Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Crime Analysis
Guns, Lawyers, and Markets: On Economic and Political Consequences of Costly Conflict

By Stergios Skaperdas and Samarth Vaidya

We synthesize research on conflict as a fundamental economic phenomenon, arguing that the implications of the ”dark side of self-interest” have received insufficient attention in economics. We define conflict as interactions where parties choose costly inputs that are adversarially combined against one another — distinct from the collaborative input combinations typical in economic models. We make four key contributions: First, we demonstrate that conflict induces economically significant costs comparable to or exceeding traditional deadweight losses. Second, we explain how these costs vary across contexts based on property rights protection, state capacity, and cultural norms. Third, we show how incorporating conflict into economic models leads to substantially different predictions than traditional models — including inverse relationships between compensation and productivity; distortions in comparative advantage; prices determined by power rather than solely by preferences endowments, and technology. Fourth, attributes of modern states such as centralization in the presence of law, checks and balances, other forms of distributed power, and the bureaucratic form of organization can partly be thought of as restraining conflict and appropriation, with implications for governance and economic development. Overall, in the presence of conflict and appropriation, power considerations cannot be separated from economics and first-best models are not empirically plausible.

 CESifo Working Paper No. 12135, 2025

Cybercrime and strain theory: An examination of online crime and gender.

By Katalin Parti, Thomas Dearden

Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females.

Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months.

Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men.

Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.

International Journal of Criminology and Sociology13, 211–226

Cybercrime Classification and Measurement

By Hal S. Stern and Daniel L. Cork, Editors

Cybercrime poses serious threats and financial costs to individuals and businesses in the United States and worldwide. Reports of data breaches and ransomware attacks on governments and businesses have become common, as have incidents against individuals (e.g., identity theft, online stalking, and harassment). Concern over cybercrime has increased as the internet has become a ubiquitous part of modern life. However, comprehensive, consistent, and reliable data and metrics on cybercrime still do not exist - a consequence of a shortage of vital information resulting from the decentralized nature of relevant data collection at the national level.

Cybercrime Classification and Measurement addresses the absence credible cybercrime data and metrics. This report provides a taxonomy for the Federal Bureau of Investigation for the purpose of measuring different types of cybercrime, including both cyber-enabled and cyber-dependent crimes faced by individuals and businesses, and considers the needs for its periodic revision. This report was mandated by the 2022 Better Cybercrime Metrics Act (BCMA).

Washington, DC: The National Academies Press., 2025. 160p.

Extended editorial: preventing fraud and cybercrime in an ageing society

By Mark Button  · Vasileios Karagiannopoulos  · Julak Lee  · Joon Bae Suh  · Jeyong Jung

Introduction The nature of crime has been changing globally with technological and other societal developments fuelling a growth in fraud and cybercrime (Button and Cross 2017). The diversity and rapid evolution of a broad range of scams has led to millions across the globe becoming victims of fraud (Federal Trade Commission 2019; ONS 2023a, 2023b). A common belief often promoted in policy circles and some research is that older adults are more vulnerable to fraud (James et al. 2014). This is not so clear cut, however, as in terms of victimisation, the middle aged have been most at risk (see Fig. 1 later). This is changing and there is evidence older adults (65+) are fast becoming the one of the most at risk categories and that they also tend to lose much more than other age groups (see Table 1 later). Indeed, there are a variety of trends fuelling a potential explosion in fraud and cybercrime among older adults unless serious action is taken to reduce the risks that we will shortly explore. It is for this reason we conceived this special edition and the research project that underpins it. To set the context for this edition, it is important to examine the factors fuelling the growth in fraud and cybercrime victimisation among older age groups. We will do this using data from the UK and South Korea. The reason for the selection of these countries is simple. The funding for the project stimulating this edition came from ESRC funding aimed at developing relationships with these two countries 

  Security Journal (2025) 38:40

Cyber‑enabled imposter scams against older adults in the United States

By Lauren R. Shapiro 

This paper evaluated three cyber-enabled imposter scams against older adults using Lifestyle Routine Activity Theory. The frst section examined the motivated ofender’s tools for manipulating older adult targets (social engineering and persuasion) and explained how Artifcial Intelligence could increase exposure and susceptibility of imposter victims. The next section focused on the suitable victim by examining how heuristics and impaired cognitive, physical, and psychosocial abilities contributed to the older adult target’s susceptibility to imposter scam by interfering with the process of rational decision-making. The third section examined ways in which capable guardians, in the form of agencies and laws, protected and helped older adult targets from imposter scams. Recommendations regarding the creation of educational programs that teach older adults how to be safer online (i.e., less suitable victims) through evaluating risks, identifying potential imposter scams, and becoming efcient self-advocators were provided.   

  Security Journal (2025) 38:43

The wisdom of the scammed: redefning older fraud victim support by utilizing the ecological systems framework

By Katalin Parti  · Faika Tahir  · Pamela B. Teaster 

Cyber victimization targeting vulnerable populations, particularly older adults, has become increasingly prevalent in the digital age. Grounded in the Bioecological Systems Framework (Bronfenbrenner in The ecology of human development: Experiments by nature and design, Harvard University Press, Cambridge, 1979), this research explores the factors contributing to victimization, including the ease of exploitation, the situational factors setting up victims for scams, their vulnerabilities, the dynamics within their environments, and the challenges victims face in recognizing scams. Using semi-structured interviews, we asked scam victims (n=19) aged 60 years and above about their personal and structural circumstances as well as their individual assessment of the impact of their being victimized. Despite high levels of education and computer literacy among our sample, their victimization occurred far too frequently, which prompts a call for the revision of existing approaches toward helping older adults overcome scam victimization.  

  Security Journal (2025) 38:49

Measuring cybercrime in Europe

By Marcelo F. Aebi Stefano Caneppele Lorena Molnar (Eds.)

  Cybercrime has become part of everyday life. We live in hybrid societies, fl uctuating between the material and the virtual world, and we are hence confronted with online, offl ine and hybrid offences. However, the few victimisation surveys conducted in Europe reveal that victims of online crimes seldom report them to the police. Consequently, cybercrimes – which according to the best estimates represent between one third and more than half of all attempted and completed crimes in Europe – seldom appear in national criminal statistics. The State seems powerless to prevent them and private security companies fl ourish. During two days, experts from all over the continent gathered together in the framework of a virtual conference organized by the Council of Europe and the European Union to discuss what we know, what we do not know, and what we could do to improve our knowledge of crime in our contemporary hybrid societies, develop evidence-based criminal policies, provide assistance to crime victims, and implement realistic programs in the fi eld of crime prevention and offender treatment. This book presents their experiences, refl exions, and proposals  

The Hague: Eleven Publishing, 2022. 150p.  

Policy Thoughts on Bounded Rationality of Identity Thieves

By Graeme R. Newman

This essay critiques a study by Copes and Vieraitis regarding the "bounded rationality" of identity thieves, arguing that a focus on offender psychology and rationalizations is insufficient for developing effective crime reduction policies[cite: ]Newman contends that current criminal justice approaches rely too heavily on punishment and victim vindication, which, while politically satisfying, fail to reduce the prevalence of identity theft.

The author advances the following arguments regarding the development of effective policy:

* Policies based on the "deep psychology" of offenders or their denial of victims are largely fruitless because these rationalizations are often unconscious defense mechanisms. Instead of asking “why” offenders commit crimes, policy should focus on “how” they are accomplished.

* Newman distinguishes between crime mitigation (reducing damage to victims) and crime prevention (reducing the number of crimes)[cite:. While legislation and credit reporting agencies have improved mitigation efforts for victims, these measures do not address the root causes of the crime.

* Effective prevention must target the technological and business arrangements that create opportunities for theft. This involves shifting focus from the offender to the "significant players" (businesses) who can implement standard security procedures, such as the use of PINs for credit cards, to harden targets.

* The essay concludes that businesses often view fraud merely as a cost of doing business rather than a crime to be prevented[cite:. Therefore, the government must establish policies that compel businesses to accept responsibility for crime reduction and eliminate the opportunities they create through their products and services[cite.

Criminology and Public Policy Vol. 8. Issue 2.

Classical Deception: Counterfeits, Forgeries and Reproductions of Ancient Coins

Wayne G. Sayles:


Classical Deception is a detailed and accessible exploration of the long history of counterfeit ancient coins and the methods by which they are produced, detected, and sometimes unwittingly circulated within the numismatic world. Designed for collectors, students of antiquity, and museum professionals alike, the book traces forgery practices from antiquity to the modern era, showing that imitations have accompanied genuine coinage for as long as coins have existed. Sayles examines a spectrum of deceptions — from ancient contemporary counterfeits meant to pass in daily commerce, to the sophisticated modern forgeries that challenge even seasoned experts.

A substantial portion of the book profiles well-known forgers, documenting their techniques, motives, and the specific pieces they produced. Sayles pays particular attention to the prolific work of modern reproduction artists, including Peter Rosa, whose replicas are widely encountered and often misunderstood by beginning collectors. More than 200 photographs allow readers to visually compare authentic coins with their deceptive counterparts, highlighting telltale markers in style, fabric, metallurgy, and die workmanship.

Sayles also introduces the scientific and observational tools available to detect fakes — from simple weight measurement and magnified study of surfaces to metallurgical testing, microscopy, and imaging technologies. Throughout, he emphasizes practical guidance: what warning signs to look for, how to assess provenance, and how to avoid costly errors in the marketplace.

Ultimately, Classical Deception serves both as a cautionary manual and as a historical study of ingenuity, fraud, and craftsmanship. It equips the reader to navigate the hazards of collecting while deepening appreciation for the authentic artistry of ancient coinage.

Perspectives on Identity Theft

By Megan M. McNally and Graeme R. Newman

From the cover: There has been a glaring lack of scholarly attention to the crime of identity theft, according to the editors. The chapters in this volume attempt to fill some of this gap by exploring theory and research on identity theft, as well as situational measures to prevent its occurrence.

The editors' introduction outlines several key issues related to the definition, extent and commission of identity theft. The chapter by Graeme Newman applies the opportunity perspective to the study of identity theft. Megan

McNally uses the "script" approach to examine the meaning and mechanics of identity theft in all of its forms. Henry Pontell, Gregory Brown and Anastasia Tosouni present new findings on how identity theft affects victims, based on data collected by the Identity Theft Resource Center. Heith Copes and Lynne Vieraitis describe how a sample of identity theft offenders viewed their crimes. Michael Levi recounts the evolution of identity fraud and its control in the U.K. Russell Smith presents a framework for evaluating preventive measures, particularly document-based systems, biometric technologies and identity cards. Sara Berg considers how information technology can be used within a situational crime prevention framework to fight identity theft. Robert Willison examines the use of situational crime prevention to protect sensitive personal information in the context of information systems security.

Crime Prevention Studies, volume 23. Willan Publishing. Culmcott House, Uffculme, Cullompton Devon EX 15 3AT, U.K. 2008. 195p.

Criminal Justice: A Multidisciplinary Bibliography

By Florence Yosne. National Criminal Justice Educational Development Project Portland State University And Center Of Criminal Justice Arizona State University.

From the Introduction: This bibliography is the result of a cooperative effort between Portland State University and Arizona State University. It was developed in response to a need for a comprehensive and detailed multi-disciplinary compilation of available books and government documents that relate to the emerging field of Criminal Justice. Professional journals and magazine sources were not included due to person power constraints and the recognition that many of the more significant articles and statements relating to Criminal Justice can be found contained in recently-published books.

The bibliography is broken down into four general substantive areas: (1) criminal justice; (2) law enforcement; (3) corrections;  and (4) courts. The majority of the works are included under the heading "Criminal Justice." In this area, titles are included from such diverse fields as anthropology, economics, education, history, law, political science, psychology, the physical sciences, public administration, and sociology. The other three areas--"Law, Enforcement, " "Corrections, " and "Courts"--while more specific in nature, also reflect the use of information and research from many related and diverse sources.

Clearly, the specific subjects appearing within these four broad rubrics are varied and numerous. In order to facilitate the use of this bibliography, the four broad areas were further broken down into specific subjects such as "civil liberties, " "victimless crimes, " etc., with bibliography entries relating to those topics being identified. The detailed classification of bibliography entries appears at the end of this "Introduction."

It will be readily apparent to the user that the bibliography is multi-disciplinary in nature. This reflects the editor's view that Criminal Justice is a multi-disciplinary, problem-oriented field of scholarship, research, and teaching, embracing those aspects of the social, behavioral, natural, and medical sciences relating to understanding crime and social deviance and entailing a critical examination of the system which has evolved for the handling of attendant problems. The selection of authors, titles, and subjects reflects the need of Criminal Justice, as an emerging field of study, to be sensitive to the ideas and philosophies of a wide range of scholar sand researchers. A bibliography with a narrow focus is of organization and functioning of an entire society.

The sources for the bibliography were legion, and they also reflect the multi-disciplinary approach. Bibliographies from the faculty at Portland State University, Florida Slate University, Michigan State University, San Jose State University, and the University of California at Berkeley, in addition to the Index of Books in Print, catalogs from the National Criminal Justice Reference Service, lists from publishers, and reviews from the New York Review of Books, Psychology Today, and the Atlantic Monthly, provided the editor with the reference material necessary for so vast an undertaking.

 MEMBERS NATIONAL CRIMINAL JUSTICE EDUCATIONAL CONSORTIUM. 1975. 418p.

A Primer in Private Security: Revived edition

By Mahesh Nalla and Graeme Newman

When the first edition of A Primer in Private Security was published, its principal purpose was to demonstrate that private policing was not a mere auxiliary to public law enforcement but a robust and rapidly growing institution with its own organizational forms, priorities, and traditions. At that time, the Hallcrest Report had just confirmed that private security personnel outnumbered public police officers in the United States, a landmark finding that set the tone for debates about the privatization of policing .

Nearly four decades later, the central argument remains as relevant as ever, but the field itself has changed dramatically. Private security is now not only a supplement to public policing but a global, technologically sophisticated industry involved in nearly every sector of modern life. While we think that the original book still remains relevant to security today, we suggest in this preface that the reader approach the content from the point of view of four major perspectives that dominate security  (the word “private” seems old fashioned and less appropriate given that what is public and what is private have become incredibly and interwoven largely as a result of media, especially social media). 

The four perspectives are:

1.     the domestic sphere of home and family,

2.     the economic sphere of business,

3.     the public sphere of local and state government, and

4.     the international sphere of global security and climate-related risk.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 183p.

Persistent Criminals: A Home Office Research Unit Report

By W. H. Hammond & Edna Chayen

Study Focus: The document examines persistent offenders liable to preventive detention in 1956, analyzing their criminal characteristics and the effectiveness of preventive detention.

Preventive Detention: It highlights the ineffectiveness of preventive detention in reducing crime among persistent offenders, noting that only a small proportion are diverted from crime.

Comparison: The study compares these offenders with those from a previous study byProfessor Norval Morris, finding similar characteristics over a 20-year period.

Recommendations: Suggestions are made for improving the selection and treatment of offenders to better protect society and rehabilitate criminals.

London, Her Majesty’s Stationery Office, 1963, 237 pages

Criminals and Their Scientists

May Contain Markup

Edited by Peter Becker & Richard F. Wetzell

Historical Scope: The book covers the history of criminology from the late 18th to mid-20th centuries across various countries, includingWestern Europe, the United States, Argentina, Australia, andJapan.

Criminological Discourse: It examines criminology as a discourse and practice, involving police, courts, parliamentary debates, media reports,and writings of statisticians, jurists, and medical doctors..

Cesare Lombroso's Influence: The book provides a comparative study of the worldwide reception of Lombroso's criminal-anthropological ideas and their impact on criminological discourse.

Interdisciplinary Approach: The chapters highlight the relationship between criminological discourse and politics, society, and culture,integrating perspectives from history, sociology, and medical science.

Cambridge University Press, 2006, 492 pages

Criminal record and employability in Ghana: A vignette experimental study

ByThomas D. Akoensi, Justice Tankebe

Using an experimental vignette design, the study inves-tigates the effects of criminal records on the hiring deci-sions of a convenience sample of 221 human resource(HR) managers in Ghana. The HR managers were ran-domly assigned to read one of four vignettes depicting job seekers of different genders and criminal records:male with and without criminal record, female with and without criminal record. The evidence shows that a criminal record reduces employment opportunities for female offenders but not for their male counter-parts. Additionally, HR managers are willing to offer interviews to job applicants, irrespective of their crim-inal records, if they expect other managers to hire ex-convicts. The implications of these findings are dis-cussed.

The Howard Journal of Crime and Justice, online first, May 2024

Get a Job: Labor Markets, Economic Opportunity, and Crime

By Robert D. Crutchfield 

Are the unemployed more likely to commit crimes? Does having a job make one less likely to commit a crime? Criminologists have found that individuals who are marginalized from the labor market are more likely to commit crimes, and communities with more members who are marginal to the labor market have higher rates of crime. Yet, as Robert Crutchfield explains, contrary to popular expectations, unemployment has been found to be an inconsistent predictor of either individual criminality or collective crime rates. In Get a Job, Crutchfield offers a carefully nuanced understanding of the links among work, unemployment, and crime.

Crutchfield explains how people’s positioning in the labor market affects their participation in all kinds of crimes, from violent acts to profit-motivated offenses such as theft and drug trafficking. Crutchfield also draws on his first-hand knowledge of growing up in a poor, black neighborhood in Pittsburgh and later working on the streets as a parole officer, enabling him to develop a more complete understanding of how work and crime are related and both contribute to, and are a result of, social inequalities and disadvantage. Well-researched and informative, Get a Job tells a powerful story of one of the most troubling side effects of economic disparities in America.

New York; London: NYU Press, 2014. 303p.

The Impact of Felony Larceny Thresholds on Crime in New England

by Osborne Jackson and Riley Sullivan

Criminal justice reform has been a high-priority policy area in New England and the nation in recent years. States are generally seeking legislation that would help reintegrate ex-offenders into society while still prioritizing the welfare of all members of the public and the achievement of fiscal goals. The research findings presented in this report indicate that raising felony larceny thresholds—that is, increasing the dollar value of stolen property at or above which a larceny offense may be charged in court as a felony rather than a misdemeanor, a policy adopted by three New England states over the last decade—seems to balance these objectives. Policymakers interested in criminal justice reform should consider incorporating felony larceny threshold increases into the suite of policy changes implementing such reform.

When assessing larceny incidents as a whole, this report concludes that enacting higher felony larceny thresholds does not lead to an escalation of crime in the short run. Even upon considering the subset of larceny incidents where escalation is most likely to occur and where analysis is potentially not affected by other concurrent changes in larceny penalties, this report finds only a small, 2 percent short-run increase in the intensity of larceny crime (value of stolen property) and still no increase in the amount of larceny crime (rate of occurrence).

New England Public Policy Center,  Federal Reserve Bank of Boston. 2020, 29pg