Skip to main content

Advertisement

Articles

Page 1 of 3

  1. Predictive policing and crime analytics with a spatiotemporal focus get increasing attention among a variety of scientific communities and are already being implemented as effective policing tools. The goal of...

    Authors: Ourania Kounadi, Alina Ristea, Adelson Araujo Jr. and Michael Leitner

    Citation: Crime Science 2020 9:7

    Content type: Systematic Review

    Published on:

  2. We recently rejected the hypothesis that increases in cybercrime may have caused the international crime drop. Critics subsequently argued that offenders switched from physical crime to cybercrime in recent ye...

    Authors: Graham Farrell and Daniel Birks

    Citation: Crime Science 2020 9:4

    Content type: Short Contribution

    Published on:

  3. Crime, traffic accidents, terrorist attacks, and other space-time random events are unevenly distributed in space and time. In the case of crime, hotspot and other proactive policing programs aim to focus limi...

    Authors: George Mohler, Michael Porter, Jeremy Carter and Gary LaFree

    Citation: Crime Science 2020 9:3

    Content type: Research

    Published on:

  4. Security and intelligence agencies around the world invest considerable resources in preventing terrorist attacks, as these may cause strategic damage, national demoralization, infringement of sovereignty, and...

    Authors: Gonen Singer and Maya Golan

    Citation: Crime Science 2019 8:14

    Content type: Research

    Published on:

  5. In this conceptual piece, we argue that the current approach to police performance measurement typically based on the use of traditional police metrics has failed to achieve the desired results and that a diff...

    Authors: Tarah Hodgkinson, Tullio Caputo and Michael L. McIntyre

    Citation: Crime Science 2019 8:13

    Content type: Theoretical Article

    Published on:

  6. In this paper we question Farrell and Birks’ assertion of the emergence of cybercrime as an invalid explanation for the crime drop. Alternatively to the “cybercrime hypothesis”, we propose two non-exclusive hy...

    Authors: Fernando Miró-Llinares and Asier Moneva

    Citation: Crime Science 2019 8:12

    Content type: Short Contribution

    Published on:

  7. The presence of civilian witnesses and victims in court is central to the effective operation of the criminal justice system. However, there is evidence of significant non-attendance which can result in ineffe...

    Authors: Evie Monnington-Taylor, Kate Bowers, Pippa Streeter Hurle, Liz Ward, Simon Ruda, Martin Sweeney, Alex Murray and Jo Whitehouse

    Citation: Crime Science 2019 8:10

    Content type: Research

    Published on:

  8. Wildlife crime is an international issue with the illicit trade of flora and fauna estimated to be worth several billion dollars. In national parks, the problem can often be summarised as an arms race, with po...

    Authors: Hervé Borrion, Amin Amiri, Dorothea Delpech and A. M. Lemieux

    Citation: Crime Science 2019 8:9

    Content type: Research

    Published on:

  9. Opportunity theories of crime emphasize the non-random spatial and temporal patterning of criminal events. Such theoretical development has proven useful when extended beyond traditional applications to crime ...

    Authors: Hannah Kelly, Joseph Clare, Kathryn Wuschke and Len Garis

    Citation: Crime Science 2019 8:8

    Content type: Research

    Published on:

  10. Research on crime concentration at micro-places has had a very western-industrialised focus. In this paper we provide results on crime concentration for 42 cities in Latin America. The results suggest that cri...

    Authors: Spencer P. Chainey, Gastón Pezzuchi, Néstor Octavio Guerrero Rojas, José Luis Hernandez Ramirez, Joana Monteiro and Erwin Rosas Valdez

    Citation: Crime Science 2019 8:5

    Content type: Short contribution

    Published on:

  11. Spam has been increasingly used for malware distribution. This paper analyzed modern spam from an age-comparative perspective to (i) discover the extent to which psychological weapons of influence and life dom...

    Authors: Daniela Seabra Oliveira, Tian Lin, Harold Rocha, Donovan Ellis, Sandeep Dommaraju, Huizi Yang, Devon Weir, Sebastian Marin and Natalie C. Ebner

    Citation: Crime Science 2019 8:3

    Content type: Research

    Published on:

  12. On 15 September 2015, the College of Pharmacists of British Columbia (BC) implemented a set of by-law and security policy changes in an effort to reduce robberies and burglaries in BC pharmacies. Prior to thes...

    Authors: Martin A. Andresen, Elliott Mann, Tarah Hodgkinson, Stephen Thacker and Bob Nakagawa

    Citation: Crime Science 2019 8:1

    Content type: Research

    Published on:

  13. This research investigated the association between Internet searches and property crime levels in the United States. States with the highest levels of property crime tended to have the highest levels of Google...

    Authors: Megan S. Stubbs-Richardson, Austin K. Cosby, Karissa D. Bergene and Arthur G. Cosby

    Citation: Crime Science 2018 7:21

    Content type: Research

    Published on:

  14. The original version of the article contained an error in the funding section and name of an author. The correction funding note should be: This project was funded by the Economic & Social Research Council gra...

    Authors: Matthew Manning, Gabriel T. W. Wong, Timothy Graham, Thilina Ranbaduge, Peter Christen, Kerry Taylor, Richard Wortley, Toni Makkai and Pierre Skorich

    Citation: Crime Science 2018 7:20

    Content type: Correction

    Published on:

    The original article was published in Crime Science 2018 7:12

  15. The world has seen a dramatic increase in cybercrime, in both the Surface Web, which is the portion of content on the World Wide Web that may be indexed by popular engines, and lately in the Dark Web, a portio...

    Authors: Dario Adriano Bermudez Villalva, Jeremiah Onaolapo, Gianluca Stringhini and Mirco Musolesi

    Citation: Crime Science 2018 7:17

    Content type: Research

    Published on:

  16. In the computer science field coordinated vulnerability disclosure is a well-known practice for finding flaws in IT-systems and patching them. In this practice, a white-hat hacker who finds a vulnerability in ...

    Authors: Marleen Weulen Kranenbarg, Thomas J. Holt and Jeroen van der Ham

    Citation: Crime Science 2018 7:16

    Content type: Theoretical article

    Published on:

  17. This paper is an edited version of the speech given upon being awarded the 2018 Stockholm Prize in Criminology. After a brief introduction, the paper describes the concept of problem-oriented policing (POP), f...

    Authors: Herman Goldstein

    Citation: Crime Science 2018 7:13

    Content type: Research

    Published on:

  18. The Manning Cost–Benefit Tool (MCBT) was developed to assist criminal justice policymakers, policing organisations and crime prevention practitioners to assess the benefits of different interventions for reduc...

    Authors: Matthew Manning, Gabriel T. W. Wong, Timothy Graham, Thilina Ranbaduge, Peter Christen, Kerry Taylor, Richard Wortley, Toni Makkai and Pierre Skorich

    Citation: Crime Science 2018 7:12

    Content type: Theoretical article

    Published on:

    The Correction to this article has been published in Crime Science 2018 7:20

  19. In this paper, we introduce two methods to forecast apartment burglaries that are based on repeat and near repeat victimization. While the first approach, the “heuristic method” generates buffer areas around e...

    Authors: Philip Glasner, Shane D. Johnson and Michael Leitner

    Citation: Crime Science 2018 7:9

    Content type: Research

    Published on:

  20. Recent studies have hypothesised that the international crime drop was the result of the rise in cybercrime. We subject this ‘cybercrime hypothesis’ to critical assessment. We find significant evidence and arg...

    Authors: Graham Farrell and Daniel Birks

    Citation: Crime Science 2018 7:8

    Content type: Short contribution

    Published on:

  21. The ‘crime drop’ refers to the substantial reductions in crime reported in many industrialised countries over at least the past quarter century. Asian countries are underrepresented in the crime drop literatur...

    Authors: Aiden Sidebottom, Tienli Kuo, Takemi Mori, Jessica Li and Graham Farrell

    Citation: Crime Science 2018 7:6

    Content type: Research

    Published on:

  22. In contrast to the Canadian crime drop of the 1990s, homicide appeared as an anomaly with a peak in the 1970s. Yet previous studies tend to refer only to completed homicides, and here we also include attempts....

    Authors: Graham Farrell, Tarah Hodgkinson and Martin A. Andresen

    Citation: Crime Science 2018 7:1

    Content type: Short contribution

    Published on:

  23. The classification of crime into discrete categories entails a massive loss of information. Crimes emerge out of a complex mix of behaviors and situations, yet most of these details cannot be captured by singu...

    Authors: Da Kuang, P. Jeffrey Brantingham and Andrea L. Bertozzi

    Citation: Crime Science 2017 6:12

    Content type: Research

    Published on:

  24. Personal security alarms have been used to try to reduce violence against healthcare staff, some of whose members face relatively high risks of assault. This systematic review focused on the effect of alarms i...

    Authors: Chloe Perkins, Deirdre Beecher, David Colas Aberg, Phil Edwards and Nick Tilley

    Citation: Crime Science 2017 6:11

    Content type: Systematic review

    Published on:

  25. That crime is concentrated at a few places is well established by over 44 studies. This is true whether one examines addresses or street segments. Additionally, crime is concentrated among offenders and victim...

    Authors: John E. Eck, YongJei Lee, SooHyun O and Natalie Martinez

    Citation: Crime Science 2017 6:8

    Content type: Systematic review

    Published on:

  26. Retailers routinely use security tags to reduce theft. Presently, however, there has been no attempt to systematically review the literature on security tags. Guided by the acronym EMMIE, this paper set out to...

    Authors: Aiden Sidebottom, Amy Thornton, Lisa Tompson, Jyoti Belur, Nick Tilley and Kate Bowers

    Citation: Crime Science 2017 6:7

    Content type: Systematic review

    Published on:

Annual Journal Metrics

Advertisement