Skip to Main Content
ICPSR
  • Help
  • Log In
  • Home
  • Find Data
    • Find Data
    • Search/Compare Variables
    • Data-Related Publications
    • Thematic Data Collections
  • Share Data
    • Start Deposit
    • Data Preparation Guide
    • Confidentiality
    • Share NIH Data
    • Suggest Data to Archive
  • Membership
    • Overview
    • Member List
    • How to Join
    • Official Rep Tools
    • Promoting ICPSR
    • News & Publications
    • Biennial Meeting
  • Summer Program
    • Home
    • Program Overview
    • Courses
    • Registration & Fees
    • Scholarships
    • Travel and Lodging
    • Testimonials
    • Giving
    • FAQ
  • Teaching & Learning
    • Overview
    • Classroom Exercises
    • Resources for Students
  • Data Management
    • Overview
    • Quality
    • Preservation
    • Access
    • Confidentiality
    • Citation
  • About
    • Overview and Mission
    • People
    • Governance
    • Building a Culture of Respect and Representation
    • News
    • Events
    • Careers
    • History
    • Data Stewardship and Research Projects
    • Giving
  • Help
  • Log In

Filters

  • computer programs9
  • instructional materials6
  • geographic information systems5
  • crime mapping4
  • international affairs3
view all
 Hide

  • United States12
  • Global2
  • Alabama1
  • Arkansas1
  • China (Peoples Republic)1
view all
 Hide

  • Public Use16
 Hide

  • SPSS3
  • Stata3
  • Delimited2
  • R2
  • SAS2
 Hide

  • program12
  • admin1
  • event1
  • experiment1
  • machine1
view all
 Hide

  • quantitative16
  •  Filter FAQ
 Hide

  • Cross-sectional1
  • Longitudinal1
 Hide

 Hide

  • New/updated this week0
  • New/updated this month0
  • New/updated this quarter0
  • New/updated this year1
 Hide

  • United States Department of Justice. Office of Justice Programs. National Institute of Justice9
  • Advanced Research Projects Agency2
  • Northwestern University1
  • Northwestern University. International Relations Program1
  • United States Department of Defense. Defense Advanced Research Projects Agency1
view all
 Hide

  • Inter-university Consortium for Political and Social Research (ICPSR)10
  • National Archive of Criminal Justice Data (NACJD)10
 Hide

  • Member-funded Data10
  • Public Data10
 Hide

  • ICPSR.X.B.remove filter
 Hide

  • Krend, Jeffery2
  • United States. Bureau of the Census2
  • Aggarwal, Sudhir1
  • Ball, John E.1
  • Belenko, Steven1
view all
 Hide

  • study18
  • unioncatalog2
 Hide

  • ICPSR20
  • NACJD10
  • IDRC2
  • RCMD2
  • NACDA1
 Hide

  • United States. Bureau of the Census2
  • City University of New York. Hunter College1
  • Columbia University, National Center on Addiction and Substance Abuse (CASA)1
  • Davners, Massachusetts, Police Department1
  • Florida State University1
view all
 Hide

  • Census of Population and Housing, 1980 [United States] Series1
 Hide

Search Results

Showing 1 - 20 of 20 results.

search tips
  • Search terms can be anywhere in the study: title, description, variables, etc.
  • Because our holdings are large, we recommend using at least two query terms:
    rural economy
    home ownership
    higher education
  • Keywords help delimit the breadth of results. Therefore, use as many as required to achieve your desired results:
    elementary education federal funding
  • Our search will find studies with derivative expressions of your query terms: A search for "nation"will find results containing "national"
  • Use quotes to search for an exact expression:
    "social mobility"
  • You can combine exact expressions with loose terms:
    "united states" inmates
  • Exclude results by using a MINUS sign:
    elections -sweden -germany
    will exclude swedish and german election studies
  • On the results page, you will be able to sort and filter to further refine results.
    • Studies
    • Variables
    • Series
    • Data-related Publications
    • ICPSR Website
     Hidden

    Study Title/Investigator
    Released/Updated
    1.
    AI Enabled Community Supervision for Criminal Justice Services, 2020-2023 (ICPSR 38996)
    Rogers, Marcus; Karabiyik, Umit; Aggarwal, Sudhir; Pettus, Carrie; Mukherjee, Tathagata; Chung, Haeyong
    This project aimed to revolutionize the reentry process for justice-involved individuals (JII) by harnessing the power of artificial intelligence (AI) and advanced technologies. The centerpiece of the endeavor is the AI-based Support and Monitoring System, or AI-SMS, a cutting-edge platform designed to assist JII and their dedicated caseworkers in their journey to reintegrate seamlessly into the community. While the primary focus is on JII, the researchers recognize the critical role played by caseworkers-clinically trained individuals who facilitate the reentry process from a community perspective. AI-SMS was conceived to be a multifaceted tool that provides case workers with early warning indicators of risky behavior and equips JII with the means and strategies to mitigate these risks, aligning with best practices in hybrid supervision. At its core, the system is committed to delivering personalized resources and opportunities to JII, complementing the support offered by caseworkers.
    2023-12-20
    2.
    Applying Artificial Intelligence to Person-Based Policing Practices, 2019-2023 (ICPSR 39074)
    Dai, Mengyan
    In this project, the research team developed and evaluated an artificial intelligence (AI) tool using agent-based modeling methods for crime analysis and risk evaluation (CARE): CAREsim. The purpose of this tool was to improve the effectiveness of person-based patrol strategies, where police take preemptive actions upon selected high-risk individuals (determined based on factors known to police such as violent crime history) when predicted risks of committing crimes are high. CARESim was developed and tested with a simulated randomized controlled experiment within the jurisdiction of Hampton, Virginia. 240 high-risk individuals (120 in each group) were followed for a 12-month period, with the simulation lasting 23 months. The treatment group received additional crime analyses using the AI tool and more focused patrols, while the control group received analyses as usual and random patrols in the simulated environment. The tool was evaluated on a series of outcomes (e.g., number of crimes and arrests) comparing the control and treatment groups. This collection contains the simulated high-risk individual data (DS1) and the simulated crimes data (DS2) used for the experiment.
    2024-09-26
    3.
    C80 Computer Program: 1980 Census Data Retrieval Package (ICPSR 9055)
    Inter-university Consortium for Political and Social Research
    This C80 computer program was written by ICPSR to retrieve and print data items from the 1980 Census Summary Tape Files (STFs). Development of the program was supported by a grant from the Administration on Aging, United States Department of Health and Human Services, which was seeking easy-to-use software for utilization by its state and area agencies on aging. C80 is written in Fortran IV and includes its own database dictionary for the STF 1 data files. This software can access any of the separate state or national data files from the STF 1 series, and can retrieve from them any combination of data items and geographical entities contained in those files. Output options include several forms of printed tables as well as logical record length data files. C80 automatically checks the "suppression flags" included in the STF 1 data files and recodes the relevant suppressed tabulations upon output. Code for the program and related materials are available as 10 separate files. The C80 program only accesses STF 1 files from the 1980 Census Summary Tape File series and cannot be used with other Summary Tape Files.
    2006-01-12
    4.
    Case Tracking and Mapping System Developed for the United States Attorney's Office, Southern District of New York, 1997-1998 (ICPSR 2929)
    Reilly, Colin; Goldsmith, Victor
    This collection grew out of a prototype case tracking and crime mapping application that was developed for the United States Attorney's Office (USAO), Southern District of New York (SDNY). The purpose of creating the application was to move from the traditionally episodic way of handling cases to a comprehensive and strategic method of collecting case information and linking it to specific geographic locations, and collecting information either not handled at all or not handled with sufficient enough detail by SDNY's existing case management system. The result was an end-user application designed to be run largely by SDNY's nontechnical staff. It consisted of two components, a database to capture case tracking information and a mapping component to link case and geographic data. The case tracking data were contained in a Microsoft Access database and the client application contained all of the forms, queries, reports, macros, table links, and code necessary to enter, navigate through, and query the data. The mapping application was developed using Environmental Systems Research Institute's (ESRI) ArcView 3.0a GIS. This collection shows how the user-interface of the database and the mapping component were customized to allow the staff to perform spatial queries without having to be geographic information systems (GIS) experts. Part 1 of this collection contains the Visual Basic script used to customize the user-interface of the Microsoft Access database. Part 2 contains the Avenue script used to customize ArcView to link the data maintained in the server databases, to automate the office's most common queries, and to run simple analyses.
    2006-01-18
    5.
    Census of Population and Housing, 1980 [United States]: Census Software Package (CENSPAC) Version 3.2 with STF4 Data Dictionaries  (ICPSR 7789)
    United States. Bureau of the Census
    This data collection contains the Census Software Package (CENSPAC), a generalized data retrieval system that the Census Bureau developed for use with its public use statistical data files. CENSPAC primarily provides processing capabilities for summary data files, but it also has some features that are applicable to microdata files. The actual software provides sample JCL for system installation, programs for system reconfiguration, source code for CENSPAC, and machine-readable data dictionaries for STF 1, STF 2, STF 3, and STF 4.
    2006-01-12
    6.
    CLUST, INDEX, THRAN, and CONID Computer Programs (ICPSR 5910)
    Schrodt, Phil
    This data collection contains eight files of computer program source code. All of these programs were written in standard Fortran IV for a CDC 6600 system at Indiana University for use with John Gillespie and Dina Zinnes, WORLD TRADE DATA, 1958-1968 (ICPSR 5402). The CLUST computer program (Parts 1 and 5) finds clusters around nations using a trade index. It allows input such as trade data for all nations in the system and for primary nations around which clusters are built, and produces several types of output data such as raw trade data, computed trade scores, GINI indices of the trade scores, members of each cluster and their cluster contribution scores, and nations that belong to more than one cluster and their respective cluster contribution scores. The INDEX computer program (Parts 2 and 6) takes a score that can be computed from world trade data and computes the score for all possible dyads and the GINI indices of the score for each nation, rotates the matrix and computes the GINI indexes again, finds the set of nations related to a nation on the basis of the score between them being greater than a certain value, and produces a frequency distribution of the scores. The CONID computer program (Parts 3 and 7) computes and prints the observed-expected trade scores between all possible dyads of nations, GINI indices on those scores for each score vis-a-vis the rest of the world, a GINI index on the indices of all nations in the world, and dominance scores for all dyads. The THRAN computer program (Parts 4 and 8) does a "threshold analysis" on a set of paired values using the correlation coefficient. This program breaks a set of ordered pairs that are sorted on the independent variable (X) into subsets so that the correlation coefficient in each subset is maximized.
    1992-02-16
    7.
    Congressional Redistricting Computer Program (ICPSR 7244)
    Nagel, Stuart S.
    This collection consists of a computer program designed to reapportion a legislature or any other body of people representing geographical districts. The program was built to produce the districting pattern that would result from agreed-upon values or the diverse patterns resulting from conflicting values. Input information consists of descriptions of units that would make up the districts, such as county, ward, and census tract, plus additional information for each time an area within a state is redistricted, consisting of both factual and value parameters. The output includes old and new districts along with certain characteristics of each old and new district. The program enables the user to adjust the relative weight to be given to three significant considerations: the relative equality of population among the districts (the one man-one vote requirement), the contiguity and degree of compactness of the districts, and the impact of redistricting on the political balance of power.
    1992-02-16
    8.
    Continuity and Change in American National Elections, 1952-1996: [Instructional Materials]  (ICPSR 3727)
    Davison, Donald L.
    These instructional materials were prepared for use with AMERICAN NATIONAL ELECTION STUDIES CUMULATIVE DATA FILE, 1948-2000 (ICPSR 8475), compiled by Virginia Sapiro, Steven J. Rosenstone, and the National Election Studies. The data file (a Stata data file) and accompanying documentation are provided to assist educators in instructing students in continuity and change over time in the major determinants of American national elections. An instructors' handout has also been included, containing the following sections, among others: (1) an overview of the instructional module and an introduction to the use of Stata, (2) a discussion of, and exercises on, the influences of party identification on political behavior, including the sources of partisan identification, partisan change over time, and partisanship and voting, (3) a discussion of, and exercises on, the social characteristics of the American electorate, including major social groupings in the American electorate, who really votes, and the social composition of the political parties, (4) a discussion of, and exercises on, the influence of social and economic factors on political behavior, including who votes, the question of class bias in American politics, and the economic determinants of the vote, and (5) a bibliography of related readings. The dataset is a collection of certain common variables for selected federal elections between 1952 to 1996 taken from the National Election Study Cumulative file. Variables in the dataset include race, gender, religion, education level, other demographic information, economic status indicators, media exposure, political ideology, political behavior, attitudes toward salient public policies, and partisan identification.
    2004-03-03
    9.
    CrimeStat III: A Spatial Statistics Program for the Analysis of Crime Incident Locations (Version 3.3), United States, 2010 (ICPSR 2824)
    Levine, Ned
    CrimeStat III is a spatial statistics program for the analysis of crime incident locations, developed by Ned Levine and Associates under the direction of Ned Levine, PhD, that was funded by grants from the National Institute of Justice (grants 1997-IJ-CX-0040, 1999-IJ-CX-0044, 2002-IJ-CX-0007, and 2005-IJ-CX-K037). The program is Windows-based and interfaces with most desktop GIS programs. The purpose is to provide supplemental statistical tools to aid law enforcement agencies and criminal justice researchers in their crime mapping efforts. CrimeStat is being used by many police departments around the country as well as by criminal justice and other researchers. The program inputs incident locations (e.g., robbery locations) in 'dbf', 'shp', ASCII or ODBC-compliant formats using either spherical or projected coordinates. It calculates various spatial statistics and writes graphical objects to ArcGIS, MapInfo, Surfer for Windows, and other GIS packages. CrimeStat is organized into five sections: Data Setup Primary file - this is a file of incident or point locations with X and Y coordinates. The coordinate system can be either spherical (lat/lon) or projected. Intensity and weight values are allowed. Each incident can have an associated time value. Secondary file - this is an associated file of incident or point locations with X and Y coordinates. The coordinate system has to be the same as the primary file. Intensity and weight values are allowed. The secondary file is used for comparison with the primary file in the risk-adjusted nearest neighbor clustering routine and the duel kernel interpolation. Reference file - this is a grid file that overlays the study area. Normally, it is a regular grid though irregular ones can be imported. CrimeStat can generate the grid if given the X and Y coordinates for the lower-left and upper-right corners. Measurement parameters - This page identifies the type of distance measurement (direct, indirect or network) to be used and specifies parameters for the area of the study region and the length of the street network. CrimeStat III has the ability to utilize a network for linking points. Each segment can be weighted by travel time, travel speed, travel cost or simple distance. This allows the interaction between points to be estimated more realistically. Spatial Description Spatial distribution - statistics for describing the spatial distribution of incidents, such as the mean center, center of minimum distance, standard deviational ellipse, the convex hull, or directional mean. Spatial autocorrelation - statistics for describing the amount of spatial autocorrelation between zones, including general spatial autocorrelation indices - Moran's I , Geary's C, and the Getis-Ord General G, and correlograms that calculate spatial autocorrelation for different distance separations - the Moran, Geary, Getis-Ord correlograms. Several of these routines can simulate confidence intervals with a Monte Carlo simulation. Distance analysis I - statistics for describing properties of distances between incidents including nearest neighbor analysis, linear nearest neighbor analysis, and Ripley's K statistic., There is also a routine that assigns the primary points to the secondary points, either on the basis of nearest neighbor or point-in-polygon, and then sums the results by the secondary point values. Distance analysis II - calculates matrices representing the distance between points for the primary file, for the distance between the primary and secondary points, and for the distance between either the primary or secondary file and the grid. 'Hot spot' analysis I - routines for conducting 'hot spot' analysis including the mode, the fuzzy mode, hierarchical nearest neighbor clustering, and risk-adjusted nearest neighbor hierarchical clustering. The hierarchical nearest neighbor hot spots can be output as ellipses or convex hulls. 'Hot spot' analysis II - more routines for conducting hot spot analysis including the Spatial and Temporal Analysis of Crime (STAC), K-means clustering, Anselin's local Moran, and the Getis-Ord local G statistics. The STAC and K-means hot spots can be output as ellipses or convex hulls. All of these routines can simulate confidence intervals with a Monte Carlo simulation. Spatial Modeling Interpolation I - a single-variable kernel density estimation routine for producing a surface or contour estimate of the density of incidents (e.g., burglaries) and a dual-variable kernel density estimation routine for comparing the density of incidents to the density of an underlying baseline (e.g., burglaries relative to the number of households). Interpolation II - a Head Bang routine for smoothing zonal data that can be applied to events (volumes), rates or can be used to create rates. In addition, there is an interpolated Head Bang routine for interpolating the smoothed Head Bang result to grid cells. Space-time analysis - a set of tools for analyzing clustering in time and in space. These include the Knox and Mantel indices, which look for the relationship between time and space, and the Correlated Walk Analysis module, which analyzes and predicts the behavior of a serial offender and a spatial-temporal moving average. Journey to crime analysis - a simple criminal justice method for estimating the likely location of a serial offender given the distribution of incidents and a model of travel distance. The routine allows the user to estimate a travel model with a calibration file and apply it to the serial events. It can be used to identify a likely location given the distribution of 'points' and assumptions about travel behavior. There is a routine for drawing lines between origins and destinations (crime trips). Bayesian journey to crime analysis - an advanced criminal justice method for estimating the likely location of a serial offender given the distribution of incidents, a model of travel distance, and an origin-destination matrix showing the relationship between where crimes were committed and where offenders lived. A diagnostics routine analyzes serial offenders for whom their residence is known and estimates which of several journey to crime estimates is most accurate. A selected method can be applied to identify a likely residence location of a single serial offender given the distribution of incidents, assumptions about travel behavior, and the origin of offenders who committed crimes in the same locatio,ns. Regression modeling - a module for analyzing a relationship between a dependent variable and one or more independent variables. The CrimeStat regression module includes both Ordinary Least Squares and Poisson-based regression models, estimated from Maximum Likelihood (MLE) or Markov Chain Monte Carlo (MCMC) algorithms. The current version includes six different models including OLS, Poisson with Linear Dispersion Correction, Poisson-Gamma and a Poisson-Gamma-Conditional Autoregressive (CAR) spatial regression model. The module can handle very large datasets through a Block Sampling approach. There is also a module for applying estimated coefficients to a new dataset to make predictions. Crime Travel Demand Modeling Crime travel demand modeling is a new module in CrimeStat III . It is an application of travel demand modeling, widely used in transportation planning, to crime analysis. The analysis is done by zones. First, crime 'trips' are defined as a link between an offender residence/origin location and a crime location. The number of crimes originating in each zone is counted as is the number of crimes ending in each zone. Second, the model is run sequentially in four separate stages with multiple routine in each stage: Trip Generation - Separate models are produced that predict the number of crimes originating in each zone (origins) and the number of crimes ending in each zone (destinations). CrimeStat III uses a multivariate Poisson regression model, with stepwise options, to create the prediction. Trips from outside the study area (external trips) can be added to the origin model to account for travel from outside the region. Once the models are created, a balancing procedure ensures that the number of origins equals the number of destinations. Trip Distribution - Using the predicted number of crime trips originating in each zone and the predicted number of trips occurring in each zone, the second stage distributes trips from each zone to every other zone using a gravity model. There are routines for calculating the actual (observed) distribution from individual data, for estimating the prediction coefficients, and for applying the predicted coefficients to the predicted origins and destinations. Another routine allows a comparison of the predicted trip distribution with the observed trip distribution. Mode Split - The predicted number of trips for each zone-to-zone pair can be split into likely travel modes using an accessibility function that approximates the utility of one mode relative to the others. Network Assignment - Finally, the predicted trips from each zone to every other zone by travel mode are assigned to a likely route based on the shortest path algorithm. The output includes the likely routes taken for each origin-destination zone pair and the total volume of trips on network links. This step requires a travel network, one for each travel mode. There are additional utilities for calculating transit networks from station/stop locations and for testing for one-way streets. Options Parameters can be saved and re-loaded. Tab colors can be changed. Monte Carlo simulation data can be output. CrimeStat, is accompanied by sample datasets and a manual that gives the background behind the statistics and examples. The manual also discusses applications of CrimeStat developed by other analysts and researchers. The program and sample data sets are in Windows-based zipped files that can be downloaded. The manual is a set of individual chapters in PDF files. They can be viewed online or downloaded. If downloading the PDF chapters separately, they should be saved into the same directory as the CrimeStat program. If the PDF file names are not renamed, they can be accessed directly from the program's help menu. CrimeStat Libraries The CrimeStat Libraries (version 1.0) are component objects that allow for the functions of CrimeStat to be programmed directly into custom software or systems. The CrimeStat Libraries include all of the routines that were developed through version 2.0 of the regular CrimeStat program, including spatial description, hot spot analysis, and kernel density interpolation routines. Additional spatial autocorrelation routines have been included. The libraries can input dbf, shape, and Ascii text files and can output to shape file, MIF/MID files, ASCII text files, and KML files.
    2023-03-30
    10.
    CrimeStat III User Workbook and Data (ICPSR 23622)
    Smith, Susan C.; Bruce, Christopher W.
    The Mapping and Analysis for Public Safety (MAPS) Program in conjunction with the National Law Enforcement, Corrections and Technology Center - Southeast (NLECTC-SE) in Charleston, South Carolina, announce the free download of a CrimeStat workbook designed specifically for crime analysts in the use of CrimeStat III. The data used in the workbook are also provided. Further, a PowerPoint file covering the workbook and all lessons is provided for download for those wanting to instruct a class. CrimeStat III is a Windows-based spatial statistics software package used for analyzing crime data from law enforcement and criminal justice agencies. Output produced from the software can be used with a geographic information system (GIS) to support and enhance the tactical and strategic analysis efforts of police departments. The workbook covers how to prepare data for CrimeStat, produce results and import them into ArcGIS 9.x for further analysis or presentation. It also covers entering data into CrimeStat III, basic descriptive statistics from Spatial Distribution, measures of clustering in Distance Analysis, several 'Hot Spot' techniques, and using both single and dual Kernel Density Interpolation. Upon completion of the workbook and exercises, users are able to immediately make use of CrimeStat at their own agencies in the analysis of crime patterns and trends.
    2008-10-16
    11.
    DICTION Computer Program (ICPSR 5909)
    North, Robert; Lagerstrom, Richard; Mitchell, William
    This data collection contains the DICTION program, a multi-option, high-speed, content-analysis program that retrieves cognitive, affective, and decisional data from speeches, documents, or archival materials. This computer analysis of textual themes by cluster-analysis technique is designed for use with Robert North et al., BRITISH SPEECHES, 1870-1914, AND GERMAN SPEECHES, 1871-1912 (ICPSR 5902). DICTION is used to produce word-frequency dictionaries, to substitute equivalent words into and delete unwanted words from the text, and to count the co-occurrences of pairs of specified keywords in text input. DICTION also includes routines to delete common English suffixes from text words. It is written in Fortran IV for use with the IBM H Compiler (OPT = 2).
    1992-02-16
    12.
    Problem Behaviors in Maltreated Children and Youth: Influential Child, Peer, and Caregiver Characteristics, 1999-2000 [United States] (ICPSR 4258)
    Wall, Ariana E.
    This project examined the problem behaviors of maltreated children and adolescents and the predictors of changes in behavior over an 18-month period. Problem behaviors included aggression, delinquency, risky sexual practices, substance abuse, and suicidal behaviors. The project used data from the National Survey of Child and Adolescent Well-Being (NSCAW), a national probability survey of children assessed following a child maltreatment report. This collection consists of SAS code used to produce subsets of the NSCAW data and the analyses for three chapters of the project's final report. Chapter 2 examined aggression and changes in behavior over 18 months for children aged six to ten years at the time of the baseline interview. Chapter 3 examined self-reported delinquency and caregiver-reported aggressive and delinquent behavior and changes in behavior over 18 months for youth aged 11 to 15 years at the time of the baseline interview. Chapter 4 examined risky behavior changes (risky sexual behavior, substance abuse, and suicidal risk behavior) over 18 months for youth aged 11 to 15 years at the time of the baseline interview.
    2005-07-06
    13.
    Reconstruction of Oliver Benson's "Simple Diplomatic Game" (ICPSR 5907)
    Krend, Jeffery
    This data collection contains a revised version of the Simple Diplomatic Game, one of the first all-computer simulations in the international relations field developed by Oliver Benson in 1959. It represents an early attempt to articulate a number of "loose" assumptions about international behavior into a set of computer instructions such that high-speed computing equipment can be used to simulate a variety of international crises situations. The earlier computer simulation program is reconstructed in this study for 25 nations in 1965 for the purpose of examining the advantages and disadvantages inherent in these simulations and gauging what might be expected of computer simulation methodology in general. The main data matrix contains nine categories of indicators of natural and technical resources used in computing the war potential of each nation, values for nine indicators of aggressiveness used for computing the propensity-to-act index, a numeric code (0-4) indicating alliance membership, a one or zero indicating the nuclear or non-nuclear status of each country, a tally of losses suffered by each coalition member as a result of an unsuccessful initiative on the part of the coalition leader, a statistic for total exports and imports for each country, degrees of longitude for a major industrial area in each country, and degrees of latitude for these industrial areas. Benson's simulation is reprogrammed in this collection in BASIC computer language for use in an on-line, time-sharing environment. Seven additional nations were added and the database for all nations was updated.
    2006-01-18
    14.
    Regional Crime Analysis Geographic Information System (RCAGIS)  (ICPSR 3372)
    United States Department of Justice. Criminal Division Geographic Information Systems Staff. Baltimore County Police Department
    The Regional Crime Analysis GIS (RCAGIS) is an Environmental Systems Research Institute (ESRI) MapObjects-based system that was developed by the United States Department of Justice Criminal Division Geographic Information Systems (GIS) Staff, in conjunction with the Baltimore County Police Department and the Regional Crime Analysis System (RCAS) group, to facilitate the analysis of crime on a regional basis. The RCAGIS system was designed specifically to assist in the analysis of crime incident data across jurisdictional boundaries. Features of the system include: (1) three modes, each designed for a specific level of analysis (simple queries, crime analysis, or reports), (2) wizard-driven (guided) incident database queries, (3) graphical tools for the creation, saving, and printing of map layout files, (4) an interface with CrimeStat spatial statistics software developed by Ned Levine and Associates for advanced analysis tools such as hot spot surfaces and ellipses, (5) tools for graphically viewing and analyzing historical crime trends in specific areas, and (6) linkage tools for drawing connections between vehicle theft and recovery locations, incident locations and suspects' homes, and between attributes in any two loaded shapefiles. RCAGIS also supports digital imagery, such as orthophotos and other raster data sources, and geographic source data in multiple projections. RCAGIS can be configured to support multiple incident database backends and varying database schemas using a field mapping utility.
    2002-05-29
    15.
    RF Fingerprinting for Contraband Wireless Devices Identification, Detection and Tracking in Correctional Facilities, Starkville, Mississippi, 2020-2022 (ICPSR 38650)
    Tang, Bo; Ball, John E.; Young, Maxwell
    The growing use of contraband wireless devices, particularly cell phones, smuggled in correctional facilities, is a significant problem across the country. Inmates behind bars may use these devices to organize gang activities, run drug operations, and even plan escapes, which may threaten the safety and welfare of other inmates, prison employees and the general public. To combat the use of contraband cell phones, some radio-based technologies have been investigated, which primarily fall into the following three categories: radio jamming systems which disrupt the communication link between the wireless device and the transceiver outside of the prison by continuously transmitting on the same radio frequencies as the contraband wireless device, and thus make the device unusable behind bars; managed access systems (MAS) which build a private micro-cellular network over the whole facility in which all radio transmissions to carrier networks, e.g., calls or messages originating from inside or outside prisons, are captured, and only those authorized transmissions from and/or to a "white list" of preregistered wireless devices are allowed; and passive detection systems which identify and localize various sources of unapproved wireless transmissions from prisons. It has been known that a jamming system may interfere with authorized calls including public safety communications (e.g., 9-1-1 calls), particularly when multiple frequency bands are involved, and a MAS is usually prohibitively expensive in its installation and operation due to the needs of covering many different commercial networks and frequency bands with an optimized footprint. In contrast, the detection system offers a passive solution in that detection systems do not transmit any radio signals and thus do not interfere with other transmissions. Therefore, the overall objective of this project is to develop an effective and low-cost contraband interdiction system (CIS) for identifying, localizing, and tracking unauthorized wireless devices such as cell phones and WiFi devices in correctional facilities, through the use and development of advanced machine learning algorithms for fingerprinting radio frequency (RF) signals originating from an unauthorized wireless device.
    2023-07-13
    16.
    Special Program Information Tape (ICPSR 8372)
    United States. Bureau of the Census
    This collection of computer programs and test data files was compiled by the Census Bureau for use with GEOGRAPHIC BASE FILE/DUAL INDEPENDENT MAP ENCODING (GBF/DIME), 1980 (ICPSR 8378). This collection consists of files grouped into five categories: Special Program Information Tape (SPIT) Datasets, UNIMATCH System Datasets, ADMATCH System Datasets, EASYMAP System Datasets, and EASYCORD System Datasets. Some of the capabilities of the programs in this collection include: mapping files for which complicated data manipulation is required, generating individualized lists of candidates for carpools, linking of records on the basis of street address, creating shaded area maps for statistical display, and producing a map coordinate system.
    2006-01-12
    17.
    Trends in Substance Abuse and Treatment Needs Among Inmates in the United States, 1996-1997 (ICPSR 3714)
    Belenko, Steven
    This data collection consists of the SPSS syntax used to recode existing variables and create new variables from the SURVEY OF INMATES OF LOCAL JAILS, 1996 [ICPSR 6858] and the SURVEY OF INMATES IN STATE AND FEDERAL CORRECTIONAL FACILITIES, 1997 [ICPSR 2598]. Using the data from these two national surveys on jail and prison inmates, this study sought to expand the analyses of these data in order to fully explore the relationship between type and intensity of substance abuse and other health and social problems, analyze access to treatment and services, and make estimates of the need for different types of treatment services in correctional systems.
    2006-01-18
    18.
    Union Army Recruits in Black Regiments in the United States, 1862-1865: [Instructional Materials] (ICPSR 3466)
    Oberly, James W.
    These instructional materials were prepared for use with UNION ARMY RECRUITS IN BLACK REGIMENTS IN THE UNITED STATES, 1862-1865 (ICPSR 9426), compiled by Jacob Metzer and Robert A. Margo. The data file and accompanying documentation are provided to assist educators in instructing students about the demographic, military, and medical history of African-American men who volunteered for service in the Union Army during the American Civil War. An instructor's handout has also been included. This handout contains the following sections, among others: (1) General goals for student analysis of quantitative datasets, (2) Specific goals in studying this dataset, (3) Suggested appropriate courses for use of the dataset, (4) Tips for using the dataset, and (5) Related secondary source readings. This data collection was designed to examine the characteristics of free Blacks and ex-slaves mustered into the Union Army between 1862 and the end of the Civil War. In addition to variables on personal characteristics (such as skin, eye, and hair color, height, age, birthplace, and occupation before enlistment), the data also contain Army-related variables (such as regiment and company number, rank, enlistment date and place, changes in rank, and date and cause of end of service).
    2004-02-27
    19.
    Violence Against Women: Developmental Antecedents Among Black, Caucasian, and Hispanic Women in the United States, 1987-1988 and 1992-1994 (ICPSR 3293)
    Jasinski, Jana L.
    The aim of this study was to examine the factors related to different patterns of male violence against women. Employing both intra-individual and sociocultural perspectives, the project focused on the relationship between violence against women and previously established risk factors for intimate partner violence including stressors related to work, economic status, and role transitions (e.g., pregnancy), as well as family power dynamics, status discrepancies, and alcohol use. The following research questions were addressed: (1) To what extent do Caucasian, Black, and Hispanic individuals engage in physical violence with their partners? (2) How are socioeconomic stressors associated with violent relationships among Caucasian, Black, and Hispanic couples? (3) To what extent are changes in patterns of physical violence against women associated with different stages of a relationship (e.g., cohabitation, early marriage, pregnancy, marriage)? (4) To what extent do culturally linked attitudes about family structure (family power dynamics) predict violence among Caucasian, Black, and Hispanic couples? (5) To what extent do family strengths and support systems contribute to the cessation of violence among Caucasian, Black, and Hispanic couples? (6) What is the role of alcohol use in violent relationships among Caucasian, Black, and Hispanic couples? The data used for this project came from the first and second waves of the National Survey of Families and Households (NSFH) conducted by the Center for Demography and Ecology at the University of Wisconsin-Madison [NATIONAL SURVEY OF FAMILIES AND HOUSEHOLDS: WAVE I, 1987-1988, AND WAVE II, 1992-1994 (ICPSR 6906)]. The NSFH was designed to cover a broad range of family structures, processes, and relationships with a large enough sample to permit subgroup analysis. For the purposes of this study, the analytical sample focused on only those couples who were cohabiting or married at the time of the first wave of the study and still with the same person at the time of the second wave (N=3,584). Since the study design included oversamples of previously understudied groups (i.e., Blacks, Mexicans, Puerto Ricans), racial and ethnic comparisons were possible. In both waves of the NSFH several identical questions were asked regarding marital conflicts. Both married and cohabiting respondents were asked how often they used various tactics including heated arguments and hitting or throwing things at each other to resolve their conflicts. In addition, respondents were asked if any of their arguments became physical, how many of their fights resulted in either the respondent or their partner hitting, shoving, or throwing things, and if any injuries resulted as a consequence of these fights. This data collection consists of the SPSS syntax used to recode variables from the original NSFH dataset. In addition, new variables, including both composite variables (e.g., self-esteem, hostility, depression) and husband and wife versions of the variables (using information from both respondent and partner), were constructed. New variables were grouped into the following categories: demographic, personality, alcohol and drug use, relationship stages, gender role attitudes, division of labor, fairness in household chores, social support, and isolation. Psychological well-being scales were created to measure autonomy, positive relations with others, purpose in life, self-acceptance, environmental mastery, and personal grow,th. Additional scales were created to measure relationship conflict, sex role gender attitudes, personal mastery, alcohol use, and hostility. The Rosenberg Self Esteem Scale and the Center for Epidemiological Studies Depression Scale (CES-D) were also utilized.
    2002-05-14
    20.
    War-Peace Module (ICPSR 5908)
    Krend, Jeffery
    This study contains a user-oriented computer module that focuses on 1,951 situations, decisions, and events relative to seven issue areas that emerged from the interactions of ten nations: China, Egypt, France, West Germany, East Germany, the Soviet Union, Israel, Syria, the United Kingdom, and the United States. The module was developed to explicate a number of propositions about war and peace between nations and to combine these propositions into an operating model of an international relations system. It is intended to serve as a technical companion to and provide supplementary flow charts and program listings for the War-Peace module developed in Jeffrey A. Krend's "War and Peace in the International System: Deriving an All-Computer Heuristic." Actors were assessed for their response to perceived threats in either a cooperative or hostile manner relative to each issue in seven key issue areas: German reunification, Israeli survival, Soviet leadership in the communist world, military support for Egypt, national survival and development, international cooperation, and big power hegemony. In addition, the technical aspects of the model were generalized into design criteria for simulations of large-scale social systems in general.
    1992-02-16
      Facebook Instagram X formerly Twitter Linked In YouTube
      Accessibility |  Privacy Policy  |  Contact Us  |  Help |  ICPSR-help@umich.edu  |  734-647-2200
      Sign up for our newsletter
      Logo for University of Michigan
      © 2025 The Regents of the University of Michigan. ICPSR is part of the Institute for Social Research at the University of Michigan.