Dataset Identification:

Resource Abstract:
description: <p> This metadata contains information on crime definitions and location obfuscation techniques to protect citizen identification data. Officers responding to incidents have also been redacted for privacy.</p> <div> <strong>1. Crime Definitions:</strong> </div> <div> <strong>For reporting purposes, criminal offenses are divided into two major groups: Part I offenses and Part II offenses.</strong> </div> <div> In Part I, the UCR indexes reported incidents in two categories: violent and property crimes. <strong>Aggravated assault, forcible rape, murder, and robbery are classified as violent while arson, burglary, larceny-theft, and motor vehicle theft are classified as property crimes.</strong> These are reported via the document named Return A Monthly Return of Offenses Known to the Police. <strong>Part 1 crimes are collectively known as Index crimes, this name is used because the crimes are considered quite serious, tend to be reported more reliably than others, and are reported directly to the police</strong> and not to a separate agency (ex- IRS) that doesn't necessarily contribute to the UCR. </div> <div> In <strong>Part II</strong>, the following categories are tracked: <strong>simple assault, curfew offenses and loitering, embezzlement, forgery and counterfeiting, disorderly conduct, driving under the influence, drug offenses, fraud, gambling, liquor offenses, offenses against the family, prostitution, public drunkenness, runaways, sex offenses, stolen property, vandalism, vagrancy, and weapons offenses.</strong> </div> <div> Two property reports are also included with the Return A. The first is the Property Stolen by Classification report. This report details the number of actual crimes of each type in the Return A and the monetary value of property stolen in conjunction with that crime. Some offenses are reported in greater detail on this report than on the Return A. For example, on the Report A, burglaries are divided into three categories: Forcible Entry, Unlawful Entry No Force, and Attempted Forcible Entry. On the Property Stolen by Classification report, burglaries are divided into six categories based on location type and the time of the offense. Offenses are counted in residences with offense times of 6 p.m. to 6 a.m., 6 a.m. to 6 p.m. and Unknown Time and Non-residences with the same three time groupings. </div> <div> The second property report is the Property Stolen by Type and Value report. The monetary value of both stolen and recovered property are totaled and classified as one of eleven property types: </div><ul><li>Currency, Notes, Etc.</li><li>Jewelry and Precious Metals</li><li>Clothing and Furs</li><li>Locally Stolen Motor Vehicles</li><li>Office Equipment</li><li>Televisions, Radios, Stereos, Etc.</li><li>Firearms</li><li>Household goods</li><li>Consumable goods</li><li>Livestock</li></ul> <div> <strong>Miscellaneous</strong> </div> <div> The FBI began recording arson rates, as part of the UCR, in 1979. This report details arsons of the following property types: </div><ul><li>Single Occupancy Residential (houses, townhouses, duplexes, etc.)</li><li>Other Residential (apartments, tenements, flats, hotels, motels, dormitories, etc.)</li><li>Storage (barns, garages, warehouses, etc.)</li><li>Industrial/Manufacturing</li><li>Other Commercial (stores, restaurants, offices, etc.)</li><li>Community/Public (churches, jails, schools, colleges, hospitals, etc.)</li><li>All Other Structures (out buildings, monuments, buildings under construction, etc.)</li><li>Motor Vehicles (automobiles, trucks, buses, motorcycles, etc.)</li><li>Other Mobile Property (trailers, recreational vehicles, airplanes, boats, etc.)</li><li>Other (crops, timber, fences, signs, etc.)</li></ul><p> <strong>2. Protecting the identification of citizens and officers:</strong></p><p> The main reason for applying masking to a data field is to protect data that is classified as personal identifiable data, personal sensitive data or commercially sensitive data, however the data must remain usable for the purposes of undertaking valid test cycles. It must also look real and appear consistent. It is more common to have masking applied to data that is represented outside of a corporate production system. In other words where data is needed for the purpose of application development, building program extensions and conducting various test cycles. It is common practice in enterprise computing to take data from the production systems to fill the data component, required for these non-production environments.</p><p> <strong>How we obfuscate data through Donut Masking: </strong></p><p> Donut Masking. This technique is similar to random displacement within a circle, but a smaller internal circle is utilized within which displacement is not allowed. In effect, this sets a minimum and maximum level for the displacement. Masked locations are placed anywhere within the allowable area. A slightly different approach to donut masking is the use of a random direction and two random radii: one for maximum and one for minimum displacement. These two techniques only differ slightly in the probability of how close masked locations are placed to the original locations. Both approaches enforce a minimum amount of displacement.</p><p>Update daily. </p>; abstract: <p> This metadata contains information on crime definitions and location obfuscation techniques to protect citizen identification data. Officers responding to incidents have also been redacted for privacy.</p> <div> <strong>1. Crime Definitions:</strong> </div> <div> <strong>For reporting purposes, criminal offenses are divided into two major groups: Part I offenses and Part II offenses.</strong> </div> <div> In Part I, the UCR indexes reported incidents in two categories: violent and property crimes. <strong>Aggravated assault, forcible rape, murder, and robbery are classified as violent while arson, burglary, larceny-theft, and motor vehicle theft are classified as property crimes.</strong> These are reported via the document named Return A Monthly Return of Offenses Known to the Police. <strong>Part 1 crimes are collectively known as Index crimes, this name is used because the crimes are considered quite serious, tend to be reported more reliably than others, and are reported directly to the police</strong> and not to a separate agency (ex- IRS) that doesn't necessarily contribute to the UCR. </div> <div> In <strong>Part II</strong>, the following categories are tracked: <strong>simple assault, curfew offenses and loitering, embezzlement, forgery and counterfeiting, disorderly conduct, driving under the influence, drug offenses, fraud, gambling, liquor offenses, offenses against the family, prostitution, public drunkenness, runaways, sex offenses, stolen property, vandalism, vagrancy, and weapons offenses.</strong> </div> <div> Two property reports are also included with the Return A. The first is the Property Stolen by Classification report. This report details the number of actual crimes of each type in the Return A and the monetary value of property stolen in conjunction with that crime. Some offenses are reported in greater detail on this report than on the Return A. For example, on the Report A, burglaries are divided into three categories: Forcible Entry, Unlawful Entry No Force, and Attempted Forcible Entry. On the Property Stolen by Classification report, burglaries are divided into six categories based on location type and the time of the offense. Offenses are counted in residences with offense times of 6 p.m. to 6 a.m., 6 a.m. to 6 p.m. and Unknown Time and Non-residences with the same three time groupings. </div> <div> The second property report is the Property Stolen by Type and Value report. The monetary value of both stolen and recovered property are totaled and classified as one of eleven property types: </div><ul><li>Currency, Notes, Etc.</li><li>Jewelry and Precious Metals</li><li>Clothing and Furs</li><li>Locally Stolen Motor Vehicles</li><li>Office Equipment</li><li>Televisions, Radios, Stereos, Etc.</li><li>Firearms</li><li>Household goods</li><li>Consumable goods</li><li>Livestock</li></ul> <div> <strong>Miscellaneous</strong> </div> <div> The FBI began recording arson rates, as part of the UCR, in 1979. This report details arsons of the following property types: </div><ul><li>Single Occupancy Residential (houses, townhouses, duplexes, etc.)</li><li>Other Residential (apartments, tenements, flats, hotels, motels, dormitories, etc.)</li><li>Storage (barns, garages, warehouses, etc.)</li><li>Industrial/Manufacturing</li><li>Other Commercial (stores, restaurants, offices, etc.)</li><li>Community/Public (churches, jails, schools, colleges, hospitals, etc.)</li><li>All Other Structures (out buildings, monuments, buildings under construction, etc.)</li><li>Motor Vehicles (automobiles, trucks, buses, motorcycles, etc.)</li><li>Other Mobile Property (trailers, recreational vehicles, airplanes, boats, etc.)</li><li>Other (crops, timber, fences, signs, etc.)</li></ul><p> <strong>2. Protecting the identification of citizens and officers:</strong></p><p> The main reason for applying masking to a data field is to protect data that is classified as personal identifiable data, personal sensitive data or commercially sensitive data, however the data must remain usable for the purposes of undertaking valid test cycles. It must also look real and appear consistent. It is more common to have masking applied to data that is represented outside of a corporate production system. In other words where data is needed for the purpose of application development, building program extensions and conducting various test cycles. It is common practice in enterprise computing to take data from the production systems to fill the data component, required for these non-production environments.</p><p> <strong>How we obfuscate data through Donut Masking: </strong></p><p> Donut Masking. This technique is similar to random displacement within a circle, but a smaller internal circle is utilized within which displacement is not allowed. In effect, this sets a minimum and maximum level for the displacement. Masked locations are placed anywhere within the allowable area. A slightly different approach to donut masking is the use of a random direction and two random radii: one for maximum and one for minimum displacement. These two techniques only differ slightly in the probability of how close masked locations are placed to the original locations. Both approaches enforce a minimum amount of displacement.</p><p>Update daily. </p>
Citation
Title City of Durham Police Crime Reports.
creation  Date   2017-09-23T19:04:18.443269
Resource language:
Processing environment:
Back to top:
Digital Transfer Options
Linkage for online resource
name Dublin Core references URL
URL:https://opendurham.nc.gov/api/v2/catalog/datasets/durham-police-crime-reports
protocol WWW:LINK-1.0-http--link
link function information
Description URL provided in Dublin Core references element.
Linkage for online resource
name Dublin Core references URL
URL:https://opendurham.nc.gov/api/v2/catalog/datasets/durham-police-crime-reports/exports/json
protocol WWW:LINK-1.0-http--link
link function information
Description URL provided in Dublin Core references element.
Linkage for online resource
name Dublin Core references URL
URL:https://opendurham.nc.gov/api/v2/catalog/datasets/durham-police-crime-reports/exports/csv
protocol WWW:LINK-1.0-http--link
link function information
Description URL provided in Dublin Core references element.
Linkage for online resource
name Dublin Core references URL
URL:https://opendurham.nc.gov/api/v2/catalog/datasets/durham-police-crime-reports/exports/shp
protocol WWW:LINK-1.0-http--link
link function information
Description URL provided in Dublin Core references element.
Linkage for online resource
name Dublin Core references URL
URL:https://opendurham.nc.gov/api/v2/catalog/datasets/durham-police-crime-reports/exports/geojson
protocol WWW:LINK-1.0-http--link
link function information
Description URL provided in Dublin Core references element.
Metadata data stamp:  2018-08-06T19:36:40Z
Resource Maintenance Information
maintenance or update frequency:
notes: This metadata record was generated by an xslt transformation from a dc metadata record; Transform by Stephen M. Richard, based on a transform by Damian Ulbricht. Run on 2018-08-06T19:36:40Z
Metadata contact - pointOfContact
organisation Name  CINERGI Metadata catalog
Contact information
Address
electronic Mail Addresscinergi@sdsc.edu
Metadata language  eng
Metadata character set encoding:   utf8
Metadata standard for this record:  ISO 19139 Geographic Information - Metadata - Implementation Specification
standard version:  2007
Metadata record identifier:  urn:dciso:metadataabout:820e1c71-830d-4a14-a59b-649a1bf60f54

Metadata record format is ISO19139 XML (MD_Metadata)