Uneingeschränkter Zugang

Practice and Effectiveness Evaluation of Community Policing Informatization in Social Management

  
25. Sept. 2025

Zitieren
COVER HERUNTERLADEN

Introduction

Informatization is a huge concept, and community policing informatization construction refers to the act of making full use of modern information technology, information resources and community resources to digitize and network the community policing activities [1-2]. Specifically, it includes the establishment of an information application system, so that information collection, transmission, and sharing can be centralized and efficient, and information resources can be optimally configured to realize the modernization and scientification of community policing work [3-4].

Through information technology, community policing work realizes real-time sharing and rapid exchange of information. Police officers can quickly obtain instant information, understand the situation in the community in time, and make corresponding responses and dispositions [5-6]. With the continuous progress of technology and the expansion of application scenarios, the management and services of community policing work show the trend of intelligence, providing a strong guarantee for the harmony and stability of the community [7-9]. The Public Security Bureau has continued to make efforts in the reform of “release management and service” to create a better business environment through the production of convenient service guides, relying on public security police stations, police stations, police offices to set up integrated windows, and stationed in the government service centers at all levels of government and public security service centers, etc. [10-12]. At the same time, household administration, traffic, flow, immigration and other businesses are integrated into a one-stop comprehensive window for processing. Community policing informatization not only enhances the efficiency of police work, but also strengthens the interaction and connection between the police and the public [13-14]. The informatization platform provides more opportunities for the public to participate in community policing work, such as providing information to police officers through online provision of clues and consultation. This mode of interaction helps to enhance public trust and support for policing work, forming a favorable situation of police-community co-governance [15-17].

At present, China is gradually entering the era of information society and knowledge economy, economic globalization, social informatization, mobility of people and crime intelligence to the public security grass-roots basic work, especially community policing work put forward new requirements [18-19]. As the basic landing point of people’s life and residence and the source of various social conflicts, the community determines that the root of maintaining social stability is in the community, the key of grassroots basic work is in the community, and the center of gravity of strengthening social governance is in the community, and the construction and application of community policing informatization should be strengthened to serve the central work of the public security, and to promote the stability of the overall social security [20-21].

Based on the social practice and feedback level, investigative research has been carried out on the current situation of the development and construction of digital informatization of community policing work. Literature [22] analyzes how AI technology affects policing by focusing on the dimensions of policing, regular patrols, etc., and points out that AI technology empowers policing not only as a paradigm shift, but also as a need for a change in the thinking of police work. Literature [23] describes the rapid development of big data-related technologies, which promotes the construction of the police informatization business platform, and meets the needs of police personnel in multiple data fusion, information fusion, collaboration, real-time monitoring, and real-time communication. Literature [24] describes the transformation of information collection, analysis and dissemination methods in the public security sector in the context of informationization, which deepens the in-depth understanding of the public security intelligence information system in the public security sector. Literature [25] investigates the police cloud-a cloud infrastructure project and learns the underlying logic of the platform reform of the public security sector and the mechanism of promoting the transformation of the public security governance model, which provides some theoretical foundations for the study of the digital construction of police informatization. Literature [26] based on the survey results of mobile government users learned that the quality of information and the quality of online services significantly affect the satisfaction of citizens’ online government experience. Literature [27] systematically reviewed the practice of digital prediction techniques for police staff and found that police officers have a deep appreciation of the limitations imposed by errors and biases in input data, which leads to skepticism towards digital prediction techniques. Literature [28] discusses the practice of digitalization of policing and concludes that there is a need to deepen the understanding and promotion of digitalization of policing, which is of positive significance for the precision of community policing.

As for the exploratory and creative research around the technical level, literature [29] studied the current situation of blockchain technology in the practice of community policing, and concluded that it effectively enhanced the degree of information interaction and sharing between community police and residents, and improved the level of community governance. Literature [30] builds a community policing resource allocation framework based on community crime data base, long and short-term memory model and hierarchical analysis to provide auxiliary support for community policing decision-making in order to improve the effectiveness of community governance. Literature [31] conceived an analytical framework to analyze the positive role played by digital technology in promoting social cooperative production and creation, and the study pointed out that digital technology not only promotes social cooperative production, but also creates favorable conditions for people’s entertainment and interaction.

In this paper, the overall framework of the community policing system is designed based on the basic structure of people, places, objects, events, and organizations in the community. The needs of the data analysis module of the system are analyzed and a case information database is established. The decision tree algorithm is utilized to predict the case categories, and the association mining is carried out by Microsoft association rule algorithm to build the system mining algorithm module. Select a city as the research object for system pilot practice, and explore the construction of community policing informatization in the city through the questionnaire survey method. Take the theft case as an example to show the system operation process during the project implementation. Through Microsoft decision tree algorithm, the origin and age structure of the offenders are mined and analyzed. Based on the association rule algorithm model, explore the deep-seated crime pattern. Investigate the satisfaction of residents after the end of the project to verify the actual effect of the system in social management.

Overall framework of the community policing information system
System functional analysis

The community policing information work platform is proposed to be built as a comprehensive information collection and application system based on real population information and covering all the operations of community police officers in police stations.

The platform takes people, places, things, events and organizations as its basic structure, realizes the comprehensive collection of all kinds of basic information such as demographic information, address information, unit information, community information, intelligence information, preventive information, police information, etc., and pushes all the collected information into the comprehensive database of the Municipal Bureau for the application by the whole police.

The platform will establish a unified information collection portal, realize one-key associated login with 10 application information systems, such as police information comprehensive application platform, law enforcement case information comprehensive application and management platform, police geographic information management system, etc., and solve the problem of repeated login of information systems by the police.

The platform will realize the directization of information feeding the grassroots, and through the integration of resources and automatic comparison, the work tasks will be automatically pushed to the community police, guiding the police with information and assisting them in completing the work of information collection and maintenance.

The platform will realize online quantitative assessment of community policing work, quantify all the work of the community police, automatically realize quantitative assessment of the completion of the work tasks of the community police through the platform’s self-built models, and realize ranking statistics on information collection and completion of work tasks.

In addition to the above main functions, the platform will also realize such special functions as the display of precinct data, network video roll-call, work report management, key personnel control, etc., and will enhance the application of information by the police through comprehensive inquiries, statistical analysis and information research and judgment functions.

System Functional Design

The community policing information work platform is designed with powerful information collection functions, taking people, places, things, events and organizations as the basic structure, setting up resident population, mobile population, boarding population, overseas population, work objects, community correctional personnel; responsibility area, community committee, address information; vehicle information, dog information, found objects information; intelligence information, conflict resolution, case return and reverse investigation; Information collection modules are set up for residential districts, units under the jurisdiction, entertainment venues, special industries, rental housing, and group prevention and control. Functional modules such as assessment management, work report management, key personnel control, 72-hour transit management, report management, platform usage ranking, precinct data display, and network video roll call are also set up. The specific functional design is shown in Figure 1.

Figure 1.

Functional structure of community policing platform

Community policing information system construction

For the community policing information system designed in this paper, the data analysis module contains a variety of functions, including storage, correlation analysis and other functions, in order to eliminate the emergence of process link data isolation. The data storage and data analysis business processes tied together, can accurately realize the deployment of internal control and control, so that the relevant processes will not produce a disconnect.

System requirements analysis
Data storage management requirements

The function of storing large amounts of unstructured data is the most basic function for a community policing information system. The system needs to store data from multiple sources, including: surveillance video, census, criminal records and other data sources. In addition, in addition to providing the function of reimbursement of expenses, the system also needs to provide the function of leadership and financial approval according to the actual needs of the enterprise in the business. Relying only on a set of database management system and network storage equipment, the traditional community policing information system has certain limitations in storage capacity and analyzing and calculating capacity, and its scalability is also poor. Therefore, when faced with the rapid growth of data, the public security organs often appear data growth brought about by the problem of slowing down the query speed. More seriously, the problem of data loss or damage often occurs. In order to deal with the storage problem of big data, this paper adopts the combination of data warehouse and HDFS distributed file storage system in the Hadoop ecosystem to complete the data storage function.

First of all, in the data warehouse, the data is organized according to the division of the keywords of the data, and these keyword fields tend to be more stable, and there will not be any change for a long time, for example, we put the policing data firefighting data as well as the entry and exit management data in different data partitions. It is conducive to correlation analysis according to the data partition.

Secondly, the preprocessing of data mining, such as data cleaning and noise reduction, is completed in the data warehouse. In-database data mining is used to populate a downstream analytical data mart that can be used by data mining and statistical modeling professionals to visualize complex patterns. For example, police use these patterns to identify potential suspects so that they can be targeted for control in a limited way. The use of in-database analytics allows for the automation of data mining in highly concurrent and highly scalable database architectures.

Finally, the data warehouse is used as the core of data analytics, where the master data is rationally maintained in the data warehouse. When the data warehouse is at the center of data governance and data cleansing, it can help make sense of all the information.

Data linkage analysis requirements

Big data sets present the characteristics of massive, high-dimensional, and sparse, however, the associations of data items continue to increase with the increase of data, so association rule mining has become one of the research cores in the field of data mining. In the field of big data, the goal of data mining is generally divided into two kinds of predictive and descriptive tasks. Predictive tasks are mainly obtained from the data set from the previously unknown and unmeasurable rules, such as valuable patterns, correlations, structures, or abnormal behaviors; descriptive tasks are to make a description of the laws that exist in the data set by using methods such as sequential patterns or correlation analysis.

In this paper, in the process of mining association rules for police data, the data set D is described as a set consisting of n transactions with unique transaction identifiers TID, D={T1,T2,,Tn}$D = \left\{ {{T_1},{T_2}, \ldots ,{T_n}} \right\}$; where any transaction T consists of a number of items Ii in the item set I, where the item set I is defined as I={I1,I2,,Im}$I = \left\{ {{I_1},{I_2}, \ldots ,{I_m}} \right\}$, and then the transaction T is a subset TI of the item set I, symbolically denoted as T={I1,I2,,Ii;im}$T = \left\{ {{I_1},{I_2}, \ldots ,{I_i};i \in m} \right\}$.

Definition (1) support: the proportion of transactions with items A and B to all transactions, i.e., the probability of items A and B occurring at the same time, and its mathematical representation can be described as: sup(AB)=P(AB)${\sup_{\left( {A \to B} \right)}} = P\left( {A \cup B} \right)$

Definition (2) Confidence: the proportion of transactions with item A that also contain item B, i.e., the probability of item B occurring given that item A occurs. Its mathematical representation can be described as: conf(AB)=P(B|A)$con{f_{\left( {A \to B} \right)}} = P\left( {B|A} \right)$

Definition (3) association rule: if sup(AB)minn_sup${\sup_{\left( {A \Rightarrow B} \right)}} \geq \min n\_\sup$, conf(AB)min_conf$con{f_{\left( {A \Rightarrow B} \right)}} \geq \min \_conf$ then AB is an association rule.

Definition (4) Candidate item set: to obtain frequent k – item set Fk, a join operation is performed for Fk−1 to generate candidate k – item set, which is denoted as Ck. Candidate Ck contains all frequent k – item sets, and the members of which can be infrequent item sets.

The join step of association rule mining generates a large number of candidate itemsets that consume storage space and computational resources, and how to efficiently and accurately discover all the frequent patterns is the core problem of the mining process. A simple association rule mining model is shown in Fig. 2.

Figure 2.

Mining process of traditional association rule algorithm

Discovering association rules is one of the core topics in the field of data mining, these rules can be effectively used to discover unknown relationships that can provide a basis for prediction and decision making.

System database module design
Case information data

The source of the case information data of this system is derived from the case information management system, SQL database format, using the case entry data of a unit for the whole year of 2021-2023. There are 964 cases in the case registration card and 975 persons in the subject registration card.

Data pre-processing

Before mining the case information set, the work of preprocessing the existing dataset has to be done first. Because there are some attributes in the case information dataset that are irrelevant or redundant to the final mining result, which are redundant attributes. Although these attributes into the mining process will not affect the results of the analysis, but it will increase the complexity of the algorithm, aggravate the burden of the server, and reduce the performance of the mining system, so it is necessary to delete these attributes before mining. By continuously removing unnecessary attributes, the dataset for data mining is finally obtained.

The main problems of the original case information involved in this paper are:

There are a number of unfilled data or obvious errors;

There are redundant data and data unsuitable for mining;

There are many unstandardized data in the case information database due to different inputters and different input habits.

To address the above problems, this paper carries out manual and computer-assisted preprocessing of case information.

Data processing of vacancies

In the usual work, the database of various types of tables often appear in a large number of vacant information, such as in the “amount of money involved” in this field in the case of property invasion, due to the property and goods involved, if it is the loss of goods, there are often empty values, which will bring trouble for the data statistics. In this paper, according to the nature of the case with reference to the previous average value to fill in for them to make up the value.

Redundant and unsuitable for mining data processing

There are many kinds of fields in the case information database, and it is necessary to select the corresponding fields for mining, and delete the information that is not useful for the mining process, such as some pure table-filling data. The data is designed to be read and understood by the user, and the data fields are clearly data that has nothing to do with the analysis. Often, analytics-oriented data warehouse systems are of no practical significance to them, and relevant information such as “reporting unit”, “person filling in the form”, “brief case facts”, etc., can be ignored.

Unstandardized data processing

In the case information data, certain fields are not filled in uniformly, which is not conducive to data mining, for example, the cultural degree in the “subject’s situation”, which is filled in in an irregular manner, such as illiterate, elementary school, elementary school, junior high school, one year of high school, and senior high school, and so on. “Junior primary school” and “high school” can be unified into “primary school” by substitution: “high school years”, “technical secondary school”, “technical secondary school”, etc. can be replaced with “high school”; “Junior College”, “Undergraduate”, “Graduate”, etc., are all unified as “University”.

Discretization of relevant fields

First, the fields of the data are studied, mainly for the analysis of the attributes of interest, and then the work focuses on discrete optimization of the attribute fields in the data table, such as the age field, because the age field is numerical, for the mining analysis, it must be optimized and fuzzy into a period of time.

System data mining module design

Based on the collected case information data, two data mining tasks are designed, namely case information decision tree prediction and case information association prediction.

Decision tree is a tree structure that uses the principle of recursion to represent a collection of decisions, and the recursive categorization produces multiple rules. Each leaf in the tree structure represents a classification rule and the branches of the tree are tested according to the type of classification. Each split of the decision tree evaluates the effect of all input attributes on the predictable attributes. In this project, the case category is predicted by the age stage, education level, time of occurrence, place of occurrence, and place of origin in the case information, which will help the public security in the inventory and detection of the case.

Correlation analysis is the analysis and research of the frequency relationship of the data item set appearing in the set from a given set of data items as well as a collection of transactions to dig out the interrelationships hidden between the data. In this project, there is a great correlation between the fields in the case information, such as origin, age, education level, and case category, which can be analyzed with association rules to find valuable information.

For the above mining tasks, the data mining algorithms that come with SQL server 2005 are used in the design by calling the API, respectively, and the parameters of the corresponding algorithms are set up in a relevant way to adapt to the mining of case information data.

Decision tree module

Decision tree follows a top-down approach to construct a decision tree from the set of training tuples and their associated class labels. First predefine the termination condition “N”, input the data set and give an accumulator i, initial value is assigned 0. First pruning, generate the decision tree [i]$\left[ i \right]$, record the decision tree [i]$\left[ i \right]$. Evaluate the decision tree, whether it satisfies the termination condition or not. If the termination condition is not met, continue pruning; if the termination condition is met, end. This recursion continues until the termination conditions are met.

Prediction of case category by decision tree algorithm.

Create a mining model.

The information of the case is created as fields of the mining model. The mining model is similar to a table in a relational database and contains columns such as serial number, place of origin, age stage, literacy level, and case category, where case category is used as a predictive column.

Once the model is created, the next step is to process the model, mainly for training. Training requires a training dataset, and the way to get these training datasets is to access the database through the OLE DB driver of the data source.

Dataset Training

Dataset training is the invocation of Microsoft’s data mining algorithms to mine the training dataset for knowledge. After training, the patterns are stored in the mining model.

Model browsing

The serial number, place of origin, age stage, education level and case category of the training dataset are displayed in a table to show the model.

Applying the model for prediction

Model prediction is to apply the pattern obtained from the training mining model in the new dataset to predict the predictable columns of the new instances. The serial number, place of origin, age stage, literacy level and case category of the data warehouse are specifically divided according to the knowledge derived from the training set to arrive at a prediction.

Association rules module

The association rule finds the frequent itemsets by iterative loop. Set the minimum support min_sup port and i = l. Scan all the attributes to get the set of first itemsets. Compare the first itemset with min_sup port to find the frequent ones and generate a candidate set, i plus 1. Calculate the support of the candidate itemset, and the itemsets with greater than the minimum support are gathered together for the second loop. This is repeated until the frequent itemsets do not satisfy the support.

Association mining with Microsoft association rule algorithm

Association rule mining of case information to create the DMX of the model. Set the minimum support of the algorithm, while the minimum probability takes the default value of the association algorithm. If the parameters are not set properly, the algorithm will take a very long time to process and will require a very large amount of memory, increasing the load on the server side and the waiting time for the end user will be on the long side. The case information is added to the mining model as a prediction column for association rule analysis.

Model building, training and prediction

After the above data collection and conversion, the case information data is assembled in the database of the SQL ser ver 2005 server. The SQL server 2005 BI data mining tool will be able to access data from it.

Once the algorithm module is designed, the data mining model is built and the following step is to provide the data to be analyzed to the data mining engine. In this training phase, the system starts studying the input data with the data mining algorithm. The training set is scanned about once or a number of times in a cycle, from which correlations between them are found and memories are generated. The data mining tool applies the training mining model to the new dataset and predicts the predictable columns of each new instance according to the rules and calculates the possible values of these predictable columns.

This concludes the design process of the system mining algorithm module.

Analysis of the practical effects of community policing informatization

In order to verify the effectiveness of the system designed in this paper in practical applications, a city was selected for the study. The city’s Community Policing Information System (CPIS) pilot project started in May 2024 and the project was implemented over a six-month period.

Status of community policing informatization
Subjects of investigation

Before the beginning of the practice of community policing informatization, in order to understand the regularity and universality of the problems existing in the construction of urban community policing informatization in the city, this paper firstly adopts an anonymous online questionnaire to conduct a random survey on different types of community policing offices in the city. The residents in 15 communities were surveyed and the questionnaire survey was conducted for the effect of their community policing work, the total number of questionnaires issued, the number of recovered questionnaires and the effective rate of questionnaires were 500, 432, and 86.4%, respectively.

Questionnaire design

The questionnaire design content is roughly divided into two parts, the first part includes the basic information part and the community policing informatization construction satisfaction survey part, mainly through the survey to understand the residents’ satisfaction with the city’s urban community policing informatization construction, so as to intuitively understand the residents’ perception, a total of 8 multiple choice questions. The second part of the survey mainly focuses on the theme of community policing informatization construction, analyzing the participation of community residents in community policing, with a total of three questions.

Statistical analysis of data

There are five questions about the perception of community policing by community residents: “Do you know that there is a police office in the community” (Q1), “Do you know the responsibilities of the community police office” (Q2), “Do you know the telephone number of the community police office” (Q3), “Have you ever asked for help from community policing (Q4)”, “Are you satisfied with community policing services (Q5)”. Details of the survey results are shown in Figure 3. From the information of the relevant data in this figure, it can be seen that the percentage of those who do not know whether there is a community policing office, do not know the specific duties of the community policing office, and do not know the telephone number of the community policing are 38.25%, 71.93%, and 57.46%, respectively. In general, community residents have a low level of knowledge about community policing. The percentages of those who have not sought help from community policing and those who are not satisfied with community policing services are 61.53% and 78.34%, respectively, and the overall satisfaction level of community residents with community policing is low.

Figure 3.

Perceptions of community residents on community policing work

Regarding the participation of community residents in community policing, three questions were set up, including channels of participation in community policing (Q6), matters (Q7), and perceived problems of community policing (Q8), and the results of the survey are shown in Table 1, 51.39% of the community residents have not participated in community policing, and most of the others who have participated in it are because of publicity and training such as firefighting, which accounted for 61.11%, and 53.94% of the residents believe that community policing information collection is slow.

Status of community residents’ participation in community policing

Question Option Number of people Proportion
Q6 Wechat and other online channels 109 25.23%
Face-to-face and other offline channels 62 14.35%
Both online and offline 39 9.03%
Have not participated 222 51.39%
Q7 Fire promotion and training 264 61.11%
Community patrol 39 9.03%
Civil dispute mediation 95 21.99%
Other 34 7.87%
Q8 Insufficient police force 88 20.37%
The trajectory of people, vehicles and objects cannot be fully controlled 35 8.10%
Slow information collection 233 53.94%
Prediction and elimination of fire and other hidden dangers 54 12.50%
Other 22 5.09%

From the results of the questionnaire, it can be concluded that the residents of this community are not satisfied with the work of community policing, and the construction of information policing computerization in this community needs to be improved.

Examples of community policing information technology applications

In the work of public security, theft is a common type of crime, and has always been the focus of the public security organs to combat. This section takes a theft case as an example to show the actual application process of the community policing information system during the implementation of the project.

Decision trees

Mining and analyzing the origin and age structure of offenders whose cases are burglaries by Microsoft decision tree algorithm.

Select Accent in the tree drop-down list in the toolbar to get the “hometown” decision tree of the offender. Firstly, the algorithm branches the age range according to the calculation result of information entropy. When the Age Area=“30-40” node is selected, the proportion of the “hometown” of the offender between the ages of 30 and 40 is displayed. The decision tree of theft is shown in Figure 4, and it can be seen from Figure 4 that there are 264 cases belonging to the Age Area=“30-40” node, and the probability of “hometown=Hebei” is 51.52%. You can then continue to expand the tree until you find the node information of interest and finally form a rule.

Figure 4.

Theft decision tree

Association rules

The Microsoft association rule algorithm model is used to explore the intrinsic connection between attribute items such as age range, place of origin, crime characteristics, and means of committing crimes, with a view to exploring the deep-seated crime laws and discovering the characteristics of the suspects, so as to assist in preventing and combating the crime.

First set the algorithm parameters of Microsoft association rule model, where Minimum_Support=30, Minimum Probability=0.5, Maximum Itemset Size=0. After the model is processed by SOL Server Analysis Services, the association rule viewer can be used to view the content of the model. Rule Viewer to view the contents of the model. The Association Rule Viewer contains three tabs: Rules, Itemsets, and Dependency Networks.

Based on the association rule model, 315 rules were generated and the results are shown in Table 2. It can be found that the criminals of the theft cases are mostly from Hebei and Jiangxi, and their ages are mostly between 30-50, and most of them are gangs of roving criminals. Therefore, the public security police should strengthen the inventory of the people who meet the above combination of conditions, and crack down on the crime of theft.

Theft association rules(part)

Support Probability Rule
1.000 1.000 Location=Residential area, Native place=Hebei Province, Sex=Male⇒Illegal act=Steal
1.000 1.000 Location=Commercial district, Native place=Hebei Province, Sex=Female⇒Illegal act=Pickpocket
1.000 1.000 Time of crime=Night, Sex=Male, Crime point=Solo crime⇒Lost items=Cash and luxury goods
1.000 1.000 Time of crime=Night, Native place=Hebei Province, Crime point=Gang crime, Tools of crime = knives⇒Illegal act=Intentional wounding
1.000 1.000 Native place=Hebei Province, Sex=Male, Age =“30-40”, Crime point=Solo crime⇒Illegal act=Steal
1.000 1.000 Native place=Jiangxi Province, Sex=Male, Age =“40-50”, Lost items=Electronic product⇒Illegal act=Steal
1.000 1.000 Time of crime=Night, Native place=Jiangxi Province, Tools of crime = knives⇒Illegal act=Intentional wounding
1.000 1.000 Native place=Jiangxi Province, Location=Residential area, Age =“30-40”, Crime point=Solo crime⇒Illegal act=Steal
1.000 1.000 Native place=Jiangxi Province, Age =“40-50”, Sex=Female⇒Illegal act=Pickpocket
... ... ...
Evaluation of the effectiveness of community policing informatization

At the end of the practice of community policing informatization, a questionnaire survey on satisfaction with community policing informatization was conducted among the residents of the city, with a total of 518 questionnaires and 477 questionnaires distributed and recovered, respectively, and a valid questionnaire rate of 92.08%.

In the evaluation of satisfaction with community policing informatization, the focus is mainly on the following aspects: community security, law enforcement, efficiency, service attitude and police transparency. The details of community residents’ evaluation are shown in Table 3.

Detailed evaluation of community residents

Very good Normal Poor
Evaluation aspect Number of people Proportion Number of people Proportion Number of people Proportion
Community security situation 348 72.96% 106 22.22% 23 4.82%
Law enforcement status 372 77.99% 93 19.50% 12 2.51%
Efficiency of service 327 68.55% 125 26.21% 25 5.24%
Attitude of service 477 100.00% 0 0.00% 0 0.00%
Transparency of information 452 94.76% 25 5.24% 0 0.00%

According to the survey and analysis of the community security situation, the majority of residents believe that the community security situation is relatively good. In the survey, 106, 348 and 23 residents chose “fair”, “good” and “poor”, accounting for 22.22%, 72.96% and 4.82% of the total, respectively.

In terms of law enforcement, most of the residents believe that the law enforcement process is fair and transparent at this stage, and their satisfaction with law enforcement is relatively high, with 93 residents (19.50%) thinking it is “fair”, 372 residents (accounting for 77.99%) thinking it is “good”, and 12 residents thinking it is “poor”.

In terms of efficiency, residents generally believe that community policing is more efficient. Specifically, the number of residents who chose “fair”, “good” and “poor” in the survey was 125, 327 and 25, respectively.

As for the service attitude, the surveyed residents felt that they were able to interact with the police in a convenient way and received a timely response, so all residents in the survey considered it “better”;

In terms of information transparency, the vast majority of residents believe that the transparency of police officers has been improved, and 94.76% of residents choose “better”.

The satisfaction of community residents is shown in Figure 5. There are 9 residents (1.89%) who do not understand or are not clear about the community policing informatization situation, 279 residents (58.49%) are satisfied with the community policing informatization situation, 126 residents (26.42%) are basically satisfied with the community policing informatization situation, 47 residents (9.85%) have an average attitude towards the community policing informatization situation, and 16 residents (3.35%) were dissatisfied with the attitude towards the community policing informatization situation.

Figure 5.

Satisfaction of community residents

From the results of the questionnaire survey, it can be seen that after the application of the community policing information system proposed in this paper, the community policing informatization construction has a better level of residents’ satisfaction in the five aspects of law and order, law enforcement, efficiency, service attitude and information transparency. Community policing informatization enhances crime prevention and emergency response through data-based means, and improves residents’ sense of security, while strengthening the transparency of law enforcement, improving efficiency and service attitude, and further improving the effectiveness of social management.

Conclusion

This paper designs and builds a community policing information system to explore the practical effects of community policing informatization in social management through a six-month project pilot.

Before the implementation of the project, the overall community residents’ understanding and satisfaction with community policing was low, 51.39% of community residents had not participated in community policing, and most of the others had participated because of publicity and training such as firefighting, which accounted for 61.11%, and 53.94% of the residents thought that the collection of community policing information was slow.

During the implementation of the project, the results of the decision tree for burglary cases showed that 264 instances belonged to the Age Area=“30-40” node, where the probability of “Origin=Hebei” was 51.52%. The association rule model produced 315 rules, and the results show that the criminals in the theft cases are mostly from Hebei and Jiangxi, and their ages are mostly between 30-50, and most of them are in gangs and roaming.

At the end of the project, the evaluation results of community residents showed that the proportion of those who chose “better” in the five aspects of law and order, law enforcement, efficiency, service attitude, and information transparency were 72.96%, 77.99%, 68.55%, 100.00%, and 94.76%, respectively. 279 residents were satisfied with the informationization of community policing, accounting for 58.49%, and 26.42% of residents were basically satisfied with the informationization of community policing. There are 279 residents who are satisfied with the community policing informatization, accounting for 58.49%, and 26.42% of the residents are basically satisfied with the community policing informatization. Community policing informatization further improves the effectiveness of social management by effectively enhancing the management level in five areas: law and order, law enforcement, efficiency, service attitude and information transparency.

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
1 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Biologie, Biologie, andere, Mathematik, Angewandte Mathematik, Mathematik, Allgemeines, Physik, Physik, andere