You are on page 1of 7

A Critical Assessment of the Big Data

Approach to Violent Crime Analysis


during Lockdowns

Aim:
In this report, we are going to assess the data of violent crime analysis during the lockdown in
United Kingdom. As we can see that the crime rate is increasing day to day, we are going to
discuss some facts based on the data analysis done in the practical work. In the data provided,
there are several kinds of crimes registered during the lockdown period and the datasets used
were Crime’s data and population data from different regions in the United Kingdom.

Objectives:
Here is the list of objectives that were achieved on performing the analysis of the datasets.
There are several sorts of crimes occurring there, and the goal is to determine the amount of
crime based on the nature and location of the crimes that fall under some of the reporting
areas. The reporting area in this case refers to the police stations where the offences were
reported. The data has been designed based on such reporting, and it will be evaluated here.

 To examine the criminal situation in light of the reporting area.


 To investigate the types of crimes recorded in the United Kingdom during the
Lockdown.
 Based on the crime data, examine the Top-5 Crimes in a certain police region.
 Analyse the location's rating depending on the crime scenario
 Use map visualisation to investigate the location of the crime (Interactive).
Metadata Available on the Datasets:
Crimes.csv LSOA.csv
Crime_ID date
Month geography
Reported_by geography_code
Falls_within Rural_Urban
Longitude Variable:_All_usual_residents;_measures:_Value
Latitude Variable:_Males;_measures:_Value
Location Variable:_Females;_measures:_Value
LSOA_code Variable:_Lives_in_a_household;_measures:_Value
LSOA_Name Variable:_Lives_in_a_communal_establishment;_measures:_Value
Crime_Type Variable: _Schoolchild_or_full-
Last_Outcome_Categor time_student_aged_4_and_over_at_their_non_term-
y time_address;_measures:_Value
Context Variable:Area(Hectares.;_measures:_Value
Variable:Density(number_of_persons_per_hectare.;_measures:_Val
ue

Crimes Recorded:
Based on the datasets provided, there are 16 types of crimes which were recorded in United
Kingdom on location basis.

Here is the list of total crimes recorded in the United Kingdom on yearly basis:
Ethical issues:
All the business and organizations will be having the customer or client information and
access to this huge data might have strategic implications (Abouelmehdi, 2017). According to
the authors Davis and Patterson, Big data collection can have an impact on both the business
and customers in aspects of generating ethical issues about violations of fundamental civil,
social, political, and legal rights. This increase in use of big data analysis in organisations
might have influence on people's capacity to appreciate its potential in making informed
judgments suggests that professional ethics, policies, and research which requires
reconsideration, referring to privacy and risk concerns.

In the proposed paper, we should consider the ethical, legal and political issues while using
the data from the UKVI website. Technical, skilled, privacy, and security difficulties are
among the constraints and challenges that might stymie the viability of Crimes-related
research. Furthermore, the student who is using this data must take responsibility for
promoting openness and preventing the exploitation of this data; otherwise, the repercussions
will be severe.

Privacy issues:

Despite the updated legal framework, the usage of Big Data creates substantial legal
challenges in terms of data protection. The majority of the recommendations in this
consultation are aimed at improving the United Kingdom’s GDPR. Also, under Electronic
Communications Regulations 2003 privacy concerns also include securing the personal or
sensitive data of an individual.

Here are the few privacy rights listed according to the Data Protection Act of 2018:

 Digital marketing approaches such as promotion calls, advertisement texts,


subscribing emails, and so on.
 Securing the hardware equipment, which uses cookies to monitor the customer
information by the website and other applications. Devices such as personal
computers, mobile devices, smart Televisions, etc, use cookies as a part of their
technology to monitor users accessing their website or applications.
 Securing accessing the public or open communication services such as free Wi-Fi, etc.
 Customer will be popped up with a notification to accept cookies when accessing
these resources and thus securely utilising these communications networks or
services, will help in loss of any personal data.

There are different methods of implemented for safeguarding the people with criminal
history, focusing group design. The DIP staff ran criminal history checks to confirm that no
rivals belong to the same group and double-verify the court-ordered proximity limits with one
another.

PECR was founded in relation to social inclusion access to online connectivity, which opened
up new options for firms and people while also bringing new privacy risks. Since PECR's
inception in 2003, our lives are now increasingly digital, and it is vital that it be re-evaluated.
The Regulations' limitations on using cookies, marketing services, and harassment calls are
one of the characteristics that are of particular significance in this case. As a consequence, the
government would like to conduct a survey and hear-out public opinions.

It was also a recruiting requirement to guarantee that criminals were not involved in
organisations where potential victims may confess their loss. Members were given the option
to leave the qualitative research without stating a rationale at the start, which added to the
safety net. Such ethical, safety, and ethical considerations, although vital, contributed to the
difficulty of the recruiting process.

Confidentiality:

Certain measures were established by PECR to safe guard people from the malicious threats
and online fraud. These apply to the placement of cookies on a person's device on the consent
of the user, as well as additional technologies including encryption and decryption methods,
software upgrades, and adware. A cookie is a tiny file that a web browser stores on a user's
terminal equipment. Cookies, as well as comparable technologies like web beacons and
hardware tracking, can be used to gather many sorts of information.

Legal issues:
The public is becoming increasingly concerned about the potential threats that arise when
machines make decisions instead of people. Artificial intelligence (AI) requires access to vast
amounts of data, but poorly crafted laws and government regulations may block this access
while simultaneously raising the danger of AI operations. AI also raises severe ethical and
privacy problems, which, if not addressed properly, might undermine public trust in emerging
technologies. As a transformative technology, AI has the potential to challenge different legal
beliefs throughout the time.

AI development and how legal guidelines adapt to it:


It is likely to vary on several factors such as social, cultural, economic. Politicians, on the
other hand, will face a difficult task in crafting laws that does not stifle AI development while
still safeguarding the public from the dangers of computer decision replacing human
decisions.

The first person to approach when an incident happens is the judiciary, as per the policy. As a
result, practitioners will have an unique duty to understand the growing difficulties, interests,
and arguments involved in AI activity in order to assist their clients.

Here are some of the best practices for legal compliance:

 An unbiased investigation needs to be carried out before accusing.


 In terms of using any customer data it should not be collected without consent.
 If any data is collected using internal or external resources, the participants should
notify how the data will be used.
 A consent form needs to be signed,

References:
Ahmad, K., JianMing, Z. and Rafi, M.
(2019) ‘An analysis of academic
librarians competencies
and skills for implementation of big data
analytics in libraries: a correlational
study’, Data
Technologies and Applications, Vol. 53,
No. 2, pp.201–216
 Ahmad, K., JianMing, Z. and Rafi, M. (2019) ‘An analysis of academic librarians
competencies and skills for implementation of big data analytics in libraries: a
correlational study’, Data Technologies and Applications, Vol. 53, No. 2, pp.201–216.
 Sammut Scerri, C., Abela, A., & Vetere, A. (2012). Ethical dilemmasof a
clinician/researcher interviewing women who have grown upin a family where there
is domestic violence. International Journalof Qualitative Methods,11, 102–122

 World Health Organization. (2002). Child abuse and neglect by par-ents and other
caregivers. In EG Kruge, M Dahlberg, AB. James,R. Zwi, & LL Lozano (Eds.), World
report on violence and health(pp. 57–86).

 Rhodes, T. (2000). The multiple roles of qualitative research in under-standing and


responding to illicit drug use. In G. Greenwood & K.Robertson (Eds.), Understanding
and responding to drug userole of qualitative research (Vol. 4, pp. 21–36).
Luxembourg, UK:European Monitoring Centre for Drugs and Drug Addiction Sci-
entific Monograph Series.

 https://assets.publishing.service.gov.uk/government/uploads/system/uploads/
attachment_data/file/1022315/
Data_Reform_Consultation_Document__Accessible_.pdf

 https://www.gov.uk/government/collections/crime-statistics

You might also like