U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Analyzing Repeat Victimization

NCJ Number
211240
Author(s)
Deborah Lamm Weisel
Date Published
August 2005
Length
72 pages
Annotation
After defining "repeat victimization" (RV) and its link to other patterns of public-safety problems, this guide indicates information sources and ways to determine the amount and characteristics of RV in a police agency's jurisdiction, followed by a review of responses to RV based on evaluations and police practice.
Abstract
According to most definitions, repeat victimization, or revictimization, occurs when the same type of crime incident is experienced by the same victim or target within a specific period of time, such as a year. Repeat victimization refers to the total number of offenses experienced by a victim or target, including the initial and subsequent offenses. The amount of RV is usually reported as the percentage of victims (persons or addresses) who are victimized more than once during a time period for a specific crime type. RV is substantial and accounts for a large percentage of all crime. This guide also discusses when, why, and where RV occurs, as well as how it relates to other crime patterns. Also discussed is the tendency of police agencies to overlook repeat victimization, as well as special concerns about repeat victimization. A section on understanding the RV pattern in a particular jurisdiction provides guidance in selecting the problem, selecting data, analyzing tasks, and planning further analysis. A section on responding to RV profiles types of responses to RV, including victim protection, shifting responsibility for RV, and increasing risks to offenders for RV. The guide concludes with suggestions for measuring the effectiveness of a response to RV. Appended information on data sources and limitations and improving data integrity, 42 notes, 34 references, and 18 annotated recommended readings