Finally, the data used by Reiss are based on
victimization state j. Since there are n - 1 (4) The individ'al, 'sing both ~ersonal both bounded and unbounded inteNiiws.
such transitions in the observed sequence, victimizations and household victimiza- households used in the construction
(5), we have that tions. of the sample may be in the sample for from
r r In Section 4 we analyze a crime-switch one to seven interviews, each of which yields
C 2 n,,= n - 1. matrix constructed by Reiss for category victimization information for the preceding
(I), households with all victimizations. 6-month period. Given the potential re-
porting biases associated with time in
Since M ={mi,} is". matrix of transition sample and differential dropout rates of
probabilities, we have that various groups (see the discussion in Fien-
berg 1978), more refined analyses than
those reported here should attempt to con-
trol for those factors in some way.
so that the likelihood function in (7) con-
sists of a product of r multinomials. 4. Analyses of crime-switch data
For each individual or household in the Our analyses here are carried out on two
NCS we can, in principle, collect full infor- related tables of crime-switch or victimiza-
mation of the form (6) for a full 3-year tion transition data constructed, discussed,
period. Unfortunately, the data records for and analyzed previously by Reiss (1980).
Table 1 gives the data classified by 20 de-
tailed types of crime, and Table 2 gives an
aggregated version of Table 1 using 8 major
crime types.
We begin with an analysis of the data in This corresponds to the model of quasi- some form of quasi-homogeneity holds for
Table 1 and treat the counts as if they were symmetry, discussed in Chapter 8 of subsets of the cells in the table. Because of
the { n , } of expression (7) in Section 2. Bishop, Fienberg, and Holland (1975), and the relatively large number of observed re-
What we would like to do is model the from Table 3 we see that this model pro- peat victimizations of the same type rela-
matrix of transition probabilities, M. The vides a remarkable fit to the data-G2 = tive to the expected values for the homoge-
first question we ask is: Are the rows of the174.9 and x2= 167.1, with 169 d.f. (We need neity model, the first quasi-homogeneity
matrix M in fact the same, i.e., do we have to fit the model of quasi-symmetry rather model we explore is based on dropping the
homogeneity of row proportions? The than the model of symmetry because of the diagonal cells and corresponds t o the well-
answer to this question is clearly no, as canmarginal constraints on the {m,,}.) This known mover-stayer model discussed in
be seen from the values of the goodness-of- feature of symmetry in the observed data the context of social mobility studies.
fit statistics reported in Table 3 for this was also noted by Reiss (1980) and partial- While this model gives a substantially im-
model, G I = 12,420 and X* = 18,410 with ly anticipated earlier in this paper when we proved fit (GZ= 2261 and XZ = 2505 with
361 d.f.1 discussed the use of randomization to 341 d.f.), it still does not fit the data well.
order the unordered incidents. As a conse- Next, we used the 8 major groupings of
Next we explore the question of symmetry quence of the excellent fit of the symmetry
of transition probabilities, i.e., crime from Table 2 and dropped the corre-
model of expression (lo), we treat cells
above and below the main diagonal in a
symmetric manner in the followinganalyses.
subject, of course, to the constraints, (9),
that the m , sum to 1 over j, i.e., Since the model of homogeneity of row
proportions does not fit the data, it is
natural to explore whether the model fits a
= 1 for all i. restricted subset of the data, i.e., whether
j
Table 1.
Purse
Type of crime Att. snatch,
Att. Serious Minor Att.
reported as Rape rape assault assault assault robbery pocket
preceding incident picking
Rape 6 3 8 1 5 2 2 1
Attempted rape 1 16 6 9 21 I 6 2
Serious assault 2 11 119 75 212 37 19 18
Minor assault 4 8 83 152 244 22 20 21
Attempted assault 11 29 199 228 1,685 59 81 37
Robbery 2 4 50 30 89 27 23
Attempted Robbery 1 5 30 21 76
72 27 54 12
Purse snatchlpocket picking 1 2 21 19 47 26 9 46
Attempted purse snatch 3 2 10 2 3 1
Personal larceny, $50+ 7 15 110 99 401 61 44 44
Personal larceny, under $50 16 33 238 292 1,314 126 136 144
Attempted personal larceny 1 3 25 34 115 22 24 15
Burglary, forced entry 7 17 90 59 199 42 25 27
Burglary, no forcible entry 9 11 85 107 319 45 34 41
Attempted burglary 8 46 46 166 30 15 23
Household larceny, $5Ot 4 8 62 61 238 43 24 30
Household larceny, under $50 7 18 89 154 554 75 49 64
Attempted household larceny 1 4 11 8 74 4 11 3
Motor vehicle theft 1 1 29 24 78 20 11 16
Attempted motor vehicle theft 1 12 16 62 8 12 5
Repeat victimization data for 20 crime categories: Reported crimes by households with two or more victimizations
while in survey, July 1, 1972, to December 31, 1975
House-
Att. Bur- Bur- -;;;H hold Att. MO:or Att.
sonal motor Total
purse larceny, larceny, Per- no
g l a ~ , glary, bur- larceny, house-
snatch sonal larceny, under hold vehicle number
$50+ larceny force force glary $50+ $50 larceny theft theft
,
Table 2. Repeat victimization data for eight major crime categories: Reported crimes by householdswith two or more victimizations
while in survey July 1,1972, to December 31,1975 (adapted from Table 1) [Source: Reiss (1980) I
2nd victimization Purse
i n pair/
,st victimization
in pair
Rape Assault Robbery Snatchingl
pocket
picking
larceny brg!ary Hy::zd' $%:
theft
Totals
Rape 26 50 11 6 82 39 48 11 273
Assault 65 2,997 238 85 2,553 1,083 1,349 216 8.586
Robbery 12 279 197 36 459 197 221 47 1,448
Purse snatching.
pocket picking 3 102 40 67 243 115 101 38 703
Personal larceny 75 2,628 413 229 12,137 2,658 3,689 687 22,516
Burglary 52 1,117' 191 102 2,649 3,210 1,973 301 9,595
Household larceny 42 1,251 206 117 3,757 1,962 4,646 391 12,372
Motor vehicle theft 3 221 51 24 678 301 367 269 1,914
Totals 278 8,645 1,347 660 22,558 9,565 12,394 1,960 57,407
These analyses of the first-order observed We also need to begin analyzing inter-
transition matrices represent only a first, victimization interval data and to concern The author is indebted to Albert J. Reiss, Jr.,
and very exploratory step in the analysisof ourselves with the overall usefulness and who provided the data analyzedin Section4and
longitudinal victimization data from the goodness-of-fit of the full semi-Markov whose original analyses suggested those carried
NCS. In addition to disaggregating the model. out i n this paper. Thanks are also due to Dennis
data in the various ways suggested in Sec- Jennings, who assisted with the computations
tions 3 and 4 and repeating similar analy- Because of the peculiaritiesassociatedwith and analyses.
ses, we also need to address more carefully the data from the NCS (see Fienberg 1978),
the procedures used to order the unordered many of these more elaborateanalyseswill
require new statistical methods or innova- References
victimizationincidents and to handleseries
victimizations and how they related to the tive adaptations of existing techniques. Bishop, Y. M. M., S. E. Fienberg, and
P. H. Holland (1975)
occurrences of other victimizations. Discrete multivariate ana!rpsis: Theory and
practice. Cambridge, Mass.: M.I.T. Press.
Cinlar, E. (1975)
Introduction to stochastic processes. Engle-
- wood Cliffs, N.J.: Prentice-Hall.
Table 3. The goodnessof-fit for various loglinear models applied t o repeat victimization
data of Table 1 Fienberg, S. E. (1978)
"Victimization and the National Crime Sur-
Likelihood ratio Pearson vey: Problems of design and analysis." I n K.
Model df. chi-square chi-square Namboodiri (ed.), Survey sampling and meas-
~2 ~2 urement, New York: Academic Press, pp. 89-106.
(Reprinted in this volume.)
Homogeneity of
row proportions 361 12,420 18,410 Penick, B. K., and M. E. B. Owens (eds.)
Quasi-symmetric 169 174.9 167.1 ( 1976)
Quasi-homogeneity Surveyingcrime. Washington, D.C.: National
(a) dropping diagonal cells 341 2,261 2,505 Academy of Sciences.
(b) plus blocks of cells for 8
.
major crime groupings 309 1,140 1,238
- Reiss, A. J., Jr. (1980)
"Victim proneness in recent victimization by
type of crime." (In this volume.)
Table 4. The goodnessof-fit for various loglinear models applied to repeat victimization
Data of Table 2
Quantitative approaches
to the study of parole
RICHARD PERLINE
Department of Psychology
University of Chicago
HOWARDWAINER
Bureau of Social Science Research
Washington. D. C.
The first part of this paper,uses Federal The second part of this talk deals with (1) "Just dessertsp'-"you did something
parole data in an attempt to develop a parole data and their adequacy. In this sec- bad so youstay in-the badder the longer."
model for the parole system as it stands and tion we shall discuss data from individual
to predict recidivism by treating it as a states gathered under the auspices of the (2) Rehabilitation-"you are more likely
latent trait. The second part discusses the Uniform Parole Reports project (hereafter to recidivate than he is, so you stay in
adequacy of Uniform Parole Report referred to as "UPR Data''). We have re- longer."
(UPR) data for states. cently had the opportunity to do an evalua-
tion of the UPR data for LEAA, and the These two schools of thought are con-
appalling results have important implica- cretized in the parole standards. The rec-
Omnia quae evenlura sun:, tions for those interested in doing parole ommended bounds are a matrix in which
in inrerro jaren:.'
research. We shall keep federal data sepa- the rows reflect the seriousness of the
rate from state data. This does not mean offense-the least serious at the top, the
THE AREA OF PAROLE RESEARCH is rife most serious at the bottom. Seriousness
with dissension and disagreement, which that federal data are better than state data,
but only that we don't know about the reli- was determined through some sort of
appears to us to be entirely justifiable. We scaling, although how and by whom, I
would like to add to the disagreements ability of the federal data.
don't know.
without further obscuring the vast dark-
ness of the topic. This paper will be broken The columns of this matrix are determined
Establishing a quantitative model by "Salient Factor scores,"in which a set of
into two parts. The first part deals with for de facto incarceration rules
some analyses we have done on Federal I1 variables are scored zero-one. The sum
parole data. In this section we will try to Parole standards are set to indicate to the of the convict's scores on these variables
develop a model for the parole system as it parole board how long a particular kind of yields his salient factor score, which is sup-
stands and to predict recidivism by treating convict should stay in prison. These are in posed to be related to the probability of
it as a latent trait. For those who are in a the form of upper and lower bounds for recidivism (r* = 0.07). The federal guide-
hurry, our results are at least as good with each cell in a two-way categorization. The lines collapse these salient factor scores
this approach as with any other, but still categorization reflects two schools of 'into four categories (0,1,2 = I; 3,4,5 = 11;6,
leave a great deal to be desired. thought on incarceration: 7,8 = 111; 9, 1 0 , l l = IV). The midpoints of
the recommended sentence length intervals
'"Everything which is to come lies in uncertainty" are shown inTable 1by offender categories
(from preface to Raleigh's Hislory of :he World,
1614). and by five seriousness of offense cate-
gories (in months for adults).
Table 1.
Offender category
1 2 3 4
Offense severity 1 8 10 12 14
category 2 10 14 18 22.5
3 11 15 19 23.5
4 14 18 22 26
5 23.5 29.5 34 39
Improvement?
I"" '.
I 1 2 3 4
Row
medians
Row effects
(row median.-gr. md.)
II Having identified the de facto structure o f
parole policy, the road toward possible im-
provement is clear, and involves two steps:
(1) Improve the accuracy of the estimates
of seriousness of crimes, so that a m o r e
accurate classification is possible.
(2) Improve the scaling of prisoner char-
I Grahd median 1.23
1 acteristics so that the prisoner effects m o r e
closely correspond to the likelihood of
Table 3. recidivism.
Let us briefly look at step (1). Shown in
Figure 1 and Figure 2 are plots of serious-
ness effects plotted against category. I t is
clear that categories 1-4 for both juveniles
and adults are linearly related to incarcera-
tion length, but when crossing into category
I -.I5 -.04 .04 .ll column medians = column effects 5 there is a major jump. It would seem that
there is room for about4 intermediate cate-
gories between the crimes which correspond
The same multiplicative model (with dif- to category 4 and those in category 5. I t
Table 4. ferent values.for the parameters) holds for would seem that finer discriminations a r e
Residual from model (in logs)
juveniles as well. This model and its fit are possible. Of course such fine discrimina-
shown in Table 6. tions are made as viewed by the increased
We are then reasonably well assured that width of allowable sentences for the more
the existing parole policy corresponds serious crimes. Why not make this explicit?
-.OI .02 closely to a multiplicative model in which We did not d o the obvious scaling experi-
ment, but the details of how to d o such a
.02 .1
study are clear (Torgerson 1958). Use clas-
characteristics among adults, and about sical scaling methodology with some
Thurstonian model and have expert judges
Our first interest was to identify the mode1 twice as much amOngjuveniles. decide which of two paired crimes is the
underlying this structure. The sentence more serious.
lengths were originally determined empiri-
cally as a measure of the de facto sentence Step (2) was one which we found interest-
structure for the majority of offenders. We ing. Could we improve upon the results
analyzed these data using traditional two- that Hoffman and his colleagues (Hoffman
way table decomposition methods. That is, and Beck 1974) had obtained through their
inspection showed that a n additive model use of multiple regression? They regressed
was not appropriate (this is easily seen by a variety of variables against the binary
fitting a n additive model and seeing the variable (Recidivate-yes or no). We know
substantial trends in the the residuals). We very well that alternative models appear, a t
thus tried a multiplicative model by first least on the surface, t o be more suitable f o r
calculating logs and taking out row medi-
ans; these correspond to seriousness effects
(Bishop, Fienberg, Holland 1975; Tukey
1977; Neithercutt, Moseley, Wenk 1975).
We then calculated column medians of the
residuals and subtracted them; these corre-
spond to offender effects. The resulting
matrix of residuals corresponds to the re-
siduals from the model. As can be easily
seen, these are all small. The effects were
then transferred back to months and the
total model specified.
Table 5.
Adults
Offender effects
.2 .2 -. 1 -.8 .55
-1.2 0.0 .7 1.2 .79 Offense
-. 2 .2 .I .1 1 .OO seriousness
I
I
Table 6.
Youth
Offender effects 1
500) and looked at goodness-of-fit of the
model. (We used differential slope models
as well, but the fit wasn't increased and so
we stuck with the equal slope model.)
.7 Associated with each variable is its "diffi-
-.-.9.97 .8
.2
-.3
.8
1.2
.3
2.6
1.4
.6
.9
1.2
Offense
seriousness
culty," here interpreted to mean how easy it
-.3 -.4 -.4 -.5 1.2 effects
is to have that variable scored I . Thus
.9 .4 -1.5 -. 3 1.9 "planned living arrangement" is the
-
Residuals (months)
I
"easiest" (86 percent had them) whereas
"drug history" is the "hardest" (only about
22 percent had one). Each person also had
an "ability" score (perhaps "returnability"
ance among Haward students is accounted is a better term). The difference between a
Figure 1. for by SAT scores, but 1 imagine it isn't person's returnability and the difficulty of
Adult offenders overwhelming. This same restriction of the item describes the likelihood of that
,range presumably exists in parole decision. person having that particular character-
Thus we must not be over-hasty in deni- istic. To predict recidivism we calculated
grating the 7 percent figure. the probability of a person having the char-
Serlousness 1 75
effect 1 50
Our approach was to think of the individ- acteristic "recidivate." The r.h,, reflects the
(~mn onths) 25
ual's background data as a test that he relationship between each "item" and the
1 00 total test. Note that the r.h,, associated with
75
takes. There were eight variables that en-
50
tered into this test which can be considered recidivism = .57 (squared = .32).
1 2 3 4 5 @0@@ "predictor variables" and a single criterion We can see from the results in Table 7 the
Serlousness category
variable "parole revoked." The eight vari- general extent of fit, and those variables
ables are shown in Table 7. There is which seem to fit. Note that such variables
A
nothing magicai about the choice of the as "planned living arrangement" don't
criterion var%ble;except that we chose it to seem to load too heavily on this trait. One
a binary criterion than linear regression. be different from the other variables. We could use such schemes to make decisions
Also, it didn't seem that it would be that might just as well wish to predict one of the as to the importance of various kinds of in-
hard to improve on a method whose cross- other variables, so we included "parole formation. The variables chosen and their
validated accuracy only accounted for 7 revoked" as one of the "items" and judged scoring were taken precisely from the
percent of the variance. It should be noted how well it is described by the rest of the methodology Hoffman et al. developed.
that there is a severe restriction of range "test" by looking at its r.b,, with the total We were not given free access to all data,
~roblem.in that we should give - proper
. .
and so had to content ourselves to these.
'
credit to'parole boards for knowing some-
thing. hat is that they tend to keep in the Thus these preliminary results look prom-
really bad characters. The ones released are ising. Upon cross validation on a neutral
at the upper end of thedistribution and it is sample there was some shrinkage. Our best
therefore harder to discriminate among guess as to the amount of variance ac-
them. At a guess, I would think that we counted for on a neutral sample is between
psychometricians don't d o all that much
better; 1 don't know how much of the vari-
Figure 2.
Juvenile Offenders
seriousness
effects
'"
1 00
,'*" Hypothetical
.75
.50
1 2 3 4 5 6 7 8 B
Seriousness category
Table 7.
fit
Variable Difficulty Ann sq. '.his
Prior conviction 1.12 .61 .76
Age at first commitment -1.36 .63 .57
Prior Incarcerations -0.07 .65 .82
Parole revoked -0.83 .74 .57
Verified employment -0.23 1.05 .41
Grade claimed 0.88 1.06 .38
Auto theft -1.18 1.07 .33
Drug history -1.57 1.36 .20
Planned living arrangement 2.20 1.73 .lo
15 and 20 percent. A bit of an improvement, decade and contain a variety of useful in- will be useful and reliable. We know for
but nothing to write home about. formation. After a careful examination of sure that the reporting agencies will no
A careful analysis of fit indicated that the thing data,these I decided that the most valuable
1 could do with this forum would be
longer be anonymous.
model could be rejected, but what does it to issue a short warning on the use of these
then mean to say that there is a single un- data. Although these data have been de- Refeences
derlying dimension of "likelihood of recid- clared "reliable enough" by their original Bishop, Y . , P. Holland, and S. Fienberg (1975)
ivism?" We tried a variety of other schemes: Discrete multivariate analysis. Cambridge,
the most interesting one was using Krus- gatherers (Neithercutt et al. 1975), our best Mass.: M.I.T. Press.
kal's monotone analysis, which showed guess is that they are not. A number of Hoffman, P. B., and J. L. Beck (1974)
that the best monotonic transformation to "shoe-box" reliability studies were carried "Parole decision-making: A salient factor
additivity did not fit much better than the out in which a very small number of cases score." Journal of Criminal Justice 2: 195-206.
Rasch model. We conclude from this that were recoded, and the differences between
although the Rasch model doesn't fit, it their original coding and second coding Neithercutt, M. G., W. H. Moseley and
does about as well as any single factor were examined (n's in these were abdut E.A. Wenk (1975)
160). The following results obtained: the Uniform Parole Reports: A notional correc-
model. tional data system. Davis, Calif.: NCCD.
percent agreement between the two codings
Parole data-UPR for a seemingly foolproof variable like Rasch, G. (1960)
"ID#" was as low as 93 percent. This was Bobabilistic models for some intelliaenceand
The preceding analyses were done on Fed- called 'high"-I would call it embarrassing. attainment tests. copenhagen: ~anrnarksPaed-
eral parole data. There exists another data The worst variable (in terms of reliability of ogodiske Institut.
set, with longitudinal records running 3 coding) was "other prior sentences" which Torgerson, W. (1958)
years on very large samples. These are the averaged about 53 percent but for some Theory and methods ofscaling. New York:
Uniform Parole Reports data. These data agencies was as low as 27 percent. Thus if Wiley.
have been gathered by the National one were using such a variable in any pre- Tukey, J. W. (1977)
Council on Crime and Delinquency.2 diction scheme accuracy of prediction Exploratory data analysis. Reading, Mass.:
These data have been gathered for almost a would certainly suffer. Overall accuracy Addison-Wesley.
was 80 percent which included such (rela-
2~ubstantial improvements have been made in this tively) failsafe variables like "is he dead?"
program since this paper was prepared. For current
information, write to Dr. James L Galvin, NCCD, One agency got "sex" wrong 4 percent of
760 Market W t , Suite 433, San Francisco, California the time.
94102; telephone (415)956-5651.
There is great variability of accuracy across
reporting agencies. Sadly, the reporting
agencies are anonymous so you can't be
sure how good your data are. These prob-
lems are being corrected, and we have rea-
son to hope that in the future UPR data
Linear logistic msdeis ike parole
decisionmaking problem
KINLEYLARNTZ
School of Statistics
University of Minnesota
This paper considers the use of quantitative DeGostin (1974), are given in Table 1. The petition," and "completed at least 10th
aids in parole decisionmaking. Current guidelines for sentence length, also from grade.") The scale construction was based
practice employs a Burgess scale which Hoffman and DeGostin (1974), are given in on the analysis of data collected on 93 1 out
weights items equally and ignores theinter- Table 2. For information on the develop- of about 1500 individuals released from
val (or ordinal) quality of the data. We pro- ment and recommended use of these guide- Minnesota prisons in 1970 and 1971. The
pose logistic regression as an alternative lines, see Gottfredson, et al. (1974). data set was divided into a construction
statistical decisionmaking guide, and illus- group of 485 cases and a validation group
trate use of these techniques on data from Various states have also developed Salient of 446 cases. A number of regressions a s
the State of Minnesota. Also discussed are Factor Scores that apply to their respective well as Burgess scales were tried out before
prison populations. The Federal set of nine the final scale was selected. Note that the
the problems of selecting a few items from a items is not directly applicable because of
pool of many items for construction of the final Salient Factor Score was one of the
the substantial differences in state and best scales on both the construction and
scale. Federal crimes. In Minnesota the Parole validation samples. Thus, in fact, all 931
Decision-Making Project, headed by Dale cases played a role in selection of the final
1. Introduction Parent, developed a Salient Factor Score nine items.
for aiding in state parole decisions; see
A recent trend in parole decisionmaking In scale construction, each individual was
Parent and Mulcrone (1978). Table 3 gives
has been the use of objective scores, to be classified as a "success" if, in the 2-year
the nine items found to be important in
'calculated for each potential parolee, period following release, the individual was
Minnesota. (In later implementation of the
which attempt to estimate that individual's not convicted of a new felony. Low scores
scale, three items were deleted: "juvenile
chance of parole success. Specifically, a on the scale correspond to good prognosis;
commitment," "had a sustained juvenile
Federal Hearing Examiner is given a po- high scores to poor prognosis. Table 4 gives
tential parolee's Salient Factor Score the group failure rates for the pooled con-
which, along with the type of crime, struction and validation samples. Failure
provides guidelines for sentence length. rates range from a low of 13 percent t o a
The Salient Factor Score is the sum of re- high of 54 percent. In Minnesota the Sali-
sponses to nine items, seven of which are ent Factor Score is used, as in the Federal
scored 0 or 1, and the other two are scored system, in conjunction with a measure of
0, 1, o r 2. The items for the Salient Factor seriousness to aid in determining a release
Score, as reported by Hoffman and date.
ltem B
ltem C
Otherwise = 0
ltem D
Otherwise = 0
ltem E
Never had parole revoked or been committed for a new offense while on parole = 1
Otherwise = 0
ltem F
Otherwise = 0
ltern G
Otherwise = 0
ltem H
Verified employment (or full-time school attendance) for a total of at least 6
months during the last 2 years in the community = 1
Otherwise = 0
ltern I
Otherwise = 0
-
(including jail time) Adults _
Severity o f
offense
XI NO 0,
N o prior convictions -0.6450
Number o f prior parole/probation failures 2 or more 1 N o parole revocations -0.2344
x2 N o auto theft -0.2210
0.1 0
Number of prior incarcerations 1 or more 1 Plan to live with spouse -0.3852
0 0 Constant
Had a sustained juvenile petition YES 1
x3
x4 Age at first adult conviction
NO
19 or under
2OUP .
0
0
Estimated failure rate = -
e-2,7s''
e1.75:1
+
x, N0 0
No
Yes
+0.5396
+0.2344
Yes
No
+0.2210
-0.3852
+0.3852
X2 =call
(Observed - Expected)2
cells
Expected 9 (3.3)
Constant - -1.2675
Observed
* G2= 2 x (~bserved)log(-).(3.4)
all
Table 6. Weights and goodness-of-fit statistics for Minnesota logit models cells
Model Model
Model Model Model If the expected frequencies are large, it is
Variable
- I
-II
-Ill - Iv
-
-
v reasonable to assess goodness-of-fit by
comparing the calculated statistic with the
XI .68385 .66484
.78213 .82426 -
xz percentage points of a chi-squared distri-
x3
.89731
.23198
.97447
.26712
-
1.0480 -
1.0029 - bution with the appropriate degrees of free-
- -
x4 .I3693 .71692
-
.74209
- - dom. However, here the expected cell fre-
x5
xs
.56074
.65332
.54484
.66840
.67259 .65932
- quencies are small., In such a case, the
-
x7 .45491 1.6642
1.7314
- .54767
-
- Pearson statistic X- has a level near the
xs .07271
- .01055
- -
x4 x7
(2 df)
21
- I
.21955
-
II
.21645
-
Ill
.22982
-
v I
.22061
-
v
-
(2.81) (2.76) (3.17) (3.03)
zz -.I1502 -.16966 - - -
(-.go) (-1.30)
23
-.09425 -.lo352 -.00708 -.07426 -
(-2.97) (-3.20) (-3.49) (-3.36)
24 .09990 .09991 - - -
(.96) (.95)
2 s -1.3631
(-1.79)
-1.1829
(-1.55)
- - -
26
.00810 .01809 - - -
(.41) (.88)
27 - .61 760 - .6122 -
(2.53) (2.59)
216
-Model
Logit I
NOTE: PNF = gi
= .583 pF =
a = -344
Logit I I I
Logit IV
Burgess
Logistic 1
Logistic I I
Logistic I I I
Logistic I V
There are several possible techniques for viduals. Table 10 summarizes logit Model Model 1. The same is true for logit Models
checking the degree of validation for a pre- 1's performance in "parolingn 230 individ- I1 (Figure 2) and 111 (Figure 3). Thus, as
dictive scale. One standard method is to uals. Of the 230 lowest risk scores 187 be- expected, there is no gain in adding non-
separate the validation sample into several longed to nonfelons. T o measure how well significant variables to the logit model.
groups according to predicted risk and see the predictive scale separates the felon and Similarly, although the interaction term is
whether the proportions of felons and non- nonfelon groups calculate the difference of statistically significant, when we compare
felons differ in the groups. Ideally, the low the proportion of nonfelons assigned to the Figure 1 with Figure 2 and Figure 3 with
risk group would contain predominantly low risk group minus the proportion of Figure 4, the validation curves indicate that
nonfelons, while the high risk group would felons assigned to the low riskgroup. In the inclusion of the interaction term is helpful
contain predominantly felons. The statisti- example, for some values of p r ~ (0.2,0.4)
l while not
cal signifancance of the degree of separa- helpful for others (p1o.1= 0.4,0.6). The Bur-
tion of felons and nonfelons could be gess scale curve (Figure 5) is comparable to
evaluated using a chi-squared test. It the logit models and perhaps even a little
should be noted that this technique and higher, but it must be kept in mind that its
depends upon the nuhber of groups nine items were selected on the basis of the
formed as well as the actual groupings. D = 0.583 - 0.344 = 0.239. same construction and validation samples
Different group formation could yield Note the proportion "paroled" in this being used here, i.e., the full data.
different degrees of validation when sample was fixed at
applied to the samc data. The logistic models (Figures 6-9) are
clearly better when fewer variables are
For comparisons in this.paper we have included, i.e., logistic Models 111 and IV.
used the following method which has the Logistic Model 111 (the two-variable
advantages of (1) not depending upon any Now consider calculating D for each possi- equation) is particularly strong for p101=
arbitrary grouping of the validation ble "paroling strategy," i.e., for paroling 0.6, yielding the highest D value for any
.
sample, (2) allowing direct comparisons 1,2,3, . . ,445 individuals, or equivalently validation. However, it does not do as well
..
between different predictive scales, whether forplol = 1/446,2/446,3/446,. ,4451446. as other models for p101near 0 or 1. This
or not the scales actually calculate an esti- Figure 1 gives a graph of D vs.plo~for logit may be unimportant sincep101near 0 or 1
mated risk (the method requires only an Modell. The higher D is for a given value imply strategies of paroling few o r nearly
ordering of the risk), and (3) providing a of pltn, the better the predictive scale in all eligible prisoners.
natural graphical output illustrating the separating nonfelons from felons. In Although not improving greatly over the
degree of validation. Figure 1, the peak value of D is 0.2480. An
Burgess scale, the better logit and logistic
"ideal scale" would have a peak value of D
To illustrate the technique let us consider of 1.000. models do perform well on the validation'
logit Model I. For each individual in the sample. The two-variable logistic model
validation sample, calculate the estimated Figures 1-9 present graphs of Dvs.pror for did particularly well, especially considering
risk using the logit model weights given in 4 logit models, the patterns for all figures that these two variables were selected from
Table 6. Order the individuals from low to are the same, although the peak values of D a pool of only seven items. The nine items
high by this calculated risk. A good predic- occur at different values of p r ~ Table
. 11 in the Burgess scale were selected from a
tive scale would have a large proportion of gives the peak values of D and also the much larger pool, and since the same items
the nonfelons in the "parole" group, while average values of D (this corresponds to were used in the logit models, the logit
having a large proportion of the felons in the area under the curve) for the nine models' performances on the validation
the "nonparole" group. Now suppose, for scales. Logistic Model I11 hss the largest D sample should not be surprising. In both
example, that we were to "parole"230 indi- value, while the Corrections Department logit and logistic cases, restricting the
scale has the largest mean. model to include only "significant" varia-
bles improved the validation performance.
We now examine the individual figures
more closely. First, logit Model I (Figure 1)
and logit Model IV (Figure 4) are virtually
identical, except for the noise caused by the
four extra variables included in logit
6. Discussion
Figure 1. One aspect of the logit and logistic models Figure 5.
Validation - Logit I that has been ignored in the compari- Validation - Burgess Scale
D 0.3-
sons is the actual estimated risk value.
Does this estimated risk have a frequency
0 2. interpretation? T o answer this question, we
conducted a sampling experiment. Using
0.1. the 9,'s of the validation sample, Bernoulli
random variables were generated to ran-
domly assign an individual as a felon or
0.0 -
nonfelon with probability j, or 1 - j,,re-
spectively.1 Figures 10, 11, and 12 give
- 0 1 - I 1 ' I 3 I ' plots of D vs. plol for the Monte Carlo
0 0 0.2 04 06 08 10 runs on logit Model 1, logit Model IV, and
P TOT logistic Model 111. If the j,'s are good
I quantitative estimates of risk, the Monte
Carlo curves should look the same as the
original validation plots. The general
Figure 2. shapes in all three cases are fine, but the
Validation - Logit II values of Dm,, as given in Table 12 are
shifted for both logit models. This is un-
doubtedly due to the greater degree of
selection for the items comprising the logit
scales-and thus also for the Burgess scale
items. Note that the logistic Model 111
curve and Dm,, are quite similar to those
seen in Figure 8. Thus, when a great deal of
selection occurs as in the Burgess scale
constructio~,the usual construction-vali-
dation splitting is not enough. Double
-01-
00
. 0,2 1 ,
04
, ,
06
, ,
08
,
10
cross-validation (Mosteller and Tukey
1977) consisting of using separate samples
P TOT
for (1) choosing items, (2) estimating co-
efficients, and (3) testing the scale likely
would have reduced the overall effects of
selection.
Figure 3.
The practical implications of thedata anal- Figure 7.
-01 , , , , , , , , a
00 02 04 06 08 10
PTOT
i
References
Figure 8. Cox, D. R. (1970) Figure 10.
Validation - Logistic Ill The analysis of binary data. London:
Methuen.
Monte Carlo - Logit I
0 03
Dempster, A. P., N. M. Laird, and
D. B. Rubin (1977)
0 2- "Maximum likelihood from incomplete data
via the EM algorithm." Journal of the Royal
0 1-
Staristical Society 39: 1-38.
Efron, B. (1978)
"Regression and ANOVA with zero-one data:
0.0 - Measures of residual variation." Journal of the
American Statistical Associarion 73: 113-121.
-01 n , n , 8 , 7 , .
Fienberg, S. E. (1977)
00 02 04 06 08 10 00 0.2 04 0.6 0.8 1.0
The analysis of cross-classfled categorical
PTOT data. Cambridge, Mass.: M.I.T. Press. P TOT
4
06
. , .
0.8 10
research and its presentation. The University of decisionmaking guidelines in Minnesota." In
Minnesota Computer Center provided a grant D. M. Gottfredson, C. A. Cosgrove, L. T. Wil- PTOT
for computing costs. Special thanksare owed to kins, J. Wallenstein, and C. Rauh, Class~pcation
Dale Parent, Minnesota Department of Correc- for parole decision policy, Washington, D.C.:
tions, who provided the raw data and was par- U.S. Government Printing Office.
ticularly helpful in clarifying the coding pro- Press, S. J. and S. Wilson (1978) Table 12. Maximum D for Monte Carlo
cedures. "Choosing between logistic regression and samples from three predictive scales
discriminant analysis." Journal of the American
Staristical Association 73:699-705. Monte Carlo Validation
Solomon, H. (1976)
"Parole outcome: A multidimensional con-
-Model
Logit I .3885
-Dmax
.2480
tingency table analysis." Journal of Research in Logit I V .4072 .2729
Crime and Delinquency (July) 107-126. Logistic 1 11 .3075 .2844
The effects of plea bargaining
on the disposition of person and property
crimes: A research note
DAVIDW. BRITT
Criminal Justice Program
Nova University
KINLEYIARNTZ
Department of Applied Statistics
University of Minnesota
Many of the studies which have examined common experience-let alone the alterna- the various points in the process and if the
the impact of offender and offense charac- tive paradigms for viewing the operation of outcomes a t one stage had no independent
teristics on sentence severity have been mis- the criminal justice system. For example, a bearing on the operation of these factors a t
specified because they have ignored (or recent analysis of the construction of judi- a later stage. Unfortunately, such assump-
tried to hold constant) events such as pre- cia1 decisions has observed that for a tions appear to be invalid. Consequently,
trial plea bargaining which took placeat an sample of judges having flexible attitudes many of the studies which have examined
earlier stage in the process but which have a toward law and order, blacks and those the impact of offender and offense charac-
critical bearing on the outcome of sentenc- with larger numbers of current charges teristics on sentence severity have been
ing decisions. Our approach to the analysis were more likely to receive short sentences misspecified because they have ignored (or
of these phenomena is similar to the than whites and those with smaller num- tried to hold constant) events, such a s pre-
exploratory study by Burke and Turk bers of current charges (Hagen 1975:379). trial plea bargaining, which took place a t
(1975)in that we are considering a sample Such results are at odds both with an earlier stage in the process but which
of all post-arrest dispositions. Our study conceptions of the criminal justice system have a critical bearing on the outcome of
differs from theirs in that we attempt to which stress a bias against the dis- sentencing decisions.
include the impact of plea bargaining on advantaged andconceptions whichempha-
subsequent sentencing decisions. size offense characteristics. ~t is apparent A thorough review of the entire
that models of post-arrest disposition have justice process as it isaffected by character-
omitted variables which are crucial to an istics of the offender, the offense, and
THE TESTING OF WHAT PASSES for understanding of the dynamics of the dis- in the structure at different points
conventional wisdom often leads to position process, and it is these specifics- is beyond the of this paper. Suffice it
conclusions which are apparently para- tion errors which have resulted in some of that the works On sentence
doxical. Such is the case for recent the paradoxical results observed in recent length tHagen 1975; Burke and Turk 1975;
attempts to structure and analyze the bias studies. Tiffany et al. 1975, for example) have been
in criminal justice systems. As Burke and unable to come up with plausible interpre-
Turk (1975:313) have Faced with the problem of disentangling tations for what appear to be bizarre
the the serial processes which un&rlie the patterns in the operation of offender
conventional wisdom of criminology has
held that the socially disadvantaged are processing of ''criminals" within the characteristics (race, sex, age, prior convic-
more likely than the advantaged to be criminal justice System, n~uch current tions), characteristics of the offense (sever-'
engaged by the criminal justice system, to research has sought to simplify the task by ity of offense, number of current charges)
be prosecuted, tried, convicted, and to examining discrete aspects of this Process and system characteristics (type of counsel,
suffer more severe upon convic- as a first step in the ultimate integration of bench vs. jury trial). What is missing from
tion. Yet the findings of empirical analyses these separate analyses. Such an attack on all of these studies is some notion of the
have been both ambiguous and occasion- the problem would be reasonable if the operation of pre-trial plea bargaining on
ally at odds with the received wisdom of Same set of factors affected dispositions at the outcome of the sentencing decision.
Some of thesestudies (Hagen 1975; Tiffany
et al. 1975) have sought to minimize the
Table 1. Results of testing the hypothesis that the variable is independent of incarceration influence of pre-trial factors by limiting the
given seriousness and type of crime. sample of cases processed by the system to
those above a minimum level of seriousness
Variable -df - G~ - x2 - T~ P-value(xz ) which have reached trial. Since fewer than
Sex 6 13.31 9.23 11.66 .25> p>.10 10 percent of the initial cases reach trial in
Race 8 8.65 7.40 7.56 p>.25 most jurisdictions (Blumberg 1967; Heis-
Plea 15 30.58 24.48 27.01 .lo> p>.05 mann 1975), and since cases which reach
Charge 10 25.03 20.38 21.81 .05> p>.025 trial are biased in that they have rejected
No. initial charges , 7 2.61 2.70 2.66 p>.25 the plea-bargaining alternative (Tiffany et
No. convicted charges 6 6.96 4.77 5.82 p>.25 al. 1975), this would seem to be an unac-
NO. previous arrests 9 32.23 28.31 29.31 p<.005 ceptable way of controlling the influence of
Felony convictions 10 41.08 35.43 41.88 p<.005 pre-trial factors.
Employment status 8 8.22 7.69 7.28 p> .25 Our approach to the analysis of these phe-
Resisting arrest 8 12.44 10.99 10.80 .25> p>.IO nomena is similar to the exploratory study
Weapon usage 7 10.84 8.32 9.03 p>.25 by Burke and Turk (1975) in that we are
Table 2. 138 Criminal sentences classified by type of crime, seriousness of charge plea, change i n charge, previous record
and incarceration
Type of crime,
seriousness and
change Plea
Good
Previous record
No jail Jail
Fair
previous record
No jail Jail
Poor
previous record
No jail Jail
5
1
Person, Guilty 1 3 2
n o change Nolo contendere 2 2 0
o f charge Not guilty 0 0 0
Person, Guilty
charge Nolo contendere
changed Not guilty
Property, Guilty
l o w seriousness, Nolo contendere
N o change o f charge Not guilty
Property, Guilty
l o w seriousness, Nolo contendere
charge changed Not guilty
Property, Guilty
moderate seriousness, Nolo contendere
no change o f charge Not guilty
Property, Guilty
moderate seriousness, Nolo contendere
charge changed Not guilty
Propeny, Guilty
serious crime, Nolo contendere
no change o f charge Not guilty
Property, Guilty
serious crime, Nolo contendere
charge changed Not guilty
Property. Guilty
very serious crime, Nolo contendere
no change o f charge Not guilty
Property, Guilty 0 2
very serious crime, Nolo contendere 1
charge changed Not guilty 0
considering a sample of all post-arrest dis- charge the same as the initial charge or was Analysis and results
positions. Our study differs from theirs in there some reduction in charge?
that we are attempting to include the (6) Number of initial charges.
With the number of variables that we
impact of plea bargaining on subsequent ( 7 ) Number of convicted charges. deemed important to consider and the rela-
sentencing decisions. tively small sample size, we opted to make
( 8 ) Number of previous arrests: Low (0, an initial pass through the data toselect the
1, 2) or high (3 or more). most important factors. Our review of the
Data (9) Number of adult.felony convictions: literature showed that seriousness of
Low (0) or high (1 or more). charge and type of crime were both impor-
Two hundred sample cases were selected (10) Employment status: Was the indi-
from the Denver, Colorado, courts under tant factors in explaining the number of
vidual employed or unemployed at the time individuals jailed. To decide which of the
the auspices of State Courts Sentencing of the offense?
Project. Sixty-two of these cases were other variables to include, each variable
(I 1) Type of crime: (a) Against prop- was tested to see if the hypothesis of condi-
eliminated from this sample: 5 because of erty, (b) against person but at most slight
inadequate data and 57 because of their tional (given seriousness and type of crime)
injury, or (c) against person with serious independence between the variables and
being so-called "victimless" crimes. The injury.
remaining 138 cases were analyzed to incarceration was plausible. The chi-'
(12) Resisting arrest: Did the individual square statistics and p-values for these tests
determine the major factors used by judges resist arrest?
in reaching the decision of whether or not are given in Table 1. The four variables
(13) Weapon usage: Did the crime yielding the lowest p-values were selected
to incarcerate an individual convicted of a involve use of a weapon?
criminal offense. Thirteen variables were for further analysis.
initially considered as possible factors: The dependent variable was incarceration, In the initial data analysis it became clear
(1) Sex. i.e., whether or not the individual was sent that sentences for crimes against property
(2) Race: White, other. to jail by the judge. had a different structure compared to sen-
(3) Plea: Guilty, nolo contendere, or not tences for crimes against persons. To deal
guilty. with this structural dissimilarity, the anal-
(4) Seriousness of charge: Low, moder- ysis was split into two parts: crimes against
ate, serious,or very serious. property and crimes against persons. Table
( 5 ) Change in charge: 1s the convicted 2 gives the data as used in the final analysis.
I Table 3. Results o f logit m o w fittings for crimes against property
Of those who either chose or were not
allowed to enter into plea bargaining (at
1 Variables included in modal df G2 X2 TZ I least with respect to an exchange of charge
reduction for a plea of guilty), those who
Previous record, plea, charge seriousness 30 23.00 21.49 17.79 pleaded guilty had the highest chance of
Previous record, plea, charge 33 29.79 22.97 23.91
Previous record, plea, seriousness 31 23.14 21.56 18.09 going to jail (78 percent). Those who were
Previous record, charge, seriousness 32 23.02 21.57 17.75 able to plead nolo contendere had only a 39
Plea, charge, seriousness 32 57.59 49.33 46.21
Previous record, plea 34 31.11 24.21 25.35 percent chance of going to jail. Pleading
Previous record, charge 35 29.94 23.17 24.03 guilty was associated with a 50 percent
Previous record, seriousness 33 23.20 21.56 18.11 chance of going to jail. These figures are
Plea, charge 35 67.1 1 57.24 54.73
Plea, seriousness 33 57.59 49.28 46.25 dramatically altered by the apparent
Charge, seriousness 34 63.00 51.19 52.23 exchange of plea for charge reduction. For
Previous record 36 31.12 24.22 25.35
Plea 36 68.07 57.14 55.97 those who plead guilty with a reduced
Charge 37 70.74 55.28 59.60 charge, the chances of being incarcerated
Seriousness 35 63.61 51.73 53.06
None 38 73.40 56.59 62.89 drop from 78 percent to 48 percent. A sim-
ilar drop in incarceration chances is noted
* x 2 = C (Obs- EX^)' /Exp for those pleading nolo contendere: from
T' = C ( J U E +JVDS + 1- J4 t x p + n2 39 percent to 14 percent.'
G 2 = 2 C Obs loge (Obs/Exp)
When cell expectations are small, as they are in our examples, we examine all three chi- Discussion and conclusions
square statistics t o evaluate the model fit (Larntz, 1975).
Dispositions of crimes against property
--
appear to be related to variation in the seri-
I Table 4. Results of logit model fitting for crimes against persons
ousness of the crime and the offender's pre-
vious record in a relatively straightforward
I Variables included In model df G2 X2 T2 1 way. As the crime becomes more serious
Previous record, charge, plea 7 13.82 and the offender's previous record becomes
Previous record and charge 9 19.90 poorer, the chances of the individual's
Previous record, and plea , 8 18.41
Charge and plea 9 13.96 being incarcerated increase. Interestingly,
Previous record only 10 24.54 as long as the previous record of the indi-
Charge only 11 20.84 vidual has not involved more than two
Plea only 10 18.47
None 12 25.13 arrests and no adult felonv convictions.
Record x plea + charge 3 12.15 there seems to be a bias against sending thd
Record x charge + plea 5 10.17
Charge x plea + record 6 12.77 individual to iail-no matter how serious
Charge x plea only 8 12.90 the present droperty crime is. Once the
-- -
individual has been arrested more than
*See footnote for Table 3
I
twice previously, or has had a previous
felony conviction, his chances of being
Note tnat crlmes against ~ e r s o n were
s not and previous record-with the latter play- incarcerated for the present offense esca-
classified by seriousness: this was because ing a more important role-provides an late rapidly. But this appears to be the only
almost all of these crimes were classified as adequate fit to the data. Table 5 gives the bias in the property-crime dispositions, for
serious offenses. Also number of previous estimated percentage incarcerated based neither characteristics of the offender (sex,
arrests and felony convictions were com- on these two variables. Those with poor race, employment status) nor his pleas or
bined into a new variable, previous record. records who have been convicted of a very charge reductions appear to directly affect
A "poor" previous record meant the indi- serious crime have roughly a 95 percent the decisionmaking process.
vidual had one or more adult felony chance of being incarcerated. The impact These results for property crimes overlap
convictions. A "fair" record resulted from of previous record on incarceration' substantially with those of Burkeand Turk
at least three previous arrests but no felony chances may be better appreciated by (1975:326), who noted that the effect of
convictions. An individual had a "good" examining two other cells in Table 5. Even previous incarceration on disposition
record if there were at most two recorded if the seriousness of the present crime was severity remained important even after
arrests with no adult felony convictions. quite low, if the prior record of the con- controlling for the nature of the offense.*
victed defendant was poor, he/she had They argued that such a pattern increased
The procedure for analyzing the data in almost a 60 percent chance of going to jail.
Table 2 was to find the logit variant (Dyke the tenability of an explanation based on
But if the prior record of thedefendant was ex-convicts' "vulnerability to the biases of
and Patterson 1952, Goodman 1970)of the good, he/she had only negligible chance of
loglinear model (Bishop, Fienberg, and legal control agents" and initiated an
going to jail no matter how serious the argument based on the presumed greater
Holland 1975; Haberman 1974) that pro- present crime.
vided the closest fit to the data. "propensity of ex-convicts for relatively
For crimes against persons, where almost serious crimes." In other words, even
Table 3 presents the results for the models all crimes were categorized as being though there may be an association
fit the property crime sentences*and serious, the logit model also includes just between prior record and offense seri-
Table 4 similarly presents the results for the two variables: change and Table
person crime sentences. BYexamining the the estimated incarceration rates for 'We should note here that the length of sentence has not
significance of the overall goodness-of-fit been taken into consideration. Hence, while these data
crimes. suggest a rationalstrategy of pledgingnolocontendere
chi-sauares as well as the differences be-
or of guilty if the plea bargainingoptioni s unavailable,
tween' the chi-square statistics when one a different pattern might have emerged had we been
model is a submodel of the other, infer- able to take length of sentence into account.
ences may be drawn as to the major factors ?Burkeand Turk (1975) found that agealso directly af-
influencing the incarceration decision. fected the dispositional process, although the impact
of age was complica~edand not amenable to
For crimes against property, the logit nonspecu~ative.plausible explanation.
model including only seriousness of'charge
-
ual's contact with the criminal justice
Table 5. Estimated percentage incarcerated for crimes against property system has become frequent a n d / o r
Seriousness of charge felonious.
Low Moderate Serious Very serious T o argue that offender characteristics (sex,
race, previous record) d o not have a direct
Good O (12) (13) O (5) O (1) impact on incarceration rates for crimes
Prior against persons does not mean that they are
i record Fair 21 (9) 27 (3) 48 (6) 82 (5)
Poor not involved in the dispositional process.
58 (7) 66 (15) 83 (5) 96 (3) It's quite possible that a defendant's prior
Note: Estimated percentages are calculated from logit model:
record, in conjunction with other indica-
P..
tors of his recidivism chances and the solid-
log L = p + a i + p . ness of the state's case against him, set
1-p..
11
1
of punishment
Jack Gibbs' paper, "Crime, Punishment, studies of the effects of law enforcement
and Deterrence," has been widely cited as activity on crime rates have gone consider-
where C is the crime rate; E represents eti-
a n important part of an accumulating body ably beyond these studies in terms of theo-
ological factors, that is, "extralegal condi-
of evidence which consistently demon- retical specifications and estimation proce-
tions which are conducive to crime . . ."
strates a negative relationship between dures. Nevertheless the estimates of
(Gibbs 1968517); and R represents repres-
crime rates and the certainty and severity of deterrence effects from these early studies sive factors, that is "aspects of reaction t o
punishment. In this paper we providea new
set of estimates of the effects of the
continue to be cited in current discussions
as part of a n accumulating body of evi-
crime which operate as deterrents .." .
certainty and severity of punishment on (Gibbs 1968:517). However, his actual
dence supporting the existence of general
homicide rates. The estimates are derived investigation of homicide rates fails t o
deterrence effects. In this paper we provide
using a structural model of violent crime include any etiological factors. He esti-
a new set of estimates using a model which
which was developed independently of mates the relationship between the two
was specified independently of Gibbs'
Gibbs' research. When the effects of the repressive factors and homicide rates while
research, and which includes a much larger
other variables in the model are taken into ignoring etiological factors. The two
number of etiological (or environmental)
account, the estimated effects of the repressive factors specified in the study are:
variables than d o any of the other deter-
punishment variables are very small. The (1) Estimated severity of sentence re-
rence studies. When the effects of these
data are consistent with a model in which ceived and served for criminal homicide,
etiological variables have been removed
certainty and severity of punishment have which he measured with the median
from Gibbs' measures of the certainty and
months served on a homicide sentence by
no effects on homicide rates. severity of punishment, the estimated ef-
persons in a state prison on December 3 1,
fects of the punishment variables are very
Background 1960 (Gibbs 1968:520-521).
small and provide reason to question
(2) Estimated certainty of imprison-
In 1968 Jack Gibbs presented the results of whether the data provide any support for ment for criminal homicide, which he
a n influential study of the effects of cer- real effects of certainty and severity of pun- measured as the number of persons
tainty and severity of punishment on ishment o n homicide rates. admitted to state prisons in 1960ona hom-
murder rates in American states. While he Before presenting the new estimates it will icide sentence, divided by the average
was appropriately cautious in interpreting be useful to briefly review the results of the number of criminal homicides reported by
his estimates as doing no more than chal- other studies of Gibbs' data. Gibbs' origi- the police in 1959 and 1960. The dependent
lenging the "common assertion that no nal paper specifies the following general variable is the average annual criminal
evidence exists of a relationship between model for crime rates: homicide rate per 100,000 population for
legal reactions to crime and the crime rate" 1959 t o 1961.1
(Gibbs 1968529-530), subsequent discus-
sions have interpreted his study as provid- Gibbs'statistical analysis is done with con-
ing support for deterrence effects (see, for tingency tables by dividing each distribu-
example, Tullock 1974:107, Tittle and tion at the median. From this analysis, he,
Logan 1973, Antunes and Hunt 1973, concludes that both certainty and severity
Tittle 1975). Gray and Martin (1969) and of punishment are negatively related t o
Bean and Cushing (1971) reanalyzed state homicide rates.
Gibbs' data, with slight modifications in 'New Jersey's values for certainty and severity were
statistical procedures and theoretical mod- estimated from the average of New York and
el, and concluded that the data are consist- Connecticut.
ent with a model which includes direct
negative effects of certainty and severity of
punishment on murder rates. More recent
New estimates of certainty
Table 1. Selected results o f previous analyses o f Gibbs' Data and severity of punishment
on homicide rates
Gray and Martin ( 1 9 6 9 )
Sociological theories of homicide, though
not incompatible with utilitarian formula-
tions which characterize most deterrence
studies, suggest that homicide is an
extreme manifestation of the "culture of
violence" which is generated by high levels
of personal frustration and extreme socio-
economic deprivation (Wolfgang 1958,
Bean and Cushing ( 1 9 7 1 ) Wolfgang and Ferracuti 1967, - ~ r e a r l ~
A 1932, Coser 1967). Some crimes of violence
(1) H =_Po -.289 P(I) -.374 T +u may be incidental to participation in other
p/sp = (-2.1 9 ) (-2.84) forms of illegal activity, but most homi-
R' = .218 cides are known to occur among friends,
A family, and acquaintances and are not by-
(2) H_,=
! - . I 9 6 P ( I )-2.05 T + . 7 1 7 R + u products of other crimes (Wolfgang 1958,
@/Sflo = (-2.39) (-2.33) ( 8 . 3 1 ) 1968). They are likely to be acts of passion
13' = 5 9 6 that grow out of high levels of frustration
A and subcultural reinforcement of interper-
(3) ~ = p , _ - . I 7 9 ~ ( 1 ) -. I 6 7 T + . 7 7 B + u sonal violence.
B/spO = (-22.38) (-2.16) (9.87)
A previous study by Loftin and Hill,
R2 = .751
drawing on studies done by Gastil (1971)
Notes: The regression coefficients are for varialrles in standard form, that is, t h e y are which is derived from sociocultural expla-
beta weights. H = homicide rate, P(I) = probability of imprisonment (Gibbs'
measure of certainty of punishment), T = median t i m e served (Gibbs' measure nations of homicide rates. The key element
o f severity), R = region (South is coded I , nonsouth is coded 0 ) . and B = percent in this model is a six-variable index
o f population black. Gray and Martin d o n o t provide estimates o f standard
errors or t values. Their coefficient for P ( I ) in equation appears to b e a n error. referred to as an index of "structural
Our o w n analysis is consistent with Bean and Cushing's results. poverty" which redundantly measures the
-proportion of a state's population at the
extremely low end of the socioeconomic
Gray and art in (1969) extended Gibbs' substitute "percent of the population that is class distribution. The components of that
study by investigating several different black" for "region" in their model and find index are:
forms of the relationships between certain that the proportion of the variance (1) Infant Mortality Rate (Grove and
ty, severity, and homicide in an ordinary "uniquely accounted for by the etiological
Hetzel 1968: Table 41).
least squares regression analysis. Table 1 factors" increased, and thus that the data
(2) Percent of persons 25 years old and
summarizes the major elements of their are consistent with the hypothesis that the years of school
over with less than
analysis which led them to conclude that etiological significance of region is due to
(Renetzky and Greene 1970:38).
the data are consistent with a model in percent black (Bean and Cushing 1971: (3) Percent of families with income
which certainty and severity of punishment 288). under $1,000 (U.S. Bureau of the Census
Operate in a nonadditive way reduce the Other studies which have estimated deter- 1964a:Table 137).
homicide rate (Gray and 19P9: rence effects for homicide, but which use (4) Percent of the population illiterate
394-395). Note that their invest1gat10n9'Ike data different from Gibbs, include Tittle (Greene and Renetzky 1970:38).
Gibbs'3 derived estimates of certainty and (1969), Chiricos and Waldo (1970), Antunes (5) Armed Forces Mental Test Failures
severity effects under the assump- and Hunt (1973), Logan (1972, 1975), (August 1958-December 1965) (American
that can be knored' Bailey, Martin, and Gray (1974). All of Education 1966:9).
That etiological factors were these studies, except Logan (1975), esti- (6) Percent of children living with one
included in the estimated model. mate significant negative deterrence ef- parent (U.S. Bureau of the Census
Bean and Cushing (1971) recognized thk fects, but none of them includes more than 1964b368).
importance of specifying a model which one variable to represent etiologicalfactors These variables account for 87 percent of
allows for etiological as well as repressive and most of them do not include any etio- the variance in 1959-1961 mean homicide
factors, but the models that they investi- logical variables. The major exception to rates in Loftin and Hill's analysis.'
gated included only one etiological vari- this generalization is Ehrlich (1973, 1975), Hill,s homicide rate is based on the U.S.
able at a time. They found that when a who reports several investigations of the Vital Statistics rather than on the uniform Crime
variable representing region (South versus effects of law enforcement variables On Report and thus is slightly different from Gibbs'
Nonsouth) was included in a linear specifi- homicide rates, all of which use models homicide rate. See Loftin and Hi11 (1974:718 and 720)
between the two
cation (see Table 1 above), the estimates of which take into account more than one eti-
the certainty and severity effects were ological factor, and allow for simultaneous
fP,',"??~~",$Si$~~~
reduced, but that they were still large relationships between crime rates and law
enough to be "consistent with the deter- enforcement variables. His results are
rence hypothesis" (Bean and Cushing consistent with most other studies in that
1971:289). Also they conclude that the his deterrence variables are negatively and
linear specification which included region significantly associated with homicide
was as adequate as alternative nonlinear rates.2
'pecifications of the they -cent evaluations of Ehrlich's findings raise
serious questions about the sensitivity of his results to
minor changes in the model (see, for example, Bowers
and Pierce 1975).
probability of arrest and prosecution de-
I Table 2. Correlations between Gibbs' measures of the homicide rate, the certainty of
punishment, the severity of punishment and the six components of the
Loftin-Hill Index
(ILLIT)
parole boards adjust sentences on the basis
Armed forces mental test failures
provements over direct ordinary least 1 T a b l e 3. Ordinary least s q u a r e s estimates of m o d e l s which include o n l y c e r t a i n t y a n d
square estimates unless sample size is large 1 severity of p u n i s h m e n t
(Namboodiri et al. 1975517). there seems I
A. Linear m o d e l H = Po + P1 P(l) + P2 T+u
to be no strong reason for expecting that
simultaneous estimates will be superior to p^ pis;
direct estimates. Certainty -.07036 -2.19053
Severity -.062 -2.83778
Table 3 presents our estimate for two mod- Constant -14.93599
els which contain only Gibbs' repressive 3 = .20144
factors. In both the linear and the multi-
plicative forms the estimates of the effects
of certainty and severity of punishment are B. Multiplicative model H = fl0P(I)" TP2 e"
negative and greater than twice their stand-
ard errors.-he d-statistic in Table 3 pro-
vides a means of comparing the goodness I n Certainty
of fit of the two models in terms of the 1n Severity
residual sums of squares.' The multiplic-
ative form clearly fits better than the linear
-
Constant
R2 = .36509
form; the residual sum of squares for the
transformed linear model is almost twice as
large as the multiplicative model, and the C. Comparison o n linear a n d multiplicative m o d e l s
d-statistic is significant at well beyond the d = 13.35339
0.01 level. All of this is consistent with pre-
vious analyses of the data and is presented
here as a basis of comparison with the esti-
mate derived from the more complete T a b l e 4. Ordinary least s q u a r e s estimates of models w h i c h include certainty a n d s e v e r i t y
forms of the model. of p u n i s h m e n t along w i t h c o m p o n e n t s of t h e Loftin-Hill I n d e x
-
Estimates from linear and multiplicative A. Linear model P(1) IMR
forms of a model which includes the six
components of the index used by Loftin p^ cs;
and Hill along with Gibbs' repressive fac- Certainty -.01906 -1.112
Severity 7.01340 -1.085
tors are presented in Table 4. In the linear IMR .31587 3.384
form of the model the adjusted coefficient ' LOWED .84948 2.790
of determination8 increases from 0.20 to ILLIT -2.34584 -2.812
LOWINC -.I8781 -1.380
0.83 when the index variables are added to TESTFAIL -.00557 w.095
the model; in the multiplicative form the ONEPARENT .49 1 6 4 2.153
increase is from 0.37 to 0.78. More impor-
tant, however, for present purposes is the
-
(Constant)
R2 = .83248
-6.84304
(Constant)
R2 .78210
=
-5.021 7 0
twice their standard errors. In the multi- severity effect, we have examined the good-
= 21In-Sei+'I plicative form the estimated effect of cer- ness of fit for the two forms in some detail.
\'ef2
tainty falls from -0.852 to -0.256 and the The d-statistic indicates that although the
The error sum of squares for the linear model is desig- estimated effect of severity from -1.269 to multiplicative form has a smaller residual
nated Sef' and S e f y o r the multiplicative model. See sum of squares (5.645 as opposed to 6.019
Rao and Miller (1971:107-1 I I) for a discussion of the
-0.540; only the severity estimate is more
procedure. than twice its standard error. Since the two for the linear specification), the difference
T h e adjusted coefficient is defined as forms of the model lead to different con- is not significant at the 0.05 level. More-
clusions about the importance of the over, a plot of the residuals against the
expected normal order statistics shows that
there is one extremely deviant value for the
where N is the total observations and k is the number multiplicative specification (the case is
of parameters estimated, including the constant term.
Rhode Island) and there is a noticeable
deviation from a linear relationship near
the lower end of the plot. Since there is no Table 5. Ordinary least squares estimates of models which include certainty and severity
compelling theoretical reason for selecting of punishment and all of the Etiological variables
the multiplicative specification and since A. LinearModel H=@o+PIP(I)+P2T+P31MR+ . . . flI4GINI+~
there is evidence that the linear model fits
the data a t least as well as if not better than
the logarithmic model, we are inclined to
Certainty
-
p^
-.02276
pjs;
-1.556
select the linear form as the better specifica- Severity .00397 .349
tion. Howevcr, as the next segment of our IMR ,18016 1.789
LOWED .34358 1.151
analysis will demonstrate, the choice ILLIT -1.60651 -1.921
between the linear and logarithmic specifi- LOWINC -.05938 -.319
cations becomes less important in assessing TESTFAIL .03874 .631
ONEPARENT .30235 1.495
the importance of the punishment vari- NONWHITE .03865 .694
ables when the other variables in the homi- RURAL -.01734 -.568
AGE .60985 2.561
cide model are introduced. HOSPBEDS -.00203 -1.81 1
REGION -1.85923 -2.182
In the analysis described in Table 5 we add GIN1 ,01676 .960
the remaining six variables in the homicide (Constant) -14.93599
model. With the exception of the estima- -
Fi2 = .89166
tion of the certainty effect in the linear
Eel = 3.30905
specification, which remains essentially the
same, the estimated effects of the punish- B. Multiplicative Model H = POP(I)' I T ~ ~ I M R ~ ~.
.GIN1
. '14eu
ment variables are reduced still further,
and in n o case are the estimates of punish- p^ ;SI ;
ment effects greater than twice their Ln Certainty -.I8257 -1.126
Ln Severity -.00721 p.032
standard errors. Moreover, in the linear Ln IMR .73758 1.206
specification the estimate of the effect of Ln LOWED -.06035 -.077
severity of punishment has changed its sign Ln l L L l T ,48048 -. 798
Ln LOWINC -.05027 -.I34
from negative to positive. Ln TESTFAI L ,17835 .787
Ln ONEPARENT 1.12196 2.757
Since both forms of the model lead to the Ln NONWHITE .31237 3.532
same general conclusions about the signif- Ln RURAL .I7588 .810
Ln AGE 2.31 579 2.179
icance of the punishment variables, the Ln HOSPBEDS p.38872 -1.404
selection between the linear and the multi- REGION -.03707 -.I95
Ln GlNl 1.20806 .492
plicative forms is less important than it
appeared to be in the earlier specification -
(Constant)
R ~ .=86442
-15.37168
.857
components of the index are introduced. In Ln Severity -.I8916 1.035
Ln IMR 1.32200 2.381
a step-wise analysis of the multiplicative Ln LOWED .04173 .055
specification, percent nonwhite entered on Ln I L L I T -.54782 1.063
the first step after the punishment variables Ln LOWINC .07524 .361
Ln TESTFAIL .09962 .453
and the six components of the.index had Ln ONEPARENT 1.24587 3.187
been entered. At that point the estimated Ln NONWHITE .33250 4.344
severity effect is less than twice its standard -
(Constant) -5.20431
error and remains there until all the vari- R~ = .85067
ables in the model have entered (see Table
6).
The 12 eriological variables in the model the multiplicative specification three meet
also generally have small estimated effects; this criterion (percent of children living
only two estimates are greater than twice with one parent, percent of population liv-
their standard error in t h e h e a r specifics- ing in rural territory, and percent age 20 t o
tion (percent age 20 to 34, and region); for 34). However, this is to be expected given
the fact that the 12 e~iologicalvariables,t o
a very large degree, reflect a single socio-
economic dimension and thus represent
redundant indexes which divide up the
socioeconomic variance among themselves
References
Table 7. Coefficients of determination ( R ~for
) regression of each independent variable American Education (1966)
on the set of other independent variables 2: no. 9. Washington: U.S. Office of
Variable taken Coefficient of determination Education.
as dependent R2
Antunes, George E., and A. Lee Hunt (1973)
IMR .85667 "The impact of certainty and severity of pun-
LOWED .98837 ishment on levels of crime in American states:
ILLIT .98011 An extended analysis." Journalof Criminal Law
LOWINC .94671
TESTFAI L .95816 and Criminology 64:486493.
ONEPARENT .89702
NONWHITE .9 1490 Bean, Frank, and R. Cushing (1971)
RURAL .79563 "Criminal homicide, punishment, and deter-
AGE .60534 rence: Methodological and substantive recon-
HOSPBEDS .49285 siderations." Social Science Quarterly 52:
REGION .79129
GIN1 .88510 277-289.
CERTAINTY .34090 Bowers, William J., and Glenn L. Pierce (1975)
SEVERITY .48702
"Deterrence, brutalization, or nonsense: A
critique of Isaac Ehrlich's research on capital
punishment." Unpublished manuscript.
resulting in small estimates of independent rejection or acceptance of the deterrence
effects. The etiological factors are included doctrine." (Gibbs 1975:l) We d o not Brearly, H. C. (1932)
to purge the punishment variables of their attempt to discuss these problems here. Homicide in the United States. Chapel Hill:
dependence on etiological factors so that Excellent discussions are available else- University of North Carolina Press.
their independent effects could be more where (Gibbs 1975, Nagin 1975, Greenberg Chiricos, Theodore G., and Gordon P. Waldo
clearly evaluated; thus the size of individ- 1975). Our objective has simply been to (1970)
ual eriological effects is not important for demonstrate that the application of reason- "Punishment and crime: An examination of
present purposes. able statistical estimation procedures t o a some empirical evidence." Social Problems
18:200-217.
model that adequately controls for socio-
The pattern of high multicollinearity Coser, Lewis A. (1967)
cultural variables can provide evidence
among the 12 eliological factors can be "Violence and social structure." In Continu-
that is quite different from that provided by
seen in Table 7 where the coefficient of ities in the study of social conflict (Lewis Coser,
previous analyses of Gibbs' data.
determination has been calculated from the ed.), New York: Free Press, pp. 55-71.
regression of each independent variable on Dye, Thomas R. (1969)
the set of other (k-1) independent variables. A cknow~ledgments "Income inequality and American state poli-
Note that while the 12 eriologicalvariables The original work on this paper began in the tics." American Political Science Review
are very highly intercorrelated with each Working Group on Deterrence Research at the 63:157-162.
other (the average R2 is 0.84), the repressive Workshop in Criminal Justice Statistics which Ehrlich, Isaac (1973)
factors are not highly correlated with each consisted of David Britt, Kinley Larntz, Colin "Participation in illegitimate activities: A
other (r2 = 0.00052) or with the other inde- Loftin, Dan Nagin, and David Seidman. At var- theoretical and empirical investigation." Journal
pendent variables (R2 = 0.341 for certainty ious points other members of the workshop of Political Economy 8 1:52 1-565.
and 0.487 for severity). This indicates that made important contributions to my thinking.
The original calculations for the research were Ehrlich, Isaac (1975)
the relatively large standard errors of the "The deterrent effects of capital punishment:
done in Washington during the workshop, but
estimates of the repressive variables are not all calculations have been repeated with the orig- A question of life and death." American
a result of multicollinearity and provides inal Loftin-Hill data rather fhan the data that Economic Review 65:397417.
support for the inference that the punish- were hastily collected during the workshop. I Gastil, Raymond D. (1971)
ment variables d o not have independent spent two days visiting with Kinley Larntz and "Homicide and a regional culture of violence."
effects on the homicide rate. Stephen Fienberg at the Department of Applied American Sociological Review 36:4 12-427.
Statistics of the University of Minnesota. That
experience had a major influence on the paper as Gibbs, Jack (1968)
Conclusions . well as on my general education. Michael "Crime, punishment and deterrence." South-
Timberlake and Robert Parker, students in the western Social Science Quarterly 48515-530.
Our purpose in this paper has been to show
that when the effects of sociocultural fac- Department of Sociology at Brown University, Gibbs, Jack (1975)
tors are removed from Gibbs' measures of assisted with some of the data analysis presented Crime, punishment, and deterrence. New
certainty and severity of punishment, the in the paper. 1am responsible for thedraft of the York: Elsevier.
report and any errors that it contains. Greenberg, David F. (1975)
estimates of their independent effects on
homicide rates are reduced to the point that "Theft, rationality and the methodology of
they might reasonably be considered to be deterrence research." Paper presented to the
nonexistent. Such a demonstration is very Annual Meetings of the American Sociological
important because previous, widely cited Association, August 1975.
analyses of the same data have concluded Greene, Jon S., and Alvin Renetzky (eds.) (1970)
that they provide evidence for independent Standard education almanac. Los Angeles:
deterrent effects. One should not conclude, Academic Media.
however, that the data provide very strong Grove, Robert D., and Alice M. Hetzel(1968)
evidence for either position. The analysis Vital statistics rates in the U.S. 1940-1960.
must remain inconclusive because of seri- U.S. Department of Health, Education, and
ous theoretical and methodological limita- Welfare. Washington, D.C.: U.S. Government
tions on the research design. Gibbs himself, Printing Office.
after a recent, thorough review of deter- Hackney, Sheldon (1969)
rence studies, concluded that ". . . horren- "Southern violence." American Historical
dous problems preclude a categorical Review 74:906-925.
Henry, Andrew F., and James F. Short (1954) Tittle, Charles R. (1969) U.S. Bureau of the Census (1964a)
Suicide and homicide: Some economic, socio- "Crime rates and legal sanctions." Social U.S. Census of popularion: 1960. Vol. I, part
logical, and ps~~chologicalaspecrs
of aggression. Problems 16:409-423. I. Washington, D.C.: U.S. Government Printing
New York: Free Press. Tittle, Charles R. (1964) Office.
Loftin, Colin, and Robert 3. Hi11 (1974) "Certainty of arrest and crime rates: A further U.S. Bureau of the Census (1964b)
"Regional subculture and homicide: An test of the deterrence hypothesis." Social Forces Statistical abstract of the United States.
examination of the Gastil-Hackney thesis." 52:455-462. Washington, D.C.: U.S. Government Printing
American Sociological Review 39:714-724. Tittle, Charles R. (1975) Office.
Logan, Charles H. (1970) "Deterrence or labeling?" Social Forces Wilkins, Leslie T. (1974)
"On punishment and crime (Chiricos and 53:399-410. "Current aspects of penology: Directions for
Waldo, 1970): Some methodological commen- Tittle, Charles R., and Charles Logan (1973) corrections." Proceedings of the American
tary." Social Problems 19:280-284. "Sanctions and deviance: Evidence and Philosophical Societ.r' 1 18:235-247.
Logan, Charles H. (1972) remaining questions." Lonsand Society Review Wolfgang, Marvin (1958)
"General deterrence effects of imprisonment." 7:371-393. Patterns in cariminal homicide. Philadelphia:
Social Forces 5 154-73. Tullock, Gordon (1969) University of Pennsylvania Press.
Logan, Charles H. (1975) "Does punishment deter crime?" The Public Wolfgang, Marvin (1968)
"Arrest rates and deterrence." Social Science Interesr 36: 103- 111. "Homicide." Inrernational Enc:,.clopedia of
Quarterly 56:376-389. U.S. Department of Justice (1959) the Social Sciences. New York: Macmillan. .
Nagin, D. (1975) Uniform Crime Reports 1959. Washington, Wolfgang, Marvin, and Franco Ferracuti (1967)
"An investigation into the association be- D.C.: U.S. Government Printing Office. The subculture of violence: Towturd an
tween crime and sanctions." Unpublished Ph.D. U.S. Bureau of the Census (1962) integrated theory in crin~inclogy. London:
dissertation, Carnegie-Mellon University. Sratisrical abstracr of the United States. Tavistock Publications.
Namboodiri, N. K., L. F. Carter, and H. M. Washington, D.C.: U.S. Government Printing
Blalock, Jr. (1975) Office.
Applied multivariate analysis and experi-
mental designs. New York: McGraw-Hill.
Orsagh, Thomas (1973)
"Crime, sanctions, and scientific explana-
tion." Journal of Criminal L a w and Criminol-
ogy 64354-361.
Phillips, Llad, and Harold L. Votey, Jr. (1972)
"An economic analysis of the deterrent effect
of law enforcement on criminal activity."
Journal of Criminal Law,, Criminologj~,and
Police Science 63:330-342.
Rao, Potluri, and Robert LeRoy Miller (1971)
Applied econometrics. Belmont, Calif.: Wads-
worth.
Recent econometric modelling of crime
and punishment: Support for the
deterrence hypothesis?
STEPHEN S . BRIER
Department of Statistics
University of Iowa
STEPHEN E. FIENBERG
Department of Statistics
and Deparment of Social Science
Carnegie-Mellon University
In this paper we review some recent The punishment of criminal offenders has The problem of absolute deterrence relates to the
attempts to develop econometric models played an important role in both the eco- question, does this particular criminal sanction
for assessing the deterrent effect of punish- nomic and sociological approaches to the deter? The problem of marginal deterrence re-
ment on crime, as well as analyses carried control of crime. Although retribution was lates to such questions as, would a more severe
out to validate these models. The formula- long considered to be a primary rationale penalty attached to this criminal prohibition
more effectively deter? In the capital punishment
tion of the basic econometric model con- for punishment, this view has given way, at debate the issue is not that of absolute deter-
sidered here is due to Becker (1968), and least partially, to the position that punish- rence-whether the death penalty is a deterrent.
the detailed specification of the model, ment of offenders will lead to a subsequent It is that of marginal deterrence-whether it is a
along with much of the empirical work re- reduction in or prevention of crime. The more effective deterrent than the alternative
viewed, has been carried out by Isaac possible mechanisms for the prevention of sanction of long imprisonment.1
Ehrlich. We find serious flaws with the crime through punishment, other than ret- Most people can accept the notion of the
Becker-Ehrlich model, with the data used ribution, are several: absolute deterrence effect of many forms of
in its empirical implementation, and with (1) Incapacitation. By removing a n of- punishment. For example, the removal of
Ehrlich's conclusions regarding evidence to fender from society for some period of all sanctions for a crime such as robbery,
support the deterrent effect of punishment time, we can prevent that offender from most would agree, would lead to a n in-
on crime. Indeed, we can find no reliable repeating his offense o r committing other crease in the rate at which robberies are
empirical support in the existing economics ones while he is not in contact with society. committed; others might argue that the
literature either for or against the deter- (2) Education. By administering pun- reason for the increase is not the removal or
rence hypothesis. ishment for antisocial acts (such as'crimes), threat of punishment but rather the re-
government and its agencies achieve a moval of the educational and moral value
Introduction moral and educational effect on individ- the punishment provided for society as a
uals in general. Society thus instructs that whole. The issue which is explored in this
The threat to person and property from these crimes are counter to its norms, and
crime is a central problem of social concern paper and which has been the subject of
by doing so educates individuals and in- recent concern is that of marginal deter-
in the United States today. But crime is not fluences their behavior.
a new problem. "Crime in the streets" and rence, i.e., we are interested in the potential
(3) Rehabilitation. Through the use of effects of shifts in the level of sanctions on
"the need for law-and-order" have been education, correctional "treatment," or
slogans used by politicians at least since the subsequent criminal behavior.
vocational training during imprisonment,
early 1960's to exploit popular fears of society attempts to "change" offenders so Measuring the effects of these different
crime, and the study of crime as a social that they will not commit crimes in the mechanisms through which punishment
phenomenon has played a prominent role future. might prevent crime is a far more difficult
in American sociology throughout the (4) Deterrence. By enforcing punish- task than it may at first seem. As we just
twentieth century. With the surge in re- ment on an offender, society warns the noted, it is often difficult to separate the
ported crime in the 1960's, considerable offender, and the community at large, and educational and general deterrent compo-
public attention was focused on the control thus inhibits the offender or others in the nents of the effects of punishment. Simi-
of crime through President Lyndon B. community from engaging in criminal ac- larly, it is difficult to separate out the effects
Johnson's Commission on Law Enforce- tivity in the future. of incapacitation from those of deterrence.
ment and Administration of Justice and The difficulty is in fact one of explaining
the subsequent implementation of the When it is the sanctioned offender who is
Commission's recommendations. At the inhibited from committing crimes by the 'Zimring and Hawkins (1973: 14).
same time economists began to study law actual experience of punishment we speak
enforcement as an economic problem in- of specific deterrence; when individuals
volving the allocation of scarce resources other than the sanctioned offender are so
(e.g., see Becker 1968). inhibited we speak of general deterrence.
Copyright 1980 by Sage Publications, Inc. Reprinted
@
With regard to the deterrent effect of pun-
by permission, with minor changes, from Evaluation ishment we need to make a further distinc-
Revieu'. VOI.4 , NO.2 , April 1980, pp. 147-191. tion, suggested by Zimring and Hawkins
(1973). between absolute and marginal
deterrence:
exactly what the mechanism of incapacita- of punishment, we need to attempt to get at Thus our conclusions are in agreement
tion actually entails. those on the margin of criminal activity. with those of the National Academy of
A simple-minded argumerit to explain the The size of the group of individuals on the Sciences Panel on Research on Deterrent
effect of incapacitation might go as fol- margin limits the potential deterrent effects and Incapacitative Effects: There is no em-
lows. Suppose we imprison a 20-year-old of any form of punishment. Since eco- pirical evidence to warrant an affirmative
male for a period of 2 years for committing nomic theory so often deals with the mar- conclusion regarding the deterrent effect of
the crime of burglary. Then, if that offender ginal effects of various policy changes, the punishment in general, and the available
had been committing burglaries at the rate appeal of crime and punishment as an correlational or observational studies on
of, say, 12 per year, the simple fact of his application of economic modelling is great. homicide provide no useful evidence on the
removal from society for 2 years will pre- What remains to be seen is whether such deterrent effect of capital punishment. The
vent the commmission of 24 burglaries. economic models are consistent with em- only available evidence that give support
Then, in any modelling we do, we would pirical observations. for the notion of general deterrence comes
wish to remove these 24 burglaries from the In this paper we review some recent at- from "natural experiments" such as Ross's
overall effect of the 2 years of punishment tempts to develop econometric models for (1973) study of the British Road Safety Act
on the future burglary rate. assessing the deterrent effect of punish- (see the discussion in Cook 1977). More-
ment on crime, as well as analyses carried over, given the limitations of aggregate
Even if we knew the rate of offending for data on crime and incarceration, we believe
each imprisoned offender, the calculation out to validate these models. The first sec-
tion discusses the possible types of empiri- that much more attention in the future
in this argument may completely distort should be focused on studies of individual
the actual effects on the overall crime rate cal investigations that might be used to
study deterrence. Next we briefly describe criminal behavior. We do not expect any
of incapacitating various individuals. In empirical research, at least in the near
the case of the 20-year-old burglar, we need the Becker-Ehrlich econometric model for
crime and punishment. Then we describe future, to provide definitive evidence on
to know more about the nature and circum- the deterrent effects of capital punishment.
cumstances of his offenses. If he were a some of the general problems in the em-
member of a group of burglars, all of whom pirical implementation of this model. The
work together, then his imprisonment may next two sections outline the pliblished em- Possible vehicles
not have any effect at all on the number of pirical tests of the model along with some tor studying deterrence
burglaries committed by the group. Indeed, of our own reanalyses. One deals with
cross-sectional data for 1960 and 1970, As with many other social ohenomena. the
if he was arrested and convicted because he relationship - between p;nishment 'and
was the worst burglar in the group, the while the other deals primarily with longi-
tudinal data for homicide and includes a crime can, in principle, be explored either
other members of the group might well re- in an experimental setting or by an obser-
cruit a superior replacement or simply in- special look at the deterrent effects of capi-
tal punishment. vational study.
crease their criminal activities, and thus the
overall number of burglaries the group Finally our own conclusions regarding the In a randomized controlled field trial, ex-
commits could easily increase. Cook(1977) empirical evidence on deterrence are pre- perimental units-individuals, collections
discusses this replacement effect in an eco- sented. They can be summarized briefly as of individuals, political or legal jurisdic-
nomic context in terms of its relationship follows: tions, etc.-are randomly assigned to treat-
to the quality of crime opportunities. Reiss (I) The Becker-Ehrlich model has glar- ment grovps and are then carefully
(1980) has argued persuasively that the ing shortcomings and, when examined crit- followed to assess the actual effects of the
interpenetrating social networks of offend- ically, does not lead to the claimed testable treatment. The randomization allows the
ers and their victims need to be better hypotheses regarding the effect of punish- experimenter to avoid the dangers of self-
understood before we can make any seri- ment of crime. selection, and it allows for the control of
ous attempt to separate out the effects of (2) The use of the Becker-Ehrlich model variables not included directly into the de-
incapacitation from those of deterrence. At for aggregate data requires extensive justi- sign of the field trial. The "controlled"
the same time no empirical model for meas- fication that has never been given. nature of such field trials implies that the
uring the deterrent effect of punishment (3) The crime and imprisonment data choice of treatment for an experimental
can be complete unless it also includes the used to empirically examine the Becker- unit is that of the investigator and that at
related incapacitation effect in some form. Ehrlich model are so untrustworthy as to least two treatments (or levels of treatment)
(See also the discussion of incapacitation in render any serious analysis meaningless. are being compared (see Gilbert, Light, and
the report of the National Academy of (4) The empirical implementations of Mosteller 1975) for further discussion).
Sciences Panel on Research on Deterrent the Becker-Ehrlich model are badly flawed The randomized controlled field trial is the
and lncapacitative Effects (Blumstein et al. and have extremely grave statistical short- most demanding of all research strategies
1978).) comings and most published conclusions for investigating social innovations, but the
from them are not to be trusted. increased reliability gained from a random-
Let us explore the mechanism of deterrence ized trial can often far outstrip the costs.
somewhat further. The effects of deter- (5) Even if one accepts the Becker-
Ehrlich model, and Ehrlich's choice ofdata For a field trial involving deterrence the
rence can be thought of only in the context
of those who are likely to commit a crime to implement it (which wedo not), Ehrlich's
and who are influenced by the threat of affirmative conclusions regarding the de-
punishment for that crime if apprehended terrent effect of punishment on crime in
and convicted. The nature and extent of $.eneral,and of capital punishment on mur-
punishment can have no effect on those der in particular, d o not stand up to careful
who do not need to be deterred from crimi- statistical scrutiny.
nal activities and on those who are not or
cannot be deterred by the threat of punish-
ment. Thus, to measure the deterrent effect
treatments would involve different levels of (2) The number of offenses and the pun- might be consistent with the economic
punishment and/or the threat of punish- ishments meted out. model. Most murders, however, occur in
ment. Unfortunately, there have been few (3) The number of offenses, arrests, and the home, involve members of t h e same
examples of randomized controlled field convictions and the public expenditures on family, and seem unpremeditated."
trials dealing with deterrence. Zimring and police and courts.
Hawkins (1973) note that "[ilt is difficult to The net result of this econometric model-
(4) The number of convictions and the
conceive of a n acceptable experiment in ling is a functional relationship between the
cost of imprisonments or alternative pun- number of offenses committed by individ-
which, after random assignment, the sever- ishments.
ity of sanctions threatened for a violation ualj, O,, and-
(5) The number of offenses and the (a) his probability of conviction, p , ,
of a particular criminal law was varied private expenditures on protection and
(b) his punishment given conviction,f;,
betweenJhe two groups." While we d o not apprehension. (c) his rate of return (benefits) if he suc-
completely agree with their statement, we
We d o not discuss (5) any further here since cessfully commits the crime, w,,( i stands for
d o recognize the many legal and possibly
it plays no role in Ehrlich's empirical imple- illegal returns),
moral roadblocks to careful experimenta-
mentation of Becker's model nor in the (d) the rate of returns from alternative
tion on deterrence. Because of this diffi-
bulk of the related literature we consider. legal activities, w ~ (I
, stands for legal re-
culty in mounting experiments, most inves-
turns),
tigators resort to alternative research strat- Becker's basic premise is that criminals (e) the probability of legal unemploy-
egies, two of which are highly prominent. maximize their expected gains (according ment, UI,, and
In the first approach the researcher at- to some utility function) from illicit activ- (f) a vector of other variables, v,:
tempts to assess the effect of a change in the ity. A person commits an offense if the
level of sanctions by comparing reported expected utility he will receive exceeds the
crime rates before and after the change in a utility he would receive by engaging in The function (1) is the one discussed by
given jurisdiction. T o reduce the potential other activities. Thus the criminal's deci- Ehrlich (1973), and is simply a n elabora-
biases and errors of such a n approach, in- sion is based on benefits and costs of both a tion of Becker's supply-of-offenses func-
vestigators often compare the change in monetaryeand psychic nature. According tion. T o arrive at (I), one must adopt many
rates with those in other jurisdictions to Ehrlich (1973) an individual allocates a untested and possibly untestable assump-
where no changes in the level of sanctions fixed amount of time among legal and il- tions regarding criminal behavior and its
took place. For a recent discussion of such legal income-generating activities. The determinants.
"natural" experiments with regard to the effects of this time allocation are intro-
duced only implicitly by Ehrlich through There is little or no discussion by Becker or
deterrent effect of capital punishment, see Ehrlich regarding those "economic" vari-
Baldus and Cole (1975); with regard to the effects of time allocation on wealth.
From the basic model Ehrlich goes on to ables not included in (I). Nor d o they pro-
other deterrent effects, see Cook (1977) and vide support for the forms of the variables
Zimring (1978). derive some behavioral implications, such
as: An increase in the probability of appre- appropriate for inclusion for the empirical
The other approach to the measurement of hension and punishment, with no change in validation of the model. This is a serious
deterrent effects of punishment is the gath- other variables, reduces the incentive to matter. No amount of utility theory, sys-
ering of aggregate data on crime and pun- participate in illegitimate activities. tems of partial differential equations,
ishment as well as on various social and Kuhn-Tucker first-order optimality condi-
economic variables. The researcher then Block and Heineke (1975) have examined tions, and analogies to the supply and
studies the variations in crime that occur Ehrlich's model with great care and have demand for bread and butter (see Ehrlich
either among jurisdictions or over time. shown that if the allocation of time is intro- and Gibbons 1977) can make up for the
This is the approach adopted by Ehrlich duced explicitly into the utility analysis, the logical leaps that lead to the specification
(1973, 1975a, 1977b) in his attempt to de- behavioral implications of the model de- of (1).
velop a n econometric model for the effect rived by Ehrlich d o not necessarily hold.
Moreover, they note that, contrary to the The first step adopted by Ehrlich and
of varying sanctions, and the inherent diffi- others in making the model of expression
culties in this approach are the primary assumptions of Becker and Ehrlich, it is not
necessarily true that monetary equivalents (I) suitable for empirical examination is
subject of this paper. the aggregation of data across individuals.
to labor and penalty attributes of an of-
fense exist. As a result, propositions re- Thus Ehrlich uses the aggregate function
The Becker-Ehrlich model garding the deterrent effect of punishment
for crime and punishment become empirical questions rather than
theoretical consequences subject to empiri- where 0* is the aggregate number of of-
Becker (1968) introduces his attempt to cal validation. fenses in a particular jurisdiction,p* is the
model crime and its optimal control by aggregate probability of conviction, and so
noting that "'crime' is a n economiCally im- Implicit in the utility analysis of Becker, on. The justification for such aggregation.
portant activity, or 'industry', not with- Ehrlich, and others is the assumption that typically rests on the assumption that either
standing the almost total neglect by econo- criminals or potential criminals are rational
mists." His model involves basically five decisionmakers in that they make their de-
behavioral relationships which he claims cisions according to a list of axioms. The
underlie the costs of crime-the relations appropriateness of such an economic
between: model of crime is clearly open t o question.
(1) The number of offenses and their For example, Avio and Clark (1976) state
cost. that: "It would be difficult to argue that
perpetrators of violent crimes behave
according to the usual set(s) of axioms. .. .
Murders involving some form of premed-
itation and motivated by economic gain
the parameters used to specify the relation The actual rate of, ding in any commu- usually handled by separate juvenile justice
(I) are constant across individuals or the nity for any specific .ne during a specific systems and are rarely sent to prison. Indi-
parameters are stochastic, coming from time period is not Known. What we have vidual offenders are not tracked over time
some common distribution. Actually, to available are data on offenses reported to through the criminal justice system, and
justify the aggregation, one needs further the po!ice. As a substitute for 0* (the the aggregate figures for those imprisoned
to specify a specific functional form. For actual offense rate), Ehrlich (1973, 1975a) that are available for jurisdictions such as
example, suppose log O; is linearly related uses Q/N, where Q is the number of of- states include individuals whose crimes
to the logarithms of the variables on the fenses reported to the police a n d recorded may have been committed in other states.
right-hand side of (1). Then, if the coeffi- by them for a jurisdiction, and N is an esti- These aggregate figures also include
cients are the same across individuals, the mate of the population size for that juris- offenders whose crimes took place possibly
aggregate number of offenses, O*, is diction. It is well known that not all several years prior to incarceration. Thus
related to the geometric means of the indi- offenses committed are reported to the the use of contemporaneous values of C
vidual values for the other variables. Thus police. Estimates of the ratio of Q to Q*, and Q by state can lead to sizeable discrep-
the justification of functional form must the true number of offenses, vary from as ancies between C/ Q and p*, which can be
ultimately be established at the individual low as 10 percent for rape to close to 100 shown to vary from state to state in occa-
rather than the aggregate level. Since percent for murder. In the case of automo- sionally very strange ways. We discuss this
aggregation also takes place over time, we bile theft there have been occasional re- problem further in the next section.
need to assume some form of constancy or, ports that Q exceeds Q* because of non-
at a minimum, stochastic stationarity of thefts reported to the police for insurance Third, Q now appears on both the left- and
the parameters in the functional specifica- purposes. right-hand sides of the operational version
tion (see e.g., Kuh and Welsch 1976). of equation (2). As is noted in the report of
Unfortunately, the ratio of Q/Q* can vary the National Academy of Sciences (Blum-
One of the few empirical examinations of a dramatically from jurisdiction to jurisdic- stein et al. 1978), variation in the error in
related functional specification at the indi- tion. For example, Skogan (1976) notes measuring Q*, the true number of crimes
vidual level was carried out by Witte (1977). that in the 26 city victimization surveys committed, can induce a spurious negative
Her analyses show the importance of the conducted under the auspices of the Na- relation between the offense rate and the
specification of individual sociodemo- tional Crime Survey Q**/ Q*(where Q** is punishment rate, when no such relationship
graphic variables, such as race and age, and the number of crimes reported to the actually exists. Klein, Forst, and Filatov
are supportive of arguments indicating the police) for robbery varied from 52 percent (1978) demonstate how such errors can
inappropriateness of the aggregate data to 76 percent.2 The estimates of the ratio of induce a similar bias in the estimated rela-
used by most investigators in this area. the number of crimes appearing on police tion between murder and execution rates.
records (i.e., Q) to the number actually
Alternatives to the Becker-Ehrlich model reported (i.e., @*) for these 26 cities, The source of the data used by Ehrlich and
exist. These are based on concepts such as others to analyze the deterrent effects of
however, varied from 19 percent to 100
the saturation of the resources of the crimi- percent! punishment in the United States is the Uni-
nal justice system (Cook 1977), and form Crime Reports (UCR) produced by
"homeostasis,"the apparent stability of im- The quantity Q is also used by Ehrlich to the Federal Bureau of Investigation (FBI).
prisonment, and effective prison capacity get a measure of p*, the aggregate subjec- UCR data are collected as part of a volun-
(Blumstein and Cohen 1973; Nagin 1977). tive probability of punishment (i.e., appre- tary reporting system involving state and
While we do not directly discuss the empiri- hension and imprisonment). He uses C/ Q local law enforcement agencies and are
cal examination of these alternatives, we as a n estimate ofp* where Q is the number based on crimes recorded by these agencies.
note that they cast doubt on Ehrlich's of recorded crimes in a given period of time In addition to the problems of reporting
claims regarding marginal deterrent effects and C is the number of offenders impris- and recording offenses noted earlier,UCR
of punishment. oned during the same time period for the rates may seriously distort the level of
same jurisdiction. There are three problems offenses because multiple crimes with pos-
here. sibly multiple victims often are recorded as
Moving toward empirical examination
of the Becker-Ehrlich model First, C and Q involve different units. C single offenses, and conversely single crimi-
deals with offenders, and Q deals with nal events often involve multiple offenders,
T o move from the aggregate supply-of- offenses. There is not a one-to-one corre- etc.
offenses model of expression (2) to an em- spondence between the two.
pirical study of deterrence, one needs to Since the beginning of the UCR program in
(a) Specify in detail the "other" varia- Second, for a fixed period of time and a 1933, both the number and the percentages
bles to be included as part of the vector v*. given jurisdiction, it is impossible to deter- of law enforcement agencies reporting to
(b) Describe how the variables are to be mine which of the offenses that are included the FBI have increased dramatically.
measured. in Q ultimately lead to apprehension and Moreover, reporting practices have also
(c) Specify the actual functional form of imprisonment. For example, juveniles are evolved, and officials generally agree that a
the relationship. larger proportion of offenses made known
'These rates are subject to substantial sampling error, to the police now get reported to the FBI
Ehrlich (1973, 1975a) provides a priori and some of the variability can be attributed to this than was the case in the past. Finally,
specifications for (a) and (c) which we call source. although the proportion of units reporting
into question in our reanalysis of his data. has increased over time, specific police de-
Thus we defer our discussion of these mat- partments that are once included in the
ters to later sections of this paper. In this UCR data base may not be included at later
section we discuss (b). points in time.
e
: Per capita expenditure on police in fiscal 1960, 1959, respectively I where Q/ N is the operational attempt t o
estimate the offense rate. O*.
M : Number of males per 1 0 0 females C / N is the operational attempt t o
D : Dummy variable distinguishing northern from southern states
estimate the probability of
(south = 1 )
punishment, p*.
a~ subscript j denotes that the variable is indexed b y specific crime categories. T*, the average time served by
prisoners in state prisons, is
the empirical measure off*,
The UCR data used by Ehrlich for his robbery, respectively. Cook (1977) insome the punishment given convic-
cross-sectional analyses (discussed in the simple preliminary analyses shows that the tion.
next section) are based on the UCR for the "usual" negative correlation between the W, the median family income,
years of interest. The data used in his na- UCR reported burglary rates and the cor- and X, the percentage of fami-
tional longitudinal analysis of murder (dis- responding UCR clearance rates is greatly lies below the median income,
cussed later) are not the reported rates for diminished when city data from the NCS are used as replacements for
each point in time. Rather, they consist of are used in their place. The Wilson and the differential monetary re-
FBI estimates of what the reported crime Boland (1976) study, which does find a sig- turns of crime relative to legal
rates would have been had the units in- nificant negative effect using NCS data for alternatives, i.e., w,* and WI*.
cluded in the UCR system been the same as robberies, unfortunately suffers from many VII, the male urban unemployment
in 1972. Unfortunately there is no published of the methodological flaws discussed in rate for ages 14-24, and LI4,
description of the procedure used by the the remaining sections of this paper. Given the labor force participation
FBI to reestimate the rates. We have no the serious technical problems with the rate for this same group, are
way to assess the appropriateness of the NCS city data (see Penick and Owens used in lieu of ul*,the proba-
FBI's reestimation procedure, but it is 1976), we d o not see the use of victimiza- bility of legal unemployment.
reasonable to conclude that it is likely to tion data as a way of correcting the prob- NW, the percentage of nonwhites,
add further biases and increased variability lems associated with UCR data. and A14, the percentage of
to a n already poor measure of crime. males in the 14-24 age group,
are the "other variables," v*.
We d o not believe that UCR data collected The analyses of U.S. cross- a, and b, for i = 1, 2, . . . , 8, are
prior to 1960 merit serious attention since sectional crime data parameters to be estimated.
are completely e is a random error term.
I,., this section we discuss some recent anal-
are subject t o enormous errors and biases. ex-
Any substantive conclusions one might ySeSthat have attempted The relationship among the variables in (3)
amine the Becker-Ehrlich econometric is multiplicative, and we must take logs-
draw from the analysis of these data are not
model of crime and punishment using rithms of both sides of the equation to pro-
be trusted' Even Ihe longer cross-sectional data for the United States. duce linearity (we use natural logarithms,
Wishes data prior 1960because We have attempted to replicate some of
of doubts regarding their We denoted by
these results, and we report on our findings
have serious reservations regarding the
quality and validity of the 1960 UCR data
used by Ehrlich and others. Nonetheless,
in this regard along with some additional
analyses.
(g) = bo + blln (g) + b21nT*
we discuss the 1960 data and national lon- + b~ln W + bJnX (4)
gitudinal UCR data for murder from 1933 + btln V14 + bhlnL14
through 1969 in the following two sections. + bllnN W + bslnA14 + e.
One alternative to the use of UCR data is (Here we take b~ = lna.) As a result of a
the use of data from the special city surveys variety of statistical analyses, Ehrlich con-
associated with the National Crime Survey cluded that v1.1, L14,and A I J had virtually
(see Penick and Owens 1976). Cook (1977) no effect on the rest of the estimated equa-
and Wilson and Boland (1976) have used tion and so he dropped them to yield the
NCS city data to examine the effects of model:
sanctions on the crimes of burglary and
C
(d) When fallible measures are used for
Table 2. Estimated coefficients of selected variables in equation [51. Estimates obtained key variables in a regression or simultane-
by two-stage least squares ous equation model, it does not suffice t o
substitute them directly into the model, as
Offense Intercept (C/O)i Ti'
- W
- -
X
-
NW Ehrlich did with equation (3). The prob-
Robbery -1 1.030 -1.303 -0.372 1.689 1.279 0.334 lems of dealing with models where there are
(-1.804)a (-7.01 1) (-1.395) (1.969) (1.660) (4.024) errors in the variables are well-known (e.g.,
Burglary -2.121 4.724 -1.127 1.384 2.000 0.250 see Sprent 1969 or Zellner 1971).
(-0.582) (-6.003) (4.799) (2.839) (4.689) (4.579)
(e) There is a special statistical technol-
Larceny -1 0.660 -0.371 -0.602 2.229 1.792 9.142
(-2.195) (-2.482) (-1.937) (3.465) (2.992) (2.019) ogy especially suitable to problems where
Auto theft -14.960 -0.407 -0.246 2.608 2.057 0.102 there are multiple indicators available for
(4.162) ( 4 . 173) (-1.682) (5.194) (4.268) (1.842) given unobservable variables (see Joreskog
Property crimes -6.279 -0.796 -0.915 1.883 2.132 . 0.243 1970 for a general formulation, and Bielby,
(-1.937) (-6.140) (4.297) (4.246) (5.356) (4.805) Hauser, and Featherman 1977 for an illus-
Murder 0.316 -0.852 -0.087 0.175 1.109 0.534 trative application). Ehrlich simply ignores
(0.085) (-2.492) (-0.645) (0.334) (1.984) (8.356)
Rape -0.599 -0.896 -0.399 0.409 0.459 0.072
this matter.
(-0.120) (-6.080) (-2.005) (0.605) (0.743) (0.922) (f) The equations for all of the crimes in-
Assault -7.567 -0.724 -0.979 1.650 1.707 0.465 clude the monetary variables W and X,
(-1.280) (-3.701 ) (-2.301 ) (2.018) (2.111) (3.655) even those equations for violent crimes
Crimes against 1.635 -0.803 -0.495 0.328 0.587 0.376 such as murder, assault, and rape. We see
the person (0.380) (-6.603) (-3.407) (0.570) (1.098) (4.833)
no justification for this. (Parenthetically,
All offenses -1.388 -0.991 -1.123 1.292 1.775 0.265
(-0.368) (-5.898) (4.483) (2.609) (4.183) (5.069)
we note that Ehrlich classifies robbery a s a
property crime, whereas the FBI classifies
umbers in parsntheses are t-ratios (i.e. the estimated coefficients divided by their
it as a violent crime.)
estimated standard errors).
(g) The equations for each crime type
are analyzed separately and not linked. In
are obtained by two-stage least squares our view a more realistic model would re-
(using a weighting scheme) and also by the late crime rates to one another because of
method of "seemingly unrelated regressions" the known tendencies of career criminals t o
due to Zellner (1962). In all cases the co- substitute one crime type for another (e.g.,
efficient of most'interest, b ~has
, a negative see Petersilia, Greenwood, and Lavin
Ehrlich uses a simultaneous equations ap- estimate and is judged to be significantly 1978).
proach to estimate the coefficients in equa- different from 0 (based upon its t-ratio Vandaele (1978) reanalyzed Ehrlich's 1960
tion (5) in which the crime rate ( Q l N), the being larger than 2). We give Ehrlich's two- data, incorporating a number of different
probability of imprisonment (CIQ), and stage least squares estimates of the coef- model specifications as well as a n attempt
the amount of police expenditures per ficients in Table 2. to identify possible outliers, i.e., states
capita ( E l N) are simultaneously deter- Ehrlich's final conclusion, based on the whose data d o not fit the pattern of the re-
mined or endogenous variables. Ehrlich analyses just outlined, is that these 1960 mainder. His analyses lead him to essenti-
does not present a system of structural data provide strong support for the theory ally the same conclusions as Ehrlich. We
equations for the entire system but only that sanctions deter crime. We take issue merely outline here some of the highlights
gives the one determining the crime rate, with this conclusion. We present detailed of Vandaele's work. He supports Ehrlich's
i.e., equation (5). In this system, however, it comments on these analyses, but first we use of weighted least squares but notes that
is the variables W, X, and N W (the only mention a few key points relating to model weighting the variables does not have any
socioeconomic variables included) that formulation and the statistical methods real effect on the conclusions. His analyses
"identify" equation (5) and allow for the used: are also done in the logarithmic scale,
estimation of the key coefficients of the (a) Ehrlich assumed a priori the specifi- although he does obtain one set of esti-
punishment variables, 61 and bz. Fisher cation of equation (3) thus leading him to mates for a model in which Q/ N is in the
and Nagin (1978) have noted that usiqg estimate a relationship that was linear in log scale and all other variables are un-
socioeconomic variables to identify simul- the logarithmic scale, i.e., equations (4) or transformed. The results of this analysis
taneous relationships can be hazardous. (5). He made no attempt to check the ap- are not very different from the others. Two
We address this point below, but empha- propriateness of this assumption, or to different models for the supply-of-offenses
size again that Ehrlich does not present his assess the overall goodness of fit of his equation that Vandaele fits include (a) the
entire system so it is impossible for anyone model. Many alternatives are available model of equation (9,where the reduced
to completely judge his specification (see which are consistent with the original form contains only the 6 variables in this
the related criticisms by Hoenack et al. econometric formulation. model together with ( E l N)59, and (b):
1978). (b) As noted above the use of the vari-
Ehrlich estimates the parameters in (5) for ables, W, X, and N W to identify the crime
each of the seven basic crime types and for rate equation, ( 9 , is highly suspect.
various combinations of crime. Estimates (c) NOjustification is given for the use of
W a n d X in place of the variables measur-
ing the differential monetary returns of
crime.
not agree with Vandaele's claim. We see
Table 3. Estimated coefficients of In (C/Q)j and lnTj (from Vandaele (1978) evidence of sensitivity of the conclusion to
changes in the specification of the model,
Equation [51a Equation [51 Equation [5]C
Offense In(CQ)j lnTj ln(CQ)j - lnTj In(CQ)j lnTi and given the comments of Fisher and
Nagin (1978) concerning identification,
Murder p.492 -.124 -2.944 .I29 2.178 -.482 this finding casts doubts on any inferences
(-.35)d (-.69) (-1.68) (.35) (.11) k.1 I )
Rape -.771 -.316 -1.347 -.699 -2.979 -1.240
drawn.
(-1.39) (-.78) (4.92) (-2.30) k.43) (v.38)
Continuing our analysis in a purely ana-
Assault -3.882 -7.216 -.968 -1.412 3.851 5.754
(7.35) (-.37) (-3.37) (-2.36) (22) L23)
lytic framework, we note that multicol-
Robbery --4.223 -1.336 -1.584 ' -.465 -1.109 -.357 linearity is a serious problem in this data
k.57) (-.SO) (-6.49) (-1.46) (-2.19) (-1.24) set. The correlation matrix indicates very
Burglary -.445 -.793 -.884 -1.31 7 -.416 -.547 high correlations am0r.g the socioeconomic
(-2.73) (-2.99) (-6.05) (4.91) (-2.81) (-2.43) variables. Our computations were done
Larceny -1.441 -2.127 -1.554 -2.287 -1.231 -1.637 using a CDC 6600 computer and, although
(-1.63) (-1.93) (-1.65) (-1.52) 1 I ) (-1.58)
Auto theft -.616 -.341 -.880 -.460 -.650 -.246 we did not run into any problems in calcu-
(-2.58) (-1.66) (-3.65) (-1.76) (-3.22) (-1.25) lating the inverses of matrices, it is well
All offenses -1.021 -1 .I56 -1.249 -1.407 -1.043 -.824 known that even a nearly singular design
(-3.84) (-3.4) (-5.43) (4.30) (-3.70) (-2.57) matrix can lead to unstable estimates of
parameters. Another problem is that of
a ~ o d e identified
l by the exclusion of In (k)
59'
"outliers" or what would be more appro-
priately called influential observations (see
b ~ o d e identified
l by the exclusion of In (k)
59
and In (g)59'
R. D. Cook 1977). These are points that
are a large distance away from the "x-space"
'Model identified by the exclusion of In (i)
59'
POL$ =fj(Y/ POP, CRl-I) strong effects on the crime rate. These three
COR$ =A(Y/ POP, CRt-I) variables were not included in Ehrlich's
wrong estimated probabilities. This vari-
analysis. Forst also replicated Ehrlich's
able is clearly not measuring (or at least not where5 represents a n affine function of the analysis, as closely as possible, using the
very well) what it is supposed to, and there included variables. This formulation allows 1970 data. He does not present specific re-
is no way of determining whether a value for transformations of variables such as sults in his paper but notes that the esti-
of C/ Q equal to 0. l or to 0.2 is an accurate PJ, which is a bounded dependent variable mated elasticities of the two deterrence
reflection of the probability of conviction in the second equation. Two important dis- variables are substantially smaller than
in that state! We can all agree that an esti- tinctions between this model and Ehrlich's Ehrlich's. It is difficult to judge how differ-
mated probability of 1.6 is wrong because are that Forst considers police expenditure ent things are since he provides no standard
we know that probabilities cannot exceed to be a n exogenous variable (determined in errors. It must be pointed out again that
one in value. When we observe estimated this case by Y/ P O P and C R I ) and, more Forst provides no assessment of the fit of
probabilities of conviction of 0.9 o r 0.5 o r importantly, Forst uses considerably more his model, aside from reporting R Zvalues.
0.3, however, what are we t o do? Why variables to determine the crime rate. We More will be said about this analysis as we
should we trust the estimates of magnitude also note that Forst analyzes only the present our analysis of this data set.
0.9 or 0.1 any more than we trust those of aggregate crime rate, not the rates for
1.1 or 1.6? The problem may be that there individual crimes.
are transitions between states which pre- The data set that we used in the analysis of
clude using this measurement of the prob- Once again we will focus only upon the esti- the 1970 data was identical to that of Forst
ability. A t any rate, it seems impossible to mation of the crime rate, the first equation with the exception of three variables,
justify seriously any inferences made using in (7). Forst presents his analysis with the Y/POP, YDSPR, and UMPL. We took
this measure of sanction, especially since variables measure in their original scale, Y/ P O P to be "personal income"and these
Ehrlich uses ln(C/Q) in his equation rather i.e., the additive relationship as opposed to data were obtained from the Statistical Ab-
than C/ Q. When C / Q is close to zero a
small error in estimate is greatly magnified 1
Ehrlich's model is one in which the murder N : Civilian population (in 1000's)
rate, probability of apprehension, and XGOV : Per capita (real) expenditures (excluding national defense) of all governments
probability of conviction given apprehen- in millions of dollars
;ion are -having XPOCl : Per capita (real) expenditures on police in dollars lagged one year
simultaneous effects on each other over : Violent crime rate (offenses of rape, robbery and aggravated assault)
time, while a number of socioeconomic
variables are considered to be exogenous
variables along with the probability of exe- ders that would be prevented by one addi-
cution given conviction. The murder ~l"($) )' Po + BIAlnPd + P?A1np~]a tional execution per year. He estimates this
supply function, by a n elaboration of the to be between 7 and 8.
earlier arguments, now replaces p* andf* + PXAlnP,J, + p,AlnU
of equation (2) by P, (the probability of + B r AlnL + PsAln Y, Ehrlich concludes that his analyses show
arrest), P,I, (the probability of conviction + & A T + e, the deterrent effect of capital punishment.
given arrest), and PelL(the probability of He claims that he has analyzed the data in
where, for a generic variable Z, the value of scales other than the logarithmic one with-
execution given conviction). The empirical
implementation of this function, using the
AZ at time is * out the conclusions changing substantially,
variables described in Table 7, takes the, AZ = Z -~ZI-I, and he also states that his results are un-
form: affected by the time period of analysis. We
and Po = 1nC. show below that there is considerable
(=i) CP,
P P- P
IP.~:P~:U
P
.L
Pr
(8)
In a simultaneous equation framework,
one must be concerned with whether or not
doubt about these two claims.
Criticism of Ehrlich's conclusions can be
Ph P7 the structural equations are identified. This divided into two broad categories: the rele-
x Y, A exp (BxT) exp (4.
particular equation is identified by omit: vance and accuracy of the data sources, and
Note that T (time) is entered into this ting a number of socioeconomic variables the methodology used. We address these in
equation in a manner different from all from this equation. The variables that were turn. The reliability of the data sources that
other variables. Time is used here as a sur- omitted must have a direct effect on some Ehrlich used has been questioned before.
rogate for the improvement of medical of the other endogenous variables so that We noted earlier the severe shortcomings
technology over time and, as a variable, it equation (10) can be identified, i.e., for the of the UCR crime rates. They are not
plays a crucial role in the analysis, as we parameters to be distinguishable. Fisher accurate measures of the variables that
shall see below. and Nagin (1978) point out the difficulty they claim to represent. Furthermore,
Since the observations all involve aggre- inherent in using socioeconomic variables Bowers and Pierce (1975) point out that the
gate national data measured annually for to identify the parameters in a structural UCR arrest and clearance rates are especi-
equation. It is impossible to determine ally suspect, primarily in the earlier years.
1933-1969, Ehrlich assumes that the errors
are subject to first-order serial correlation, whether Ehrlich has validly identified his What is particularly troublesome is that
l.e., structural equations because he only pre- recording practices have changed so much
sents the one equation given in (10). over time. Moreover, while the UCR
u1 = PUI- I + el, (9) Ehrlich presents estimates of the param- murder rates have been reestimated for the
where p is the serial correlation and the el earlier years, the arrest and clearance rates
eters in equation (10) using six different
are independent random errors. The equa- have not been so adjusted. When one is
measures of P,I,, the probability of execu-
tion whose coefficients he thus sets out to making inferences based upon a time series,
tion given conviction. Two of these are de-
estimate is fined in Table 7. In all but one of the six such dramatic changes in the coverage of
cases Pel, is viewed as a n exogenous vari- data collection inevitably are confounded
able. He finds that for all six measures the with any real effects that are present.
estimated coefficient of the P,I, variable is A second data-related problem is concep-
negative. Also, for four of the six, the esti- tual as well. The variable Pelc relates t o
mated coefficient is significantly different crimes of murder subject to punishment by
from zero (having a ratio smaller than -2). execution, actually a small proportion of
He also repeats the analysis after excluding
some years from the beginning and some
from the end of the series. These modifica-
tions d o not change his resultsappreciably.
Using two of the estimates, Ehrlich derives
a n estimate of the average number of mur-
Table 8. Comparison of estimated coefficients in equation [lo]
A
P
Ehrlich's
-Constant
- 'a
- P
cia - - - PXQl U L
- Y~ - -
A T
I I
estimates
a) .257 -3.1 76 -1.553 -.455 -.039 .067 -1.336 1.481 .630 p.047
( -.78) (-1.99) (-3.58) (-1.59) (2.00) (-1.36) (4.23) (2.10) (-4.60)
Our
estimatesa
b) .257 -2.02 -.56 u.25 -.038 .01 -.91 .65 .71 -.02
"our estimate of p was actually $= .55 but we present estimates using the same value as Ehrlich obtained for comparison purposes.
Our estimates were not sensitive + changes in p except for p near 1.
all murders and one which varies from state Assuming that the variables used in the precious degrees of freedom. While there is
to state. Yet the UCR data used by Ehrlich study are faithful measures of what we some validity to Ehrlich's response, the
for the number of murders, the number of really want to observe (which we believe to deletion of these points is not arbitrary if a
arrests, and the number of convictions be untrue), there are still a number of meth- fundamental change in American society
refer to all murders and nonnegligent odological questions to be answered. took place around 1963, as has been argued
homicides rather than to only capital Ehrlich's model is linear in the logarithmic by many criminologists and sociologists.
crimes. If both capital and noncapital mur- scale (although he leaves Tuntransformed) Moreover, as we found in our reanalyses
der rates have production functions of the and a number of authors have shown that described below, these years stand out as
form (8), then the overall murder rate can- the conclusions reached are dependent discrepant in various forms of residual
not have a production function of this form upon the scale of measurement. Passel1and analysis.
(see the related discussion in Hoenack and Taylor (1977) and Bowers and Pierce
Weiler 1977). Ehrlich's discussion of this (1975), using data sets that are effectively K1ein, Forst, and Filatov a
problem is noninformative and sidesteps identical to Ehrlich's, find that the coeffi- number of
the issues. cient of PC(,is not significantly different that Ehrlich might have used. One is the
The data used for PC], present further prob- from zero when estimated in a model that is average length time served by
lems. particular, the data for P,,d and linear in the original scale of measurement. murderers-it very well may be that this is
XPOL were not available for odd years Finally, we note that all of the variables the for explaining the
from 1913-1951. Ehrlich estimated these actually used by Ehrlich are fallible meas- increase in murders. lhese
ures of the variables of interest, and that data are not available. Another
values by a regression technique that he the models of real interest should thus in- variable that they d o use is an overall index
does not describe. Among the many prob- valve errors-in-the-variables, and multiple- of violent crime. The justification for its in-
lems inherent in this type of procedure is
indicator structures. ~h~ difficulties here elusion is that murder may be increasing as
the loss in real degrees of freedom due to are the same as those described in the last a by-product of an overall increase in the
the missing data. The effective degrees of level of lawlessness. Reanalyzing Ehrlich's
freedom for estimation is a n important section.
data, they find that with this extra variable
issue here and more will be said about it Another methodological question is whether in the structural equation the coefficient of
later. the relationship between theactual variables Pel,is no longer significantly different from
i ~ h was
A fourth problem that ~ - , ~ l faced used is changing over time. Passel1 and zero.
that there were no executions after 1967. Taylor and Bowers and Pierce indicate that
He arbitrarily defined the number of execu- the data for Years after 1963 exert heavy in- Hoenack and Weiler (1977) reanalyzed the
Bowers-Pierce data, using a fully specified
tions in those years to be one in order to be fluence on the estimated coefficients. In simultaneous system of equations, a theo-
able to take logarithms. This is indicative their analyses, both sets of authors show
retical justification for which is given in
of a basic flaw in the production function that the effect of Pel,is not significant when Hoenack, Kudrle, and Sjoquist (1978).
model of equation (8). ~t is simply inappro- these later Years are deleted from the data
Their model interprets Ehrlich's murder
for application to a social structure set (see the related discussion in Klein,
allowing zero executions, since it predicts Forst, and Filatov (1978)). Passell and supply function as the society's response to
a n essentially infinite murder rate for such perform an F-test determine if murder behavior, not vice versa. For their
specification, the coefficient of the execu-
situations if the coefficient pl is negative the regression function is the same for the tion variable is positive although never
(i.e., the sign associated with a deterrent years before 1963as for the years after 1963 more than one standard deviation from
effect of capital punishment). and conclude that it is not. (Unfortunately,
as Ehrlich (1977a) notes, the properties of zero. A key feature of their specification is
An overriding issue related to the data is their test statistic are not known.) Further, the of the the pro-
the choice of aggregate data for making In- Bowers and Pierce argue that doing the portion of the population between the ages
ferences. Baldus and Cole (1975) include an analysis in the logarithmic scale gives more of 14 and 24, into two parts: one for the
excellent discussion of the dangers of weight to these later years. In his rebuttal to proportion of juveniles (ages 14-18) and
making causal inferences using nationwide Bowers and Pierce, Ehrlich (1975b) claims One for young (ages 19-24). We
crime data. They note that crime patterns "Ote that their re-
that there is no justification for arbitrarily
have differed over time from state to state deleting data points and that doing so loses quire the inclusion of T(its estimated coef-
as has the use of the death penalty. If mur- ficient is essentially zero when included); this
der rates increased in states that used the point is especially interesting given the cru-
death penalty often, but rates decreased in cia1 role played by T i n Ehrlich's analysis
states not using the death penalty, the use and specification, which we discuss in
of nationwide data might completely ob- detail shortly.
scure this fact.
These criticisms raise a number of ques- We take issue with Ehrlich's arguments for results, greatly simplifies the estimation,
tions. The estimated coefficients differ de- the endogenous variables Q/ N, P.,, and P,I, and allows for detailed residual analyses
pending on the scale in which theanalysis is having simultaneous effects on one another. based on standard methods for multiple
done, but which is the proper scale? The It makes far more sense to us to think of a linear regression. Those residual plots that
estimates are affected by the later years criminal's subjective assessment of punish- we have examined indicate that this
(1963-1969) but what distinguishes these ment rates as affecting his current behavior, assumption may not quite be met, but
later years from the earlier ones? A further but that the murder rate affects the punish- when we have reestimated the parameters
criticism deals with the basic formulation ment variables after some delay of time. assuming different values for the first-
of the model as a simultaneous set of equa- The delay might be 6 months, 1 year or order serial correlation coefficient we have
tions and the identification of the key struc- even 2; however, since the data only allow found that the estimates do not change
tural equation for the supply of murders. for delays which are multiples of a year, we substantially. The residual plots indicated
We use a somewhat different approach in have arbitrarily fixed on a delayed effect of that the correlation might be of greater
our analysis and try to answer some of murder rates on punishment of 1 year. This than first order but this possibility was not
these and other questions. assumption means that our system of equa- explored. If such higher order serial
tions, unlike Ehrlich's, is recursive not si- correlation exists, it affects Ehrlich's
In our analyses we have used data furnished multaneous, and thus we d o not have analyses a s well as our own.
by Bowers and Pierce and used in their Ehrlich's identification problem nor the
analyses. Ehrlich consistently refused to Table 9 gives estimates of the coefficients in
problem of making inferences about struc- the murder rate equation for different
make his data available to us and to others tural parameters. Our model differs in this
for reanalysis. The only versions of the transformations. Note that the first two
way from those used byLEhrlich, Bowers sets of estimates are for an equation that
variable Pel, that we had values for were and Pierce, and Passel1 and Taylor, and we
PXQl and PXQ2. The bulk of our analysis does not include C, the violent crime level
use it primarily to make a series of meth- index. We considered three different meas-
focused on using either PXQl or its lagged odological points.
values, PXQlI-I ] , as a measure of probabil- ures of PC(,:PXQI, PXQI1 - 1 1 , and PXQ2.
ity of execution given conviction. Our model for reanalysis is thus of the The only significant coefficients (whose
form: t-values, which are given in parentheses, are
Our first goal was to see if we could repro- in excess of 2) are for PXQi when variables
duce Ehrlich's results using this data set. In are measured in the original scale or when
Table 8 we give our estimates, along with only Q/ N is measured in the logarithmic
Ehrlich's, of the coefficients in the murder scale. These equations are the only ones t o
rate equation. Note that the signs of all co- contain significant coefficients for the
efficients agree but that there are some dif- other punishment variables, namely P,I,.
ferences. The likely cause of the different
estimates is in Ehrlich's estimation proce- Bowers and Pierce (1975) conclude that
dure based on the method of Fair (1970). Ehrlich's results are heavily dependent o n
We have programmed a method suggested the analysis being done in the logarithmic
by Fair ourselves to get estimates, while scale. They state that due to the very low
Ehrlich used a packaged routine. We sus- number of executions after 1962, taking
pect the problem is in how the modified logarithms of PXQl emphasizes the effect
first differences are created. Fair actually of these later years thus yielding a negative
suggests a number of different methods, coefficient which is significantly different
some of which are asymptotically more from zero. Our conclusion, after studying
efficient than thers. The method that we the residual plot shown in Figure 2 as well
adopted uses (8, - p P I = las
) the values for where the errors, e,, are assumed to be,inde-
pendent with mean 0 and variance a; (i.e.,
as other graphs, is in conflict with theirs.
Taking the logarithms of PXQl moves the
the endogenous variables in the second
stage regression. Thus in our analysis the independent for different points within values of PXQI in later years far from the
effective years are from 1934-1969. Ehrlich equations). A subscript of (-1) indicates center and tends to flatten out the slope.
appears to have used a somewhat different that the variable was lagged by 1 year. By These residual plots do, however, support
differencing operation which allowed an assuming that the errors are independent the conclusions of Bowers and Pierce and
analysis only for the period 1935-1969. At for different points within equations, we of Passell and Taylor that the years after
any rate, the conclusions based upon our have set p = 0. This zero value for the serial 1962 d o not fit the pattern of the previous
estimates are not substantially different correlation is completely consistent with ones.
from Ehrlich's. A ' major discrepancy our findings in the replication of Ehrlich's
Other residual plots that we examined in-
occurs in the estimates of b. We found = a dicated a second problem which has not
0.55 while Ehrlich reports a= 0.257. Since
Figure 2. been noted in previous analyses. Large
our estimates were not very sensitive to residual values corresponding to 1934
changes in 0 (except near 1) we used Residual plot for the crime rate
point to it as a possible outlier. Looking a t
Ehrlich's value to get the remaining equation in [I 21
the original data, we find that for 1934
estimates. .10-,69
there is a very large value of PXQl and a
a 68
small value of Q/ N. We suspected that this
- .05... @67
J .... ....
... .
. point might have a strong effect on the esti-
: mates so we reestimated the coefficients in
0 0
2 .. . . - - - - . - -
both the original and the logarithmic scale.
-:05
64 63 062
-15: ; k a a : ! : : +
-4 -2 0 2 3
LnPXQ,
i .
-
Pa 2
P PXQ~
- L
- u
- A Y~
- - T c
1b - -.99 .I4 .063 -64 -. 084 .81 w.029 -.13 .39
(-1.16 (1.00) (1.91) (7.49) (-1.83) (3.00) k.09) (-.93) (1.95)
gb -1 .0x104 -1 .8x104 -7.6x10-~ -.20 4.0x10-~ .035 1.1x l w 5 -.002 9x10.~
k.38) (-1.5) (-1.04) (-3.33) (-2.35) (.78) (1.31) (-7.62) (9.00)
These estimates, given in Table 9, show degrees of freedom actually are in a two- Earlier we noted the arbitrary choice by
that things d o change considerably once stage estimation problem. In Ehrlich's first Ehrlich of the use of logarithms for all vari-
1934 is deleted. The estimated coefficient in stage regression, there are 18 independent ables but T, time. In Table 9 we show some
the original scale is still negative but not variables in addition to the 9 independent equations where in T was used in place of T
significant while the estimate in the loga- variables in the second stage regression. As in a fully logarithmic specification. The
rithmic scale is now positive. The residual far as we know, there has been no work changes in sign for the coefficient of P X Q
plots after deletion of this point d o not done on determining the appropriate that go with this change in specification are
indicate any other outlier problems. We degrees of freedom for this type of problem suggestive that the choice of scale for the
note that in Ehrlich's analyses, a significant but we would think there are considerably variable T may have a strong influence o n
result is obtained when using P X Q I but fewer than 25. The difficulty in computing the coefficient. Now the arbitariness of
not with P X Q I .With the lagged variable, degrees of freedom is compounded by Ehrlich's choice hits home. Why choose T
PXQl (- I , ,the value for 1934 is used while Ehrlich's estimation of the missing values or log Tinstead of T I , o r In(T- 1900), o r
for PXQl that year's data are excluded of P,[,and X P O L using the remainingdata. even In(T - 1776)? In other reanalyses we
from the analysis. This seems to support have discovered that suitable transforma-
our finding regarding the suspect nature of Table 9 contains only the results for equa-
tion (12) of our three-equation model. We tions of Tcan dramatically change the size
the 1934 data. and sign of the coefficient of PXQl.
have analyzed the other equations as well
It is not surprising that one point can exert but d o not report o n them-here since they In summary, we find that these data d o not
such a strong effect on the estimated coef- d o not affect the deterrence hypothesis. support Ehrlich's conclusion that there is a
ficients. Even in our recursive model there deterrent effect created by a n increase in
are only 25 degrees of freedom available for the probability of execution. First, we find
estimating the coefficients in the model. In the model formulation suspect, and inap-
Ehrlich's model the problem is much propriate for application in-situations with
worse. Although Ehrlich, as well as other essentiallv zero execution rates. Second.
authors, have routinely computed the we the choice of data used td
degrees of freedom associated with their measure key variables in the model. Third,
estimates, it is not clear what the effective we have noted that the analysis is sensitive to
the specification of the model. Using a
recursive model we have obtained results
that are different from Ehrlich's. The ques-
tion of which model is more appropriate is Conclusions
not an easy question to answer, but we
think that there is as much apriorisupport Becker's (1968) paper has stimulated many
for our model as for Ehrlich's. Our residual economists and others to use modern sta-
analysis does not indicate any lack of fit where I i s the percentage of the family pop- tistical methods for the analysis of regres-
other than the two problems discussed sion and simultaneous equations models to
ulation below a n arbitrary cash income
search for evidence in support of the deter-
above; in contrast Ehrlich does not poverty line, and M is the ratio of net non-
examine the goodness of fit of his model. rence hypothesis. Following Ehrlich's
white migrants in the previous 10 years to
Others, such as Bowers and Pierce (1975) (1973a, 1975a) pioneering attempts t o im-
the total population. Using both ordinary
and Hoenack and Weiler (1977), have also plement Becker's theoretical model, the
and two-stage least squares he found posi-
formulated alternative model specifications flood of papers and manuscripts o n the
tive (but not significant) estimated coeffi-
which when used in analyses make the analysis of crime and punishment data has
cients for PQX, and negative (and signifi-
deterrent effect of capital punishment dis- been almost overwhelming.
cant) estimated coefficients for C/ Q and
appear. In all, there are far too many flaws T*. Passell's specifiction, unfortunately, What has this work contributed t o our
in Ehrlich's model, his data, and his analy- has little more to recommend it than does knowledge of the deterrent effects of pun-
ses for him to claim that a real deterrent Ehrlich's, but his results d o illustrate the ishment on crime? We have concluded that
effect of any sort has been found using this importance of the specification on the re- little or no progress has been made during
form of longitudinal data. sults and the inferences one is likely to draw the past 10 years in our understanding of
from the analysis. the potential deterrent effects of punish-
Cross-section analyses of murder rates ment on crime. Indeed much of the contro-
Forst (1977) examined data on the change
T o buttress the arguments in his paper o n versy that erupted over Ehrlich's work has
in the crime and punishment measures that
the analysis of the longitudinal data on served to divert the efforts of serious
occurred between 1960 and 1970 for all 50
murder, Ehrlich (1977a) has also analyzed scholars of crime from more productive
states. In regressions based on a subset of
the cross-sectional variations of murder pursuits to a battle with Ehrlich and his
32 states for which complete data were
and execution in 1940 and 1950. The basic supporters. The battle has raged before the
available, he found the execution variable
regression model used in his analyse~ United States Supreme Court, which heard
to have a positive coefficient. Although his
resembles equations (4), ( 9 , and (10). arguments based on Ehrlich (1975a) and
results appear to be in agreement with
Passell, they are almost certainly domi- Passel1 and Taylor (1977) in the case of
nated by the fact that P X Q for 1970 for all Fowler v. North Carolina. It has filled the
states was zero! Forst models the change in pages of many different journals. Some
the homicide rate, A(Q/ N), as a function of journals devote entire issues to the topic
the change in execution rates, A(PXQ), (e.g., see Journal of Behavioral Economics,
and changes in other variables. Since Vol. 6, Numbers 1 and 2, Summer/ Winter,
PXQ = 0 for all states in 1970, Forst thus 1977). It has been investigated by a panel
Ehrlich uses ordinary least squares to esti- established by the National Academy of
models A(Q/ N) as a function of PXQ for
mate the coefficients in equation (15) and Sciences. And in the end we seem to be no
1960 and the changes in other variables.
uses data first for states with positive exe- further ahead of where we were 10 years o r
We d o not understand the logic behind this
cutions, and then for all states. He also more ago.
specification.
attempts to compare the results of a fully
linear specification with (15), using a n In this paper, we have reviewed a large pro-
Finally we note the analyses carried out by portion of the empirical attempts to model
approach suggested by the method of Box Loftin (1980) for 1960 cross-sectional data
and Cox (1964). His comparison strongly the economics of crime and punishment,
using a markedly different set of variables including the work of Ehrlich (1973a,
favors the log-log specification of (15). aside from C / Q and T*, motivated pri-
Ehrlich finds the estimated coefficients of 1975a) based on the model suggested by
marily by sociological rather than economic Becker (1968). We have concluded that:
T*, Q/ C, and PXQ (measured in several considerations. Loftin finds little to sup-
different ways) to be negative and signifi- (a) The Becker-Ehrlich model has glar-
port the inclusion of the punishment vari- ing shortcomings and, when examined crit-
cant at a t least the 0.05 level both for the ables in a regression equation with either a
linear and log-log specifications. His con- ically, does not lead to the claimed testable
linear o r a log-log specification. hypotheses regarding the effect of punish-
clusion is that these data and the analyses
of them corroborate his earlier analysis of We have concluded that these cross- ment of crime.
the longitudinal data. sectional analyses offer no support to the (b) The use of the Becker-Ehrlich model
conclusion that there is a deterrent effect of for aggregate data requires extensive justi-
As in Ehrlich (1975a) these conclusions capital punishment, and the conflicting fication that has never been given.
seem at first sight convincing, until we note results for the other punishment variables (c) The crime and imprisonment data
that the data used have even greater short- cast serious doubt on any attempt to infer used to empirically examine the Becker-
comings than those noted earlier and that deterrent effects. Ehrlich model are so untrustworthy as to
almost all of the other analytical problems render any serious analysis meaningless.
mentioned earlier remain. Moreover, Ehr- (d) The empirical implementations of
lich's results run contrary to those of other the Becker-Ehrlich model are badly flawed
investigators who have examined cross- and have extremely grave statistical short-
sectional data. For example, Passe11 (1975) comings, and most published conclusions
used 1950 and 1960 data to estimate theco- from them are not to be trusted.
efficients in the model, (e) Even if one accepts the Becker-
Ehrlich model, and Ehrlich's choice of data
to implement it (which we do not), Ehrlichf
affirmative conclusions regarding the de-
terrent effect of punishment on crime in
general, and of capital punishment on mur-
der in particular, d o not stand up to careful
statistical scrutiny.
Ehrlich's critique of the National Academy References Ehrlich, I. (1973)
of Sciences Panel's report (Ehrlich and Avio, K., and C. S. Clark (1976) "Participation in illegitimate activities: A
Marks 1978) is essentially a n attempt a t Propern. crime in Canada: An econonietric theoretical and empirical investigation." Journal
self-justification. He argues that only his stud?.. Toronto: Ontario Economic Council. of Political Ec~norn.&~8 1 :52 1-565.
version of the econometric model of deter- Baldus, D. C., and J. W. L. Cole (1975) Ehrlich, 1. (1975a)
rence is relevant, that any work inconsistent "A comparison of the work ofThorsten Sellin "The deterrent effect of capital punishment: A
with it can be dismissed out of hand, that and lsaac Ehrlich on the deterrent effect of capi- question of life and death." American Economic
only analyses done by Ehrlich (or those tal punishment." Yale L a w Journal85:170-186. Review 65:397-417.
confirming his findings) are correct or ap- Becker, G. S. (1968) Ehrlich, 1. (1975b)
propriate, and that all of the work of others "Crime and punishment: An economic ap- "Deterrence: Evidence and inference." Yale
whose conclusions run counter to Ehrlich's proach." Journal o f Political Econo~li.~~
78: Lau8Journal 85:209-227.
is incorrect, distorted, technically flawed, 169-217. Ehrlich, I. (1977a)
theoretically eclectical, or irrelevant. This Bielby, W. T., R. N. Hauser, and "The deterrent effect of capital punishment:
is hardly a dispassionate perspective, and D. L. Featherman (1977) Reply." American Economic Review 67:452-458.
we find little in the critique which counters "Response errors in nonblack males in models Ehrlich, 1. (1977b)
the crucial points made in the preceding of the stratification process." Journal of' the "Capital punishment and deterrence: Some
sections and in the Panel's report itself. American Statistical Associarion 72:723-735. further thoughts and additional evidence."
Block, M. K., and J. M. Heineke (1975) Journal of ~o?iticalEconomy 85:74 1-788.
We find no reliable empirical support in the
"A labor theoretic analysis of the criminal Ehrlich, 1.. and J. C. Gibbons (1977)
existing econometrics literature either for
choice." American'Econotnic Rerliew 65:314-325. "On the measurement of thedeterrent effect of
or against the deterrence hypothesis. capital punishment and the theory of deter-
Moreover, we believe that little will come Blumstein, A., and J. Cohen ( 1973)
"A theory of,the stability of punishment." rence." Journal of Legal Studies 6:35-50.
from further attempts to model the effects
of punishment on crime using the type of Journal of' Criminal Law and Criminology Ehrlich, I., and R. Marks (1978)
64: 198-207. "Fear of deterrence." Journal ofLegalSrudies
data we have described in this paper. 7:293-316.
Blumstein, A., J. Cohen, and D. Nagin (eds.)
(1978) Fair, R. C. (1970)
Deterrence and incapacitation: Estimating the "The estimation of simultaneous equation
Acknowledgments e~fectso f criminal sanctions on c-rime rates. models with lagged endogenous variables and
The authors are indebted to several of the partic- Washington, D.C.: National Academy of the first order serially correlated errors."
ipants of the SSRC-LEAA Workshop whose Sciences. Econometrics 38:507-5 16.
ideas and ?suggestions inevitably have found Bowers, W. J., and G. L. Pierce (1975) Fisher, F. M., and D. Nagin (1978)
their way into this article, although perhaps in a "The illusion of deterrence: A critique of lsaac "On the feasibility of identifying the crime
distorted way. In particular, thanks are due to Ehrlich's research on capital punishment." Yale function in a simultaneous model of crime rates
Albert D. Biderman, Alfred Blumstein, William Journal 85: 187-208.
La\+*
and sanction levels." In A. Blumstein et al. (eds.),
Fairley, Kinley Larntz, Colin Loftin, Daniel Deterrence and incapacitation: Estimating the
Nagin, Albert J . Reiss Jr., David Seidman, and Box, G. P., and D. Cox (1964)-
"An analysis of transformations." Journal of effects of criminal sanctions on crime rates,
Leslie Wilkins. We also wish to thank the many Washington, D.C.: National Academy of
others who have shared their thoughtsand work the Royal Statistical Society, (B)26:211-243.
Sciences. .
with us, including William Bowers, Phillip Cook, P. (1977)
Cook, Franklin Fisher, Brian Forst, Stephen "Punishment and crime: A crit~queof current Forst, B. E. (1976)
Hoenack, Paul Meier, Frederick Mosteller, findings concerning the preventive effects of "Participation in illegitimate activities: Fur-
Glenn Pierce, Christopher Sims, Walter Vandaele, punishment." Lak*and Contemporarr Prohknis ther empirical findings." Policy Analysis 2:
Ann Witte, and William Weiler. William 41: 164-204. 477-492.
Bowers, Brian Forst, and Walter Vandaele all Forst, B. E. (1977)
provided their data for our reanalyses; lsaac Cook, R. D. (1977)
"Detection of influential observations in lin- "The deterrent effect of capital punishment: A
Ehrlich consistently refused to make his data cross-state analysis of the 1960's." Minnesota
available. ear regression." Technometrics 19:15-18.
LonvReview 61:743-767.
Daniel, C., and F. S. Wood (1971j
Fitting equations to data. New York: John
Wiley and Sons.
Draper, N., and H. Smith (1966)
Applied regression ana!rsis. New York: John
Wiley and Sons.
Gilbert, J. P., R. J. Light, and F. Mostellex Passell, P. (1975) U.S. Bureau of the Census (1975)
(1975) "The deterrent effect of the death penalty: A Statistical abstract qf the United States (96th
"Assessing social innovation: An empirical statistical test." Stanford Law Review 28:61-80. edition). Washington, D.C.: U.S. Government
base for In A. R. Lunsdaine a n d c . A. Printing Office.
Passell, P., and J. B. Taylor (1977)
Bennett (eds.), Evaluation and experiment: "The deterrent effect of capital punishment: Vandaele, W. (1978)
Some critical issues in assessingsocialprograms, Another view." American Economic re vie^' "Participation in illegitimate activities: I.
New York: Academic Press. 67:445-45 1. Ehrlich revisited." In A. Blumstein et al. (eds.),
Hoenack, S. A., T. T. Kudrle,and D. L. Sjoquist Deterrence and incapacitation: Estimating the
Penick, B. K. E., and M. E. B. Owens (eds.)
(1978) e[fects of criminal sanctions on crime rates,.
(1976) Washington, D.C.: National Academy of
"The deterrent effect of capital punishment: A Surveying crime. Washington, D.C.: National
question of identification." Po1ic.v Anahsis Sciences.
Academy of Sciences.
4:49 1-527. Wilson, J. Q., and 6. Boland (1976)
Petersilia. J.. P. W. Greenwood, and M. Lavin "Crime." In W. Gorham and N. Glazer (eds.),
Hoenack, S. A,, and W. C. Weiler (1977) (1978)
"A structural model of murder behavior and The urban predicament, Washington, D.C.: The
Criminal careers of habitua,felons. Washington, Urban Institute.
the criminal justice system." Unpublished D.C.: National lnstitute of Law Enforcement
manuscript. and Criminal Justice, Law Enforcement Assist- Witte, A. D. (1977)
Joreskog, K. G. (1970) ance Administration. "Estimating the economic model of crime with
"A general method for analysis of covariance individual data." Working Paper 77-6. Chapel
Reiss, A., Jr. (1980) Hill, N.C.: Department of Economics, Univer-
structures." Biometrika 57:239-25 1. "Understanding changes in crime rates." This
sity of North Carolina.
Klein, L. R., B. E. Forst, and V. Filatov (1978) volume.
"The deterrent effect of capital punishment: Zellner A. (1962)
Ross, H. L. (1973) "An efficient method of estimating seemingly
An assessment of the estimates."In A. Blumstein "Law, science, and accidents: The British
et al. (eds.), Deterrence and incapacitation: Esti- unrelated regressions and tests for a regression
Safety Act of 1967." Journal o f Legal Studies
mating the~effectof criminal sanctions on crime bias." Journal of the American Statistical Asso-
2: 1-78. ciation 57:348-368.
rates, Washington, D.C.: National Academy of
Sciences. Skogan, W. G. (1976) Zellner, A. (1971)
"Crime and crime rates." In W. G. Skogan
Kuh, E., and R. E. Welsch (1976) An introduction to Bayesian inference in
(ed.), Sample surveys of the victims o f crime,
"The variances of regression coefficient esti- econometrics. New York: John Wiley and Sons.
Cambridge, Mass.: Ballinger.
mates using aggregate data." Econometrics Zimring, F. E. (1978)
44:353-363. Sprent, P. (1969) "Policy experiments in general deterrence:
Models in regression and related topics. 1970-1975." In A. Blumstein et al. (eds.), Deter-
Loftin, C. (1980) London: Methuen.
"Alternative estimates of the impact of cer- rence and incapacitation: Estimating the efects
tainty and severity of punishment on levels of U.S. Bureau of the Census (1972) ofcriminal sanctions on crime rates, Wdshington,
homicide in American states." This volume. Statistical abstract o f the United States (93rd D.C.: National Academy of Sciences.
edition). Washington, D.C.: U.S. Government Zimring, F. E., and G. Hawkins (1973)
Miller, R. G., Jr. (1966) Printing Office.
Simultaneous statistical inference. New York: Deterrence: The legal threat in crime control.
McGraw-Hill. Chicago: University of Chicago Press.
Nagin, D. (1977)
"Crime rates, sanction levels, and constraints
on prison population." Unpublished manuscript.
Criminal jwtice planning
GARYC . KOCH
Department of Biostatistics
University of North Carolina
JUSSIM I is a deterministic, steady-state, I. Background and need, is important to begin consideration of the
nonqueueing flow simulation of a multi- for the model future generation of such planning models.
stage system like the criminal justice In this paper, we expand the view of the
system. The flow is processed through The principal computerized model in cur- existing JUSSIM models to introduce the
stages, and the process is characterized by rent use in the criminal justice planning following additional considerations:
a n input into the first stage and by stage-to- process is the JUSSIM I model (see Belkin
et al. 1971) which examines the "down- (1) Explicit concern for the demograph-
stage branching ratios. At each stage, ic and socioeconomic characteristics of the
resources are applied to the units of flow, stream" flow through the criminal justice
system beginning with crimes and follow- population generating criminality.
resulting in linear costs and resource con- (2) Explicit concern for the demograph-
sumption. JUSSIM I1 expands on JUSSIM ing the handling of such crimes as they
become associated with suspects, defend- ic and socioeconomic characteristics of the
I by incorporating the feedback flow of population generating victims.
recidivists through subsequent arrests. In ants, convicted offenders, and prisoners.
(3) Explicit concern for the effect of the
this paper, an expanded "JUSSIM 111" is JUSSIM I1 (see Belkin et al. 1974) incorpo- criminal justice system o n crime reduction
outlined. JUSSIM 111 incorporates a rates recidivism into that model through through incapacitation and deterrence.
crime-generation process and a victim- the addition of the feedback features (4) The effects on crime of environmen-
generation process from the characteristics associated with re-arrests. These features tal factors such as the state of the economy
of offenders and victims. Offenses are gen- include probability of re-arrest at various or social conditions.
erated by first-time offenders coming from points of departure from the criminal jus-
the general population and recidivists re- tice system, the time lags until recidivism, a Even though the information on most of
leased by the criminal justice system. Simi- crime-type-switch process reflecting the these relationships is still extremely limited,
larly, the population produces first-time transformation from a previous crime type there are nevertheless i m ~ o r t a n treasons
victims from a potential victim population, to a subsequent crime type, and a distinc- for pursuing the development of a model
and "victim recidivism" provides an oppor- tion between virgin arrestees (those ar- that incorporates them. Such a model
tunity for further victimization, which rested for the first time) and recidivist forces a n identification of the relevant vari-
could be influenced by the victim's self- arrestees. ables in those relationships, and s o iterates
protective actions. The offense and victim- with the data collection process t o assure
ization processes interact in a "victimiza- The JUSSIM I model has seen fairly that the information to be collected is con-
tion events" stage. The paper considers the widespread implementation (as discussed sistent with the formulation of that model.
various sources of data which could be in Cohen et al. 1973 and Blumstein 1975), Alternatively, as the data arrive from the
used to generate the parameters of such a but very little actual use has yet been made
model and the statistical approaches to of the JUSSIM I1 model. This is true
identifying the important parameters and largely because of the limited availability of
for developing estimates for them. data on recidivism, and t o a lesser degree,
because the intelligent use of this more
complex and advanced model demands
greater technical sophistication. JUSSIM
I1 is, however, now ready for implementa-
tion in a number of jurisdications, and so it
(3) The increasingly computerized criminal-
I
Figure 1.
history records (or "rap sheets") such as
the FBI's Computerized Criminal History
(CCH) file which records for each in-
dividual the sequence of his arrests and
any relevant dispositional information that
subsequently becomes available for each
arrest.
In addition, a variety of computerized sys-
tems are being developed for handling the
w w
specific functions of various subsystems of
Virgin
I' the CJS. For example, the PROMIS
Potential system, designed to aid prosecutors,
Offenders Victimization Switch
offender
events matrix maintains detailed information on defend-
copulation
Slk
5 Milk ants as they are handled through the
prosecutory processes.
Total v~ctimizations 1 All of these data systems were devised and
are used for reasons other than the
Compensatlonf
)r restltutlon
formulation and use of a planning model,
Non-reports and most of them are relatively unrespon-
Precaution sive to the information demands of such a
J
1 model. Nevertheless, the data they d o pro-
vide can often be transformed into appro-
-
Non-arrests
priate inputs for a planning model. In
*
b
addition, the planning model can indicate
variables central to planning but for which
Arrests Vlct~m no appropriate data collection system has
reactlon
yet been organized. Those variables, once
I Dlsmlssed identified, might then be appended t o exist-
ing collection efforts or, in some cases,
a Trial
might warrant an entirely new data
collection effort.
Even though the principal value of such a.
model at this time is in shaping data collec-
tion and manipulation and in the formula-
Recidivists tion of functional relationships, it could
Conviction
Offender ultimately. become an important policy
reaction
instrument when it is developed and
Release
provided with appropriate and valid data.
That role, however, will continue to be
limited by the validity of the assumed rela-
tionships incorporated into the model. As
1 Institution 1
4
- community 1 1 the forms of those relationshipsare revised,
further modifications of the models will
become necessary.
1 II. Basic structure of the model
/ A. Flow diagram. The basic structure of
the model is shown in Figure I , which
various data collection programs, they pro- The need for developing models is particu- depicts the flow of virgin offenders from a
vide a stimulus for reshaping the formula- larly important today in view of the major "criminal population" and of virgin victims
tion of the model. This interaction between data collection efforts being undertaken. from a "victim population" (both of which,
the data and the model represents a n These include: of course, are drawn from the same total
important contribution of any such model (1) The Offender-Based Transaction population) into a "victimization events"
formulation. Statistics (OBTS) system, which tracks stage where the offender and the victim
individual crimes and arrestees in their interact with each other or with other recid-
processing through the criminal justice ivist victims and/or offenders in the
system.
(2) The National Crime Panel's victim-
ization survey, which collects a wide vari-
ety of personal and crimeexperience data
from a sample of households and businesses.
generation of victimization events. Subse- ables such as age, race, sex, and marital preventive patrol, o r CJS sanction vari-
quent t o that victimization, the event is status, as well as socioeconomic variables ables. These functions could be as large and
either reported or unreported and, if re- such as education, income, and employ- as elaborate as could validly be built from
ported, a n offender may or may not be ment status. The partitioning is intended to the available data and statistical evidence.
arrested. If arrest occurs, then the suspect is divide the total population intosubpopula-
handled through the criminal justice tions which have reasonably homogeneous (4) CJS resource consumption. As is
seen in Figure I , the flow of reported
system; he may be dropped out at any one crime-propensity rates ( t , ~which
) can then crimes and arrestees through the criminal
of a number of stages of successive penetra- be measured for each crime type, k. justice system is structured similarly to
tion through the system; and then he may JUSSIM I, and the JUSSIM I structure
either recidivate or desist from future (2) Victim population (V,r). Similarly,
the total population is partitioned into vic- could be used for examining the resource
criminal activity. use associated with this model. The princi-
tim subpopulations which are indexed by
The victimization process has a similar subscripts j = 1, 2, . . . ,Nv. This partition is pal extension would involve the incorpora-
"recidivism" loop in which a victim may likely to be different from the partition into tion of the victim and offender attributes.
subsequently engage in various forms of which the offender population was struc- (5) Rehabilitation (@,r,A,L).The offender
preventive action reducing his vulnerability tured, for it represents groups with inter- feedback loop used here is very similar t o
t o victimization, and he may or may not nally homogeneous victimization risks. that associated with JUSSIM 11; the
subsequently become a victim again. In This might reflect their "value" as victims feedback here, however, is to the vic-
both the offender and the victimization of crime as well as their vulnerability to timization event rather than to re-arrest as
recidivism processes, there is a "crime- potential offenders. The strycture might in JUSSIM 11. The feedback is character-
switch" process reflecting the possibility include business or commercial enterprises ized by parameters of recidivism probabil-
that a subsequent appearance involves a as well as individuals. Here also, a victim- ity or (the complement) desistance probability
different crime type than the previous ization rate ( g , ~ would
) reflect the rate a t (@,I).These could be introduced as average
appearance. which a member of the j'h victim subpopu- values, or, more richly, as functional forms
lation becomes a victim of crime type k. of the exogenous environment in a way
This structure deals with all the functional
aspects explicitly incorporated into the (3) Victimization events (M,,L).The cen- similar to that discussed previously for vic-
JUSSIM I and JUSSIM I1 models, tral feature of the model is the stage labeled timization events. Effort would be directed
particularly the considerations of flow, "victimization events." This stage involves towards identifying the functional rela-
resource consumption, and C J S workloads the convergence,of the offenders who come tionships of recidivism probability (I-@,k)
associated with JUSSIM Iand the rehabili- initially from the "potential offenders" and the mean time until recidivism (or its
tationlrecidivism aspects of JUSSIM 11. In population and the victims who come initial- reciprocal, the mean recidivist crime rate
addition, however, it introduces a number ly from the "potential victims" popula- ( h , ~ ) for the offender subpopulation
of new considerations. First, it goes back tion. Both of these "potential" populations groups. More elaborate functional structures
from the crime or arrest stage to identify first generate first-time or "virgin" of- could be introduced to account for the
the relevant criminal population and the fenders and virgin victims, many of whom contemporary socioeconomic environment,
relevant victim population in terms of their reappear subsequently as recidivist of- the criminal justice system's deterrent activ-
demographic and socioeconomic charac- fenders and recidivist victims. A victimiza- ity, the nature of the rehabilitation
teristics. In addition, it incorporates the tion event involves the joint interaction of treatment offered, and other factors that
effects of the various "environmental an offender of type i with a victim of type j might reflect the individual's prior criminal
factors" (e.g., economic conditions, social in a crime of type k, and so the victimiza- history and his last treatment by the CJS.
conditions) as considerations in their crimi- tion events are characterized by rate (6) Victim vulnerability (v,~).Just as the
nality or victimizationvulnerability. Other- parameters M,,r, which would involve vir- model displays a feedback process for
wise, the model attempts to reflect the gin or recidivist offenders and virgin or criminal offenders, it also includes a
deterrent effects of actions within the recidivist victims (i.e., the four combina- feedback loop for victims, with their associ-
criminal justice system on the criminality tions of potential victimization activity). ated "recidivism" rates., v,i.
... This rate can be
of the relevant potential criminal popula- The M,,Lentries could be absolute quan- affected by factors related to the compensation
tion as well on the recidivism character- titative rates reflecting the respective rates of victims or to restitution by the offender
istics. The following discussion of each of of victimization, or they could be more or by various types of protective action
these aspects of the model indicates how general functions reflecting the way those taken after a victimization event in order to
these representations would be accomplished. rates vary with other exogenous variables. reduce further victimization.
These could include contemporary eco-
B. Identification of parameter groups. In nomic conditions, factors in the social (7) Offender-victim-crime-switch proc-
this section, the major groups of variables environment, police deterrent activity like ess (T). In each cycle through the recidi-
are identified, and their individual struc- vism process, it is possible for each dimen-
tures, their relationships to each other, and sion of the previous path to be transformed.
the effects of exogenous variables are
explored. First, there is the potential of straightfor-
ward transformation of crime type (a
( I ) Potential offender population (si~). burglar switches to larceny or a victim of
The potential offender population is robbery has his automobile stolen the next
created by exhaustively partitioning the time). There can also be transformation of
total population (a)into subpopulations
indexed by a subscript i=1,2, . . . ,NO.The
partitioning is based on demographic vari-
both the offender's and the victim's sub- Ill. Structure of the model This potential criminal population would
group, either through internal processes, parameters give rise t o an input of virgin criminals Kk,
such as aging, or by exogenous effects, reflecting the number of offenders of the ih
such as change in socioeconomic status The basic variables in the model include the
potential offender group committing crimes
through change in economic and employ- following:
of type k.
ment conditions. A large switch matrix, T, (1) Criminal population, their charac-
is included to reflect these transformations. teristics, and their criminality. B. Oflender recidivist population. The
(2) Recidivist population and their recidivist population is similarly charac-
(8) Incapacitation effects. Changes in recidivism probabilities and crime rate. terized by a pair of variables, 4 , a~n d h,k,
incapacitation strategy in the criminal jus- (3) Victimization population and their where @,k is the probability of desistance of
tice system would be reflected through characteristics. a person of type i who last committed a
branching ratios associated with incarcera- (4) Victimization event rates reflected in crime of type k (where desistance in this
tion (e.g., reflecting the increased use of the M matrix. case implies complete cessation of crime
prison) or through the effect of longer sen- (5) Offender-victimcrime switch process. committing behavior). In addition, those
tences on the longer observed time between (6) Branching ratios of the criminal jus- who do continue to commit crimes d o so at
criminal events, with the associated reduc- tice system. a rate A,k, reflecting the reciprocal of the
tion in the individual crime rate (ilk) for (7) Resource costs and workloads as time until the next crime by a person of
persons routed through prison. used in the JUSSIM I model. type i who has just previously committed a
(9) General-deterrenceeflects. The gen-
crime of type k.
In this sectio?, we examine these various
eraldeterrent effect of sanctions used in The attributes associated with the
groups of variables and the structure asso-
the criminal justice system (e.g., appre- recidivist population could include the
ciated with estimating these variables from
hension probability, conviction probabil- same ones characterizing the criminal
available data. In many cases, we try to
ity, probability of imprisonment and sen- population, augmented by the individual's
indicate our current best judgment of the prior criminal record (the number of prior
tence) would be reflected through the func- appropriate data elements in estimating
tional relationships among the sanction arrests, convictions, sentences) and by the
these variables, but these will of course treatment last given him by the criminal
levels and the virgin criminality (t),the depend o n the degree t o which data o n the justice system (failure to arrest, arrest but
desistance probability (@),and the recidi- indicated variables are available and the no charge, acquittal at trial, conviction but
vist crime rate (A,k). As these relationships degree to which they d o indeed serve to released into community supervision, or
develop from the deterrence literature, they estimate the relevant variables, since they institutionalization). In any of these, any
could be incorporated directly into estimating could well be augmented by other elements level of detail appropriate to alternative
these parameters. or replaced by other more efficient estimat- specific treatment programs could be
(10) Environmental factors. It is well ing variables. Thus, the specifics of the
incorporated into such a model.
known that a wide variety of factors in the variables identified serve more as illustra-
tions than as the ultimate definitive set that C. Victimpopulation. The structure of the
socioeconomic environment are highly
will eventually be used. victimization population would be devel-
correlated with crime rates, both cross-
A. OSfender population. The offender oped in a manner similar to that of the
sectionally and longitudinally. It would be
extremely desirable t o incorporate the population is characterized by a set of at- offender population. The dominant demo-
effect of these factors into the victimiza- tributes reflecting the demographic and graphic, social, and economic variables
tion-event functional relationships to re- socioeconomic characteristics along which would include age, race, sex, marital status,
flect the issues surrounding the question of they are best partitioned to generate sub- education level, and income. It may well
the "causes of crime." These factors would groups with homogeneous offending rates. turn out, however, that an examination of
The presumed relevant attributes include the detailed data will suggest a different
be reflected in a manner similar to the
the following: structuring of the individual variables for
deterrence variables, i.e., through the
(1) Demographic variables-age, race, the victimization population than for the
desistance and crime rates associated with
sex, marital status. offender population, even though the basic
the recidivist population. If they could be
(2) Socioeconomic status variables- variables would be the same.
adequately identified, these would provide
education level and income level. In addition, the victimization popula-
important policy bases for crime-control
tion would also be characterized by some
actions that go beyond the confines of the The demographic variables might include measure of exposure. This measure would
criminal justice system. As with the other binary partitions of race and sex, a three- include a combination of considerations of
relationships in the model, the problems way split for marital status (never married,
relate to the difficulty of estimating these assets o r vulnerability to victimization as
currently married, and previously married well as considerations of self-protective
relationships, particularly in an identified but not currently), and some type of group-
causal form. actions taken to reduce the risk of
ing for the age variable. For the socioeco- victimization.
nomic status variables, a n initial estimate
might include for education (less than 8
years, 8 to 12 years, 12 years, and more
than 12 years) and for income (less than
$5,000 per year, $5,000-$10,000 per year,
$10,000-$20,000 per year, and more than
$20,000 per year). In addition, there would
be a variable reflecting the individual's em-
ployability or skill level.
D. Rate of victimization events. The rate T o the extent that data d o not permit JUSSIM 111 will require a more elaborate
of victimization events is indicated by the determination of the M,]k functions in switch process. First, it must incorporate
entries in the victimization matrix, M,,r,t he terms of environmental factors and deter- the offender's crime-type switch as in
rate at which a victim of c1ass.jis victimized rence factors, then these factors should be JUSSIM 11. It will also require transforma-
by a n offender of class i for a crime of class brought into the relationship for determi- tions of both the offender class and t h e
k. The structure of the matrix isdictated by nation of the virgin crime-propensity from victim class on subsequent recidivism.
the structure of the offender and victim the potential criminal population (0, a nd Thus, a n offender would transform from
populations. The entries would be the rate for the determination of the recidivism type i to i', a victim from type j toy, and the
of aggregate victimizations by aggregate parameters, A and 4, associated with the crime type from type k t o k'. For example,
offenders (combining the virgins and recid- recidivist offenders. It is probable, however, a n offender might age, change his education
ivists of both offender and victim groups). that the relationship will be more easily level (perhaps because of a n educational
The entries in the matrix would be either a determined for the victimization rates than component of his treatment program)
simple scalar value for the rate of victimiza- for the offenders, because most criminal increase his earnings, or change his marital
tion events or, more generally, a function records d o not make an adequate distinc- status between successive incidents. T h e
of current environmental factors, the deter- tion between virgin and recidivist offenders. switch matrix would therefore reflect those
rent effects of current criminal justice Therefore, the relationship may well be rates of state transition. For victims, the
sanctions, and the effect of such police more easily applied directly through the transition might reflect similar changes in
practices as preventive patrol. M,,k matrix than partitioned into separate demographic structure or changes in
Examples of the relevant environmental relationships for virgins and recidivists, exposure reflecting various actions taken
factors include: with the recidivists' relationship partitioned for self protection. The matrix would be a
(1) Population density as measured by between the desist probability (4) and the square matrix with rank equal t o the
people per acre in the district being studied, associated crime rate, A. product of the number of offender types by
such as a census tract. the number of victim types by the number
E. Victim recidivism. Recidivism is built in
(2) A measure of the housing condition of crime types on each of its dimensions.
for victims just as it is for offenders. The
in the district, as measured, for example, by parameters for the victimization recidivism G. Branching ratios in the criminal justice
the persons per room o r the measured state process, identified as victimization at a rate system. For the flow through the criminal
of dilapidation of the housing in the area. vJr would be a parameter very similar to A,r justice system, JUSSIM 111 requires
(3) A measure of the migratory mobility for the offender recidivists. The victimiza- branching ratios similar to those associated
of the population in the area as measured tion-recidivism function would be associ- with JUSSIM I and JUSSIM 11. These
by the percent of population resident in the ated with each victimization population branching ratios, however, must now
area for less than 2 years. reflect the much richer "characteristic" o r
(4) A measure of the state of unemploy- group j, and would be designed t o incorpo-
rate consideration of the victims' prior "crime-type" structure of the JUSSIM 111
ment in the area as measured by the percent
history, just as offenders' prior history is model. Thus, the branching ratios would
employed, the percent seeking employment depend in general o n the characteristics of
but unemployed, and the percent eligible taken into account in estimating the recidi-
vism parameters. In addition, v,k would the offender, the characteristics of the
for employment but no longer seeking
take into account the victims' reactions to victim, and the crime type. This provides
employment. the opportunity for reflecting the differ-
(5) A measure of the state of family their prior victimization experiences and t o
the compensation or restitution envi- ential treatment given to offenders or
disintegration in the region as reflected,
ronment. For example, if compensationar- defendants based on their different demo-
say, in the percent of one-parent families.
rangements tend to reduce the incentives graphic or socioeconomic attributes. It
(6) A measure of the differences across
for self-protective action, then a n environ- also provides the opportunity for reflecting
regions, as measured by a variety of
ment that provides victim compensation the influence of a victim's characteristics o n
regional indicator variables.
would be expected t o stimulate a higher the treatment accorded his attackers (e.g.,
The deterrence variables would be reflecting a difference in the courts'
reflected through additional functional victimization-recidivism risk. If prior vic-
timization history stimulates self-protective responses to intergroup events rather than
relationships on the M matrix. These to intragroup ones).
relationships would include variables such action such as target-hardening or escape,
as the probability of arrest given a crime, then the victimization-recidivism rate H. Resources, costs, and workloads. The
the probability of conviction given a n would be reduced correspondingly. JUSSIM 111 model would include data o n
arrest, the probability of imprisonment F. Offender-victim-crimeswitch. J U SSI M the resource costs and workloads just as
given conviction, and the mean time served I1 calls for a crime-switch matrix reflecting they are incorporated in the basic JUSSIM
for those imprisoned. the transformation from a prior crime type I format. If the parameters are independent
The police crime prevention activities to a subsequent one by recidivists; of the offender or victim class, their values
might include the intensity of preventive would simply be replicated for that
patrol (as measured, for example, by the segment of the workload vector. If the
mean patrol passage time for a random workloads are sensitive to either class, then
point in the district), by the percentage of that relationship would be reflected in
unmarked patrol activity, as well as by the richer detail within the workload vector.
rate of various forms of police crime- The resource costs would depend only on
prevention activity, such as the use of the resource and would be independent of
family crisis intervention units. any of the crime type, victim, or offender
characteristics, as in the previous versions
of JUSSIM.
IV. Statistical considerations (vii) Whether a victimized person expe- Similarly, if simultaneous information for
riences a subsequent victimization or not both the offender and victim can be
The statistical issues underlying the devel- during a particular time period after the
opment of the JUSSIM I11 model pertain obtained for individual victimization events
previous victimization. and consecutive pairs of victimization
to the formulation of valid methodological
strategies for estimating the functional The independent variables would reflect events, appropriate contingency tables can
relationships which characterize the re- the specific nature of such exposure units also be formulated to determine the
spective model components. For this as: victimization rate structure ~ { , ] kand
) the
purpose, attention must be directed to the (a) The demographic, socioeconomic, crime switch structure { T , k , , t l l k ; , ~ ~ l l ~ k ~ ~ )
following four basic problems: and vulnerability characteristics of poten- respectively. More realistically, hqwever,
(1) The specification of the structure of tial victims. such data would be very difficult, if not
the data array required for the estimation (b) The demographic, socioeconomic, impossible, t o obtain. For this reason, a
of a particular functional relationship and and opportunity characteristics of potential more practical estimation strategy may be
its corresponding parameters. offenders. to apply synthetic estimation ("raking")
(2) The specification of methods of sta- (c) The crime type and the environmen- procedures (as described in Appendix A) t o
tistical analysis for parameter estimation tal characteristics for reported victimiza- adjust analogous arrest data like (d) t o the
tions together with any available informa- corresponding separate marginal struc-
from appropriate data arrays.
tures for victims and offenders like the
(3) The specification of available data tion for the involved victim and offender as
{vk) and {S,k). However, as indicated in
sources and their possible limitations as a in (a) and (b).
basis for parameter estimation. (d) The demographic, socioeconomic, the next section, such methods should be
(4) The specification of the potential and ~reviouscriminal record character- used cautiously because they presume that
istics-of an arrested person together with the joint victim-offender crime association
need for new data sources in terms of
alternative sampling and measurement corresponding information for the in- structure for victimizations is the same as
procedures. volved victim as in (a) and the crime type for arrests.
The remainder of this discussion is and environment as in (c). In summary, various types of multidimen-
concerned with the implications of these (e) The demographic, socioeconomic, sional contingency tables can be con-
considerations for the JUSSIM 111 model. and criminal record characteristics of a structed as a basis for estimating the
person released from the criminal justice parameters in the JUSSIM 111 model.
A. Spec8cation of data array structure
system (either prior to trial, at the end of Some of these tables may involve rather
for parameter estimation. Since the JUSSIM
trial, etc.) and their opportunity character- crude data while others may require highly
111 model is concerned with the rates of
istics for committingsubsequent vidmhtions. sophisticated data. In either situation, the
occurrence of discrete events (victimiza-
(f) The demographic, socioeconomic, critical issue is the formulation of such
tions, arrests, trials, etc.), the data arrays
previous victimization history, and vulner- estimation problems in terms of contin-
required to estimate the various functional
ability characteristics of a victimized gency tables which can then be manip-
relationships in its structure are multidi-
person. ulated via the methods of analysis in
mensional contingency tables which link
the frequencies of such events to the Thus, the parameters in the JUSSIM 111 Appendix A to determine the functional
characteristics of the corresponding vic- model can be estimated through the relationships which characterize the model
tims, offenders, and environmental sub- analysis of such contingency tables as: components. In any event, a considerable
populations. In this framework, the (1 (i) vs.(a) to determine the structure effort in data collection, analysis and
assumption testing can be anticipated
dependent variables would pertain to the (3) of the victim population and the before valid and credible relationships are
outcome (or response) status for exposure virgin victimization rates { q , k ) .
units at risk for such phenomena as: (2) (ii) vs. (b) to determine the structure developed.
(i) Whether a person of a particular type {s,L) of the offender population and virgin B. Specification of available data sources.
experiences any victimizations during a offender rates {hk). The JUSSIM 111 model described in this
particular time period (the most recent day, (3) (iii) vs. (a) and (iii) vs. (b) to paper is extremely elaborate in order to
week, month, year). determine the reporting rate structure for account for the diversity of victim types,
(ii) Whether a person of a particular victimizations from the victim and of- offender types, and crime types. For this
type commits any victimizations during a fender perspectives. reason, obtaining data for the formal con-
particular time period. (4) (iv) vs. (c) to determine the arrest struction of the model will require
(iii) Whether a victimization event is rate structure for reported victimizations. extensive use of available data sources as
reported to police by either the involved (5) (v) vs. (d) to determine the prison well as the development of new data
persons or witnesses. rate structure for arrests. sources in the future. In this section,
(iv) Whether a reported victimization (6) (vi) vs. (e) t o determine the recidi- various existing data sources are discussed
event ultimately leads to an arrest. vism rate structure {h,k)and the desist rate in terms of their applicability to the
(v) Whether an arrested person is structure {4,k). JUSSIM 111 model.
ultimately sent to prison or experiences (7) (vii) vs. (0 t o determine the victim-
The FBI's Unljbrm Crime Reports (UCR)
other sanctions. ization recurrence rate structure { v j k ) .
(vi) Whether an arrested person com- present basic data for police reported
mits a subsequent victimization (and/ or is crime rates in different parts of the United
re-arrested) or not during a particular time States. The corresponding arrest data
period after release from the criminal jus- provide some inforniation concerning of-
tice system (either prior to trial, at the end fender demographic status as well as the
of trial, or at the end of prison sentence or environmental situations in which the re-
other sanction).
spective crimes have occurred. On the Another relevant information source is the C. Specification of new data sources. A
other hand, the principal limitation of criminal history record or "rap sheet." primary motivation underlying the formu-
these data is that the arrest process can These records typically include data o n the lation of the JUSSIM 111 model is its
involve a biased selection of the offender age, race, sex, and possibly other demo- potential usefulness as a planning instru-
population, some offenders being more graphic characteristics of the offenders, as ment for criminal justice system policy
arresi prone than others. Thus, estimates well as the sequence of offenses for which decisions. However, this type of applica-
obtained from the UCR data for offender they were arrested, the dates of arrest, and, tion is appropriate only if the estimated
characteristics need to be contrasted with when reported, the disposition of each functional relationships in the model are
corresponding results from other sources arrest. Thus they provide a basis for the based on valid data. Thus, the inherent
of information like victimization surveys estimation of the recidivism behavior of weaknesses of the existing sources of infor-
and offender self-report studies in order to offenders. The rap sheet data and the mation, like those described previously in
evaluate the general magnitude of this bias. OBTS data are largely complementary. Section IV. B, imply the need for new data
Such comparisons also provide a basis for They also provide some opportunities for collection systems havingless selection bias
the adjustment of competing estimators consistency checks, but they are not likely in their sampling procedures and more
from alternative data sources to a common to be available for all offenders in all juris- accurate measurements. From a statistical
framework by synthetic estimation (rak- dictions for a long time to come. Special point of view, each of the respective types
ing) procedures as described in Appendix adjustment procedures will be required t o of contingency tables (1)-(7) described in
A. Other comparisons of UCR crime data use such data in jurisdictions other than the Section IV.B, together with the corre-
with victimization data and offender self- few for which good data are available. sponding dependent variables (i)-(vii) a n d
report data can be used t o estimate the ex- independent variables (a)-(f), should be
tent to which various crime types are Other aspects of criminal history, like non-
considered in this light, edch requiring
reported or not reported to the police. reported offenses or offenses for which no detailed specifications to obtain data with
arrests were made, can be analyzed with
The victimization surveys provide the pri- the required validity. Thus, a realistic dis-
offender self-reports. Such self-reports are
mary sources of information for estimating cussion of the development of the new
unquestionably suspect a priori, but fur-
functional relationships in the victim- information sources required warrants a
ther study is required t o determine the
ization process. In addition, victim recidi- separate research effort beyond the scope
degree to which there is distortion in the
vism information is potentially obtainable of this paper. Nevertheless, some brief re-
self-reporting process (both suppression
from the longitudinal aspects of the na- marks about the general requirements for
and elaboration) and to identify methods
tional survey, which obtains information such data collection efforts can be given t o
for adjusting for such distortions. In this
repeatedly from panel members. The panel motivate those future investigations.
context, the most important use of self-
data could be used t o construct estimates report information would be the estima- First of all, attention should be directed
for the intervals between victimizations or tion of association parameters for offender toward improving the quality of the data
the rate of victimization and the nature of characteristics which could then be synthe- pertaining t o the processing of arrests
the crime switch process for victims. All of sized with analogous data from rap sheets through the criminal justice system. A
this analysis, however, should be under- and from victimization surveys. national sample of jurisdictions will be
taken with caution because of the errors needed in order to obtain complete follow-
with which individuals recall victimization In summary, these available data sources
u p information on the ultimate disposition
events, especially sequences of such events. provide a basis for estimating in at least a
(e.g., dismissal before trial, acquittal after
preliminary way many of the parameters of trial, probation after conviction, prison
Where available, the Offender Based the JUSSIM 111 model, even in the face of
Transaction Statistics (OBTS) are particu- sentence of specific duration) for a n appro-
their respective limitations and even
larly well suited as data sources for the priately defined parallel set of stratified
though none of them is available at the vic- subsamples of different types of arrests
branching ratios throughout the criminal tim-offender-crime level of detail for
justice system. Typically, these can be esti- (e.g., all homicides, 30% of all other felo-
victimization events. Moreover, a wide va- nies, 10% of all misdemeanors, etc.).
mated for each of the offender demo- riety of special-purpose studies (e.g., the
graphic groups since the OBTS incorpo- Moreover, such data should be collected in
Kansas City Police Patrol Experiment
rate offender characteristics as part of the a manner which is not biased by the
1974, the Wolfgang, Figlio, and Sellin 1972
regular record. If the OBTS contain some selected police departments and courts,
birth cohort study, etc.) represent addi-
limited victimization information, such does not interfere with their everyday
tional sources of information for estima-
data might provide preliminary estimates operation, and encourages their coopera-
.ting various parameters after appropriate
for the interactions in the joint offender- tion and participation.
adjustments have been made for their
victim victimization rate structure. special character o r the particular jurisdic-
tion where they took place. Thus, although
suitable caution must be exercised, existing
data sources can be used to form pre-
liminary estimates for various functional
relationships in the JUSSIM 111 model,
and those estimates will stimulate the col-
lection of better data and the improved
specification of relationships, eventually
resulting in a reasonable and useful
formulation.
1 Table 1. Predicted values for prison rates from linear model contingency table analysis
I
I-
Defendants Predicted
offense1
Prior
arrests
Arrest
promptness2 lncome3
Total
Defendants Steon',":?," prison
rate
NRB = nonres, burg.; RE = res. burg.; Residual goodness of fit O (D.F.=21) = 6.01
O F M L = larceny (felony and misdemeanor)
Total variation 12(D.F.=23) = 87.71
2~ = arrest same day as offense; A = later day
Percent unexplained variation = 7%
3~ = low; H U = high or unclassified
Secondly, a national sample similar to that that victimizations are publicly perceived corresponding victimization events and
described for arrests will be needed for a t an aggregate level (for instance, a 1- possibly previous events. Obviously, the
information o n the subsequent experience month time period for all persons who live principal disadvantage of this data source
of convicted offenders who are released in a specific census tract) as relatively would be the bias associated with its reli-
from the criminal justice system via proba- prevalent events, but are experienced as ance on volunteer reporting. Nevertheless,
tion, parole, o r other means. This infor- very rare events by specific individuals for if the reporting rates for victimizations
mation source would also involve a multi- such isolated time periods as 1 week or 1 were high, then the effects of this bias might
stage selection beginning with institutions, month. Thus, data collection systems like be reduced by using matching procedures
such as courts, full probation, halfway the victimization surveys which focus on to link such information to that obtained
houses, and prisons, and ultimately the recent experience of selected individ- from police records and victimization
focusing on released offenders. Various uals can provide only a limited amount of surveys and applying multiple-record-
types of data would then be collected for information about the reported victimiza- system statistical estimation procedures
the individuals in the sample by both active tions themselves (ignoring temporarily the like those described in Bishop, Fienberg,
(interview) and passive (reports of subse- corresponding measurement error prob- and Holland (1975, Chapter 6), Koch, El-
quent arrests by the police or FBI) methods lems) because of the relatively small Khorazaty, and Lewis (1976a), and Marks,
for a particular fixed future time period of number who are involved even in verv.large
perhaps as long as 10 years. samples. They do, however, provide useful
- Seltzer. and Krotki (1974).
The formulation of new information information about different types of Finally, other types of new information
sources about the arrest process, although victimization rates in the exposed popu- systems may be of interest with respect to
perhaps prohibitively expensive in prac- lation at risk. Thus, another data source is certain specific aspects of victimization
tice, is straightforward in principle. The needed for obtaining more extensive events. In this regard, a national sample of
questions pertaining to improving the coverage of victimization events. One sys- long-term cohort studies on virgin victim-
quality of victimization data are consider- tem which could be developed for this pur- izations would provide useful data similar
ably more difficult. Thecritical issue here is pose would be a national system of victim- to that provided by Wolfgang, Figlio, and
ization reporting centers whose locations
were based on an appropriate sampling
plan. The explicit mission of these centers
would be t o provide free counseling and
legal advice in a confidential manner (i.e.,
without specific notification to the police
or other official agencies) t o both offenders
and victims; and their implicit mission
would be t o obtain information about the
Sellin (1972) o n virgin offenses. Moreover, eligible combinations of variables in a multi- For the burglary and larceny arrest data consid-
a national follow-up sample for suitably variate relationship. The first variable selected ered by Clarke and Koch (1975), Phase I led t o
identified victims who a r e linked t o arrests was the one having the largest (x2/d.f.) with the selection of type of offense, income, prior
or other methods of reporting might respect to its first-order (two-way) relationship arrest record, and arrest promptness, respec-
to prison outcome. Additional variables were tively. These four variables were then cross-
obtain information a b o u t their subsequent
selected by applying a similar selection rule using tabulated with prison status to produce a five-
victimization experience. (x2/d.f.) computed for three-way, four-way, etc. dimensional contingency table. Phase I1 then
I n summary, the formulation of a J U S S I M contingency tables involving all of the involved the fitting of a model to the prison rates
111 model helps t o identify several new previously selected independent variables suc- for all combinations of the selected independent
cessively with each of the eligible remainingvari- variables. For this purpose, the weighted least
sources of d a t a f o r the measurement of
ables vs. prison outcome. Phase 1alsoincluded a squares methods described in Grizzle, Starmer,
crime a n d the activities of t h e criminal jus- procedure for terminating the selection process and Koch (1969) were used to formulate a n ef-
tice system. A broad range of possibilities when the remaining variables were not statis- fective additive linear model for characterizing
exists for the design of such future tically important. Two different types of statis- the variation among prison rates by systemati-
information systems, b u t their specific tics were used for this purpose: cally removing unimportant sources of variation
development requires a substantially more (A) The Pearson X2-statisticsfor the partial such as higher order interaction effects. Such
comprehensive investigation. T h e J U S S I M association (from two-way contingency tables) effects are not retained unless they are significant
I11 model sketched here represents a n im- of a specific eligible variable vs. prison outcome at a n appropriate level like a = 0.05. In addition,
portant instrument for generating a n summed over all possible combinations of vari- the model is not considered to be satisfactory
ables that have already been selected. until a residual goodness of fit statistic Q
agenda of future research in the d e v e l o p
(B) A Xz-statistic developed by Cochran becpmes small (i.e., not significant at a = 0.25),
ment o f criminal justice statistics for use in (1954) and Mantel and Haenszel (1959), which for otherwise not all of the important sources of
the planning process. combines information with respect to the effect variation have been identified. A final criterion
of a specific eligible variable on prison outcome for model effectiveness is a measure of unex-
Appendix A: over all combinations of previously selected plained variation, analogous to (I - R ~ in ) mul-
Specification of methods wriables. tiple regression, which is defined as the ratio of
of statistical analysis the goodness of fit statistic for the model to a n
The statistic (A) reflects both the main effects of
analogous statistic for total variation among all
The principal objective underlying statistical a specific variable and its interactions with previ- the prison rates (i.e., the goodness of fit statistic
analyses for contingency tables such as (1)-(7) in ously selected variables. After the first few steps for a model which implied that all the rates were
Section 1V.A pertains to the characterization of of the selection process, this statistic tends tolose
equal). U
the relationship between dependent outcome its usefulness for two reasons. First, its degrees
variables such as (i)-(vii) and correspondingsets of freedom increase rapidly causing selection to Analyzing prison rate data in this way leads toan
of independent variables such as (a)-(f). Atten- become overly stringent. Second, the data be- efficient description or smoothing of the data as
tion is directed at identifying which of the come thinned to the extent that many of the cell shown in Table 1. These results indicate that the
independent variables account for the variation frequencies in the multidimensional contingency functional relationship between prison status
in the respective dependent variables together table become smaller than 5 so that this criterion and the independent variables which were
with the extent of the interaction among them. begins to lose its validity as a chi-squarestatistic. included in the analysis can be summarized in
One approach for dealing with these questions is At this point, statistic (B) becomes useful terms of four distinct predicted values or clusters
given in Clarke and Koch (1975), who consid- because it combines information across all as follows:
ered the relationship between the probability of combinations of previously selected variables Cluster I. High prison rate = 53.7 percent if
prison sentence and independent variables cor- and is thus more resistant to the thinning nonresidential burglary and low income and
responding to the defendent's age, race, sex, problem. This statistic is highly sensitive with arrested same day as offense.
income, employment, type of offense charged, respect to detecting weak but consistent CIusrer 2. Moderate prison rate = 30.4
prior arrest record, and arrest promptness (a relationships for variables which have not yet percent if nonresidential burglary and (a) low
been selected; however, it has the disadvantage income but not arrested same day, or (b) arrested
proxy for strength of evidence against the
defendant) for a sample of certain types of that it reflects the "average"effects of a variable same day but not low income, or (c) one or more
burglary and larceny arrests occurring in as opposed to its "total contribution," which arrests but not low income and not arrested same
Mecklenburg County (Charlotte), North Carolina, includes interactions with other variables. For day, etc.
during 1971. Their analysis consisted of two the most part, this difficulty should not often Cluster 3. Low prison rate = 19.3 percent ry
phases: pose a major problem because statistic (A), larceny and one or more arrests and low income.
Phase I: A screening of the variables to select which is used in the earlier stages, does pertain to Cluster 4. Very low prison rate= 7.2 percent if
those responsible for the greatest amount of the "total contribution" of a variable. In the later not in Clusters 1, 2, or 3.
variation in prison rates among the subpopu- stages of the selection process where statistic (B) These "predicted values" are different only if
lations defined by different combinations of the is used, the "average effects" of variables are the the corresponding observed values are signifi-
independent variables. ones of primary interest becausethe interactions cantly different; moreover, they represent better
Phase II: The fitting of a parsimonious model with other variables are likely to be of minor estimates (i.e., with smaller standard errors) of
involving the independent variables selected as importance because the relationships to which the prison outcome probabilities than the actual
important during Phase 1. they apply are generally weaker. In summary, observed rates for the respective subpopulations
statistic (A) is used to decide whether to termi- corresponding to the cross-classified independ-
Phase I was conducted in the same spirit as step- nate selection after the first two or three vari- ent variables, because they are based o n the
wise multiple regression, but in a context appro- ables have been selected, and statistic (B) is used entire set of data rather than on its component
priate for the categorical nature of the discrete thereafter. In each case, the basis for terminating subsets. Thus, a clearer and more simplified
variables under investigation. In this regard, cer- selection is failure to meet a significance level of framework is obtained for interpreting the rela-
tain Pearson Xz-statistics divided by their a = 0.10 or a = 0.05, as in forward stepwise re-
respective degrees of freedom were used like the gression. Finally, in some situations, certain
"F to enter" statistic in multiple regression as variables are known apriori to be of importance.
measures of relative importance for suitably These can be included either at the beginning of
Phase 1 or at the end, depending on their poten-
tial causal role with regard to the dependent
variable.
tive effects of the important independent In summary, a broad range of statistical meth- Freeman, D. H., Jr., and G. G. Koch (1976)
variables than would be possible from casual ods are available t o estimate functional relation- "The asymptotic covariance structure of esti-
inspection of the full multidimensional contin- ships for the components of the JUSSIM I11 mated parameters from marginal adjustment
gency table. model. Some of these are based o n weighted (raking) of contingency tables." 1976 Proceed-
least squares computations while others are ings o f the Social Statistics Section o f the
An alternative framework for Phase 11 analysis American Statistical Association 330-335.
is based on the use of log-linear models. These based on the Deming-Stephan Iterative Propor-
types of funct~onalrelationships are discussed tional Fitting procedure. Thus, for any specific Goodman, L. A. (1970)
extensively in Bishop, Fienberg, and Holland application, the critical issue is to use that meth- "The multivariate analysis of qualitative data:
(1975), Goodman (1970, 1971), and Ku and od which is most appropriate t o the estimation Interactions among multiple classifications."
Kullback (1974). They can often be applied t o problem under consideration. Journal o f the American Statistical Association
contingency tables such as the previously con- 65:226-256.
sidered prisondata by the Deming-StephanIter- References Goodman, L. A. (1971)
ative Proportional Fitting procedure in con- "The analysis of multidimensional contin-
junction with an appropriate set of marginal Belkin, Jacob, A. Blumstein, and W. Glass
(1971) gency tables; stepwise procedures and direct
subtables. For this reason, the resulting esti- estimation methods for building- models for
mated parameters have reasonably robust and "JUSSIM, a n interactive computer program
for analysis of criminal justice systems." Urban multiple classifications." Technometrics 13:
stable statistical properties even for sparse con- 33-6 1.
tingency tables ( w ~ t hmany small frequencies Systems Institute Report, School of Urban and
which are less than 5). Their major disadvantage Public Affairs, Carnegie-Mellon University, Grizzle, J. E., C. F. Starmer, and G. G. Koch
is the possibly unclear interpretation of the log- July 1971. ( 1969)
linear model parameters, particularly when Belkin, Jacob, A. Blumstein, and W. Glass "Analysis of categorical data by linear
interaction is present in the relationships among ( 1974) models." Biornetrics 25:489-504.
the dependent and independent variables. "JUSSIM 11, an interactive feedback model Ireland, C. T., and S . Kullback (1968)
Further discussion of the relative merits of linear for criminal justice planning. Urban Systems "Minimum discrimination information esti-
vs. log-linear models is given in Bhapkar and Institute Report, School of Urban and Public mation." Biornetrics 24:707-7 13.
Koch (1968a, 1968b). This subject is alsoconsid- Affairs, Cainegie- ello on University, January
ered in Koch et al. (1976b) In the context of a 1974. Kelling, G. L., T. Pate, D. Dieckman, a n d C. E.
general methodolog~calstrategy for estimating Brown (1974)
log-linear model parameters, which is based on Bhapkar, V. P. and G. G. Koch (1968a) The Kansas City Preventive Patrol Experi-
the simultaneous use of weighted least squares "Hypotheses of 'no interaction' in multidi- ment: A technical report. Washington, D.C.:
and lterative Proport~onal Fitting or other mensional contingency tables." Technometrics Police Foundation.
related computational algorithms. 10:107-123.
Koch, G. G., D. H. Freeman, Jr., and J. L.
Bhapkar, V. P., and G . G. Koch (1968b) Freeman (1975)
Another statistical method of potential use with "On the hypotheses of 'no interaction'in con-
respect t o the JUSSIM 111 model is synthetic tingency tables." Biometrics 24:567-594. "Strategies in the multivariate analysis of data
estimation ( o r "raking") for contingency tables. from complex surveys." InternationalStatistical
This analytical procedure permits an observed Bishop, Y. M. M., S. E. Fienberg, and P. W. Review 43:59-78.
table corresponding to a sample from a specific Holland (1975) Koch, G. G., M. N. El-Khorazaty, and A. L.
population to be adjusted t o yield estimators for Discrete multivariate ana!vsis: Theory and Lewis (1976a)
other target populations, e.g., (I) local or region- practice. Cambridge, Mass.: M.I.T. Press. "The asymptotic covariance structure of log-
al subdivisions of a sampled national population; Blumstein, Alfred (1975) linear model estimated parameters for the
(2) other local or national populations which "A model to aid in planningfor the total crim- multiple recapture census." Communications in
partially overlap a sampled local population. inal justice system." In Quantitative tools for Statistics A-5: 1425-1445.
The assumptions required for the validity of this crimrnal justice planning, Washington, D.C.:
Koch, G. G., D. H. Freeman, Jr., P. B. Imrey,
approach are: U.S. Department of Justice, Law Enforcement and H. D. Tolley (1976b)
(I) Certain. marginal distributions for the tar- Assistance Administration.
"The asymptotic covariance structure of esti-
get population, referred to as the "allocation
mated parameters from contingency table log-
structure," are known on the basis of census or Brock, D. B., D. H. Freeman, Jr., J . L. Freeman,
and G. G. Koch (1975) linear models." Proceeding of 9th International
other data.
(2) The higher order interactions across the "An application of categorical data analysis to Biometric Conference, Cambridge, Mass., August
subsets in (I), referred to as the "association the National Health Interview Survey." Pro- 1976.
structure,"are the same for the target population ceedings o f the Social Statistics Section o f the Ku, H. H., and S. Kullback (1974)
as for the sampled population. American Statistical Association. "Log-linear models in contingency table anal-
Given these considerations, the estimated Causey, B. C. (1972)
ysis." The American Statistician 28: 1 15-1 22.
table for the-target population can be obtained "Sensitivity of raked contingency table totals to
Mantel, N., and W. Haenszel (1959)
by using the Deming-Stephan Iterative Propor- changes in problem conditions." The Annals of
"Statistical aspects of the analysis of data
tional Fitting algorithm which preserves 'asso- Mathematical Statistics 43:656-658.
from retrospective studies of disease." Journalof
ciation structure" as it successively adjusts the the National Cancer Institute 22:719-748.
observed table t o the components of the "allo- Clarke, S. H., and G. G. Koch (1975)
cation structure." Additional details pertaining "Who goes to prison? The likelihood of receiving
Mark, E. S.. W. Seltzer,and K. J . Krotki (1974)
to the statistical properties of this procedure are an active sentence." Popular Government
Population growth estimation. New York:
given in Bishop, Fienberg, and Holland (1975). 41:25-37.
The Population Council.
Causey (1972), Ireland and Kullback (1968),and Cohen, Jacqueline, et al. (1973) Seidman, D. (1975)
Freeman and Koch (1976). As indicated by "Implementation of the JUSSIM model in a "Simulation of public opinion: A caveat."
Seidman (1975) in a more general context, such criminal justice planning agency." Journal of Public Opinion Quarterlv 39:33 1-342.
synthetic estimation methods should be used Research in Crime and Delinquency, June 1973.
cautiously because of the potentially severe bias Uniform Crime Reports (1 973)
they may suffer when assumptions ( I ) or(2) are Cochran, W. G. (1954) Washington, D.C.: Federal Bureau of Investi-
not justified or are incorrectly applied. "Some methods of strengthening the common gation, U.S. Department of Justice.
X' test." Biornetrics 10:417-451. Wolfgang, M. E., R. M. Figlio, and T. Sellin
Finally, Kochetal. (1975)and Brock etal. (1975)
(1972)
discuss weighted least squares methods of
analysis for contingency tables based o n com- Delinquenc:~in a birth cohort. Chicago and
London: University of Chicago Press.
plex sample surveys such as those used t o
measure victimization. These procedures are
directly analogous to those described in refer-
ence t o the prison rate from Clarke and Koch
(1975).
Redesigning the Kansas City
Preventive Patrol Experiment
STEPHEN E. FIENBERG
Department of Statistics
and Department of Social Science
Carnegie-Mellon University
KINLEYLARNTZ
Department of Applied Statistics
University of Minnesota
ALBERTJ. REISS,J R.
Department of Sociology
Yale University
The most striking result of the Kansas City groups of 3 matched beats each, on the (a) what explanatory model lay behind
Preventive Patrol Experiment (KCPPE) basis of reported crime counts, calls for the KCPPE.
was that no significant differences were police service, and demographic data. (b) what was measured and what was not
found among the three types of beats ("re- Within each triplet one beat, the "control," measured.
active," "control," and "proactive") in was to be patrolled by a single police car in (c) what the results really were.
reported crime, rates of victimization, level the usual fashion whenever it was not (d) what aspects of the experimental
of citizen fear, or level of citizen answering calls. In a second beat in each design and its execution may have led
satisfaction with the police. In this paper, triplet, routine preventive patrol was directly to these results.
we focus on several related shortcomings of eliminated and officers were t o respond (e) whether the foregoing facts may in
the design and implementation of the only to calls for service. These were any way compromise the conclusions
KCPPE. These include (1) the orientation referred to as the "reactive" beats. Finally, reached by Kelling and his coworkers and
toward proving rather than disproving the in the third beat in each triplet, routinepre- others commenting on the experiment.
null hypothesis of no differences among ventive patrol was increased t o 2 or 3 times (f) if the conclusions are compromised,
treatment effects, (2) the confusion of man- the usual level. These were referred to as whether there is a different experiment that
power differences and treatment (patrol the "proactive" beats. Complete details of a n appropriate police department might
strategy) differences, and (3) the lack of the experimental design and its imple- conduct which would get around many of
control of other variables affecting the mentation can be found in Kelling et al. the problems associated with the KCPPE.
outcome of the experiment and the lack of (1974). A major difficulty with the KCPPE and
proper randomization in assigning treat- The strik.ing result of this Kansas City Pre- any consideration of it are the terms "pre-
ments to beats. Following this discussion ventive Patrol Experiment (KCPPE) was vention" and "preventive patrol." Basi-
of the KCPPE, we outline the design of a that there were no "significant" differences cally, the problem is that "prevention" is a
class of randomized controlled field studies among the three types of beats in reported black box, and exactly what police officers
for patrol-related experiments that are crime, rates of victimization, level of citizen do with time spent on what is called "pre-
adaptable to most large citiesand thatcould fear, and level of citizen satisfaction with ventive patrol" is difficult to determine.
have yielded considerably more informa- the police. There was simply no apparent The KCPPE did not actually manipulate
tion than the actual design used in Kansas effect that could be related todifferences in this elusive concept of preventive patrol.
City. patrol manpower allocation, deployment, Rather, the experiment attempted to ma-
and operation. Now this result appears to nipulate the amount of manpower and its
I. The Kansas City experiment fly in the face of conventional wisdom that deployment. We return to this issue in the
increases in police patrol should reduce the foilowing sections.
From October 1, 1972, through September
levels of street crimes such as robbery and
30, 1973, the Kansas City, Missouri, Police automobile theft. Since one of the purposes
Department conducted a n experiment of the experiment was "to determine II. Experimenting
designed to assess the impact of routine with police manpower
whether the Kansas City Police Department
preventive patrol on the incidence of crime could safely divert resources ordinarily Most social experiments, especially those
and the public's fear of crime. The experi- involving the police, are not really experi-
allocated to routine preventive patrol to
ment involved 3 variations in the level of ments in the statistical sense, but are in fact
other, possibly more productive patrol
preventive patrol used in 15 of the 25 beats innovations for which there are no direct
strategies," the results would appear t o
comprising the Kansas City South Patrol means available for separating out or con-
have important policy implications regarding
Division. The 15 beats were blocked into 5
the use of various manpower allocation
schemes. It is therefore incumbent upon us
to reexamine the experimental setup and
the results of the KCPPE with great care in
order to determine:
trolling the effects of a change in public Ill. Shortcomings of the KCPPE Because the no-difference outcome o f the
policy from concomitant changes in related KCPPE has such important social and pol-
Our discussion of the design and analysis of
variables. For example, "Operation 25," a icy implications, it is important t o ask
the KCPPE here focuses on several
4-month "experiment" conducted by the whether the design chosen sufficiently con-
interrelated issues:
New York City Police Department in 1954, trols for crucial sources of variability t o
(1) proving rather than disproving the
involved the more than doubling of police allow for the detection of the effects of true
null hypothesis.
strength in Manhattan's 25th Precinct. treatment differences when they exist.
(2) the difficulty in actually assessing the
Although reported street crime went down treatment differentiation. The following example, adapted* from
markedly over this 4-month period, no (3) the absence of adequate measure- Kempthorne (1952), may help clarify the
direct information was available for the ment of treatment implementation. issues just raised. A soft drink manufac-
true crime rates. Alternate explanations of (4) the confusing of manpower differ- turer has developed a new procedure for
the observed decrease were available, and ences and treatment (patrol strategy) producing its best-selling cola. The ques-
no effort was made to assess the possible differences. tion to be resolved is whether or not people
deleterious effects of the increased man- (5) the possible contamination of data can detect a difference in taste between the
power on adjacent areas or to determine in experimental beats by the patrolling colas produced by the new and old proce-
what the reported crime would have been strategies in adjacent beats (whether they dures. The manufacturer's statistician sets
had the changes in manpower not been in- be experimental or not). up the following experiment. A panel of n =
stituted. Far better than "Operation 25" (6) the lack of proper randomization in 6 tasters is presented with 3 glasses of cola,
was the 1966 experiment in New York's assigning treatments to beats. 2 produced by the old process and 1 by the
20th Precinct (see Press 1971, 1972), al- new. Each taster is asked to pick the one
though it too had its problems. Other cola whose taste differs from the other two.
examples of innovations in police practice A. Proving the null hypothesis
The tasters work independently of one an-
are readily available. In 1953, the Kansas A primary purpose of carefully designed other, and the colas are presented in a ran-
City Police Department carried out a com- statistical experiments is to control for as dom order to each taster. The null hypoth-
plete 24-hour changeover from two-man to many sources of variation as possible in esis, Ho,specified by the statistician is that
one-man patrol cars, and the 24 patrol order to maximize the probability of "no differences are detectable," and when
areas were reorganized into 41 substantial- detecting differences in the effects of MI is true the probability of detecting the
ly smaller beats (see Brannon 1956). No different treatments when these differences cola produced by the new process i s p = 113.
adequate evaluation of such a change was d o in fact exist. Because the KCPPE was
possible. unable to detect*anydifferences in outcome There are 7 possible results of this experi-
attributable to the differences in the level of ment, indexed by the number of tasters
In light (or perhaps we should say shadow)
preventive patrol, we must therefore ask who correctly picked the cola from the new
of these earlier attempts to evaluate the process. llnder f i , the probabilities of
effects of changes in police patrol practices, whether this result is due to the true lack of
treatment effect differences or simply the observing these results are:
the KCPPE would appear t o provide a
model worthy of careful study. Patrick weakness of the experimental setup when
Murphy, President of the Police Founda- in fact differences d o exist. The framework No. correct Probability
tion which supported the KCPPE, has of hypothesis testing adopted by the au- 6 11729 = 0.001
been quoted as saying that the preventive thors in their report is geared toward 121729 = 0.016
5
patrol project "ranks among the very few rejecting the null hypothesis (in this case
major social experiments ever to be com- that of no difference) in favor of some 4 601729 = 0.082
pleted and was unique in that never before alternative, by giving heavy weight to the 3 1601729 = 0.219
had there been an attempt to determine null hypothesis unless it is demonstrably 2 2401729 = 0.329
through such extensive scientific evalua- false. In technical terms we fix the level of
tion the value of visible police patrol." significance (the probability of falsely re-
While the KCPPE does not quite measure jecting the null hypothesis) a t some low
up t o the well-evaluated randomized con- value (e.g., a = 0.05) and the probability of If all 6 tasters correctly pick the cola from
trolled field trials of large-scale social failing to detect the alternative hypothesis the new process then we would appear to
action programs described by Gilbert, when it is true is determined. Unless the have strong evidence that HOis false. Even
Light, and Mosteller (1975), it represents a latter is also small, we end u p weighting the if only 5 tasters are correct the evidence is
major step forward in the design and strat- experiment in favor of the null hypothesis. strong, but if only 4 tasters are correct, we
egy of police research. It is only because of The danger of "proving" the null hypothe- might have observed a result so extreme
the use of sophisticated statistical tech- sis by means of a weak experiment haunts with probability 0.001 + 0.016 + 0.082 =
niques and their extensive documentation much of the literature on social experimen- 0.099 0.1. This is not a very rare event
in the Technical Report (Kelling et al. tation. and, even if a small difference between the
1974) that we are able to assess very care- colas exists, we would likely not take the
fully the various aspects of design and result of 4 out of 6 as being indicative of
analysis. The KCPPE has not only shown such a difference. Thus we take 5 or 6 cor-
that a police department can successfully rect as evidence against Ho and in favor of
experiment with patrol strategies without some alternative hypothesis.
disastrous consequences, but it has also In order to evaluate how good an experi-
provided a starting point for future experi- ment this really is, we need to ask what
mentation in this area. would happen if some alternative t o HCis
really true. Suppose, for example that p =
112, and the cola from the new process is In its ultimate design the project would be a rig- observed time in the experimental area
more likely to be picked than is indicated orous and systematic attempt to test the out- turned out to actually be noncommitted,
by f i .Then the probability of getting5 or 6 comes of different patrol strategies and and only a fraction of the noncommitted
correct is now (1 / 64) + (6164) ~ 0 . 1 0 9 .Thus ultimately could lead to cost-benefit analyses of time is used for activities that might be
even though there is a difference we would varied strategies to determine the most efficient labelled preventive patrol. The uses of
methods of undertaking patrol. It was likewise noncommitted time by officers d o not seem
fail to detect it about 8 out of 9 times using felt that the preventive patrol experiment would
o u r criterion of 5 or 6 correct. The help to maintain a climate of innovation and to vary very much for officers assigned to
probability 0.109 is referred toas thepower self-evaluation, not only on the part of the the beats with the three different levels of
of our test for the alternativep = 112, and in department as a whole but alsoamong individual preventive patrol. Since calls for service
the present case it would appear that the officers. The task force and the Police Founda- and other routine uses of committed time
experiment as planned will simply not be tion realized that since the effectiveness of rou- were treated in a similar fashion in all
powerful enough t o detect an alternative as tine preventive patrol was not self-evident and experimental beats, the differences among
big a s p = 213 (for which the power is only because the capacity to deal with crime is a cen- the levels of treatment are not nearly as
0.35). The experiment appears to be tral police function, the preventive patrol exper- great as they appear to be from the initial
stacked in favor of the null hypothesis, and iment would fill a real professional need hereto- experimental description. Moreover, offi-
fore not addressed by other police agencies. cers o n reactive beats used their preventive
unless we are careful we might erroneously
conclude that p = 113 even when it really is The notion of preventive patrol in this patrol time either on the perimeter of their
as large as p = 213. Note the importance description is really a "black box,"and the own beats or in patrolling proactive beats
here of explicitly stating what effects we problem for the experimenter is that it is to compensate for manpower shortages.
would like to be able to detect if they are hard to manipulate such a "black box." As The amount of time spent on the beat
present. Riecken and Boruch (1974) note: perimeters in reactive areas is not given,
A specified treatment allows a much more pow- but it should have been carefully assessed
Basically, there are three ways to make a n erful experimental test than does a "black box." due to the shape and relatively small size of
Furthermore, specifying treatments helps to several of the beats. Finally, officers often
experiment more sensitive to detecting achieve comparability between different experi- cross beat boundaries in response to calls
reasonable alternatives to H,: mental sites. . .when an experimental treatment for service. Since there are more officers on
(1) increase the sample size. is repeated (replicated) it should be kept the
(2) reorganize the structure of the same or deliberately and systematically altered, patrol in the proactive beats, they are more
experiment. rather than being allowed to vary haphazardly. likely to be free to cross into reactive or
(3) refine the experimental technique. control beats in response to service calls
What was actually manipulated in the than the other way around. Finally, as
In the cola experiment we could employ KCPPE was some combination of changes
all three of these methods, but in the Davis and Knowles (1975) note, specialized
in manpower, the deployment of manpow- units (helicopters, K-9 units, etc.) were
KCPPE where there are severe limitations er, and visibility. Each of these variables
o n how big we can make the sample size, we deployed independently of the preventive
contributes in a partially undefined way to patrol experiment a t a level consistent with
clearly must know how to reorganize and the level of activity in each experimental
refine the experiment to avoid the trap of activity in the preceding year.
unit, and then the level of activity somehow
proving the null hypothesis. We address affects the "black box" of prevention. There is a set of incident types defined by
these issues in Section IV of this paper. Some of the experimental areas were to Kelling et al. as part of routine preventive
continue with the same manpower levels, patrol: traffic violations, building checks,
B. Differences in treatments the same deployment, and the same visi- car checks, and pedestrian checks. These
bility as before. This was intended t o keep routine patrol incidents are presented by
Directly related t o the issue of "provingthe constant the level of activity in these "con- treatment group in Table 111-5A of Kelling,
null hypothesis" is the choice of treatment trol" areas. In a second group of areas the et al. (1974, p. 47). We have recategorized
for the experiment. If there is little or no manpower was doubled (very roughly), but these data to assess more easily treatment
difference among treatments, then we can the deployment of manpower was to be no differences. If there were no differences in
hardly expect to have much luck in different from before. The resulting in- the levels of preventive patrol across beat
discovering differences among the resulting crease in activity leads to the label of "pro- type we would expect each of the three sets
effects. The treatment standard chosen as active" for these areas. In the third group of of treatment areas t o have roughly 33.33
the "control" in the KCPPE was the experimental areas, the level of manpower percent of the routine preventive patrol
current patrol strategy and level of patrol was left the same, but deployment was incidents. The 1972 data (collected from
used in the individual beats involved in the manipulated. Some of the activities January through September) are reason-
experiment. Yet we don't know whether associated with the "controls" were elimi- ably compatible with thisexpectation, with
this "control" level of patrol differs nated from these areas, and thus we label percentages varying from a low of 28.97
markedly across beats, nor whether it is the activity as "reactive." These manipula-
high, moderate, or even low relative to the tions of treatment variables leave us with
levels of patrol that are feasible for a given the three patrol strategies of the KCPPE.
beat area or for police patrol beats more
generally. The "reactive"and "proactive" patrol strat-
egies appear on the surface t o differ
Kelling et al. (1974) state the aim of the markedly from the control strategy, but is
KCPPE as follows: this in fact the case? Routine preventive
patrol is carried out during an officer's
noncommitted time, but only 60 percent of
percent to a high of 38.69 percent but with activity occurs in the midnight to 8 a.m. the-envelope" model, Larson (1976) esti-
most near 33 percent. The 1973 data (also watch, and the least in the peak workload mates that the average frequency of pre-
January through September), in which we watch from 4 p.m. to midnight. When these ventive patrol passings in the control areas
would expect the proactive beats to have a activities are examined on a day by beat by in 0.164 passes per hour o r roughly one
considerably larger share of the incidents watch basis we find that we are faced with a every 6 hours. Thus he notes that
and the reactive beats a considerably low productivity situation, where big preventive patrol as usual in the experi-
smaller share, present a somewhat different treatment changes may be required to mentaI zone is not very much preventive
picture. The proactive beats in 1973 had 43 increase or decrease productivity. Since the patrol. Even if doubling the number of cars
percent of the car checks, 53 percent of the average number of patrol-initiated activities in the proactive areas doubles the number
pedestrian checks, and close tq 33 percent is about one per day per beat per watch, of times a randomly chosen spot is passed
of both traffic violations and building how much of a n effect can we expect from in a fixed period of time, this is still only
checks as opposed to 38, 39, 35, and 34 the supposed elimination of preventive once every 3 hours. Larson notes that the
percent, respectively, in these categories in patrol from the reactive areas and the range of preventive patrol coverages in the
1972. On the other hand, the reactive beats doubling of manpower, which likely KCPPE is considerably less than that for
in 1973 had 26 percent of the car checks, 24 produces far less than two per day per beat many other U.S. cities on a typical day,
percent of the pedestrian checks, 28 percent per watch? In fact, the biggest source of thus calling into question how useful the
of the traffic violations, and 28 percent of variation in patrol-initiated activities may Kansas City results would be for other
the building checks. These should be well be among watches within beat, rather cities.
compared with figures from 1972 of 33,32, than among treatment areas.
32, and 37 percent, respectively. The In summary, there are few (if any) direct
control beats were much more stable for measures of treatment conditions in the
1972 and 1973 except that pedestrian C. Treatment inlplementation: KCPPE, and those measurements that are
checks dropped from 29 to 24 percent and What was measured.? available tend to point toward minimal
car checks increased from 29 to 37 percent. Kelling et al. (1974) seem to have differences in treatment effects across the
There do appear to be differences in the abstracted from the literature on patrol three types of treatment.
relative proportions of routine preventive strategies the assumption that visibility is
patrol incidents across treatment areas, but the main factor underlying patrol variations D. Manipulating manpower
the differences are not all that big. What is and that visibility impact on the crime rate versus patrol strategy
even more troubleso,me is that the number might be mediated by changes in "fear of
of patrol-initiated events that took place in apprehension on the part of crimina1s"and The Kelling et al. report on the K C P P E
the "reactive" areas actually increased from "police response time" (see page xvii). The continually speaks of experimenting with
1972 to 1973. Although the proportion of extent to which differences in treatment led police patrol strategies, but as we noted
car checks out of the total number that to differences in actual visibility is thus earlier the experiment itself deals only with
took place in the reactive areas decreased crucial. The KCPPE used no direct the manpower levels for the proactive
from 33 to 26 percent, car checks still measurement of visibility anywhere in the treatment and with one particular strategy,
comprised 45 percent of all patrol-initiated study and, while some attempt was made to i:e., reducing preventive patrol for the
activities in 1973 data, whereas they measure response time, the data were reactive treatment. But manipulating what
comprised less than 36 percent of the scanty and not very reliable. Kelling et al. officers actually d o while on patrol may
activities for the comparable period of time (1974) note that there was no consequential well have as great a n effect on the
in 1972. Thus there is some question as to difference in response time to calls for the commission of crimes in an area as the
what the experimental conditions were and three areas based o n the KCPPE measure- manpower level of the patrol. For example,
how they were maintained. Larson (1976) ments, but Larson (1976), using a simple "stop and frisk" patrol strategies clearly
discusses this point in greater detail. involve more intrusive activities than d o
"back-of-theenvelope" operations research
model, has shown that, for the experimental routine patrol strategies. By manipulating
The figures in the preceding paragraph design used, the expected travel time for both manpower and patrol strategy we
may tend to overstate the treatment differ- cars in reactive beats would not increase might produce alternatives to routine
ences. T o see this it is important to note very much. Since the experimental units preventive patrol a t current manpower
that, unlike many other cities where man- were beat areas but what was manipulated levels, the effects of which are detectable. It
power is scheduled over the day according were beat cars, it is unfortunate that any is, of course, much easier for us to reach
to anticipated police activities, Kansas City potentially useful information on reaction this conclusion after examining the KCPPE
attempts to equalize its manpower over 24- time is recorded by car rather than by beat and its results than it would have been
hour periods by allocating the same area. before it was carried out.
number of officers to each of the three 8-
hour watches. Thus most preventive patrol Let us return to the issue of visibility.
Crimes where offenders are in private
places are not accessible to the police for
prevention efforts, and the offenders who
commit these crimes are not affected by the
visibility of police cars. Only street crime
may be affected and, even in the case of
purse snatchings and auto theft, visibility
can aid the offender committing a crime if
the visibility is fairly predictable. Because
there was no direct measurement of visibil-
ity we must try to infer the amount of visi-
bility associated with each of the three
"levels of patrol." Using another "back-of-
Whenever manpower is highly inefficient, E. Strategies in adjacent beats
o r has low productivity relative to what it Figure 1.
might have, increasing the number of As we noted above, officers are dispatched
workers will have relatively little impact on across beat boundaries in answer to calls Schematic representationof the
for service. With more manpower on 15-beat experimental area
reducing the levels of crime. If a police
officer makes only one car check a day routine preventive patrol in proactive
when he could easily make 10, then dou- areas, officers from proactive beats are
R . C
bling the manpower (assuming a constant much more likely to be able to answer calls C R
tive patrol strategy other than riding and of the experiment. Since controlling the P
P
sitting around, we can't expect changes in dispatch of police cars is a near-impossible R
task, care must be taken in allocating R
manpower to produce very much. Thus C
leaving the ordinary conditions of produc- treatments to beats to allow a measure of
tivity constant, we must ask whether control relating to effective treatment P = Proact~ve
=
R = Reactwe
CY
CP .234 .SO6
variances for the two 6-block designs Table 6. Variances of parameter estimates in the model with cross-over effects
(random and balances) assuming the
presence of neither residual, carryover, nor
interaction effects. Treatments A
-
.063a2
-
Balanced Random
.14002 Block B1
--
Balanced Random
1.18 .789
B .063 .I85 effects B2 1.08 1.03
For the 12-block experiment and the model C .056 .I32 B3 1.18 .843
with residual effects the balanced design Insulation or .056 .I45 Bq ' 1.18 1.22
seems superior to the random one, except
for a few primary by secondary interaction
P
Avs B before C!
Y
.063
.063
.618
.lo9
.I66
.579
B5
B7
1.18
1.08
1.08
.921
.777
1.32
_ .
parameters. For the model with carryover A vs C before B .619 653 1.18 .960
B vs C before A .619 .353 B9 1.18 .881
effects, however, the results are less clear. a vs f3 before y 519 .482 B10 1.18 .672
The balanced design is superior for the or vs y before P .619 .408 Bll 1.08 .784
main effects due to treatments in the p vs y'before a .618 .467 812 1.18 .903
Interaction Aa .741 .594 Time T1 .074 .I17
primary and secondary beats, but other- effects Ap .852 .701 T2 .I85 .080
wise the random design is by and large
superior. All things considered, we prefer 2: .852
.741
.852
.489
.915
.596
T3 .I85 .090
II I
-- I
Balanced Random
In Section 111-E we discussed problems in
the KCPPE which resulted from some
beats in the experimental area being on the
approach outlined here in order t o ensure
t h a t all of the primary beats d o not fall
adjacent to city and natural boundaries.
For example, if we have 4 blocks resulting
Treatments A .ll1u2 .233u2 boundaries of the city of Kansas City,
in a 6 x 9 layout of beats, eliminating all of
B .I11 .I92 Missouri. By making a few plausible
C .I11 .I25 assumptions, we can turn what was the exterior secondary beats leads to a lay-
Insulation a .lll .215 out with all 6 primary beats o n the bound-
.I11 .I31 formerly a disadvantage into a benefit and,
in the process, cut down on the actual ary. Some type of compromise would
y .I11 .I92
probably be wise in such circumstances.
I Block
effects
B1
B2
61
.278
.278
.278
.278
.278
.278
number of police beats required to carry
out the experiment.
Let us suppose that those secondary beats V. Further considerations
in a block sharing a side with the primary and summary
Time T1 .lll .I59 beat each contribute equally to the appro- For policy decisions regarding police
T2 .I11 .I11
priate effect terms, while the four second- deployment and manpower allocation we
T3 .111 .159
ary beats that share only a corner with the require as precise estimates as possible of
primary beat contribute equal but lesser the effects of one policy versus another.
departmental records, but we would also amounts (say 1/2 of the former). Then we Thus once we carry out all of the tests cor-
like to have several offender-related can alter the number of beats in those responding to the various sources in the
response measures since we anticipate that blocks on a boundary, by eliminating as ANOVA tables of the previous section, we
the treatment tactics will have "deterrent" many secondary beats as necessary. For should bolster our estimates of various
effects on potential offenders. Some example, suppose we have a design with effects by directly utilizing data from the
possibilities are: nine blocks laid out so that the experimen- secondary beats. Since reported crimes are
tal area takes the form of a 9 x 9 layout of already recorded by beat there would be no
(a) Data on modus operandi for of-
fenses. These are hard to get and will be the square beats. If we have a n actual area of added cost for collecting additional data o n
least sensitive to changes. roughly the same size but possessing 49 the secondary beats.
(b) Data on rearrest rates and place of beats in a 7 x 7 area, then we eliminate the
The experimental designs described in Sec-
occurrence of offense for rearrested secondary beats all around the original
tion IV may easily be adapted for other
design resulting in the layout shown in
offenders. experiments involving police deployment
(c) Data on characteristics of offenders Figure 3.
and manpower allocation, such as ones
for crimes against the person, e.g., changes Note that the 4 blocks in the corner have dealing with comparisons between the use
in race, age, and sex of offenders in beats. only 3 secondary beats, while 4 others have of one-man and two-man patrol cars.
Thus, for example, blacks might commit exactly 5, and only one block has 8.
fewer offenses in white areas with a n inter- We have noted earlier that the proposed
rogation procedure o r juveniles might be a Analyzing designs laid out in a fashion experiment involves neither changes in
smaller proportion of all offenders. similar to the one above requires modifica- police manpower nor the spatial redistri-
(d) The ratio of crimes against persons tions to the more o r less standard analyses bution of patrol resources within a city, as
to property. This is again a highly indirect for the "complete" designs described ear- was the case in the KCPPE. Thus n o policy
measure but offenders might shift more to lier, but the modifications are straight- implications regarding levels of manpower
crimes of stealth under increased proactiv- forward, corresponding directly to the can possibly result. Moreover, since the
ity. O n the whole this would be a difficult assumptions regarding the effects from the different patrol strategies will be applied to
measure to interpret. secondary beats described above. small areas, even if the results are striking
(e) Changes in the population of the policy implications for overall police
In Kansas City, not only can we reduce the patrol strategy in a city may be difficult to
offenders with afirst arrest and in propor- number of beats required for our designs
tion of offenders with a first arrest. Both formulate due to the use of the different
by taking advantage of the city boundaries, strategies in adjacent beats in the experi-
have defects as measures, yet they could be we can make similar reductions with blocks
affected by proactive tactics. ment. For example, if there is no detectable
of beats bordering the Missouri River. The difference among treatment effects, we
(0 Changes in distance betweenplace of river slices across the city and, according to
occurrence of offense and residence of must ask if the results suggest a policy of
reports we have had, police patrolling beats "business as usual" or a new overall
offender. If a n entire city is used, this on one side of the river rarely answer calls
should not change if resources were strategy of low visibility patrol. The answer
for service on the other side. Thus we may seems unclear.
constant, but they are not. Offenders might well be able to reduce the 108 beats
be more inclined to go greater distances required for implementing our 12-block
where the police have a larger territory to balanced design to the 69 beats that
cover with increased proactivity. actually exist in Kansas City.
The foregoing is a tentative list of possible
response variables to be measured and
analyzed. Considerably more work is
required to refine this part of the proposal.
Many social experiments, as a result of Appendix:
Figure 3. their failure to control for various sources Power calculationsfor comparing
of variability, end up by proving the null balanced and random designs
hypothesis. The analysis of experimental for ANOVA models in Section IV
results is structured toward rejecting the The tables in this appendlx glve illustrations of
null hypothesis (typically that of no differ- the magnitude of effects capable of detection
ence) in favor of some alternative, by giving through the use of standard F-tests with a n 0.05
heavy weight to the null hypothesis unless level of significance, with power = Pr(reject IH,
it is demonstrably false. The level of true) = 0.50,0.70,0.90, and 0.95. Table A-l is for
the 12-block experiment and the model with car-
significance (the probability of falsely ryover effects. Table A-2 is for the 12-block
rejecting the null hypothesis) is set a t some experiment and residual effects. Table A-3 is for
low value and then the probability of fail- the 6-block experiment. At least two illustra-
ing to detect the alternative hypothesis tions are given for each effect.
when it is true is made problematic. Unless For treatment and main effects, the tests were
that probability also is small, the experi- based on adjustments first for other maineffects
ment will be weighted in favor or the null (this is the standard form of analysis), and then
hypothesis. Such, we have argued, was for all other effects including interactions, car-
Primary likely the case in the KCPPE because of its ryover effects, and residual effects.
weak experimental design, i.e., its failure to How to read the tables. Suppose we are inter-
Secondary
control for important sources of varia- ested in compared experiments using an 0.05
bility. At least as crucial, in our view, was level of significance. Then the first set of rows in
the failure of the KCPPE investigators to the table tell us that, if A = 4.550, B =O,and C =
use proper randomization of treatments to +0.550 (where 02 is the varlance of the random
Finally we must ask how stable the experimental units. error term), the usual F-tests for treatments
estimates of parameters in the experi- would have detected these effects for the bal-
mental model will be over time, and across The problem of what design to adopt for anced design with power = 0.50.
cities. Variables that influence the behavior
social experiments is not easily resolved.
of offenders may interact with the experi- Here we call attention to a particular class Acknowledgments
mental variables and with the peculiarities of designs that are useful not only for
experiments relating to patrol strategies, This paper grew out of mater~aldiscussed in the
of cities and times in such a way as to make Workshop o n Criminal Justice Statistics, held in
estimates highly unstable. If this is the case, but also t o other types of social experi-
ments. Our basic design has two key Washington, D.C., July 1975,and sponsored by
then changes and refinements in the experi- the Social Science Research Council Center for
mental design are required. Further con- features: Coordination of Research on Social indicators
sideration must be given to the potential (1) Different treatments are applied t o and the Law Enforcement Assistance Adminis-
policy implications of the experiment as the same experimental units during differ- tration. We are indebted to Davld W. Britt,
part of the design. ent time periods, resulting in a crossover or William Falrly, Rlchard Larson, Katherine C.
changeover structure where each unit is Its Lyall, and Richard Sparks for several important
Many so-called social experiments are not own control. suggestions and comments. An abbreviated ver-
really experiments in the formal statistical (2) Additional control is exercised through sion of a n earller draft of thls paper appeared
sense. All too often, when trying to evalu- a specialdevice whereby primary experimental under the same tltle in Evaluat~on3 (1976),
124-131.
aTe whether some innovation or social pro- units are insulated from one another by the
gram has the intended effect, investigators addition of secondary experimental units, During the preparation of this paper, Stephen E.
fail to provide a direct means for separating with effects being examined in both the Fienberg's research was partially supported by
out or controlling for the effects of changes primary and secondary units. This paper grants from The Robert Wood Johnson Foun-
in concomitant variables. T o overcome the explores different orders of complexity in dation and the Commonwealth Fund to the
difficulties inherent in such studies, social this design and discusses means for Center for Analysis of Health Practices,
scientists have turned to the use of evaluating tradeoffs among them. Harvard School of Public Health, and from the
randomized controlled field trials. Both the National Science Foundation Grant SOC72-
It is apparent that more complex experi- 05257 to the Department of Statistics, Harvard
randomization and the control are crucial mental designs controlling for various University. Albert J . Reiss' research was par-
t o such studies. sources of variation will in general be more tially supported by a grant from the Russell Sage
costly, take longer periods of time, and Foundation.
involve greater use of repeated measures
than the simple experimental design
adopted for the KCPPE. If public policy is
to rest On social experiments where causal
inference is essential, the gain in efficiency
associated with complex designs should
ordinarily outweigh any increased cost.
.
Table A-1 Carry-over analysis
50% Power 70% Power 90% Power 95% Power
(a) Balanced Random Balanced Random Balanced Random Balanced Random
Treatment effects A -.55 -.57 -.69 -.72 -.89 -.93 -.99 -1.03
(adjustingonly for B 0 0 0 0 0 0 0 0
main effects) C +.55 +.57 +.69 +.72 +.89 +.93 +.99 +1.03
Treatment effects A -.56 -.80 -.70 -1.02 -.91 -1.31 -1.01 -1.45
(adjusting for an 8 0 0 0 0 0 0 0 0
effects) C +.56 +.80 +.70 +1.02 +.91 +1.31 +1.01 +1.45
Treatment effects A +.63 +.66 +.80 +.83 +1.03 +1.07 +1.14 +1.19
(adjusting only for B -.32 -.33 -.40 -.41 -.51 -.54 -.57 -.60
main e f f e c w C -.32 -.33 -.40 -.4 1 -.51 -.54 -.57 -.60
Treatment effects A +.67 +.98 +.85 +1.24 +1.09 +1.60 cl.21 +1.78
(adjusting for & I B -.34 -.49 -.42 -.62 -.55 -.80 -.61 -.89
effects) C -.34 -.49 -.42 -.62 -.55 -.80 -.61 -.89
Insulation effects 01 -.55 -.57 -.69 -.72 -.89 -.93 -.99 -1.03
(adjusting only for 0 0 0 0 0 0 0 0
main effects) Y +.55 c.57 +.69 +.72 +.89 +.93 +.99 +1.03
Insulation effects ff -.56 -.96 -. 70 -1.20 -.91 -1.55 -1 .O1 -1.73
(adjusting for all P 0 0 0 0 0 0 0 0
effects) Y c.56 +.96 +.70 -1.20 +.91 +1.55 +1.01 +1.73
Insulation effects a +.63 +.64 +.80 +.81 +1.03 +1.04 +1.14 +1.16
(adjusting only for P -.32 -.32 7.40 -.40 -.51 -. 52 -.57 -. 58
main effects) Y -.32 -.32 -.40 -.40 -.51 -.52 -.57 -. 58
Insulation effects a c.63 +.99 +.80 +1.25 +1.03 +1.61 +1.14 +1.79
(adjusting for &I 0 -.32 -. 50 -.40 -.62 -.51 -.81 -.57 -.90
effects) Y -.32 -. 50 -.40 -.62 -.51 -.81 -.57 -.90
(b)
Treatment A before C + l . 18 +1.84 +1.47 +2.30 +1.89 +2.95 +2.08 +3.24
carry-over B before C --1.18 -1.84 -1.47 -2.30 -1.89 -2.95 -2.08 -3.24
effects A before B +.59 +.92 +.74 +1.15 +.95 +1.48 +1.04 +1.62
C before B -. 59 -.92 -. 74 -1.15 -.95 -1.48 -1.04 -1.62
B before A 0 0 0 0 0 0 0 0
C before A 0 0 0 0 0 0 0 0
Treatment A before C 0 0 0 0 0 0 0 0
carry-over B before C 0 0 0 0 0 0 0 0
effects A before B 0 0 0 0 0 0 0 0
C before B 0 0 0 0 0 0 0 0
B before A +1.53 +1.53 +1.91 +1.91 +2.45 +2.46 +2.69 +2.70
C before A -1.53 -1.53 -1.91 -1.91 -2.45 -2.46 - -
Insulation f f before y +1.18 +1.38 +1.48 +1.73 +1.90 +2.20 +2.07 +2.44
carry-over p before y -1.18 -1.38 -1.48 -1.73 -1.90 -2.20 -2.07 -2.44
effects a before +.59 +.69 +.74 +.86 +.95 +1.10 +1.04 +1.22
y before P -. 59 -.69 -. 74 -.86 -.95 -1.10 -1.04 -1.22
before a 0 0 0 0 0 0 0 0
y before a 0 0 0 0 0 0 0 0
Insulation a before 7 0 0 0 0 0 0 0 0
carry-over 0 before y 0 0 0 0 0 0 0 0
effects a before /3 0 0 0 0 0 0 0 0
y before 0 0 0 0 0 0 0 0 0
0 before a +1.52 +1.84 +1.90 +2.30 +2.44 +2.96 +2.68 +3.25
y before a -1.52 -1.84 -1.90 -2.30 -2.44 -2.96 -2.68 -3.25
(c)
Interaction Aff +5.16 +3.72 +6.37 +4.59 +8.19 +5.91 +8.95 +6.45
effects AP -.65 -.47 -.80 -.57 -1.02 -. 74 -1.12 -.81
-.65 -.47 -.80 -.57 -1.02 -. 74 -1.12 -.81
-.65 -.47 -.80 -.57 -1.02 -. 74 -1.1 2 -.81
BP -.65 -.47 -30 -.57 -1.02 -.74 -1.12 -.81
By -.65 -.47 -.80 -.57 -1.02 -.74 -1.12 -.81
Car -.65 -.47 -.80 -.57 -1.02 -.74 -1.12 -.81
CP -.65 -.47 -.80 -. 57 -1.02 -.74 -1.12 -.81
C7 -.65 -.47 -.80 -.57 -1.02 -.74 -1.1 2 -.81
Interaction Aa +3.39 +1.90 +4.18 +2.34 +5.38 +3.01 +5.87 +3.29
effects Ap -.97 -. 54 -1.19 -.67 -1.54 -.86 -1.68 -.94
A7 -.97 -.54 -1.19 -.67 -1.54 -.86 -1.68 -.94
801 -.97 -.54 -1.19 -.67 -1.54 -.86 -1.68 -.94
BP +1.94 +1.08 +2.39 +1.34 +3.07 +1.72 +3.36 +1.88
87 -.97 -. 54 -1.19 -.67 -1.54 -.86 -1.68 -.94
Car -.97 -. 54 -1.19 -.67 -1.54 -.86 -1.68 -.94
CP -.97 -. 54 -1.19 -.67 -1.54 -.86 -1.68 -.94
Cy +.48 +.27 +.60 +.33 +.77 +.43 +.84 +.47
Interaction Act +2.00 +1.12 +2.47 +1.38 +3.17 +1.78 +3.47 +1.94
effects Ap -1.00 -.56 -1.23 -.69 -1.59 -.89 -1.73 -.97
-1 .OO -. 56 -1.23 -.69 -1.59 -.89 -1.73 -.97
-1.00 -.56 -1.23 -.69 -1.59 -.89 -1.73 -.97
B@ +2.00 +1.12 +2.47 +1.38 +3.17 +1.78 +3.47 +1.94
By -1.00 -. 56 -1.23 -.69 -1.59 -.89 -1.73 -.97
Ccl -1.00 -.56 -1.23 -.69 -1.59 -.89 -1.73 -.97
:; --1 .OO
+2.00
-. 56
+1.12
-1.23
+2.47
-.69
+1.38
-1.59
+3.17
-39
+1.78
-1.73
+3.47
-.97
+1.94
Table A-2. Residual analysis
50% Power
Balanced Random
.70% Power
Balanced Random
9 0 % Power
Balanced Random
9 5 % Power
Balanced Random
I
effects
Treatment
effects
Insulation
effects
Insulation
effects
The National Criminal Justice Reference Service (NCJRS)abstractsdocumentspublished in the criminaljustice field. Personswho
are registeredwiththe ReferenceServicereceive announcementsof documents in their stated fields of interestand order forms for free
copies of Bureau of Justice Statisticspublications. If you are not registered with the Reference Service,and wish to be, please provide
your name and mailing address below and check the appropriate box.
Name Telephone
Please send me a
( 1 NCJRS registration
Number and street form.
Please send me the
reports listed
City State ZIP Code below.
I 1 I
(Fold here)
(Fold here)
Single copies are available at no charge from the 13 Amerlcan Cities. NCJ-42018
(annual), NCJ-57463
6000, Rockviiie, Md. 20850. Multiple copies are for Survey, NCJ-43732
Criminai Justice System (annual)
Government Printing Office, Washington, D.C. Potential Costs and Coverage of a National
1978 final report. NCJ-66482
(annual): NCJ-55878
NCJ-36747
61368
Justice Agencies in the U.S.:
NCJ-59898
Capital Punishment (annual):
Justice Agency List, NCJ-65560
1976, NCJ-49543
Prisoners in State and Federai Institutions on
NCJ-17930
1975, NCJ-44593
December 31:
2: N.J.. N.Y., NCJ-17931
1974, NCJ-39467
1978, NCJ-64671
3: Del., D.C., Md., Pa., Va., W.Va., NCJ-17932
1973. NCJ-34732
1979advance report, NCJ-66522
4: Aia.. Ga., Fla.. Ky.. Miss.. N.C., S.C., Tenn.,
The Cost of Negligence: Losses from
Census of State Correctional Facilities, 1974
NCJ-I7933
Preventable Household Burglaries,
advance report, NCJ-25642
5: Iii., Ind., Mich., Minn., Ohio, Wis., NCJ-
NCJ-53527
Profile of State Prison Inmates: Socio-
17934
NCJ-58257
8: Colo., Mont.. N.Dak.. S.Dak., Utah. Wyo..
Crime and Seasonality, NCJ-64818
NCJ-18471
Rofile of Inmates of Local Jaiis: Socio-
Boston, NCJ-34818
demographic Findingsfrom the 1978 Survey
Buffalo, NCJ-34820
of inmates of Locai Jaiis, NCJ-65412
Utilization of Criminal Justice Statistics
Cincinnati, NCJ-34819
The Nation's Jaiis: A report on the census
Project:
Houston, NCJ-34821
of jails from the 1972 Survey of inmates of
Sourcebook of Criminal Justice Statistics
- Milwaukee, NCJ-34823
Survey of Inmates of Local Jails, 1972,
Pubiic Opinion Regarding Crime, Criminal
. Minneapolis, NCJ-34824
advance report. NCJ-13313
Justice, and Related Topics, NCJ-17419
%_--
Oakland, NCJ-34826
Uniform Parole Reports: Offenders: The Denver Model, NCJ-! 7420
Pittsburgh, NCJ-34827
Parole in the United States (annual):
Who Gets Detained?An Empirical Analysis
>>
a-
Bg'
Washington, D.C., NCJ-34830
Characteristics of the Parole
Juvenile Dispositions: Social and Legal
0 Boston, NCJ-46235
A National Survey of Parole-Related
Deiinquency Cases, NCJ-17418
Buffalo, NCJ-46236
Legislation Enacted During the 1979
Offender-Based Transaction Statistics: New
{- @ Cincinnati, NCJ-46237
Houston, NCJ-46238
c? Miami, NCJ-46239
Children in Custody: Juvenile Detention and Sentencing of California Felony Offenders,
8
,:Minneapolis, NCJ-46241
<New ~ r i e a n sNCJ-46242
,
c_%akiand, NCJ-46243
;j.:Fttsburgh, NCJ-46244
1977advance report:
Census of Public Juvenile Facilities.
NCJ-60967
Counties, NCJ-29644
- :
c5
:-%an Diego, NCJ-46245
NCJ-60968
Courts, NCJ-34730
2.-
-rtlDetroit, Los Angeles, New York, and 1971, NCJ-I3403
The Patternsand Distribution of Assault
2 rl"
(3 :,;Philadelphia: A Comparison of 1972and
G, ,-,, :-.:-I974 --. Findings. NCJ-36360
Myths and Realities About Crime: A
Areas. NCJ-40025
.-- .
+a
-.
(:*,I Griminai Victimization Surveys in the
7:jNation's Five Largest Cities: National information from the Nationai Prisoner
,P pi., I !"
re-- --, Los Angeles. New York, and Philadelphia,
Survey, NCJ-46249
The Characteristics of Burglary incidents.
1972, NCJ-16909
NCJ-42093
Louis, NCJ-36361
1977 Supplement to State Judicial Systems,
Sources of Nationai Criminai Justice
NCJ-013314
NCJ-29433
Federal Criminal Sentencing: Perspectives
Cities. NCJ-41336
Annuai Report, 1976. NCJ-56599
Predicting Sentences in Federal Courts: The
issues, NCJ-39973
Processing, NCJ-55171
NCJ-33686