416:
decides that there is little or no risk attached to the act. One of the goals of SCP is to implement safeguards to the point where the potential offender views the act unfavourably. For example, drivers approaching a traffic junction where there are speed cameras slow down if there is a nearly 100% chance of being caught trying to run a red light. The use of crime "scripts" has been touted as a method of administering safeguards. Scripts were originally developed in the field of cognitive science and focus on the behavioural processes involved in rational goal-oriented behaviour. Hence scripts have been proposed as tool for examining criminal behaviour. In particular the use of what is termed a "universal script" has been advanced for correctly identifying all the stages in the commission process of a crime.
1152:
1141:
387:
advertised as an attempt to keep illegal driving incidences down. As a potential criminal, someone who is about to speed or run a red light knows that their risk of getting caught is nearly 100% with these systems. This completely disincentivizes the person from speeding or running red lights in areas in which they know ATES are set up. Though not conclusive, evidence shows that these type of systems work. In a
Philadelphia study, some of the city's most dangerous intersections had a reduction of 96% in red light violations after the installation and advertisement of an ATES system.
592:
or stressors, often while performing care-giving duties. The authors of the theory argue that modifying the situations experienced by children, through situational crime prevention strategies, could lower the likelihood of abuse, irrespective of the disposition of people who are likely to come into contact with children. The authors concede that there has been little testing of situational interventions, which means there is little evidence to demonstrate their effectiveness.
628:, profiles of users and their activities, security of computers and avoiding customer dissatisfaction. There are a number of issues that make the development of fraud management systems an extremely difficult and challenging task, including the huge volume of data involved; the requirement for fast and accurate fraud detection without inconveniencing business operations; the ongoing development of new fraud to evade existing techniques; and the risk of false alarms.
555:
unethical activities, which may be committed via electronic or other methods and IS security technologies are vital in order to protect against amendment, unauthorised disclosure and/or misuse of information. Computer intrusion fraud is a huge business with hackers being able to find passwords, read and alter files and read email, but such crime could almost be eliminated if hackers could be prevented from accessing a computer system or identified quickly enough.
219:(1993) demonstrated that changing the policy of police response to domestic violence calls altered the probability of subsequent violence. Policing hot spots, areas of known criminal activity, decreases the number of criminal events reported to the police in those areas. Other initiatives include community policing efforts to capture known criminals. Organizations such as America's Most Wanted and Crime Stoppers help catch these criminals.
588:
situational factors, which form the immediate backdrop to the setting in which the abuse takes place. Situational factors, it is argued, can influence not just whether a person abuses a child, but whether the idea of abusing occurs to them in the first place. The particular opportunities and dynamics of a situation are said to present cues, stressors, temptations and perceived provocations, which trigger motivation.
1366:
372:: Includes reducing frustrations and stress (e.g. efficient queues and polite service), avoiding disputes (e.g. Separate enclosures for rival soccer fans), reducing emotional arousal (e.g. controls on violent pornography), neutralising peer pressure (e.g. targeting and removing troublemakers from a school) and discouraging imitation (e.g.
396:
conduct. Hence rather than focus on the criminal, SCP focuses on the circumstances that lend themselves to crime commission. Understanding these circumstances leads to the introduction of measures that alter the environmental factors with the aim of reducing opportunities for criminal behavior. Other aspects of SCP include:
550:(ICT) and information is a hugely valuable asset due to the accessible data that it provides, which means IS has become increasingly important. While storing information in computers enables easy access and sharing by users, computer crime is a considerable threat to such information, whether committed by an external
165:
The commissions agree on the role of municipalities, because they are best able to organize the strategies to tackle the risk factors that cause crime. The
European Forum for Urban Safety and the United States Conference of Mayors have stressed that municipalities must target the programs to meet the
591:
The consideration of situational factors leads to the argument that some offenders may be considered as ‘situational’, marking them out from other types. The ‘situational offender’ is someone who is not primarily attracted to children. Instead, he is stimulated to offend by specific behavioural cues
311:
The theory behind SCP concentrates on the creation of safety mechanisms that assist in protecting people by making criminals feel they may be unable to commit crimes or would be in a situation where they may be caught or detected, which will result in them being unwilling to commit crimes where such
587:
Smallbone et al.’s
Integrated Theory of Child Sexual Abuse posits that it can be useful to study child sexual abuse as a situationally specific incident, and that on any particular occasion, a variety of different factors can influence whether that incident is likely to occur. One set of factors is
578:
In the case of computer crime, even cautious companies or businesses that aim to create effective and comprehensive security measures may unintentionally produce an environment, which helps provide opportunities because they are using inappropriate controls. Consequently, if the precautions are not
545:
could use the same techniques and consequently reduce the frequency of computer crime that targets the information assets of businesses and organisations. Designing out crime from the environment is a crucial element of SCP and the most efficient way of using computers to fight crime is to predict
415:
Another aspect of SCP that is more applicable to the cyber environment is the principle of safeguarding. The introduction of these safeguards is designed to influence the potential offender's view of the risks and benefits of committing the crime. A criminal act is usually performed if the offender
395:
Situational crime prevention (SCP) in general attempts to move away from the "dispositional" theories of crime commission i.e. the influence of psychosocial factors or genetic makeup of the criminal, and to focus on those environmental and situational factors that can potentially influence criminal
211:
Family-level factors such as consistent parenting skills similarly reduce individual level risk. Risk factors are additive in nature. The greater the number of risk factors present the greater the risk of criminal involvement. In addition there are initiatives which seek to alter rates of crime at
976:
Cornish, D. and Clarke, R. Opportunities, Precipitators and
Criminal Decisions: A Reply to Wortley's Critique of Situational Crime Prevention. In Theory for Practice in Situational Crime Prevention, Crime Prevention Studies, (Vol 16) M. Smith and D. Cornish, Eds, Criminal Justice Press, New York,
554:
or by an ‘insider’ (a trusted member of a business or organisation). After viruses, illicit access to and theft of, information form the highest percentage of all financial losses associated with computer crime and security incidents. Businesses need to protect themselves against such illegal or
293:
as it begins with an examination of the circumstances that allow particular types of crime. By gaining an understanding of these circumstances, mechanisms are then introduced to change the relevant environments with the aim of reducing the opportunities for particular crimes. Thus, SCP focuses on
386:
One example of SCP in practice is automated traffic enforcement. Automated traffic enforcement systems (ATES) use automated cameras on the roads to catch drivers who are speeding and those who run red lights. Such systems enjoy use all over the world. These systems have been installed and are
623:
has been one of the most complex crimes worldwide in recent times and despite numerous prevention initiatives, it is clear that more needs to be done if the problem is to be solved. Fraud management comprises a whole range of activities, including early warning systems, signs and patterns of
558:
Despite many years of computer security research, huge amounts of money being spent on secure operations and an increase in training requirements, there are frequent reports of computer penetrations and data thefts at some of the most heavily protected computer systems in the world. Criminal
428:
be assessed in terms of their criminal attributes, which include skills, knowledge, resources, access and motives (SKRAM). Cybercriminals usually have a high degree of these attributes and this is why SCP may prove more useful than traditional approaches to crime. Clarke proposed a table of
546:
criminal behaviour, which as a result, makes it difficult for such behaviour to be performed. SCP also has an advantage over other IS measures because it does not focus on crime from the criminal's viewpoint. Many businesses/organisations are heavily dependent on
382:: Includes setting rules (e.g. rental agreements), posting instructions (e.g. 'No Parking' signs), alerting conscience (roadside speed display boards), assisting compliance (e.g. easy library check-out) and controlling drugs and alcohol (e.g. alcohol free zones)
618:
In computer systems that have been developed to design out crime from the environment, one of the tactics used is risk assessment, where business transactions, clients and situations are monitored for any features that indicate a risk of criminal activity.
207:
Primary prevention addresses individual and family-level factors correlated with later criminal participation. Individual level factors such as attachment to school and involvement in pro-social activities decrease the probability of criminal involvement.
79:
They agree that governments must go beyond law enforcement and criminal justice to tackle the risk factors that cause crime, because it is more cost effective and leads to greater social benefits than the standard ways of responding to crime. Multiple
595:
An evaluation of a programme which worked work mothers in London to reduce situational risk of child sexual abuse in the home illustrated some of the challenges that mothers faced in identifying and reducing situational risk:
1025:
527:(IS) security by decreasing the rewards criminals may expect from a crime. SCP theory aims to affect the motivation of criminals by means of environmental and situational changes and is based on three elements:
249:
Tertiary prevention is used after a crime has occurred in order to prevent successive incidents. Such measures can be seen in the implementation of new security policies following acts of terrorism such as the
1103:
Thakar U., Dagdee N., Varma S., Pattern
Analysis and Signature Extraction for Intrusion Attacks on Web Services, International Journal of Network Security and Its Applications, Vol 2(3), p190 - 205, 2010
316:- that every criminal will assess the situation of a potential crime, weigh up how much they may gain, balance it against how much they may lose and the probability of failing, and then act accordingly.
260:
uses techniques focusing on reducing on the opportunity to commit a crime. Some of techniques include increasing the difficulty of crime, increasing the risk of crime, and reducing the rewards of crime.
932:
1298:, Committee on the Assessment of Family Violence Interventions, Board on Children, Youth, and Families, Edited by Rosemary Chalk and Patricia King. Washington, DC: National Academies Press, 2004
575:. As the popularity and growth of the Internet continues to increase, many web applications and services are being set up, which are widely used by businesses for their business transactions.
520:
Many of these techniques do not require a considerable investment in hi-tech IT skills and knowledge. Rather, it is the effective utilization and training of existing personnel that is key.
1115:
Willison R., Backhouse J., Opportunities for computer crime: considering systems risk from a criminological perspective, European
Journal of Information Systems, Vol 15, p 403 - 414, 2006
222:
Secondary prevention uses intervention techniques that are directed at youth who are at high risk to commit crime, and especially focus on youth who drop out of school or get involved in
234:
are high. Much of the crime that is happening in neighbourhoods with high crime rates is related to social and physical problems. The use of secondary crime prevention in cities such as
823:
330:), applying screen exits (e.g. Electronic merchandise tags), deflecting offenders (e.g. dispersing pubs) and controlling tools or weapons (e.g. Disabling stolen mobile phones).
246:. Programs such as general social services, educational institutions and the police are focused on youth who are at risk and have been shown to significantly reduce crime.
1021:
Beebe N.L., Rao V.S., Using
Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems, Security, Proceedings of the 2005 SoftWars Conference,
1022:
659:– to categorise and group data and automatically identify associations and rules that may be indicative of remarkable patterns, including those connected to fraud.
690:
of crime suggests that disorderly neighborhoods can promote crime by showing they have inadequate social control. Some studies have indicated that modifying the
1007:
Willison R. Siponen M. Overcoming the insider: reducing employee computer crime through
Situational Crime Prevention, Communications of the ACM, Vol 52(9), 2009
881:
929:
749:
547:
294:
crime prevention rather than the punishment or detection of criminals and its intention is to make criminal activities less appealing to offenders.
1094:
Sukula S.K., Mittal, K.K., Computer crimes and preventive measures in cyber law, Journal of Social
Welfare and Management, Vol 2(2), p63 - 70, 2010
69:
772:
517:
Avoiding disputes and temptations – maintaining positive employee-management relations and increasing awareness of responsible use policy.
1176:
797:
1412:
998:
Me G., Spagnoletti P., Situational Crime
Prevention and Cyber-crime Investigation: the Online Pedo-pornography Case Study, Eurocon 2005
918:
509:, harsh penalties for hacking, rapid notification of stolen or lost credit bankcards, avoiding ID numbers on all official documents.
1377:
817:
304:
Entail the management, creation or manipulation of the immediate environment in as organised and permanent a manner as possible; and
73:
1175:
Palshikar G.K., The Hidden Truth: data analysis can be a strategic weapon in your company’s management and control of fraud,
1065:
1417:
281:) is a relatively new concept that employs a preventive approach by focusing on methods to reduce the opportunities for
1370:
346:), utilising place managers (e.g. rewarding vigilance) and strengthening formal surveillance (e.g. Security guards).
848:
551:
466:
251:
1402:
674:
61:
989:. Edited by Marvin D. Krohn, Alan J. Lizotte and Gina Penly Hall. Springer Science and Business Media, LLC 2009.
173:
of key agencies such as schools, job creation, social services, housing and law enforcement around a diagnosis.
1257:
Urban Crime Prevention and Youth at Risk: Compendium of promising strategies and programs from around the world
494:
648:
Data pre-processing techniques for validation, correction of errors and estimating incorrect or missing data.
741:
632:
1345:
Preventing violence: A guide to implementing the recommendations of the World Report on Violence and Health
1319:, New York: United Nations, Economic and Social Council, Office for Drug Control and Crime Prevention, 2002
1085:
Garfinkel S.L., Inside Risks, The Cybersecurity Risk, Communications of the ACM, Vol 55 (6), p29 - 32, 2012
485:
of computer users, use of photo and thumb print for ID documents/credit cards, requiring additional ID for
123:
Define priorities for, and support research on, the causes, consequences, costs and prevention of violence.
523:
It has been suggested that the theory behind situational crime prevention may also be useful in improving
147:
86:
1189:
Kondo, Michelle C.; Andreyeva, Elena; South, Eugenia C.; MacDonald, John M.; Branas, Charles C. (2018).
687:
342:), Assisting natural surveillance (e.g. adequate street lighting), Reducing anonymity (e.g. compulsory
645:
Matching algorithms to identify irregularities in the transactions of users compared to previous proof
1407:
458:
1387:
949:
Automated Traffic Enforcement Systems: The Efficacy of Such Systems and Their Effect on Traffic Law
716:
665:
524:
91:
1250:
Reducing offending: An assessment of research evidence on ways of dealing with offending behaviour
779:
326:: Includes target hardening (e.g. Tamper-proof packaging), controlling access to facilities (e.g.
711:
564:
339:
355:
1252:, edited by Peter Goldblatt and Chris Lewis. London: Home Office, Research and Statistics, 1998
319:
Situational Crime prevention can be applied using twenty-five opportunity reducing techniques:
1212:
914:
813:
691:
620:
568:
482:
1207:
1190:
1202:
1055:
871:
863:
805:
721:
668:
to identify groups or patterns of behaviour either automatically or to match certain inputs.
158:
46:
17:
809:
631:
Generally, fraud detection techniques fall into two categories: statistical techniques and
429:
twenty-five techniques of situational crime prevention, but the five general headings are:
1029:
936:
572:
313:
137:
133:
849:"Understanding the perpetration of employee computer crime in the organisational context"
84:
also confirm public support for investment in prevention. Waller uses these materials in
132:
Integrate violence prevention into social and educational policies, and thereby promote
699:
695:
625:
542:
486:
478:
358:), identifying property (e.g. cattle branding), disrupting markets (e.g. monitoring of
327:
227:
65:
642:
Grouping and classification to determine patterns and associations among sets of data.
76:
have analyzed their and others' research on what lowers rates of interpersonal crime.
1396:
867:
505:
Removing targets and disrupting cyberplaces – monitoring Internet sites and incoming
425:
354:: Includes concealing targets (e.g. unmarked bullion trucks), removing targets (e.g.
57:
662:
Specialist systems to programme expertise for fraud detection in the shape of rules.
563:
are increasing with computers being used for numerous illegal activities, including
1238:, London: Audit Commission for Local Authorities and NHS in England and Wales, 1996
702:
available in an area, and keeping vacant lots and buildings maintained and secure.
151:
81:
1043:
307:
Result in crime being more difficult and risky or less rewarding and justifiable.
952:
671:
Machine learning techniques to automatically detect the characteristics of fraud
656:
290:
286:
157:
Seek practical, internationally agreed responses to the global drugs and global
114:
1264:
Crime Prevention Digest II: Comparative Analysis of Successful Community Safety
686:
Neighborhoods can implement protective strategies to reduce violent crime. The
560:
506:
462:
363:
359:
343:
235:
231:
42:
1280:, edited by Wesley Skogan, Washington, DC: The National Academies Press, 2004
1060:
170:
38:
1301:
Sherman, Lawrence, David Farrington, Brandon Welsh, Doris MacKenzie, 2002,
1216:
239:
1365:
312:
mechanisms are in place. The logic behind this is based on the concept of
143:
Increase collaboration and exchange of information on violence prevention.
1331:
Preventing Crime: What Works for Children, Offenders, Victims, and Places
243:
638:
Important statistical data analysis techniques to detect fraud include:
1382:
449:
These techniques can be specifically adapted to cybercrime as follows:
876:
930:
25 Opportunity reducing techniques (Source: Cornish and Clarke, 2003)
490:
373:
109:
56-24 for governments to implement nine recommendations, which were:
965:
Fighting computer crime: A New Framework for protecting Information
403:
aiming to increase the effort and decrease potential risks of crime
694:
can reduce violent crime. This includes deconcentrating high-rise
481:
procedures- background checks for employees with database access,
282:
34:
1296:
Violence in families: assessing prevention and treatment programs
579:
providing an adequate level of security, the IS will be at risk.
289:. SCP focuses on the criminal setting and is different from most
285:. It was first outlined in a 1976 report released by the British
166:
needs of youth at risk and women who are vulnerable to violence.
1271:
100 Crime Prevention Programs to Inspire Action across the World
1142:"Four Steps to the Prevention of Child Sexual Abuse in the Home"
802:
Oxford Research Encyclopedia of Criminology and Criminal Justice
223:
189:
or motivation to participate in a banned or prohibited behavior;
90:
to propose specific measures to reduce crime as well as a crime
600:
Increasing understanding about abuse, how and where it happens.
215:
For example, Larry Sherman from the University of Maryland in
603:
Accepting the possibility of abuse at home and in the family.
1127:
Preventing Child Sexual Abuse: Evidence, Policy and Practice
677:
that can learn suspicious patterns and later identify them.
606:
Accurately assessing the risks posed to one's own children.
181:
Several factors must come together for a crime to occur:
609:
Lowering known risks by negotiating with family members.
1388:
Crime Prevention and Social Media Community of Practice
1338:
World report on road traffic injury prevention: Summary
778:. U.S. Department of Justice. p. 9. Archived from
457:
Reinforcing targets and restricting access- the use of
911:
Situational Crime Prevention: Successful Case Studies
1294:
National Research Council and Institute of Medicine,
796:
Freilich, Joshua D.; Newman, Graeme R. (2017-03-29).
297:
SCP focuses on opportunity-reducing processes that:
1324:
Less Law, More Order: The Truth about Reducing Crime
1278:
Fairness and Effectiveness in Policing: The Evidence
698:, making zoning changes, restricting the number of
465:, card/password access to ID databases and banning
652:Important AI techniques for fraud management are:
442:Reducing any provocation for committing the crime
400:targeting specific forms of crime e.g. cybercrime
257:
120:Enhance capacity for collecting data on violence.
1383:International Center for the Prevention of Crime
1354:, Geneva: Violence and Injuries Prevention, 2002
1347:, Geneva: Violence and Injuries Prevention, 2004
1291:, Washington, DC: National Academies Press, 2001
192:at least some of the participants must have the
41:. It is applied specifically to efforts made by
1191:"Neighborhood Interventions to Reduce Violence"
60:, commissions, and research bodies such as the
45:to reduce crime, enforce the law, and maintain
1269:International Centre for Prevention of Crime,
1262:International Centre for Prevention of Crime,
1255:International Centre for Prevention of Crime,
1125:Smallbone, S; Marshall, W; Wortley, R (2008).
541:IS professionals and others who wish to fight
1315:United Nations, Economic and Social Council,
913:(2nd ed.) Harrow and Heston, New York, 1997,
531:Increasing the perceived difficulty of crime;
445:Removing any excuses for committing the crime
129:Strengthen responses for victims of violence.
8:
1329:Welsh, Brandon, and David Farrington, eds.,
1241:Her Majesty's Inspectorate of Constabulary,
1111:
1109:
905:
903:
901:
439:Reducing the rewards of committing the crime
436:Increasing the risks of committing the crime
242:has achieved large reductions in crime and
230:and law enforcement at neighborhoods where
842:
840:
196:and tools needed to commit the crime; and,
1326:, West Port: Praeger Imprint Series, 2006
1312:, New York: Oxford University Press, 1997
1206:
1059:
875:
548:information and communications technology
433:Increasing the effort to commit the crime
113:Create, implement and monitor a national
1208:10.1146/annurev-publhealth-040617-014600
1017:
1015:
1013:
391:Applying SCP to information systems (IS)
338:: Includes extending guardianship (e.g.
1129:. Cullompton, Devon: Willan Publishing.
1044:"Statistical Fraud Detection: A Review"
733:
301:Are aimed at particular forms of crime;
150:, laws and other mechanisms to protect
70:United States National Research Council
1317:Guidelines for the Prevention of Crime
1236:Misspent youth: Young people and crime
967:. Wiley Computer Publishing, New York.
773:"Crime Prevention Publicity Campaigns"
614:Situational crime prevention and fraud
1378:Institute for the Prevention of Crime
185:an individual or group must have the
169:To succeed, they need to establish a
126:Promote primary prevention responses.
7:
810:10.1093/acrefore/9780190264079.013.3
1352:World Report on Violence and Health
1308:Skogan, Wesley and Susan Hartnett,
752:from the original on 4 October 2018
103:World Report on Violence and Health
33:is the attempt to reduce and deter
1283:National Research Council (U.S.),
212:the community or aggregate level.
27:Measures to reduce and deter crime
25:
1310:Community Policing: Chicago Style
146:Promote and monitor adherence to
1364:
1285:Juvenile crime, juvenile justice
1276:National Research Council (US),
868:10.1016/j.infoandorg.2006.08.001
513:Reducing provocation and excuses
107:World Health Assembly Resolution
1303:Evidence Based Crime Prevention
1158:from the original on 2020-11-07
1068:from the original on 2016-02-14
887:from the original on 2016-03-10
826:from the original on 2018-06-12
99:World Health Organization Guide
1195:Annual Review of Public Health
987:Handbook on Crime and Deviance
798:"Situational Crime Prevention"
406:reducing provocative phenomena
1:
1042:Bolton R., Hand D.J. (2002).
362:) and denying benefits (e.g.
856:Information and Organisation
275:Situational crime prevention
270:Introduction and description
265:Situational crime prevention
258:Situational crime prevention
18:Situational crime prevention
1350:World Health Organization,
1343:World Health Organization,
1336:World Health Organization,
1245:, London: Home Office, 1998
1179:Intelligent Enterprise 2002
583:Application to sexual abuse
424:It has been suggested that
1434:
1413:Law enforcement techniques
1333:, New York: Springer, 2006
420:Application to cybercrimes
252:September 11, 2001 attacks
217:Policing Domestic Violence
1287:, edited by Joan McCord,
771:Barthe, Emmanuel (2006).
534:Increasing the risks; and
344:taxi identification cards
62:World Health Organization
469:websites and magazines.
117:for violence prevention.
1140:Williams, Mike (2018).
742:"Our Kids, Our Problem"
633:artificial intelligence
101:(2004) complements the
497:and at point of sale.
328:Electronic card access
148:international treaties
1373:at Wikimedia Commons
1305:, New York: Routledge
1061:10.1214/ss/1042727940
688:broken windows theory
537:Reducing the rewards.
453:Increasing the effort
1418:Espionage techniques
847:Willison R. (2006).
501:Reducing the rewards
105:(2002) and the 2003
87:Less Law, More Order
1048:Statistical Science
717:Predictive policing
666:Pattern recognition
525:information systems
483:tracking keystrokes
473:Increasing the risk
370:Reduce Provocations
340:neighbourhood watch
324:Increase the Effort
203:must be acted upon.
1234:Audit Commission,
1028:2018-10-04 at the
963:Parker, D. (1998)
935:2022-08-03 at the
712:Crime displacement
565:email surveillance
380:Remove the excuses
352:Reduce the Rewards
336:Increase the Risks
1369:Media related to
947:Page, Benton H.,
692:built environment
621:Credit card fraud
569:credit card fraud
16:(Redirected from
1425:
1403:Crime prevention
1371:Crime prevention
1368:
1273:, Montreal, 1999
1266:, Montreal, 1999
1259:, Montreal, 2005
1221:
1220:
1210:
1186:
1180:
1177:The Hidden Truth
1173:
1167:
1166:
1164:
1163:
1157:
1146:
1137:
1131:
1130:
1122:
1116:
1113:
1104:
1101:
1095:
1092:
1086:
1083:
1077:
1076:
1074:
1073:
1063:
1039:
1033:
1032:, Las Vegas 2005
1019:
1008:
1005:
999:
996:
990:
984:
978:
974:
968:
961:
955:
945:
939:
927:
921:
907:
896:
895:
893:
892:
886:
879:
853:
844:
835:
834:
832:
831:
793:
787:
786:
784:
777:
768:
762:
761:
759:
757:
738:
722:Preventive state
487:online purchases
376:in televisions).
74:Audit Commission
47:criminal justice
31:Crime prevention
21:
1433:
1432:
1428:
1427:
1426:
1424:
1423:
1422:
1393:
1392:
1362:
1357:
1322:Waller, Irvin,
1230:
1225:
1224:
1188:
1187:
1183:
1174:
1170:
1161:
1159:
1155:
1144:
1139:
1138:
1134:
1124:
1123:
1119:
1114:
1107:
1102:
1098:
1093:
1089:
1084:
1080:
1071:
1069:
1041:
1040:
1036:
1030:Wayback Machine
1020:
1011:
1006:
1002:
997:
993:
985:
981:
975:
971:
962:
958:
946:
942:
937:Wayback Machine
928:
924:
909:Clarke, R (ed)
908:
899:
890:
888:
884:
851:
846:
845:
838:
829:
827:
820:
795:
794:
790:
782:
775:
770:
769:
765:
755:
753:
740:
739:
735:
730:
708:
700:liquor licenses
684:
675:Neural networks
616:
585:
573:software piracy
422:
413:
393:
356:women's refuges
314:rational choice
272:
267:
228:social programs
179:
138:social equality
55:
28:
23:
22:
15:
12:
11:
5:
1431:
1429:
1421:
1420:
1415:
1410:
1405:
1395:
1394:
1391:
1390:
1385:
1380:
1361:
1360:External links
1358:
1356:
1355:
1348:
1341:
1340:, Geneva, 2004
1334:
1327:
1320:
1313:
1306:
1299:
1292:
1281:
1274:
1267:
1260:
1253:
1246:
1239:
1231:
1229:
1226:
1223:
1222:
1181:
1168:
1132:
1117:
1105:
1096:
1087:
1078:
1054:(3): 235–255.
1034:
1009:
1000:
991:
979:
969:
956:
951:, p 13, 2009.
940:
922:
919:978-0911577389
897:
862:(4): 304–324.
836:
818:
788:
785:on 2011-09-28.
763:
732:
731:
729:
726:
725:
724:
719:
714:
707:
704:
696:public housing
683:
680:
679:
678:
672:
669:
663:
660:
650:
649:
646:
643:
626:types of fraud
615:
612:
611:
610:
607:
604:
601:
584:
581:
559:activities in
543:computer crime
539:
538:
535:
532:
479:authentication
447:
446:
443:
440:
437:
434:
426:cybercriminals
421:
418:
412:
409:
408:
407:
404:
401:
392:
389:
384:
383:
377:
367:
348:
347:
332:
331:
309:
308:
305:
302:
271:
268:
266:
263:
205:
204:
197:
190:
178:
175:
163:
162:
155:
144:
141:
130:
127:
124:
121:
118:
66:United Nations
58:Criminologists
54:
51:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1430:
1419:
1416:
1414:
1411:
1409:
1406:
1404:
1401:
1400:
1398:
1389:
1386:
1384:
1381:
1379:
1376:
1375:
1374:
1372:
1367:
1359:
1353:
1349:
1346:
1342:
1339:
1335:
1332:
1328:
1325:
1321:
1318:
1314:
1311:
1307:
1304:
1300:
1297:
1293:
1290:
1286:
1282:
1279:
1275:
1272:
1268:
1265:
1261:
1258:
1254:
1251:
1248:Home Office,
1247:
1244:
1243:Beating crime
1240:
1237:
1233:
1232:
1227:
1218:
1214:
1209:
1204:
1200:
1196:
1192:
1185:
1182:
1178:
1172:
1169:
1154:
1150:
1143:
1136:
1133:
1128:
1121:
1118:
1112:
1110:
1106:
1100:
1097:
1091:
1088:
1082:
1079:
1067:
1062:
1057:
1053:
1049:
1045:
1038:
1035:
1031:
1027:
1024:
1018:
1016:
1014:
1010:
1004:
1001:
995:
992:
988:
983:
980:
973:
970:
966:
960:
957:
954:
950:
944:
941:
938:
934:
931:
926:
923:
920:
916:
912:
906:
904:
902:
898:
883:
878:
873:
869:
865:
861:
857:
850:
843:
841:
837:
825:
821:
819:9780190264079
815:
811:
807:
803:
799:
792:
789:
781:
774:
767:
764:
751:
747:
743:
737:
734:
727:
723:
720:
718:
715:
713:
710:
709:
705:
703:
701:
697:
693:
689:
681:
676:
673:
670:
667:
664:
661:
658:
655:
654:
653:
647:
644:
641:
640:
639:
636:
634:
629:
627:
622:
613:
608:
605:
602:
599:
598:
597:
593:
589:
582:
580:
576:
574:
570:
566:
562:
556:
553:
549:
544:
536:
533:
530:
529:
528:
526:
521:
518:
515:
514:
510:
508:
503:
502:
498:
496:
492:
488:
484:
480:
475:
474:
470:
468:
464:
460:
455:
454:
450:
444:
441:
438:
435:
432:
431:
430:
427:
419:
417:
410:
405:
402:
399:
398:
397:
390:
388:
381:
378:
375:
371:
368:
365:
361:
357:
353:
350:
349:
345:
341:
337:
334:
333:
329:
325:
322:
321:
320:
317:
315:
306:
303:
300:
299:
298:
295:
292:
288:
284:
280:
276:
269:
264:
262:
259:
255:
253:
247:
245:
241:
237:
233:
229:
226:. It targets
225:
220:
218:
213:
209:
202:
198:
195:
191:
188:
184:
183:
182:
176:
174:
172:
167:
160:
156:
153:
149:
145:
142:
139:
135:
131:
128:
125:
122:
119:
116:
112:
111:
110:
108:
104:
100:
95:
93:
89:
88:
83:
82:opinion polls
77:
75:
71:
67:
63:
59:
52:
50:
48:
44:
40:
36:
32:
19:
1363:
1351:
1344:
1337:
1330:
1323:
1316:
1309:
1302:
1295:
1288:
1284:
1277:
1270:
1263:
1256:
1249:
1242:
1235:
1228:Bibliography
1198:
1194:
1184:
1171:
1160:. Retrieved
1148:
1135:
1126:
1120:
1099:
1090:
1081:
1070:. Retrieved
1051:
1047:
1037:
1003:
994:
986:
982:
972:
964:
959:
948:
943:
925:
910:
889:. Retrieved
859:
855:
828:. Retrieved
801:
791:
780:the original
766:
754:. Retrieved
745:
736:
685:
682:Applications
651:
637:
635:techniques.
630:
617:
594:
590:
586:
577:
557:
540:
522:
519:
516:
512:
511:
504:
500:
499:
477:Reinforcing
476:
472:
471:
456:
452:
451:
448:
423:
414:
411:Safeguarding
394:
385:
379:
369:
351:
335:
323:
318:
310:
296:
278:
274:
273:
256:
248:
221:
216:
214:
210:
206:
200:
193:
186:
180:
168:
164:
152:human rights
106:
102:
98:
96:
85:
78:
56:
30:
29:
1408:Criminology
1201:: 253–271.
953:Publication
657:Data mining
364:speed humps
291:criminology
287:Home Office
232:crime rates
201:opportunity
115:action plan
43:governments
1397:Categories
1162:2018-08-01
1072:2016-02-09
891:2016-02-09
877:10398/6463
830:2018-06-11
624:different
561:cyberspace
463:encryption
360:pawn shops
236:Birmingham
159:arms trade
756:4 October
489:, use of
459:firewalls
171:coalition
72:, the UK
39:criminals
1217:29328874
1153:Archived
1066:Archived
1026:Archived
977:151-196.
933:Archived
882:Archived
824:Archived
750:Archived
746:Inlander
706:See also
244:violence
491:cameras
374:V-chips
53:Studies
1289:et al.
1215:
917:
816:
552:hacker
467:hacker
240:Bogotá
194:skills
187:desire
134:gender
68:, the
1156:(PDF)
1149:NSPCC
1145:(PDF)
885:(PDF)
852:(PDF)
783:(PDF)
776:(PDF)
728:Notes
283:crime
224:gangs
177:Types
35:crime
1213:PMID
915:ISBN
814:ISBN
758:2018
571:and
507:spam
495:ATMs
238:and
136:and
97:The
92:bill
37:and
1203:doi
1056:doi
1023:PDF
872:hdl
864:doi
806:doi
493:at
279:SCP
199:an
1399::
1211:.
1199:39
1197:.
1193:.
1151:.
1147:.
1108:^
1064:.
1052:17
1050:.
1046:.
1012:^
900:^
880:.
870:.
860:16
858:.
854:.
839:^
822:.
812:.
804:.
800:.
748:.
744:.
567:,
461:,
366:).
254:.
94:.
64:,
49:.
1219:.
1205::
1165:.
1075:.
1058::
894:.
874::
866::
833:.
808::
760:.
277:(
161:.
154:.
140:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.