Crime SciencePub Date : 2020-11-11DOI: 10.1186/s40163-020-00134-5
Zarina I. Vakhitova, Rob I. Mawby, Clair L. Alston-Knox, Callum A. Stephens
{"title":"To SPB or not to SPB? A mixed methods analysis of self-protective behaviours to prevent repeat victimisation from cyber abuse","authors":"Zarina I. Vakhitova, Rob I. Mawby, Clair L. Alston-Knox, Callum A. Stephens","doi":"10.1186/s40163-020-00134-5","DOIUrl":"https://doi.org/10.1186/s40163-020-00134-5","url":null,"abstract":"This paper presents the findings from a mixed-methods examination of self-protective behaviours (SPBs) adopted by victims of cyber abuse from the rational choice perspective. The data from a sample of the U.S. adults ( $$N = 746$$ N = 746 ), members of an online opt-in panel, were analysed to first distinguish the types of SPBs adopted by victims of cyber abuse using a thematic analysis of open-ended responses. We then identified the factors associated with an increased likelihood of adopting SPBs and the specific identified types of SPBs using logistic regression with Bayesian variable selection and a stochastic search algorithm. Of the six identified types of SPBs, adjusting privacy settings was the most commonly reported response, and improving security (e.g. changing passwords, etc.) was the least common SPB. Older victims who reported higher than the average perceived impact from victimisation, were abused by a stranger and experienced either surveillance of their online activities or multiple types of abuse, were significantly more likely to adopt an SPB. Our findings inform strategies for both Internet user education and for preventing cyber abuse victimisation.","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140882438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-11-04DOI: 10.1186/s40163-020-00132-7
Sophie Curtis-Ham, W. Bernasco, O. Medvedev, D. Polaschek
{"title":"A framework for estimating crime location choice based on awareness space","authors":"Sophie Curtis-Ham, W. Bernasco, O. Medvedev, D. Polaschek","doi":"10.1186/s40163-020-00132-7","DOIUrl":"https://doi.org/10.1186/s40163-020-00132-7","url":null,"abstract":"","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s40163-020-00132-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43361221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-10-31DOI: 10.1186/s40163-020-00133-6
Timothy I. C. Cubitt, K. Wooden, K. Roberts
{"title":"A machine learning analysis of serious misconduct among Australian police","authors":"Timothy I. C. Cubitt, K. Wooden, K. Roberts","doi":"10.1186/s40163-020-00133-6","DOIUrl":"https://doi.org/10.1186/s40163-020-00133-6","url":null,"abstract":"","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s40163-020-00133-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65836688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-10-07DOI: 10.1186/s40163-020-00127-4
Daniel Birks, Alex Coleman, David Jackson
{"title":"Unsupervised identification of crime problems from police free-text data","authors":"Daniel Birks, Alex Coleman, David Jackson","doi":"10.1186/s40163-020-00127-4","DOIUrl":"https://doi.org/10.1186/s40163-020-00127-4","url":null,"abstract":"We present a novel exploratory application of unsupervised machine-learning methods to identify clusters of specific crime problems from unstructured modus operandi free-text data within a single administrative crime classification. To illustrate our proposed approach, we analyse police recorded free-text narrative descriptions of residential burglaries occurring over a two-year period in a major metropolitan area of the UK. Results of our analyses demonstrate that topic modelling algorithms are capable of clustering substantively different burglary problems without prior knowledge of such groupings. Subsequently, we describe a prototype dashboard that allows replication of our analytical workflow and could be applied to support operational decision making in the identification of specific crime problems. This approach to grouping distinct types of offences within existing offence categories, we argue, has the potential to support crime analysts in proactively analysing large volumes of modus operandi free-text data—with the ultimate aims of developing a greater understanding of crime problems and supporting the design of tailored crime reduction interventions.","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140882402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-08-19DOI: 10.31235/osf.io/8w73n
Daniel Birks, A. Coleman, Donald A. Jackson
{"title":"Unsupervised identification of crime problems from police free-text data","authors":"Daniel Birks, A. Coleman, Donald A. Jackson","doi":"10.31235/osf.io/8w73n","DOIUrl":"https://doi.org/10.31235/osf.io/8w73n","url":null,"abstract":"We present a novel exploratory application of unsupervised machine-learning methods to identify clusters of specific crime problems from unstructured modus operandi free-text data within a single administrative crime classification. To illustrate our proposed approach, we analyse police recorded free-text narrative descriptions of residential burglaries occurring over a two-year period in a major metropolitan area of the UK. Results of our analyses demonstrate that topic modelling algorithms are capable of clustering substantively different burglary problems without prior knowledge of such groupings. Subsequently, we describe a prototype dashboard that allows replication of our analytical workflow and could be applied to support operational decision making in the identification of specific crime problems. This approach to grouping distinct types of offences within existing offence categories, we argue, has the potential to support crime analysts in proactively analysing large volumes of modus operandi free-text data—with the ultimate aims of developing a greater understanding of crime problems and supporting the design of tailored crime reduction interventions.","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43791855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-08-17DOI: 10.1186/s40163-020-00124-7
Lucia Summers, Tiffany Gentry Rogers
{"title":"Too far for comfort? Situational access to emergency medical care and violent assault lethality","authors":"Lucia Summers, Tiffany Gentry Rogers","doi":"10.1186/s40163-020-00124-7","DOIUrl":"https://doi.org/10.1186/s40163-020-00124-7","url":null,"abstract":"This research demonstrates the relationship between situational access to emergency medical care and assault lethality, by comparing attempted and completed murders in Greater London, England, over a five-year period (N = 1512 victims). Access to emergency care was operationalised using the time taken to contact emergency services, the distance from the nearest ambulance station, and the distance to the nearest emergency department. Notification lags in excess of 1 h were associated with significantly higher lethality, after controlling for offence and victim characteristics. The distance predictors were non-significant, which could be due to observed distances in our urban setting being overwhelmingly short (< 5 miles) and homogeneous.","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140882543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-08-05DOI: 10.1186/s40163-020-00123-8
M. Caldwell, J. T. A. Andrews, T. Tanay, L. D. Griffin
{"title":"AI-enabled future crime","authors":"M. Caldwell, J. T. A. Andrews, T. Tanay, L. D. Griffin","doi":"10.1186/s40163-020-00123-8","DOIUrl":"https://doi.org/10.1186/s40163-020-00123-8","url":null,"abstract":"A review was conducted to identify possible applications of artificial intelligence and related technologies in the perpetration of crime. The collected examples were used to devise an approximate taxonomy of criminal applications for the purpose of assessing their relative threat levels. The exercise culminated in a 2-day workshop on ‘AI & Future Crime’ with representatives from academia, police, defence, government and the private sector. The workshop remit was (i) to catalogue potential criminal and terror threats arising from increasing adoption and power of artificial intelligence, and (ii) to rank these threats in terms of expected victim harm, criminal profit, criminal achievability and difficulty of defeat. Eighteen categories of threat were identified and rated. Five of the six highest-rated had a broad societal impact, such as those involving AI-generated fake content, or could operate at scale through use of AI automation; the sixth was abuse of driverless vehicle technology for terrorist attack.","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140882462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-07-09DOI: 10.1186/s40163-020-00119-4
Marianne Junger, Victoria Wang, Marleen Schlömer
{"title":"Fraud against businesses both online and offline: crime scripts, business characteristics, efforts, and benefits","authors":"Marianne Junger, Victoria Wang, Marleen Schlömer","doi":"10.1186/s40163-020-00119-4","DOIUrl":"https://doi.org/10.1186/s40163-020-00119-4","url":null,"abstract":"<p>This study analyses 300 cases of fraudulent activities against Dutch businesses, 100 from each of the following three categories: CEO-fraud, fraudulent contract, and ghost invoice. We examine crime scripts, key characteristics of targeted businesses, and the relationship between input criminal effort and output financial benefit. Results indicate that whilst all CEO-frauds are conducted online, most of the fraudulent contracts and ghost invoices are undertaken via offline means. Both Routine Activity Theory and Rational Choice Model are evidenced-fraudsters clearly take the business size and seasonality into account, and the input criminal effort and output criminal benefit are positively correlated. Having vigilant employees is evidenced as the most effective way of fraud prevention, both online and offline.</p>","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140882464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-07-08DOI: 10.1186/s40163-020-00122-9
Kyle Dakin, Weizhi Xie, S. Parkinson, Saad Khan, Leanne Monchuk, Ken Pease
{"title":"Built environment attributes and crime: an automated machine learning approach","authors":"Kyle Dakin, Weizhi Xie, S. Parkinson, Saad Khan, Leanne Monchuk, Ken Pease","doi":"10.1186/s40163-020-00122-9","DOIUrl":"https://doi.org/10.1186/s40163-020-00122-9","url":null,"abstract":"","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s40163-020-00122-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65836104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime SciencePub Date : 2020-05-27DOI: 10.1186/s40163-020-00118-5
W. Bernasco, Remco van Dijke
{"title":"RETRACTED ARTICLE: Do offenders avoid offending near home? A systematic review of the buffer zone hypothesis","authors":"W. Bernasco, Remco van Dijke","doi":"10.1186/s40163-020-00118-5","DOIUrl":"https://doi.org/10.1186/s40163-020-00118-5","url":null,"abstract":"","PeriodicalId":37844,"journal":{"name":"Crime Science","volume":null,"pages":null},"PeriodicalIF":6.1,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s40163-020-00118-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65836055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}