Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Analysis
SELECTING AND VALIDATING OUTCOME MEASURES FOR THE DOMESTIC VIOLENCE AND ABUSE CORE OUTCOME SET (DVA-COS) 

By Jenna Harewell, Elizabeth Dunk Shivi Bains, Emma Howarth, Claire Powell, Lazaros Gonidis

  Background - The domestic abuse core outcome set (DVA-COS) is an agreed set of five outcomes intended for use in evaluations of interventions or services for children and families with experience of domestic violence and abuse (DVA, hereafter referred to as domestic abuse). A COS is a minimum standard for measurement in intervention studies, the purpose of which is to overcome heterogeneity in outcome selection and measurement. The aim of a COS is to maximise the value of a body of evidence by facilitating comparison between and synthesis across studies, thus reducing research wastage. Since the development of the DVA-COS, work has been undertaken to identify, select, and validate outcome measurement instruments (OMIs) to measure the core outcomes. The Warwick– Edinburgh Mental Wellbeing Scale (WEMWBS) was previously identified as acceptable by stakeholders to capture two outcomes: child and caregiver emotional health and wellbeing. This work seeks to extend those findings by validating the measure for use with domestic abuse experienced populations. Aims Foundations, the national What Works Centre for Children & Families, commissioned two work packages to develop and integrate previous work to outline and validate OMIs for use to assess outcomes comprising the DVA-COS. Work package 1 seeks to identify three OMIs, and this report focuses on work package 2, which aimed to validate the Short WEMWBS (SWEMWBS) for use with children and young people (aged 11 to 18) who have experienced domestic abuse. The studies that make up this work package used mixed methods to examine the acceptability, content validity, structural validity, internal consistency, and measurement invariance for the scale in children and young people experiencing domestic abuse. We also report a validation study of the WEMWBS for adults with experience of domestic abuse. Methods The above aims were addressed across four individual studies: two planned and two supplementary. First, a qualitative ‘think aloud’ study assessed the acceptability of the SWEMWBS with children and young people who had experienced domestic abuse. The remaining three studies were quantitative analyses of secondary data on using the SWEMWBS and WEMWBS with children and young people and adult samples. • Study A: a qualitative think aloud study that involved interviews and a focus group to gather feedback from children and young people with domestic abuse experience on use of the SWEMWBS. • Study B: examined cross-sectional data collected by the OxWell Student Survey to validate the SWEMWBS with children and young people affected by domestic abuse. • Study C: examined anonymised longitudinal service data to validate the SWEMWBS with children and young people affected by domestic abuse. • Study D: validated the WEMWBS with adults who have experienced domestic abuse using cross-sectional data from the Adult Psychiatric Morbidity Survey (APMS). Key findings Our findings demonstrate the validity and acceptability of the SWEMWBS and WEMWBS in domestic abuse-experienced child and adult populations respectively. Study A indicated that the SWEMWBS is broadly acceptable for use with children and young people, while raising important considerations regarding respondents’ interpretation of the measure’s items as well as the emotional impact of the measure on this population. Studies B and C demonstrated robust psychometric validity2 of the SWEMWBS with children and young people affected by domestic abuse, and Study D showed robust psychometric validity of the WEMWBS with adult victims of domestic abuse. These are significant findings given the limited number of measures that have been evaluated for use with this population across practice and research contexts. Moreover, this represents an important step forward in the implementation of the DVA-COS, which we hope will help to unify outcome measurement in domestic abuse research and evaluation, as well as service monitoring. Recommendations We recommend that the SWEMWBS and WEMWBS be used to measure wellbeing in the context of evaluation studies (of any quantitative design) seeking to assess the impact of child-focused domestic abuse interventions. To enhance the acceptability of the measure to children and adults we suggest minor adaptations for use in the domestic abuse context. Finally, we recommend the development of guidelines for practitioners and researchers about how to use the tools in a ‘carefirst’ way and how to guard against the tools being used for screening or triaging, or rationing care, as well as guidance for commissioners on how to interpret and use evidence, generated by the completion of the SWEMWBS and WEMWBS, for the basis of decision making. This guidance needs to reflect the balance between the benefits of data-driven decision making and the risk of unduly narrowing the breadth of services or thwarting innovation in the sector. The OMI’s implementation (including the use of guidance) should be closely monitored and evaluated, to inform any associated refinements and to develop an in-depth understanding of the process and outcomes associated with embedding routine measurement in practice. Further work is also required to identify an alternative OMI or adapt the SWEMWBS for appropriate use with children under the age of.   11.

Foundations UK: 2025. 106p.

  SELECTING AND VALIDATING OUTCOME MEASURES FOR THE DOMESTIC VIOLENCE AND ABUSE CORE OUTCOME SET (DVA-COS)

By Shivi Bains, Elizabeth Dunk, Lazaros Gonidis,  Jenna Harewell,Emma Howarth, Claire Powell

  Background - The domestic violence and abuse core outcome set (DVA-COS) is an agreed set of five outcomes intended for use in evaluating interventions for children and their families with experience of domestic abuse. The purpose of a core outcome set is to harmonise outcome measurement, helping to reduce variation in outcome selection and measurement across studies, with the aim of preventing research waste. This minimum, but not exclusive, set of outcomes also aims to ensure interventions capture impact meaningful to all stakeholders, whether through routine data collection within domestic abuse services or as outcomes in trials and research evaluations. Since the development of the DVA-COS, work has been undertaken to consolidate and validate outcome measurement instruments (OMIs) to use within the core outcome set. The work reported here builds on and extends these efforts (Powell, Clark, et al., 2022; Powell, Feder, et al., 2022). Aims Foundations, the national What Works Centre for Children & Families, commissioned a programme of work, comprised of two work packages, to develop and validate OMIs for use in the DVA-COS. This report focuses on work package 1, which sought to identify and appraise measurement tools, using the COnsensus-based Standards for the selection of health Measurement INstruments (COSMIN) Process, to assess three of the five core outcomes of the DVA-COS: family relationships, feelings of safety, and freedom to go about daily life. Work package 2 sought to validate the Short Warwick–Edinburgh Mental Wellbeing Scale (SWEMWBS) for use with child and young people populations with experience of domestic abuse and is reported separately. Methods To meet the aim of work package 1, this project adopted a four-stage process. Within stage A, OMIs were identified through rapid reviews of the domestic abuse literature (peer-reviewed and grey) and through targeted searches of the non-domestic abuse literature; these searches were informed by concept workshops with 15 key stakeholders to highlight priority concepts within the outcomes. In stage B, candidate OMIs and their associated studies were quality appraised, using the COSMIN protocol, and the highest-scoring tools were shortlisted for assessment of their acceptability and feasibility. Feedback workshops and stakeholder votes, held within stage C, determined which tools should proceed to the consensus workshop. Concluding this process (stage D), a consensus workshop was held with 29 domestic abuse practitioners, commissioners, researchers, and survivors to allow stakeholders to discuss and reach agreement on recommending OMIs for the three outcomes. Key findings In total 144 OMIs were identified across all evidence sources and from previous work. A systematic process of conceptual mapping, quality appraisal, and examination of acceptability and feasibility issues resulted in a shortlist of 18 OMIs (seven OMIs mapping to family relationships, six mapping to feelings of safety, and five capturing freedom to go about daily life) for discussion by three stakeholder groups. Of these, eight OMIs (three OMIs for family relationships, three for feelings of safety, and two for freedom to go about daily life) progressed to the final consensus workshop. Votes held during the consensus workshop identified the Children and Families Against Domestic Abuse (CAFADA) Wellbeing and Safety as the preferred OMI to assess two outcomes: family relationships (81.5%) and feelings of safety (74.1%). A provisional recommendation for use of this tool was agreed, given that it was recently developed and so it lacks psychometric validation. Therefore it is recommended that before widespread use, this OMI is subject to further adaptation and evaluation in cooperation with the tool developers. In particular, thought is needed about the tool’s suitability for a wider range of interventions, including those supporting perinatal families or services including the person that harms. No agreement, and therefore no recommendation, was reached for an OMI capturing freedom to go about daily life. Feedback from the consensus workshop highlighted a range of positive attributes that explained the CAFADA Wellbeing and Safety’s high acceptability for use within domestic abuse contexts, such as visually appealing design, trauma-informed and strengths-based language, and the complementary adult and child versions. The consensus workshop also highlighted key areas of development such as removing gendered language, being inclusive of non-traditional family structures, and being accessible to children of different ages or cognitive maturity. Conclusion This work makes important strides towards the realisation of a DVA-COS. It establishes a consensus with respect to the provisional recommendation for use of the CAFADA Wellbeing and Safety scale, in research and practice contexts, to assess feelings of safety and family relationships. This provisional recommendation is dependent on further work being carried out to refine the tool and to evaluate its implementation in real-world contexts and in relation to different types of childand family-focused interventions. The not insignificant challenges of implementing a core outcome set are discussed, including the importance of creating trauma-informed guidance to ensure the DVA-COS adopts a care-first approach and to mitigate any unintended consequences. Key findings In total 144 OMIs were identified across all evidence sources and from previous work. A systematic process of conceptual mapping, quality appraisal, and examination of acceptability and feasibility issues resulted in a shortlist of 18 OMIs (seven OMIs mapping to family relationships, six mapping to feelings of safety, and five capturing freedom to go about daily life) for discussion by three stakeholder groups. Of these, eight OMIs (three OMIs for family relationships, three for feelings of safety, and two for freedom to go about daily life) progressed to the final consensus workshop. Votes held during the consensus workshop identified the Children and Families Against Domestic Abuse (CAFADA) Wellbeing and Safety as the preferred OMI to assess two outcomes: family relationships (81.5%) and feelings of safety (74.1%). A provisional recommendation for use of this tool was agreed, given that it was recently developed and so it lacks psychometric validation. Therefore it is recommended that before widespread use, this OMI is subject to further adaptation and evaluation in cooperation with the tool developers. In particular, thought is needed about the tool’s suitability for a wider range of interventions, including those supporting perinatal families or services including the person that harms. No agreement, and therefore no recommendation, was reached for an OMI capturing freedom to go about daily life. Feedback from the consensus workshop highlighted a range of positive attributes that explained the CAFADA Wellbeing and Safety’s high acceptability for use within domestic abuse contexts, such as visually appealing design, trauma-informed and strengths-based language, and the complementary adult and child versions. The consensus workshop also highlighted key areas of development such as removing gendered language, being inclusive of non-traditional family structures, and being accessible to children of different ages or cognitive maturity. Conclusion This work makes important strides towards the realisation of a DVA-COS. It establishes a consensus with respect to the provisional recommendation for use of the CAFADA Wellbeing and Safety scale, in research and practice contexts, to assess feelings of safety and family relationships. This provisional recommendation is dependent on further work being carried out to refine the tool and to evaluate its implementation in real-world contexts and in relation to different types of childand family-focused interventions. The not insignificant challenges of implementing a core outcome set are discussed, including the importance of creating trauma-informed guidance to ensure the DVA-COS adopts a care-first approach and to mitigate any unintended consequences

Work Package 1.   

Foundations UK: 2025. 126p.



Bridging the Immigration Detention Justice Gap

By Jaclyn Kelley-Widmer and  Alisa Whitfield

Immigrants held in United States detention centers experience a de facto denial of their right to access to counsel. The 38,000 immigrants detained each day are largely held in remote facilities, where they experience extremely poor—often abusive—conditions; the inability to contact counsel or prepare their cases; and a legal framework that is stacked against them. Many scholars have studied the overlapping challenges detained immigrants face in a hostile regime and have proposed solutions ranging from ending immigration prison to providing universal representation for all those detained to revising legal rationales for detention. These ideas are good ones. However, as we work towards such goals, tens of thousands remain detained with little recourse. As a partial way to bridge that gap, we argue for a transformative, collaborative model of access to justice that focuses on community empowerment and combines the work of organizers, attorneys, and law students in clinics.

 This article uniquely blends both theory and practical perspectives to advance a theory of abolition-minded provision of legal services in detention. First, we explore the legal right of access to counsel for detained immigrants, with an overview of Constitutional and international human rights models. We then examine the severe barriers to this counsel that immigration detention creates. We then use theories of abolition and legal pedagogy to explore an innovative and critical model for expanding justice in immigration detention. We propose primary goals of increasing access to counsel, empowering communities, and supporting organizing to work towards the end of immigration detention.

 This article was inspired by our experiences representing detained immigrants in a clinical setting, with law students, and in coalition with agencies and organizers working on the ground. Through examples, stories, and even photographs, we weave in insights from this ongoing collaborative project to advance a framework for bridging the immigration detention justice gap.

Cornell Legal Studies Research Paper 25-18, 2024


From Border-Based to Status-Based Mandatory Detention

Boston College Law School Legal Studies Research Paper No. 65653 Fordham Urb. L. J. ___ (forthcoming 2026)44 Pages Posted: 16 Aug 2025 Last revised: 9 Sep 2025

By Mary Holper

The United States once authorized only border-based mandatory detention. However, immigration detention is now like an enormous fortress that has grown two mandatory detention turrets: status-based mandatory detention and crime-based mandatory detention. Status-based mandatory detention sees its only doctrinal foundations in the detention of those physically standing at the border. Yet, it has grown to reach both physically and temporally beyond those stopped at the border. Status-based mandatory detention first grew to include those stopped within 100 miles of a land border and under fourteen days in the U.S., whom immigration enforcement agents placed in expedited removal. Then, status-based mandatory detention grew further to include those stopped anywhere in the U.S. and under two years in the U.S., whom immigration enforcement agents placed in expedited removal. Most recently, status-based mandatory detention has grown to include persons who entered the U.S. at any time and whom immigration enforcement agents never placed in expedited removal. 
This article documents each of the blocks that have been placed in the massively-growing turret of status-based mandatory detention, and analyzes the strength of each block to hold up the turret. The article argues that broad status-based detention is inconsistent with the intent of Congress in passing what traditionally has been border-based mandatory detention. Under principles of statutory interpretation, this excessively large status-based mandatory detention turret cannot hold up.

Boston College Law School Legal Studies Research Paper No. 656, 53, 2025 Fordham Urb. L. J. ___ (forthcoming 2026)

Garbage in garbage out? Impacts of data quality on criminal network intervention

By Wang Ngai YeungRiccardo Di Clemente & Renaud Lambiotte

Criminal networks such as human trafficking rings are threats to the rule of law, democracy and public safety in our global society. Network science provides invaluable tools to identify key players and design interventions for Law Enforcement Agencies (LEAs), e.g., to dismantle their organisation. However, poor data quality and the robustness of criminal networks make effective intervention extremely challenging. Although there exists a large body of work building and applying network scientific tools to green intervene criminal networks, these work often neglect the problems of data incompleteness and inaccuracy. Moreover, there is thus far no comprehensive understanding of the impacts of data quality on the downstream effectiveness of interventions. This work investigates the relationship between data quality and intervention effectiveness based on classical graph theoretic and machine learning-based targeting approaches. Decentralization emerges as a major factor in network robustness, particularly under conditions of incomplete data, which renders intervention strategies largely ineffective. Moreover, the robustness of centralized networks can be boosted using simple heuristics, making targeted intervention more infeasible. Consequently, we advocate for a more cautious application of network science in disrupting criminal networks, the continuous development of an interoperable intelligence ecosystem, and the creation of novel network inference techniques to address data quality challenges.

 EPJ Data Sci. 14, 37 (2025)

THE BUSINESS OF EXPLOITATION:  THE ECONOMICS OF CYBER SCAM OPERATIONS IN SOUTHEAST ASIA

By Kristina Amerhauser | Audrey Thill 

  Cyber scam operations in Southeast Asia rely heavily on information and communications technology, financial fraud, trafficking for forced criminality, corruption and elite capture. This creates what can be described as ‘compound crimes’, reflecting how cyber scam operations are both based in physical compounds and involve multiple criminal markets. While estimates vary, the scale of funds defrauded from scam victims each year is in the tens of billions of US dollars and trending upward. In addition, illicit proceeds are generated from exploitation of trafficked persons, illegal gambling and corruption. The scale of illicit financial flows represents a clear threat to national economies, governance and international security. Cyber scam operations and their enabling networks operate at scale across Southeast Asia and beyond. They have reportedly trapped hundreds of thousands of people inside compounds where they are forced to conduct scams. Some operations retain workers through debt bondage, psychological coercion and financial incentives. Significant diversity in operational models – from high-security compounds to thousands of smaller operations located in apartments and other small premises – creates varied patterns of financial flows across jurisdictions. The money laundering process is part of a sophisticated financial service ecosystem. Most concerning is how networks of actors operate at scale and at the intersection of legitimate and illegitimate economies by using licensed crypto exchanges, registered fintech platforms and traditional banking services. Some are ‘crime as a service’ providers, explicitly providing money laundering services to cyber scam operations and doing so with corporate efficiency. This means that moving and laundering money has evolved into a marketplace-type structure where actors remain anonymous to others within the network. Governments, the private sector and civil society actors have sought innovative responses to disrupt the illicit industry. These include initiatives that ‘follow the money’ and disrupt the money laundering networks used by cyber scam operations. While some work has begun to explore illicit financial flows stemming from scam operations, notably related to cryptocurrencies, important gaps persist. Less is known about the wider set of financial flows, the mechanisms used to transfer proceeds in and out of the region and the networks involved. This policy brief seeks to help fill this gap by mapping wider related payments and providing insights into how money is moved and where it ultimately ends up. It concludes by providing actionable policy recommendations for Southeast Asian governments as well as regional and global financial service providers. Crucially, these recommendations identify entry points for disrupting the operations of the transnational organized crime groups that run cyber scam operations. The key findings include: Actors involved in cyber scams and trafficking for forced criminality often use cryptocurrency to move illicit money. They also use cash, fintech – such as peer-to-peer (P2P) payment apps – gaming or gambling platforms, bank transfers, shell and front companies, credit cards and pre-paid cards. The role of the formal banking sector in these financial flows appears significant, as many scam-related transfers are initiated by the victim from their own bank accounts before being converted into cryptocurrencies at different steps of the laundering process. While most financial institutions likely process these transactions unwittingly, evidence suggests they may be enabled by regulatory loopholes such as weak know-your-customer (KYC) requirements and/or excessively high minimum thresholds for reporting suspicious transactions. After being laundered and converted back into fiat currency4 from cryptocurrency, illicit funds are also likely to be moved again through the formal financial system.

Many of the fintech and cryptocurrency platforms that money laundering networks use to convert cryptocurrencies back into fiat are registered companies and hold financial service licences. Some owners of these platforms have close connections to the political and business elites in the countries of registration, suggesting influence over financial regulation and an interest in maintaining a policy environment amenable to the large-scale laundering of criminal proceeds. Transnational organized crime groups in Southeast Asia generate highly lucrative profits. This creates a vicious cycle: greater profits enable these groups to expand their influence, including over public officials and the financial sector, which in turn reduces scrutiny of cyber scam compounds and related suspicious financial transactions. With their growing wealth, these criminal networks invest further into other types of crime and crime-as-a-service infrastructure, generating additional profits that allow them to strengthen their influence and market position   
Geneva: Global Initiative Against Transnational Organized Crime. 2025. 44p.

Cybersecurity: Network Monitoring Program Needs Further Guidance and Actions

By Jennifer Franks

The Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) program gives agencies cybersecurity tools to strengthen the networks and systems they use to meet their missions.While the program has met two of its goals, it lacks sufficient guidance for managing network security and data protection. The program generally supports government-wide cybersecurity initiatives, but DHS's Cybersecurity and Infrastructure Security Agency hasn't finalized all plans for how CDM can provide support. For example, the agency hasn't fully updated the program's cloud asset management guidance.

We recommended DHS address these issues

Washington, DC: U.S. Government Accountability Office, 2025. 46p.

Artificial Intelligence, Cybersecurity, and National Security:

By Richard Danzig

In this paper, the author warns national security decisionmakers that to accomplish their missions they urgently need to better prepare for the impact of artificial intelligence (AI) on cybersecurity. He analyzes the present failings of the U.S. government in this respect, highlights the consequences of these failings, and makes recommendations for correcting them. He offers this effort as a case study and draws from it ten propositions relevant to those who are more broadly concerned with how AI, other technologies, and human decisions are intertwined and co-evolving.

Santa Monica, CA: RAND, 2025.

Cybercrime and strain theory: An examination of online crime and gender.

By Katalin Parti, Thomas Dearden

Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females.

Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months.

Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men.

Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.

International Journal of Criminology and Sociology13, 211–226

 Cybercrime against senior citizens: exploring ageism, ideal victimhood, and the pivotal role of socioeconomics

By Suleman Lazarus  · Peter Tickner  · Michael R. McGuire1

 We discuss cybercrimes against senior citizens from three standpoints: (a) online fraudsters often target senior citizens because of their age, which results in the propagation of ageism. Thus, we explicitly defne ageism in the context of cybercrime, characterising it as the intentional targeting or prioritisation of senior citizens as potential victims of online fraud. (b) Senior citizens are vulnerable to online fraud schemes for physiological (e.g., cognitive decline), psychological (e.g., elevated fear of cybercrime), familial (e.g., insider fraud), and sociocultural (e.g., isolation) reasons. (c) Cybercrimes against older adults predominantly fall under the socioeconomic category driven by a common fnancial motive. We argue that ageism serves as a weapon used by online offenders to target older adults, whilst the concept of the ideal victim acts as society’s shield in response to these reprehensible actions. This framework invites closer attention to how age-based targeting in cyberspace reproduces broader social, economic, and moral asymmetries.  Future empirical studies are warranted to substantiate these claims beyond the theoretical realm.

Security Journal (2025) 38:42 


Numismatic Forgery

By Charles M. Larson

In "Numismatic Forgery," author Charles M. Larson pulls back the curtain on one of the most secretive and sophisticated threats to the world of coin collecting.1 Far from a simple historical overview, this book serves as a definitive guide to the dark art of the "super-forger," detailing the methods used to deceive even the most seasoned experts.

Larson provides a deep dive into the technical evolution of counterfeiting—from the crude cast copies of the past to the modern, high-precision struck forgeries that haunt the current marketplace. By meticulously explaining the tools of the trade, including centrifugal casting, pressure casting, and the creation of deceptive dies, Larson equips collectors, dealers, and historians with the knowledge necessary to spot the subtle "tells" of a fake.

Key features of this essential numismatic reference include:

  • The Forger's Toolkit: A step-by-step examination of the physical processes used to create counterfeit currency.

  • Detection Techniques: Practical advice on identifying "transfer marks," edge filing, and suspicious luster.

  • Case Studies: Real-world examples of famous forgeries that have infiltrated major collections.

  • The Ethics of the Hobby: A sobering look at how forgery undermines the historical integrity of numismatics.

Whether you are a casual hobbyist or a professional dealer protecting a million-dollar inventory, "Numismatic Forgery"is an indispensable resource for anyone who wants to ensure that the history they hold in their hands is the real deal.

Policy Thoughts on Bounded Rationality of Identity Thieves

By Graeme R. Newman

This essay critiques a study by Copes and Vieraitis regarding the "bounded rationality" of identity thieves, arguing that a focus on offender psychology and rationalizations is insufficient for developing effective crime reduction policies[cite: ]Newman contends that current criminal justice approaches rely too heavily on punishment and victim vindication, which, while politically satisfying, fail to reduce the prevalence of identity theft.

The author advances the following arguments regarding the development of effective policy:

* Policies based on the "deep psychology" of offenders or their denial of victims are largely fruitless because these rationalizations are often unconscious defense mechanisms. Instead of asking “why” offenders commit crimes, policy should focus on “how” they are accomplished.

* Newman distinguishes between crime mitigation (reducing damage to victims) and crime prevention (reducing the number of crimes)[cite:. While legislation and credit reporting agencies have improved mitigation efforts for victims, these measures do not address the root causes of the crime.

* Effective prevention must target the technological and business arrangements that create opportunities for theft. This involves shifting focus from the offender to the "significant players" (businesses) who can implement standard security procedures, such as the use of PINs for credit cards, to harden targets.

* The essay concludes that businesses often view fraud merely as a cost of doing business rather than a crime to be prevented[cite:. Therefore, the government must establish policies that compel businesses to accept responsibility for crime reduction and eliminate the opportunities they create through their products and services[cite.

Criminology and Public Policy Vol. 8. Issue 2.

Abnormal Man : Volume 1 --Digest of Literature

By Arthur MacDonald. Introduction by Graeme R. Newman

What does it mean to be “abnormal”? Who decides? And how have these judgments shaped modern science, education, and criminal justice?

First published in 1893, Arthur MacDonald’s Abnormal Man is one of the earliest American attempts to systematically study human difference through the emerging tools of psychology, anthropology, and criminology. Drawing on international research—from European criminal anthropology to American child-study movements—MacDonald sought to classify the physical, mental, and moral traits considered “aberrant” in his era. His work reflects the hopes and anxieties of a society confronting rapid industrialization, immigration, social change, and new scientific approaches to crime and mental health.

To the modern reader, Abnormal Man reveals both the ambition and the pitfalls of nineteenth-century science. Its pages contain pioneering observations about child development, deviance, and social responsibility, alongside early theories—now discredited—about heredity, physiognomy, and race. What emerges is a vivid and sometimes unsettling portrait of a culture striving to understand human variation without the benefit of modern psychology or ethical safeguards.

This new Read-Me.org edition presents Abnormal Man as both a historical artifact and a gateway to critical reflection. It illustrates how scientific thought evolves, how cultural bias can shape research, and how early debates about abnormality laid the groundwork for contemporary approaches to mental health, special education, criminology, and social policy.

A foundational text at the crossroads of science and society, Abnormal Man invites readers to explore the origins of modern debates about deviance, diversity, and the boundaries of the “normal.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. p.193.

Larceny in the Product Market: A Hidden Tax?

By Osborne Jackson and Thu Tran

The “hidden tax” resulting from larceny crime refers to the higher prices paid by consumers to producers who raise prices in order to pass on some of the associated cost of such theft. In the same vein, consumers who are victimized by larceny theft could pass along some of the associated cost that they bear by spending less. This study analyzes larceny crime as a hidden tax in order to examine its welfare implications. Using traditional tax theory, the authors first characterize how larceny crime might create distortions in a given product market. Employing a sample covering 17 US states during the 2000–2015 period, they then use the enactment of higher felony larceny thresholds to generate exogenous variation in larceny crime by product market. A felony larceny threshold is the dollar value of stolen property at or above which a larceny offense may be charged in court as a felony rather than a misdemeanor. Focusing on the subset of larceny crime that is likely most affected by raising the larceny threshold, the authors calculate baseline hidden tax rates and then examine how changes in larceny rates related to higher thresholds affect this tax. They use these estimated changes in the hidden tax rates to compare the associated welfare costs of larceny crime across product markets.''

Boston: Federal Reserve Bank of Boston, Research Department. 2020, 33

Community Criminology: Fundamentals of Spatial and Temporal Scaling, Ecological Indicators, and Selectivity Bias

By Ralph B. Taylor

For close to a century, the field of community criminology has examined the causes and consequences of community crime and delinquency rates. Nevertheless, there is still a lot we do not know about the dynamics behind these connections. In this book, Ralph Taylor argues that obstacles to deepening our understanding of community/crime links arise in part because most scholars have overlooked four fundamental concerns: how conceptual frames depend on the geographic units and/or temporal units used; how to establish the meaning of theoretically central ecological empirical indicators; and how to think about the causes and consequences of non-random selection dynamics. The volume organizes these four conceptual challenges using a common meta-analytic framework. The framework pinpoints critical features of and gaps in current theories about communities and crime, connects these concerns to current debates in both criminology and the philosophy of social science, and sketches the types of theory testing needed in the future if we are to grow our understanding of the causes and consequences of community crime rates. Taylor explains that a common meta-theoretical frame provides a grammar for thinking critically about current theories and simultaneously allows presenting these four topics and their connections in a unified manner. The volume provides an orientation to current and past scholarship in this area by describing three distinct but related community crime sequences involving delinquents, adult offenders, and victims. These sequences highlight community justice dynamics thereby raising questions about frequently used crime indicators in this area of research. A groundbreaking work melding past scholarly practices in criminology with the field’s current needs, Community Criminology is an essential work for criminologists.

New York; London: New York University Press, 2015. 336p.

Projecting Illinois Crime Rates and the Impact of Further Prison Population Reductions

By James Austin, Todd Clear, and Richard Rosenfeld

Illinois is one of several states considering how to reduce its prison population amid the pandemic and calls for an end to mass incarceration. In recent years, the state has taken steps to reduce its prison population through judicial discretion, bail reform, and diversion programs. As Illinois’ prison population declines and policymakers, prosecutors, and courts consider alternatives to incarceration, what is the risk to public safety? Is crime likely to increase or decline in the state as those convicted of crimes are released or diverted to other programs? In this study, funded by The Harry Frank Guggenheim Foundation, the authors conclude that Illinois crime rates, which have been on the decline since the 1990s, will continue to decline in a fluctuating pattern, with moderate year-to-year changes. This will be true even if Illinois reduces its prison population by an additional 25% over five years. The authors reached this conclusion by constructing a quantitative model that accounts for Illinois crime trends over nearly four decades and provides a basis for predicting crime rates in the near future. This study is a companion to the 2020 Harry Frank Guggenheim Foundation report Explaining the Past and Projecting Future Crime Rates, which examined national crime trends and reached similar conclusions about crime rates in the near future.   

New York: Harry Frank Guggenheim Foundation. 2020, 23pg

Projecting Florida Crime Rates and the Impact of Prison Population Reductions

By James Austin, Richard Rosenfeld and Todd Clear

Florida has benefited from the national drop in crime that began in the early 1990s. Its growth in incarceration also paralleled the steady national imprisonment rise of the last forty-five years. Florida’s rate peaked around 2010 and has been declining ever since. Policy makers would benefit from defensible projections of future trends in crime, and especially from estimates of the effect that further reductions in the number of people in jail and prison might have on those trends. The authors of this study developed quantitative models—explained here in non-technical language—of the effects of various demographic and economic factors, as well as the imprisonment rate, on Florida’s past crime rates. They then used these models to project crime trends into the 2020s, both with and without the assumption of a substantial reduction in imprisonment.

New York: Harry Frank Guggenheim Foundation. 2021, 28pg