To see the other types of publications on this topic, follow the link: Crime pattern theory.

Journal articles on the topic 'Crime pattern theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Crime pattern theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhao, Peixin, Marjorie Darrah, Jim Nolan, and Cun-Quan Zhang. "Analyses of Crime Patterns in NIBRS Data Based on a Novel Graph Theory Clustering Method: Virginia as a Case Study." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/492461.

Full text
Abstract:
This paper suggests a novel clustering method for analyzing the National Incident-Based Reporting System (NIBRS) data, which include the determination of correlation of different crime types, the development of a likelihood index for crimes to occur in a jurisdiction, and the clustering of jurisdictions based on crime type. The method was tested by using the 2005 assault data from 121 jurisdictions in Virginia as a test case. The analyses of these data show that some different crime types are correlated and some different crime parameters are correlated with different crime types. The analyses also show that certain jurisdictions within Virginia share certain crime patterns. This information assists with constructing a pattern for a specific crime type and can be used to determine whether a jurisdiction may be more likely to see this type of crime occur in their area.
APA, Harvard, Vancouver, ISO, and other styles
2

Hiropoulos, A., and J. Porter. "Visualising Property Crime in Gauteng: Applying GIS to crime pattern theory." South African Crime Quarterly 47, no. 1 (April 14, 2014): 17. http://dx.doi.org/10.4314/sacq.v47i1.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Simon, Armando. "Application of Fad Theory to Copycat Crimes: Quantitative Data following the Columbine Massacre." Psychological Reports 100, no. 3_suppl (June 2007): 1233–44. http://dx.doi.org/10.2466/pr0.100.4.1233-1244.

Full text
Abstract:
Copycat crimes have traditionally proven to be hard to both identify and analyze, although it has long been known that they occur. The present study analyzed the copycat crimes that followed the Columbine massacre of 1999 in light of fad theory and found that a copycat crime is, essentially, a fad. The pattern of development followed a particular progression with variations on the initial incident and reached a peak, whereupon the number of copycat incidents dropped radically. This pattern allows for predictability of copycat crimes.
APA, Harvard, Vancouver, ISO, and other styles
4

Andresen, Martin A., and Nicolas Malleson. "Testing the Stability of Crime Patterns: Implications for Theory and Policy." Journal of Research in Crime and Delinquency 48, no. 1 (December 5, 2010): 58–82. http://dx.doi.org/10.1177/0022427810384136.

Full text
Abstract:
Recent research in the ‘‘crime at places’’ literature is concerned with smaller units of analysis than conventional spatial criminology. An important issue is whether the spatial patterns observed in conventional spatial criminology focused on neighborhoods remain when the analysis shifts to street segments. In this article, the authors use a new spatial point pattern test that identifies the similarity in spatial point patterns. This test is local in nature such that the output can be mapped showing where differences are present. Using this test, the authors investigate the stability of crime patterns moving from census tracts to dissemination areas to street segments. The authors find that general crime patterns are somewhat similar at all spatial scales, but finer scales of analysis reveal significant variations within larger units. This result demonstrates the importance of analyzing crime patterns at small scales and has important implications for further theoretical development and policy implementation.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Zengli, and Hong Zhang. "Construction, Detection, and Interpretation of Crime Patterns over Space and Time." ISPRS International Journal of Geo-Information 9, no. 6 (May 26, 2020): 339. http://dx.doi.org/10.3390/ijgi9060339.

Full text
Abstract:
Empirical studies have focused on investigating the interactive relationships between crime pairs. However, many other types of crime patterns have not been extensively investigated. In this paper, we introduce three basic crime patterns in four combinations. Based on graph theory, the subgraphs for each pattern were constructed and analyzed using criminology theories. A Monte Carlo simulation was conducted to examine the significance of these patterns. Crime patterns were statistically significant and generated different levels of crime risk. Compared to the classical patterns, combined patterns create much higher risk levels. Among these patterns, “co-occurrence, repeat, and shift” generated the highest level of crime risk, while “repeat” generated much lower levels of crime risk. “Co-occurrence and shift” and “repeat and shift” showed undulated risk levels, while others showed a continuous decrease. These results outline the importance of proposed crime patterns and call for differentiated crime prevention strategies. This method can be extended to other research areas that use point events as research objects.
APA, Harvard, Vancouver, ISO, and other styles
6

Cowan, Devin, William D. Moreto, Christina Burton, Matt R. Nobles, and Rohit Singh. "Applying Crime Pattern Theory and Risk Terrain Modeling to Examine Environmental Crime in Cambodia." Journal of Contemporary Criminal Justice 36, no. 3 (May 25, 2020): 327–50. http://dx.doi.org/10.1177/1043986220923467.

Full text
Abstract:
The spatial-temporal analysis of crime has significantly evolved. One innovative technique recently developed is risk terrain modeling (RTM). RTM, however, has yet to be used for environmental crime. This research applies RTM and draws from crime pattern theory to examine illegal activities in two protected areas in Cambodia. Findings suggest that pathways, edges, areas with suitable targets, conservation posts, landcover, and prior incidents are related to fauna- and flora-related illegal activities, though this relationship varies by season, units of analysis, and study area (i.e., patrol-based compared with official designation). Implications for theory and policy are outlined.
APA, Harvard, Vancouver, ISO, and other styles
7

Alalehto, Tage. "Crime prevention in terms of criminal intent criteria in white-collar crime." Journal of Financial Crime 25, no. 3 (July 2, 2018): 838–44. http://dx.doi.org/10.1108/jfc-05-2017-0051.

Full text
Abstract:
Purpose In the field of crime prevention there are several theoretical approaches explaining why crime occurs and how to prevent it. Three of them – routine activity theory, crime pattern theory and the theory of crime-as-choice – are logically tested in this work. The point of departure is to test if the theories are logical consistent and logical valid, irrespective of whether the criterion for criminal intent is changed from direct intention to negligence. Design/methodology/approach The issues will be explored in a logical structure by a first-order logic propositional analysis. Findings The analysis shows that all three theories are logical consistent, but only routine activity theory is logical valid. The conclusion is that crime prevention should in general assume that routine activity theory is the legitimate theory and that social prevention as a prevention strategy is logically unnecessary to adopt because it does not matter whether the offender is motivated (direct intention) or not (negligence). Practical implications It does not really matter if the authors theoretically treat white-collar offenders as motivated, because if they have committed an actus reus, they are an offender according to the objective requisites. This means that the best strategies to prevent a potential white-collar criminal are situational prevention, i.e. complicate their access to money, where it becomes irrelevant if the potential offender has a mens rea or not. What counts is the prevention of actus reus by a potential offender. Originality/value As far as I know, no one has previously investigated the logical consistency and/or logical validity of routine activity theory, crime pattern theory and the theory of crime-as-choice as theories of crime prevention.
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, YuSang, SungSup Brian Choi, JinSoo Lee, and Won Chang Jin. "Population Size vs. Number of Crimes: Is the Relationship Superlinear?" International Journal of Information Systems and Social Change 9, no. 1 (January 2018): 26–39. http://dx.doi.org/10.4018/ijissc.2018010102.

Full text
Abstract:
Do large cities suffer from an even greater incidence of crime? According to the Urban Scaling Theory, the number of crimes committed may follow a superlinear relationship as a function of the population size of city. For example, if the population size increases by 100%, the incidence of crime may increase by 120%. We analyzed a total of 11 types of crimes which had occurred in about 250 cities with more than 100,000 inhabitants in the United States during the period of 1995-2010. We found that the relationship between the number of crimes counts and the population size of cities have followed a superlinear power function without exception in all 176 cases. However, significant variations exist among the superlinear relations by types of crime. We also found that the values of scale exponents display time-invariant pattern during the 16-year period.
APA, Harvard, Vancouver, ISO, and other styles
9

Kadar, Cristina, Stefan Feuerriegel, Anastasios Noulas, and Cecilia Mascolo. "Leveraging Mobility Flows from Location Technology Platforms to Test Crime Pattern Theory in Large Cities." Proceedings of the International AAAI Conference on Web and Social Media 14 (May 26, 2020): 339–50. http://dx.doi.org/10.1609/icwsm.v14i1.7304.

Full text
Abstract:
Crime has been previously explained by social characteristics of the residential population and, as stipulated by crime pattern theory, might also be linked to human movements of non-residential visitors. Yet a full empirical validation of the latter is lacking. The prime reason is that prior studies are limited to aggregated statistics of human visitors rather than mobility flows and, because of that, neglect the temporal dynamics of individual human movements. As a remedy, we provide the first work which studies the ability of granular human mobility in describing and predicting crime concentrations at an hourly scale. For this purpose, we propose the use of data from location technology platforms. This type of data allows us to trace individual transitions and, therefore, we succeed in distinguishing different mobility flows that (i) are incoming or outgoing from a neighborhood, (ii) remain within it, or (iii) refer to transitions where people only pass through the neighborhood. Our evaluation infers mobility flows by leveraging an anonymized dataset from Foursquare that includes almost 14.8 million consecutive check-ins in three major U.S. cities. According to our empirical results, mobility flows are significantly and positively linked to crime. These findings advance our theoretical understanding, as they provide confirmatory evidence for crime pattern theory. Furthermore, our novel use of digital location services data proves to be an effective tool for crime forecasting. It also offers unprecedented granularity when studying the connection between human mobility and crime.
APA, Harvard, Vancouver, ISO, and other styles
10

Luo, Fei, Yan Zhang, and Larry T. Hoover. "The journey to crime and victimization." International Journal of Police Science & Management 23, no. 3 (May 7, 2021): 211–21. http://dx.doi.org/10.1177/14613557211008477.

Full text
Abstract:
The offender’s journey to crime has attracted much attention in mobility triangle research, whereas the journey to victimization and the spatial distance between the offender’s and the victim’s residences have been relatively less examined. This research fills this gap in the literature by examining spatial comparisons of variations in journey to crime, journey to victimization, and the distance between victim’s and suspect’s residences for five types of offenses. Crime data from the Houston Police Department from 2010 to 2013 were used to analyze the mobility triangle in five types of crime. The results show that the dynamics of travel pattern vary by demographic characteristics of the suspects and victims. It is also contingent on the types of crime. The proximity of offender’s and victim’s residences is closely related to the chance of crimes. The findings provide important implications for theory, policy and policing practice.
APA, Harvard, Vancouver, ISO, and other styles
11

Kocsis, Richard N., Ray W. Cooksey, Harvey J. Irwin, and Greg Allen. "A Further Assessment of “Circle Theory” for Geographic Psychological Profiling." Australian & New Zealand Journal of Criminology 35, no. 1 (April 2002): 43–62. http://dx.doi.org/10.1375/acri.35.1.43.

Full text
Abstract:
The Circle theory of environmental range (Canter & Larkin, 1993) has demonstrated utility for the analysis of the spatial distribution of serial rape and arson offences, but the theory's applicability to the crime of multiple burglary is more equivocal. The present study analysed the spatial distribution of 58 multiple burglary cases that had occurred in four Australian rural towns. The marauder pattern of offence that had been found to accommodate most cases of serial rape and arson was no more likely than a commuter pattern to characterise multiple burglaries. Further, among those cases that showed a marauder pattern the circle theory provided only a relatively vague indication of the location of the offender's home base. No correlates of offence pattern were identified. The utility of the circle theory for geographic psychological profiling in cases of multiple burglary therefore remains to be demonstrated. The validity of the theory in this context also was queried. Directional vector analyses of the data suggested that multiple burglaries tend to lie in a narrow corridor relative to the offender's home base, whereas an assumption of the circle theory implies that these vectors will radiate in every direction from the home base. Crime investigators therefore should be discriminating in their application of the circle theory to an actual case of serial crime.
APA, Harvard, Vancouver, ISO, and other styles
12

Ida Hasan, Holy One Singadimedja, Yogi Yasa Wedha, Sara Ida Magdalena Awi, and Edy Nurcahyo. "Street Crime during Covid-19 Pandemic in Perspective of Routine Activity Law Theory and it Influence on Indonesian Criminal Law." International Journal of Science, Technology & Management 1, no. 2 (July 30, 2020): 46–54. http://dx.doi.org/10.46729/ijstm.v1i2.17.

Full text
Abstract:
The initial prediction is that the condition of covid-19 pandemic will shake people's lives in all aspects, and this condition has a great potential for rising crime. With all of its character, it is very interesting to discuss how street crime developed during the Covid-19 pandemic. This study use a mixed research method, where data is collected from facts in the field, legal sources or applied regulations, associated with legal materials obtained from literature review research and overall data obtained from both primary data and secondary data. The conclusion from this research is that street crime during the Covid-19 Pandemic cannot be stated expressly decreased or increased for each region has dynamics that differ from one another according to the characteristics of the region. The correlation of PSBB policy during the Covid-19 Pandemic with the level of street crime in the perspective of routine activity theory can be seen from several street crimes that change the type and location of their objects / targets as well as the increasing number of drug and cybercrime cases that are striking. PSBB conditions during Pandemic Covid-19 against crimes that require a new system that is integrated with the internet, a pattern of punishment with massive amounts of assimilation to reduce the density of prison and a virtual court examination system that should be a part of the criminal justice system in Indonesia
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Shuai, Chundong Gao, Dong Jiang, Mengmeng Hao, Fangyu Ding, Tian Ma, Shize Zhang, and Shunde Li. "The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China." ISPRS International Journal of Geo-Information 10, no. 12 (November 30, 2021): 802. http://dx.doi.org/10.3390/ijgi10120802.

Full text
Abstract:
As a typical cybercrime, cyber fraud poses severe threats to civilians’ property safety and social stability. Traditional criminological theories such as routine activity theory focus mainly on the effects of individual characteristics on cybercrime victimization and ignore the impacts of macro-level environmental factors. This study aims at exploring the spatiotemporal pattern of cyber fraud crime in China and investigating the relationships between cyber fraud and environmental factors. The results showed that cyber fraud crimes were initially distributed in southeastern China and gradually spread towards the middle and northern regions; spatial autocorrelation analysis revealed that the spatial concentration trend of cyber fraud became more and more strong, and a strong distinction in cyber fraud clustering between the north and the south was identified. To further explain the formative causes of these spatial patterns, a generalized additive model (GAM) was constructed by incorporating natural and social environmental factors. The results suggested that the distribution of cyber fraud was notably affected by the regional economy and population structure. Also, the high incidence of cyber fraud crime was closely associated with a large nonagricultural population, a high proportion of tertiary industry in GDP, a large number of general college students, a longer cable length, and a large numbers of internet users.
APA, Harvard, Vancouver, ISO, and other styles
14

Mogavero, Melanie C., and Ko-Hsin Hsu. "Sex Offender Mobility: An Application of Crime Pattern Theory Among Child Sex Offenders." Sexual Abuse 30, no. 8 (June 2, 2017): 908–31. http://dx.doi.org/10.1177/1079063217712219.

Full text
Abstract:
Sex offenders are a heterogeneous group and exhibit various offense patterns. Often the location where the offender committed the offense is different from where the offender encountered their victim. Applying crime pattern theory, this study sought to understand if the type of location, victim, and situational characteristics could predict whether an offender would commit the sexual offense in a different and more secluded location than where he first encountered the victim. Among a sample of 114 incarcerated sex offenders, the results showed that offenders who contacted their victims in locations where children are known to congregate were more than 4 times more likely to travel to a more secluded location to complete the sexual offense. Those who used noncoercive strategies (e.g., bribes, seduction) during the offense process were approximately 7 times more likely to travel to a more secluded location that those who did not. Policy implications of the findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
15

Higgins, Ethan M., and Kristin Swartz. "Edgeways as a theoretical extension: connecting crime pattern theory and New Urbanism." Crime Prevention and Community Safety 20, no. 1 (April 25, 2017): 1–15. http://dx.doi.org/10.1057/s41300-017-0021-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Klös, Marie-Christine. "Towards a lexicogrammatical pattern in Swedish crime novels." Literary Linguistics 3, no. 1 (June 3, 2013): 56–70. http://dx.doi.org/10.1075/ld.3.1.04klo.

Full text
Abstract:
The success of Swedish crime novels has been noted and discussed at length. Much of this commentary refers to a salient characteristic atmosphere which seems to be a common feature of most if not all Scandinavian crime novels. In this paper the potential of some recurring lexicogrammatical features to construct this characteristically gloomy and sombre atmosphere is presented and discussed. It will be shown that the vague feeling of unease which is perceived while reading these fictional texts is linguistically attestable. The analysis is conducted within the framework of M.A.K. Halliday’s systemic-functional grammar (SFG) which will be applied to three contemporary Swedish crime novels by different authors. One of the main goals is to illustrate by what means the authors instantiate perceptions and extra-linguistic phenomena in their fictional worlds.
APA, Harvard, Vancouver, ISO, and other styles
17

Pooley, Kamarah, and Claire E. Ferguson. "Using environmental criminology theories to compare ‘youth misuse of fire’ across age groups in New South Wales." Australian & New Zealand Journal of Criminology 50, no. 1 (July 27, 2016): 100–122. http://dx.doi.org/10.1177/0004865815596794.

Full text
Abstract:
Youth misuse of fire is a substantive community concern. Despite evidence which indicates youths account for a significant proportion of all deliberately lit fires within Australia, an absence of up-to-date, contextually specific research means the exact scope and magnitude of youth misuse of fire within Australia remains unknown. Despite research suggesting commonalities exist between youth misuse of fire and juvenile offending more broadly, misuse of fire is rarely explained using criminological theory. In light of this gap, a descriptive analysis of youth misuse of fire within New South Wales was performed. Routine Activity Theory and Crime Pattern Theory were tested to explain differences in misuse of fire across age groups. Results suggest these environmental theories offer useful frameworks for explaining youth misuse of fire in New South Wales. It is argued that the Routine Activity Theory and Crime Pattern Theory can be employed to better inform youth misuse of fire policy and prevention efforts.
APA, Harvard, Vancouver, ISO, and other styles
18

Groff, Elizabeth R., Ralph B. Taylor, David B. Elesh, Jennifer McGovern, and Lallen Johnson. "Permeability across a Metropolitan Area: Conceptualizing and Operationalizing a Macrolevel Crime Pattern Theory." Environment and Planning A: Economy and Space 46, no. 1 (January 2014): 129–52. http://dx.doi.org/10.1068/a45702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Eze, Obinna J., Cyril O. Ugwuoke, and Ijeoma Igwe. "EXAMINING THE EFFECTS OF COVID-19 CURTAILMENT MEASURES ON CRIMINAL ACTIVITIES IN SOUTHERN NIGERIA." JOURNAL OF CRIME AND CRIMINAL BEHAVIOR 2, no. 2 (2022): 159–76. http://dx.doi.org/10.47509/jccb.2022.v02i02.06.

Full text
Abstract:
COVID-19 ushered in a new pattern of social living as governments across the globe sought out ways to contain the spread of the viral pandemic. Notable among the measures adopted by the government of Nigeria is the lockdown policy. Following the Routine Activities theory, this study examined criminal victimization in Nigeria during the period of COVID-19 pandemic using a qualitative approach. Findings indicate that criminal victimization lessened at the onset of the lockdown measure; however, trends in criminal victimization kept oscillating as the lockdown persisted. The pattern of crime found to be prevalent are human right abuses by law enforcement agents, domestic crimes, white collar crime and pen robbery such as mismanagement of funds donated by well spirited individuals and corporate bodies by some government agents, profiteering and advanced fee fraud amongst others. We also found that following the changes in social living, corruption became rife in Nigeria. The study concludes that there is need for implementation of community policing in Nigeria as the bulk of policing returned to the people during the pandemic period.
APA, Harvard, Vancouver, ISO, and other styles
20

Ejiogu, Kingsley U. "Block-Level Analysis of the Attractors of Robbery in a Downtown Area." SAGE Open 10, no. 4 (October 2020): 215824402096367. http://dx.doi.org/10.1177/2158244020963671.

Full text
Abstract:
This article examines the predictions of crime pattern theory in a unique neighborhood type. It tested potential crime attracting facilities against street robbery data from 2009 to 2013 in the Police Districts I & II in Downtown Houston. The analysis modeled the four daily human routine periods described in the American Time Use Survey (ATUS). Generalized linear simultaneous negative binomial regression model was used to determine the size of the influence of the variables (beta coefficients) and their significance for each model outcome. The findings show some distinct patterns of street robbery due to the immediate and lagged effects of the variables relatable to the study environment’s unique setting. Two variables, geographic mobility, and barbershops were particularly significant across three of the outcome models. The results suggest that the physical and social structure of neighborhoods determined by land-use regulations would enhance understanding of the time-based influence on robbery patterns due to crime-attracting facilities.
APA, Harvard, Vancouver, ISO, and other styles
21

Alotaibi, Nawaf Ibrahim, Andrew J. Evans, Alison J. Heppenstall, and Nicolas S. Malleson. "How Well Does Western Environmental Theory Explain Crime in the Arabian Context? The Case Study of Riyadh, Saudi Arabia." International Criminal Justice Review 29, no. 1 (July 20, 2017): 5–32. http://dx.doi.org/10.1177/1057567717709497.

Full text
Abstract:
Crime within Arabic countries is significantly different from Western crime in type, frequency, and motivation. For example, motor vehicle theft (MVT) has constituted the largest proportion of property crime incidents in Saudi Arabia (SA) for decades. This is in stark contrast to Western countries where burglary and street theft dominate. Environmental criminology theories, such as routine activity theory and crime pattern theory, have the potential to help to investigate Arabic crime. However, there is no research that has sought to evaluate the validity of these theories within such a different cultural context. This article represents a first step in addressing this substantial research gap, taking MVT within SA as a case study. We evaluate previous MVT studies using an environmental criminology approach with a critical view to applying environmental criminology to an Arabic context. The article identifies a range of key features in SA that are different from typical Western contexts. These differences could limit the appropriateness of existing methodologies used to apply environmental criminology. The study also reveals that the methodologies associated with traditional environmental crime theory need adjusting more generally when working with MVT, not least to account for shifts in the location of opportunities for crime with time.
APA, Harvard, Vancouver, ISO, and other styles
22

van Sleeuwen, Sabine E. M., Stijn Ruiter, and Barbara Menting. "A Time for a Crime." Journal of Research in Crime and Delinquency 55, no. 4 (April 5, 2018): 538–68. http://dx.doi.org/10.1177/0022427818766395.

Full text
Abstract:
Objectives: This article examines to what extent repeat offenders’ crime location choices are conditional on the timing of the offenses within the week and within the day. Extending crime pattern theory, we argue that offenders acquire time-specific rather than general knowledge of their environment. We hypothesize that offenders are more likely to offend in previously targeted areas at similar than at different days and times. Methods: Data on 12,639 offenses committed by 3,666 repeat offenders in the Netherlands are analyzed using discrete spatial choice models. Results: Offenders are most likely to offend in areas they already targeted before at similar parts of the week and similar times of the day, especially when the previous offense was committed on exactly the same weekend day or weekday and at the same hour of day. Offenders are less likely to return to previously targeted areas at different times of the week and day, and least likely to offend in areas they never targeted before. The effects were stronger for the same than for different types of crime. Conclusions: Assessing cyclic time patterns in crime location choice not only enhances our understanding of spatial criminal decision-making, but could also improve predictive policing methods.
APA, Harvard, Vancouver, ISO, and other styles
23

TAYEBI, MOHAMMAD A., UWE GLÄSSER, MARTIN ESTER, and PATRICIA L. BRANTINGHAM. "Personalized crime location prediction." European Journal of Applied Mathematics 27, no. 3 (April 28, 2016): 422–50. http://dx.doi.org/10.1017/s0956792516000140.

Full text
Abstract:
Crime reduction and prevention strategies are vital for policymakers and law enforcement to face inevitable increases in urban crime rates as a side effect of the projected growth of urban population by the year 2030. Studies conclude that crime does not occur uniformly across urban landscapes but concentrates in certain areas. This phenomenon has drawn attention to spatial crime analysis, primarily focusing on crime hotspots, areas with disproportionally higher crime density. In this paper, we present CrimeTracer1, a personalized random walk-based approach to spatial crime analysis and crime location prediction outside of hotspots. We propose a probabilistic model of spatial behaviour of known offenders within their activity spaces. Crime Pattern Theory concludes that offenders, rather than venture into unknown territory, frequently select targets in or near places they are most familiar with as part of their activity space. Our experiments on a large real-world crime dataset show that CrimeTracer outperforms all other methods used for location recommendation we evaluate here.
APA, Harvard, Vancouver, ISO, and other styles
24

Oluku, Ochuko. "Repositioning the Victim in Victimology through Theory: The Concentric Model." Journal of Management and Social Science Research 1, no. 1/2 (2020): 43–53. http://dx.doi.org/10.47524/jmssr.11.6.

Full text
Abstract:
This work examines the inadequacies of the current victimological and criminological theories for not giving the rightful focus to the victim as their subject matter. The two predominant strands of current theorizing, ‘native’ and adapted perspectives were questioned for blaming the victim for his victimization or attributing his predicament to socio – structural variables, instead of the crime perpetrator. The legal status of the victim is not considered by both perspectives: hence, the paper proposes a concentric model, which seeks to restore the victim to his rightful place within the criminal justice system. The victim is appropriately portrayed as an inactive player in crime causation, who is at the receiving end of the activities of outlaws. New concepts, ‘former normal’, ‘victim status’ and ‘victimal’ state are introduced to properly capture the ‘alterative’ harm offenders inflict on their victims, some of which many never recover from. It attempts a reconstruction of the process of victimization, and with the aid of two empirical case studies, demonstrates the possibility of discovering the pattern of offender victimization through mass studies of crime victimization data. Results from the studies can be used to formulate strategies to halt crime and break the cycle of victimization. The model holds great promise for research and policy on prevention of victimization and victim support and treatment in the criminal, or any alternative justice system.
APA, Harvard, Vancouver, ISO, and other styles
25

Bichler, Gisela, Steven Lim, and Edgar Larin. "Tactical Social Network Analysis: Using Affiliation Networks to Aid Serial Homicide Investigation." Homicide Studies 21, no. 2 (September 27, 2016): 133–58. http://dx.doi.org/10.1177/1088767916671351.

Full text
Abstract:
Integrating crime pattern theory with tenets of social network theory, we argue that linking people who frequent the same places reveals intersecting behavioral patterns illustrative of case connectivity. Using the Green River serial murder investigation as a case study, we demonstrate that structural statistics may be useful in focusing investigative efforts. Significant shifts in the centrality of suspects emerge when we track the evolution of this case at 6-month increments, suggesting that the initial working case hypothesis misled investigators. Continued exploration into the utility of social network analysis (SNA) for tactical purposes will help advance applied criminology.
APA, Harvard, Vancouver, ISO, and other styles
26

Seregig, I. Ketut, Bambang Hartono, and Yustina Ndari. "POLICY ON OVERCOMING VILLAGE BUDGET DEVIATIONS BY THE GOVERNMENT INTERNAL SUPERVISORY APPARATUS IN INDONESIA (CASE STUDY OF TANJUNGSARI VILLAGE, LAMPUNG)." Cepalo 5, no. 1 (April 15, 2021): 23–38. http://dx.doi.org/10.25041/cepalo.v5no1.2211.

Full text
Abstract:
Corruption is deeply rooted in Indonesia. This fact is undeniable when this crime has occurred at the lowest government level, namely in the village government. One sample of cases raised in this study is the alleged Corruption Crime committed by the Head of Tanjungsari Natar Village, South Lampung, named Robangi. The problems examined in this alleged criminal act are the factors causing the perpetrator to commit the criminal act of corruption. Second, the pattern of countermeasures carried out by APIP in resolving the case. The method used is qualitative and in the research data collection using a normative juridical approach and empirical juridical. Meanwhile, the theory used as a knife of analysis is the theory of Non-Penal Policy proposed by Muladi and Barda Nawawi Arief, which states that "non-penal policy is the prevention of crime which prioritizes the prevention of crimes committed by guidance, aims to prevent before the crime occurs, and/or the perpetrator does not repeat his actions".The results showed that the factors causing the perpetrator to commit these acts were because the project implementation was not following the proposal, the use of funds was not per the project proposal (total loss), the reason was that at the request of the community, the planned construction was moved to another place. This act is procedurally violating the SOP for the management of state finances. However, empirical facts prove no state loss in the corruption crime allegedly committed by the village head. Based on these facts, APIP South Lampung Regency has implemented a countermeasures policy by imposing administrative sanctions on the village head of Tanjungsari, Natar District, South Lampung.
APA, Harvard, Vancouver, ISO, and other styles
27

Bicakci, Yunus Serhat, Dursun Zafer Seker, and Hande Demirel. "Location-Based Analyses for Electronic Monitoring of Parolees." ISPRS International Journal of Geo-Information 9, no. 5 (May 1, 2020): 296. http://dx.doi.org/10.3390/ijgi9050296.

Full text
Abstract:
This study analyses the spatio-temporal pattern of parolees using electronic monitoring, where the developed spatial framework supports the Environmental Criminology concepts such as crime patterns or crime attractive locations. A grid-based solution for spatio-temporal analyses is introduced to ensure the anonymity of the parolees. In order to test these developed concepts, the Istanbul Metropolitan Area was selected as the pilot study area. Following the developed concepts of the Crime Pattern Theory, a spatial framework was designed. A novel grid-based weighted algorithm for the most attractive areas was generated via spatial point-of-interest data and a conducted survey among police officers. The designed framework and the spatio-temporal analyses were carried out for 77 parolees using geostatistical methods. The major findings of the study are (a) 24-hour trajectories of each parolee was monitored; (b) the most attractive grids within the city were defined; and (c) for each parolee, the entrance time to the grid and the time spent within that grid were reported and analyzed. This study is a preliminary study for spatio-temporal detection of parolees’ trajectories, where location-based analyses serve well. This study aims to aid decision-makers to better monitor the parolees and justify the benefits of surveillance.
APA, Harvard, Vancouver, ISO, and other styles
28

Limo, Jerry. "INFLUENCE OF SECURITY MANAGEMENT MECHANISM IN ADDRESSING EMERGING BODA-BODA SECURITY THREATS IN CHANGAMWE SUB-COUNTY, MOMBASA COUNTY, KENYA." Advances in Social Sciences Research Journal 9, no. 5 (May 24, 2022): 165–75. http://dx.doi.org/10.14738/assrj.95.12292.

Full text
Abstract:
This paper uses data collected for an MA Thesis on the influence of security management mechanism in addressing emerging Boda-Boda security threats in Changamwe Sub-County in Mombasa County, Kenya. The study has been necessitated by the conception that management of Boda-Boda security threats will significantly lower Annual crime patterns like terror attacks, kidnappings, robberies, target violent crimes among others. According to this study, the sector operated without proper regulation and or control. The study was guided by three specific objectives; to establish the types of emerging Boda-Boda security threats prevalent in Changamwe Sub-County, to examine perceptions of security personnel on emerging Boda-Boda security threats, and to establish security management mechanism adopted by security personnel in addressing Boda-Boda Security threats in Changamwe Sub-County in Mombasa County. This study was focused by crime pattern and Routine Activity Theory. The study comprised of 144 respondents. Stratified random sampling method and purposive sampling techniques were used to select respondents and descriptive statistics used in data analysis. According to the study, the main types of Boda-Boda related crimes prevalent in Changamwe Sub-County were robberies, thefts, kidnappings, murders and other forms of gun violence. One of the major perceptions of emerging security threat is that of motor bike related gang that has increased vulnerability of many businesses and targets due to their disguised surveillance on unsuspecting victims and targets. According to the study Boda-Boda related crimes are largely under regulated. As one of the major policy concerns, concerted efforts by the Government and the Private sector to come up with preventive social programmes such as economic empowerment and alcohol and drug control programmes that will potentially avert the identified pushing factors responsible for rampant Boda-Boda sector related crimes; Poverty and alcohol consumption and drug use. Social programmes may also come up with mechanisms of social justice to supplement government enforcement mechanisms. Finally, National Police Service should increase intelligence and surveillance of the sub-sector to identify crime patterns, trends and hot spots in order to cut this problem at the nib.
APA, Harvard, Vancouver, ISO, and other styles
29

Hoekema, David A. "Trust and Obey: Toward a New Theory of Punishment." Israel Law Review 25, no. 3-4 (1991): 332–50. http://dx.doi.org/10.1017/s0021223700010451.

Full text
Abstract:
An impartial observer reviewing the Anglo-American philosophical writings of recent decades on the question of the justification of punishment would very likely label the contest, thus far, a draw. Three major justifications have been put forward as principles constitutive of fairness in punishment, and none can be said to have routed its rivals.Some modern writers have written forcefully in defence of the rehabilitative justification of punishment — or, more precisely, the replacement of punishment with a system of judicially mandated therapy for criminals. This substitution, however, has been tellingly criticized as demeaning to offenders, violative of individuals' moral rights, and liable to abuse as a pretext for suppression of unpopular ideas. Others have sought to justify punishment on the basis of the societal need to deter crime. But deterrence seems at the same time too severe and too lenient a basis for punishment. Draconian penalties for minor offences and exemplary punishment of the innocent would meet the requirements of deterrence if they proved effective in preventing future crimes; yet offences whose nature or whose pattern of occurrence makes effective deterrence impossible should go unpunished, on this view.
APA, Harvard, Vancouver, ISO, and other styles
30

Long, Dongping, and Lin Liu. "Do Migrant and Native Robbers Target Different Places?" ISPRS International Journal of Geo-Information 10, no. 11 (November 12, 2021): 771. http://dx.doi.org/10.3390/ijgi10110771.

Full text
Abstract:
The spatial pattern of crime has been a central theme of criminological research. Recently, the spatial variation in the crime location choice of offenders by different population groups has been gaining more attention. This study addresses the issue of whether the spatial distribution of migrant robbers’ crime location choices is different from those of native robbers. Further, what factors contribute to such differences? Using a kernel density estimation and the discrete spatial choice modeling, we combine the offender data, POI data, and mobile phone data to explain the crime location choice of the street robbers who committed offenses and were arrested from 2012 to 2016 in ZG City, China. The results demonstrate that the crime location choices between migrant robbers and native robbers have obvious spatial differences. Migrant robbers tend to choose the labor-intensive industrial cluster, while native robbers prefer the old urban areas and urban villages. Wholesale markets, sports stadiums, transportation hubs, and subway stations only affect migrant robbers’ crime location choices, but not native robbers’. These results may be attributable to the different spatial awareness between migrant robbers and native robbers. The implications of the findings for criminological theory and crime prevention are discussed.
APA, Harvard, Vancouver, ISO, and other styles
31

KIUNGA, NICKSON. "INFLUENCE OF THE PERFORMANCE OF NATIONAL POLICE SERVICE IN PREVENTION OF ORGANIZED CRIMES IN MOMBASA COUNTY, KENYA." Advances in Social Sciences Research Journal 8, no. 10 (October 29, 2021): 321–31. http://dx.doi.org/10.14738/assrj.810.10889.

Full text
Abstract:
This paper uses data collected for an MA Thesis on influence of the Performance of National Police Service in Prevention of organized Crimes in Mombasa County, Kenya. The study was necessitated by continued rise of criminal gangs despite police service efforts to contain the problem. The study was guided by three specific objectives, but for this paper first and second objectives will be discussed. First, the examined the influence of resource capacity on the performance of national police service in prevention of organized crimes in Mombasa County. Secondly, the study examined the influence of motivation on the performance of national police service in prevention of organized crimes. Thirdly, the last objective assessed the influence of external environment on the performance of National Police Service in prevention of organized crimes in Mombasa County, Kenya. The survey utilized Expectancy theory and Crime Pattern Theory and adopted a descriptive research design employing a mixed method paradigm. The study sample size comprised 306 National Police Service officers (NPS); Directorate of Criminal Investigations (DCI) officers, Kenya Police service (KP), and Administration Police (AP) officers both senior and junior. Qualitative data was analyzed using thematic analysis derived from the study objectives. On the other hand, quantitative data was analyzed through descriptive statistics. According to the findings, 17% of the police officers still undertake operations without intelligence briefing, and that despite the availability of criminal intelligence. Besides, access to criminal intelligence was still a major challenge to 45% of the officers while inter-agency coordination was a rare part of the fight against organized crime to 56% of the officers who were not involved. The findings also revealed that despite the importance of training towards the prevention of organized crime, 33% of police officers did not have access to these trainings. Furthermore, 53% of the officers, cited lack of recognition and motivation that could go a long way in raising performance of the police officers. The study makes two major recommendations; special attention to training and curriculum review that addresses the demands of emerging global security challenges. Secondly, officer’s welfare remains a thorny issue which can potentially stifle any crime prevention initiative. Welfare issues of concern such as merit and fairness in promotions, rewards and other incentives, and better compensation were said to be an integral part of any serious police reform agenda.
APA, Harvard, Vancouver, ISO, and other styles
32

Babenko, Andriy, Ruslan Tarasenko, and Oleksandr Ostrohliadov. "Mapping method in research of drug crime regional criminological features (Ukraine taken as an example)." SHS Web of Conferences 68 (2019): 01011. http://dx.doi.org/10.1051/shsconf/20196801011.

Full text
Abstract:
General national average drug crime rates on which the contemporary criminological theory and practice is based do not adequately reflect regional peculiarities in the field of illicit drug trafficking as they level high quality/quantity parameters in some areas and their lower values in others. Still, consideration of only national totals in organization of crime counteraction leads to incomplete information, neglecting its negative trends in certain areas, thus, causing aberration of the actual drug crime situation and using improper countermeasures. Under such circumstances the state law enforcement agencies do not operate preemptively against the illicit drug trafficking, do not contain in due time outbreaks of drug crime in certain areas- crime donors, and, as a result, the efficiency of steps aimed at drug addiction prevention as well as crime limitation in total becomes substantively deteriorated. Criminological mapping method enables the territorial police divisions to monitor existing criminological situation, inform the public and other law enforcement agencies on trends and locations of drug crime expansion, and reveal the most affected areas to be able to react promptly to crime pattern changes in regions. The application of this method enabled the evident demonstration of the fact that in Ukraine the Eastern and Southern areas were most affected by drug crime, wherein the affection factor in this part is twice higher than general national value.
APA, Harvard, Vancouver, ISO, and other styles
33

Englefield, Ashley, and Barak Ariel. "Searching For Influential Actors in Co-Offending Networks: The Recruiter." International Journal of Social Science Studies 5, no. 5 (April 12, 2017): 24. http://dx.doi.org/10.11114/ijsss.v5i5.2351.

Full text
Abstract:
The co-offending literature research has recently unraveled the possible existence of a specific class of offenders commonly referred to as a “recruiter”: one who recruits others who are younger or less experienced for the purpose of offending. Yet the available evidence has focused on small or non-representative samples, and has supplied a limited conceptual scope for explaining how instigation takes place within co-offending groups. We provide evidence from population-level arrest records over eight years in Sacramento, California, is presented on 251,285 criminal charges (n=80,245 offenders). Social network analysis to used to study how “crime ideas” are transmitted. We identified 1,092 recruiters, yet this subgroup is responsible for 6% of arrest cases in Sacramento and a disproportionate number of younger and less experienced recruits. The data suggest a pattern of recruitment specialization in specific crime categories and wider age differentials in against-persons rather than property crime categories. We contextualize the findings within Dawkin’s (1976) meme theory as a more robust conceptual framework for explaining how recruitment takes place, why “crime ideas” can be seen as units of imitation, and under which conditions they are subsequently replicated, reproduced, and evolve. Directions for future research are then considered, with an emphasis on crime control initiatives.
APA, Harvard, Vancouver, ISO, and other styles
34

Frisell, T., P. Lichtenstein, and N. Långström. "Violent crime runs in families: a total population study of 12.5 million individuals." Psychological Medicine 41, no. 1 (March 25, 2010): 97–105. http://dx.doi.org/10.1017/s0033291710000462.

Full text
Abstract:
BackgroundEtiological theory and prior research with small or selected samples suggest that interpersonal violence clusters in families. However, the strength and pattern of this aggregation remains mostly unknown.MethodWe investigated all convictions for violent crime in Sweden 1973–2004 among more than 12.5 million individuals in the nationwide Multi-Generation Register, and compared rates of violent convictions among relatives of violent individuals with relatives of matched, non-violent controls, using a nested case–control design.ResultsWe found strong familial aggregation of interpersonal violence among first-degree relatives [e.g. odds ratio (OR)sibling 4.3, 95% confidence interval (CI) 4.2–4.3], lower for more distant relatives (e.g. ORcousin 1.9, 95% CI 1.9–1.9). Risk patterns across biological and adoptive relations provided evidence for both genetic and environmental influences on the development of violent behavior. Familial risks were stronger among women, in higher socio-economic strata, and for early onset interpersonal violence. There were crime-specific effects (e.g. ORsibling for arson 22.4, 95% CI 12.2–41.2), suggesting both general and subtype-specific familial risk factors for violent behavior.ConclusionsThe observed familiality should be accounted for in criminological research, applied violence risk assessment, and prevention efforts.
APA, Harvard, Vancouver, ISO, and other styles
35

Il’ichev, D. A., M. S. Karmanovskiy, and E. V. Kos’yanenko. "Criminal Association (Criminal Organization): Theory and Practice of Application." Sociology and Law, no. 2 (July 18, 2020): 69–77. http://dx.doi.org/10.35854/2219-6242-2020-2-69-77.

Full text
Abstract:
The article is devoted to the analysis of the concept of criminal association (criminal organization) set out in part 4 article 35 of the Criminal Code, as well as the practice of applying article 210 of the Criminal Code. Adverse trends in the pattern of criminal prosecution for the organization of a criminal association and participation in it at all stages (from the registration of a crime to the imposition of a penalty) are due to shortcomings in the legal technique when the legislator designs this form of complicity. Under criminal law, a criminal association may be in the form of a structured organized group. Meanwhile, the etymology of the concepts of organized group and structured organized group attests to their identity. Contradictions in the formulation of the purpose of a criminal association cause reasonable criticism of theorists and significantly narrow the types of criminal activities permitted by law.
APA, Harvard, Vancouver, ISO, and other styles
36

Suparmin, Entol, and Amsori Amsori. "Tindak Pidana Korupsi Proyek Pusat Pendidikan Pelatihan dan Sekolah Olahraga Nasional di Kementrian Pemuda dan Olahraga ( Studi Putusan Nomor 2427K/Pid.Sus/2014 )." IBLAM LAW REVIEW 1, no. 2 (June 30, 2021): 80–102. http://dx.doi.org/10.52249/ilr.v1i2.30.

Full text
Abstract:
Corruption, eradicating criminal acts of corruption, Decision No. 2427K / Pid.Sus / 2014, formulation: Is the imposition of criminal sanctions on corruption in the Ministry of Youth and Sports projects the same as the imposition of criminal acts of corruption in general, What is the basis for legal considerations for judges in imposing corruption crimes with Law Number 31 of 1999 in conjunction with Law Number 20 of 2001 concerning the Eradication of Corruption, the normative method is carried out on theoretical matters. Knowing whether the imposition of criminal sanctions on corruption is the same as the imposition of criminal acts of corruption in general. know what is the basis for legal considerations for judges in imposing crimes on perpetrators of Corruption Crime, the legal basis for adjudicating cases. The conclusion of the Judge's consideration, the imposition of additional criminal sanctions to compensate the state losses imposed on the defendant was imprisoned for 4 years and a fine, Article 2 paragraph (1) in conjunction with Article 18 of Law No. 31 of 1999 as amended by Law No. 20 of 2001 concerning the Eradication of Corruption in conjunction with Article 55 paragraph (1) 1 in conjunction with Article 65 paragraph (1) of the Criminal Code. Suggestions need evaluation In handling corruption crimes by implementing a synergy pattern between Indonesian National Police Investigators, Public Prosecutors , Prosecutor's Office, Corruption Eradication Commission.
APA, Harvard, Vancouver, ISO, and other styles
37

Win, Khin Nandar, Jianguo Chen, Yuedan Chen, and Philippe Fournier-Viger. "PCPD: A Parallel Crime Pattern Discovery System for Large-Scale Spatiotemporal Data Based on Fuzzy Clustering." International Journal of Fuzzy Systems 21, no. 6 (June 17, 2019): 1961–74. http://dx.doi.org/10.1007/s40815-019-00673-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Felson, Marcus, Silas Nogueira de Melo, and Remi Boivin. "Risk of Outdoor Rape and Proximity to Bus Stops, Bars, and Residences." Violence and Victims 36, no. 6 (December 1, 2021): 723–38. http://dx.doi.org/10.1891/vv-d-20-00074.

Full text
Abstract:
Several researchers have linked the configuration of public places to the risk of sexual attack against women, including rape. Based on the routine activity approach and crime pattern theory, we expect to find the greatest risk of outdoor urban rape near public places that are “target rich,” “offender rich,” and “guardian poor.” We apply the theory to 193 outdoor rape locations in Campinas, Brazil, 2010–2013. We measure distances to the nearest bus stops, bars, and residences, then compare each of these to the distance from random points in the same city. Consistent with theory, outdoor rape victimizations occur disproportionately near bus stops and bars, but at least 250 meters away from the location of the nearest residence of any type. This baseline model suggests that urban planners could make women more secure from outdoor sexual attack by improving the design and location of public places, reducing the concealment of such places, and enhancing guardianship.
APA, Harvard, Vancouver, ISO, and other styles
39

Levy, Jeremy M., Yasemin Irvin-Erickson, and Nancy La Vigne. "A case study of bicycle theft on the Washington DC Metrorail system using a Routine Activities and Crime Pattern theory framework." Security Journal 31, no. 1 (March 15, 2017): 226–46. http://dx.doi.org/10.1057/s41284-017-0096-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

WANG, CHUNTIAN, YUAN ZHANG, ANDREA L. BERTOZZI, and MARTIN B. SHORT. "A stochastic-statistical residential burglary model with independent Poisson clocks." European Journal of Applied Mathematics 32, no. 1 (February 5, 2020): 32–58. http://dx.doi.org/10.1017/s0956792520000029.

Full text
Abstract:
Residential burglary is a social problem in every major urban area. As such, progress has been to develop quantitative, informative and applicable models for this type of crime: (1) the Deterministic-time-step (DTS) model [Short, D’Orsogna, Pasour, Tita, Brantingham, Bertozzi & Chayes (2008) Math. Models Methods Appl. Sci.18, 1249–1267], a pioneering agent-based statistical model of residential burglary criminal behaviour, with deterministic time steps assumed for arrivals of events in which the residential burglary aggregate pattern formation is quantitatively studied for the first time; (2) the SSRB model (agent-based stochastic-statistical model of residential burglary crime) [Wang, Zhang, Bertozzi & Short (2019) Active Particles, Vol. 2, Springer Nature Switzerland AG, in press], in which the stochastic component of the model is theoretically analysed by introduction of a Poisson clock with time steps turned into exponentially distributed random variables. To incorporate independence of agents, in this work, five types of Poisson clocks are taken into consideration. Poisson clocks (I), (II) and (III) govern independent agent actions of burglary behaviour, and Poisson clocks (IV) and (V) govern interactions of agents with the environment. All the Poisson clocks are independent. The time increments are independently exponentially distributed, which are more suitable to model individual actions of agents. Applying the method of merging and splitting of Poisson processes, the independent Poisson clocks can be treated as one, making the analysis and simulation similar to the SSRB model. A Martingale formula is derived, which consists of a deterministic and a stochastic component. A scaling property of the Martingale formulation with varying burglar population is found, which provides a theory to the finite size effects. The theory is supported by quantitative numerical simulations using the pattern-formation quantifying statistics. Results presented here will be transformative for both elements of application and analysis of agent-based models for residential burglary or in other domains.
APA, Harvard, Vancouver, ISO, and other styles
41

Summers, Lucia, and Shane D. Johnson. "Does the Configuration of the Street Network Influence Where Outdoor Serious Violence Takes Place? Using Space Syntax to Test Crime Pattern Theory." Journal of Quantitative Criminology 33, no. 2 (June 17, 2016): 397–420. http://dx.doi.org/10.1007/s10940-016-9306-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Sartika, Yustin. "THE FORMULA OF AGATHA CHRISTIE’S DETECTIVE STORY THE THIRD-FLOOR FLAT." LINGUA LITERA : journal of english linguistics and literature 7, no. 2 (September 12, 2022): 57–66. http://dx.doi.org/10.55345/stba1.v7i2.169.

Full text
Abstract:
Abstract This research aims to explain the detective formula as portrayed in Agatha Christie’s The Third-Floor Flat short story and the techniques that are employed to maintain the suspense by using Cawelti’s formula theory. Cawelti explains there are four aspects of the classic detective’s formula: situation, the pattern of action, character and their relation, and setting. This research is descriptive qualitative research. The formulas of detective stories exist in The Third-Floor Flat. The plot goes straight on the definite formula: the preliminaries, birth of the plot, intentional misleading, the crime, grouping for the murderer by the police, friends, relatives, and amateur detective, failure of everybody, detective’s announcement of facts and proof. The author used some techniques such as the whodunit, metaphor, foreshadowing, and fake devices to maintain the suspense.
APA, Harvard, Vancouver, ISO, and other styles
43

Soudijn, Melvin R. J. "Rethinking money laundering and drug trafficking." Journal of Money Laundering Control 19, no. 3 (July 4, 2016): 298–310. http://dx.doi.org/10.1108/jmlc-07-2015-0028.

Full text
Abstract:
Purpose In accordance with the literature on money laundering, policymakers and researchers often use a model which distinguishes three successive stages: placement, layering and integration. But how well does this model compare to actual investigations of money laundering in relation to large-scale drug trafficking? Design/methodology/approach The basis is formed by data collected in 2012 for that year’s crime pattern analysis (CPA) for money laundering and cocaine trafficking. In all, 46 structured interviews were conducted. These interviews mostly centred around money laundering, involving the proceeds of drugs crime. As a result of the interviews, the dossiers from 16 criminal investigations were also obtained for further analysis. Findings Comparing the three-phase model with Dutch investigations on drug trafficking, three observations can be made. First of all, cash plays a larger role than the theoretical model would suggest. Second, the proceeds of crime are often moved abroad, circumventing the legal financial system. And third, money laundering often occurs in much simpler forms than the theory would lead one to suspect. Research limitations/implications The sources mainly involve criminal investigations into organized drug trafficking. Investigations involving white collar crime and fraud will probably generate different outcomes. Another caveat is that the situation in other countries may differ from the picture that emerges from the Dutch data. Practical implications Combating money laundering is sometimes a job for specialists, but many forms (involving cash and moving money around) can easily be left to ordinary investigative officers with no financial background. Money laundering therefore needs to be demystified to broaden the opportunities for investigating analyzing and researching money laundering. Furthermore, it is not always practical to depend on Financial Intelligence Unit’s information to start an investigation or to evaluate anti-money laundering efficiency. Originality/value The literature on money laundering often centres around judicial system, legal issues and theoretical solutions. Empirical data is hard to come by. This article uses information from actual investigations to illustrate aspects of money laundering that can be overlooked.
APA, Harvard, Vancouver, ISO, and other styles
44

Johannessen, Jon-Arild. "Management by obedience: the patterns that lead to evil acts." Kybernetes 44, no. 1 (January 12, 2015): 159–70. http://dx.doi.org/10.1108/k-02-2014-0034.

Full text
Abstract:
Purpose – If we know something about the patterns and conditions of crime against humanity, we may perhaps at an early point be able to diagnose and identify developments that lead to these acts. If such developments can be diagnosed, it will be easier for the international community to intervene and stop developments that can lead to a human catastrophe. Consequently, the main reason to examine the patterns and conditions for crime against humanity is to contribute to efforts that will ensure that this crimes likely do not happen again. The paper aims to discuss these issues. Design/methodology/approach – Designing system of propositions to develop a theory of crime against humanity, using a typology and conceptual models. Findings – Development of a model for management by obedience leading to evil acts. Research limitations/implications – Understanding patterns leading to evil acts. Practical implications – A model of management by obedience. The model is a way to understand and explain crimes against humanity from a systemic perspective. Originality/value – Development of a typology of crimes against humanity and development of a theory (system of propositions) of crimes against humanity.
APA, Harvard, Vancouver, ISO, and other styles
45

Han, Chang-Ryung, Hans Nelen, and Matthew Youngho Joo. "Documentary credit fraud against banks: analysis of Korean cases." Journal of Money Laundering Control 18, no. 4 (October 5, 2015): 457–74. http://dx.doi.org/10.1108/jmlc-12-2014-0048.

Full text
Abstract:
Purpose – This paper aims to explore the feature and mechanism of a new type of documentary credit fraud that victimizes banks’ issuing letters of credit (L/C), harming neither the importer nor the exporter and seeks to suggest possible measures to tackle it. Design/methodology/approach – This study analyzed 30 cases of documentary credit fraud against banks that were detected by the Korea Customs Service (KCS) and interviewed three key customs investigators to interpret the case reports more accurately and gain a deeper understanding into the mechanisms governing the fraud. This study draws on routine activity theory and crime pattern theory to analyze the opportunity structures of this fraud. Findings – This study found that the importer that engaged in the fraud cases had established a solid business relationship with the exporter and had established trust with the victimized banks; the banks, despite the fact that they had their own risk management systems to screen out unqualified L/C applicants, were defrauded by the offending importers and exporters. Unlike ordinary documentary credit fraud, fraud against banks can be tackled by customs because the offender and the victim typically operate in the same jurisdiction, and this type of fraud often results in trade-based capital flight and money laundering, which is the target of customs enforcement. Research limitations/implications – As this paper is based on case reports of the KCS, it is inappropriate to generalize the findings or to apply the findings to other contexts. Nevertheless, the opportunity structure elaborated upon in the course of this paper may prove useful in devising measures to tackle this type of fraud elsewhere. Originality/value – Documentary credit fraud against banks is relatively unexplored, in particular from criminological perspective. This study can contribute to a refinement of the application of opportunity perspective to white-collar crime.
APA, Harvard, Vancouver, ISO, and other styles
46

Rossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.

Full text
Abstract:
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement, collection and study of computer information in the investigation of crimes. The objects are computer tools and systems, especially forensic technologies of collection (detection, fixation, seizure) and research of these objects to obtain evidence and guidance information. From the modern point of view, the method of crime is determined by personality, subject and circumstances of the criminal attack, the system of actions of the subject, aimed at achieving the criminal goal and united by a single criminal plan. The means of a crime commitment are divided into fully structured, including preparation, commission and concealment, and incomplete, when one or two elements are absent. The formation of the means of a crime is influenced by objective and subjective factors, which determines the determinism and repeatability of the means of the crime.The main means of computer crimes are considered: aimed at hiding unauthorized access to computer tools and systems; the use of Trojans for various purposes; infection of computer systems with viruses; the use of hardware and software systems for mass campaigns of malicious software distribution to mobile devices; computer attacks on local corporate networks, etc.It is established that the criminalistic regularity of the formation and implementation of computer crimes is a mandatory stage of preparation for the crime, which at the same time includes actions to conceal the traces of the crime, i.e. the methods of computer crimes are fully structured
APA, Harvard, Vancouver, ISO, and other styles
47

Song, Guangwen, Chunxia Zhang, Luzi Xiao, Zhuoting Wang, Jianguo Chen, and Xu Zhang. "Influence of Varied Ambient Population Distribution on Spatial Pattern of Theft from the Person: The Perspective from Activity Space." ISPRS International Journal of Geo-Information 11, no. 12 (December 8, 2022): 615. http://dx.doi.org/10.3390/ijgi11120615.

Full text
Abstract:
The ambient population has been regarded as an important indicator for analyzing or predicting thefts. However, the literature has taken it as a homogenous group and seldom explored the varied impacts of different kinds of ambient populations on thefts. To fill this gap, supported by mobile phone trajectory data, this research investigated the relationship between ambient populations of different social groups and theft in a major city in China. With the control variables of motivated offenders and guardianship, spatial-lag negative binominal models were built to explore the effects of the ambient populations of different social groups on the distribution of theft. The results found that the influences of ambient populations of different social groups on the spatial distribution of theft are different. Accounting for the difference in the “risk–benefit” characteristics among different activity groups to the offenders, individuals from the migrant population are the most likely to be potential victims, followed by suburban and middle-income groups, while college, affluent, and affordable housing populations are the least likely. The local elderly population had no significant impact. This research has further enriched the studies of time geography and deepened routine activity theory. It suggests that the focus of crime prevention and control strategies developed by police departments should shift from the residential space to the activity space.
APA, Harvard, Vancouver, ISO, and other styles
48

Awatef Atil Lemoueldi, Awatef Atil Lemoueldi. "A Socio-Psychological approach to understanding Child Rape: An analytical study: مقاربة سوسيوسيكولوجية لفهم جريمة اغتصاب الأطفال: دراسة تحليلية." مجلة العلوم الإنسانية و الإجتماعية 5, no. 11 (September 29, 2021): 64–51. http://dx.doi.org/10.26389/ajsrp.m130321.

Full text
Abstract:
This paper is about children rape crime; which represents one of the sexual violence patterns. This later has serious psychological, social and health effects on the child and grow up with him. Thus, it is regarded as the most dangerous kind of crimes against the child. This crime has come out of social and psychological factors. So, we studied this topic through the sociological theory and the psychological theory.
APA, Harvard, Vancouver, ISO, and other styles
49

Kurniawan, Rudy Cahya. "IMPLEMENTATION OF INDONESIAN POLICE (POLRI) TASK IN CHANGING ERA: A PARADIGMATIC STUDY ON THE MODEL OF COMMUNITY PERPOLISM (POLMAS), LEGAL ENFORCEMENT AND LOCAL FUNCTION." Jurnal Pembaharuan Hukum 6, no. 1 (March 31, 2019): 125. http://dx.doi.org/10.26532/jph.v6i1.4878.

Full text
Abstract:
Before Society Police was carried out the community still complained about the police's performance which was not maximal in overcoming and minimizing the security of criminal acts within the community itself, so it was hoped that with the establishment of Society Police, Society Police could help the police in dealing with crime around the community so safe and orderly environment. The writing of this dissertation is essentially focused on the implementation of Polri's duties in the changing era with a paradigmatic analysis of the model of Society Police (Polmas), law enforcement and local wisdom. This effort requires cooperation between law enforcement officials. The thing that needs to be understood from the Polmas model above is the pattern of the legal system towards the implementation of Indonesian Police duties related to Society Police and problems relating to the community, especially related to solving small problems such as security and order in the community through Society Police and influencing factors the implementation of Society Police in creating a conducive society security situation . The theory or concept of criminal policy is used as the analytical system.
APA, Harvard, Vancouver, ISO, and other styles
50

Handayani, Viona Rizky, Diana Puspitasari, and Hartati Hartati. "Invensi dalam Genre Detektif." Jurnal SAKURA : Sastra, Bahasa, Kebudayaan dan Pranata Jepang 3, no. 2 (August 30, 2021): 116. http://dx.doi.org/10.24843/js.2021.v03.i02.p04.

Full text
Abstract:
The purpose of this research to describe the detective formulas in Japanese anime produced in the period 2014-2016, including Meitantei Konan I Jigen no, Ryuugajou Nanana No Maizoukin, Sniper Psycho-Pass : The Movie ( Gekijou-ban Psycho-Pass ), Ghost In The Shell, Meitantei Konan Junkoku no Naitomea, and Bungou Stray Dogs Season 1. The method used was descriptive qualitative with literary formula approach based on Cawelti. The data analysis technique uses were observing recording and classifying data. The results of this study show that there were 132 data with detective action pattern conventions consisting of six phases and four roles. That are 1) introduction of detectives, 2) crime and guidance, 3) investigation, 4) announcement of solution, 5) solution explanation, 6) end of story. In addition, these four roles are those who are exposed to the threat of 1) victims, 2) criminals, 3) detectives, and 4) crimes, but cannot resolve them. Then, it was found that the ending of the story was an archetypal invention in the anime Ryuugajou Nanana No Maizoukin, while the other five anime had archetypal conventions according to Cawelti's theory. In addition, in this study, it was found that there is a formula invention that occurs in every detective anime. The form of invention in detective anime is to add a supernatural formula to the storyline. Based on the results of data analysis, the conclusion is that the six animes contain the rules and inventions of the formula detective genre. Formula conventions and inventions occur as the audience becomes more interested in the genre. The more popular a particular genre, the more conventions and inventions as a development of formulas and archetypes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography