Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
Choose an application
Crime analysis --- Crime --- Analysis --- Police administration
Choose an application
This book analyzes the expanding crime opportunities created by the Internet and e-commerce, and it explains how concepts of crime prevention developed in other contexts can be effectively applied in this new environment. The authors note that the Internet and associated e-commerce constitute a lawless "wild frontier" where users of the Internet can anonymously exploit and victimize other users without a high risk of being detected, arrested, prosecuted, and punished. For acquisitive criminals who seek to gain money by stealing it from others, e-commerce through the Internet enables them to "hack" their way into bank records and transfer funds for their own enrichment. Computer programs that are readily available for download on the Web can be used to scan the Web for individual computers that are vulnerable to attack. By using the Internet addresses of other users or using another person's or organization's computers or computing environment, criminals can hide their trails and escape detection. After identifying the multiple opportunities for crime in the world of e-commerce, the book describes specific steps that can be taken to prevent e-commerce crime at particular points of vulnerability. The authors explain how two aspects of situational crime prevention can prevent Internet crime. This involves both a targeting of individual vulnerabilities and a broad approach that requires partnerships in producing changes and modifications that can reduce or eliminate criminal opportunities. The authors apply the 16 techniques of situational crime prevention to the points of vulnerability of the e-commerce system. The points of vulnerability are identified and preventive measures are proposed. In discussing the broad approach of institutionalized and systemic efforts to police e-commerce, the book focuses on ways to increase the risks of detection and sanctions for crime without undue intrusions on the freedom and privacy of legitimate Internet and e-commerce users.
Internet fraud --- Computer crimes --- Prevention. --- Prevention --- Fraud
Choose an application
Economic law --- Criminal law. Criminal procedure --- Criminal psychology --- Criminology --- Decision making --- Choice (Psychology) --- 343.95 --- -Criminal psychology --- -Criminology --- -Decision making --- -Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Problem solving --- Crime --- Social sciences --- Criminals --- Criminal psychiatry --- Psychology, Criminal --- Criminal anthropology --- Psychology --- Psychology, Pathological --- Criminologische psychologie. Forensische psychologie --- Congresses --- Study and teaching --- Congresses. --- -Criminologische psychologie. Forensische psychologie --- 343.95 Criminologische psychologie. Forensische psychologie --- -343.95 Criminologische psychologie. Forensische psychologie --- Deciding --- Criminal psychology - Congresses --- Criminology - Congresses --- Decision making - Congresses --- Choice (Psychology) - Congresses
Choose an application
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved security, as central to the 'crime drop' experienced in many countries. Studies in different countries show car theft fell with far more and better vehicle security. Yet increases in household security were more modest and do not track burglary's decrease as well. In this chapter, the authors explain that apparent anomaly as due more to an improvement in the quality of household security leading to reduced burglary. It is further suggested that improvements to home insulation in the UK that brought double glazing may have, somewhat inadvertently, introduced better frames and locks for doors and windows, that in turn reduced household burglary.
Science. --- Science, general. --- Natural science --- Science of science --- Sciences --- Criminology and Criminal Justice. --- Crime Control and Security. --- Public safety. --- Safety, Public --- Human services --- Criminology --- Public safety
Choose an application
Organized crime investigation --- Organized crime --- Prevention --- Crime syndicates --- Organised crime --- Crime --- Criminal investigation
Choose an application
Choose an application
Choose an application
Given that the war on terror is currently being fought the way crime typically is-after the fact-this country cannot protect its citizens from future terrorist events solely in this way. Instead, measures must be taken to actually stop terrorists before they can attack. Here, the authors argue that government anti-terrorism policy must pay much more attention to reducing opportunities for terrorist attacks by protecting vulnerable targets, controlling the tools and weapons used by terrorists, and by removing the conditions of everyday life that make these attacks possible. While some of this work is done on an ad hoc basis, there are no recognized methods to guide the work, there is limited experience on which to draw, and the government has no trained professionals to oversee the work. In this book, the authors address these deficiencies, and lay out a systematic approach for reducing opportunities for terrorism. The current "take-them-out mindset" may be the main reason why reducing opportunities for terrorism has been so neglected by governments, but another important reason is that the task seems so overwhelmingly difficult. How can we possibly protect every vulnerable target or person? How can we control all the everyday tools that terrorists must use in carrying out their attacks? How can we control their weapons when we cannot even keep guns out the hands of ordinary criminals? In this book, the authors show that these tasks are indeed manageable. They take readers through the methods for preventing terrorism and the policies that will assist in this important work. They show that in order to protect the country from terrorists, security forces must do what the terrorists do: identify vulnerable targets, analyze their specific weaknesses, consider the tools and weapons needed to attack, and assess access to the targets. Once these steps are taken, security agencies can then provide appropriate protection, limit accessibility, anticipate the forces needed to combat a potential attack, and plan carefully for an attack if it does occur. By "outsmarting the terrorists" security forces undertake the same analysis of vulnerabilities and opportunities that terrorists themselves undertake in planning their operations, and can more effectively defeat them before they strike. This books shows how this approach works and can succeed.
National security --- Security, International --- Terrorism --- Terrorism --- Terrorism --- War on Terrorism, 2001-2009 --- Government policy --- Prevention --- Prevention
Choose an application
Listing 1 - 10 of 13 | << page >> |
Sort by
|