Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged opportunity theory
Policy Thoughts on Bounded Rationality of Identity Thieves

By Graeme R. Newman

This essay critiques a study by Copes and Vieraitis regarding the "bounded rationality" of identity thieves, arguing that a focus on offender psychology and rationalizations is insufficient for developing effective crime reduction policies[cite: ]Newman contends that current criminal justice approaches rely too heavily on punishment and victim vindication, which, while politically satisfying, fail to reduce the prevalence of identity theft.

The author advances the following arguments regarding the development of effective policy:

* Policies based on the "deep psychology" of offenders or their denial of victims are largely fruitless because these rationalizations are often unconscious defense mechanisms. Instead of asking “why” offenders commit crimes, policy should focus on “how” they are accomplished.

* Newman distinguishes between crime mitigation (reducing damage to victims) and crime prevention (reducing the number of crimes)[cite:. While legislation and credit reporting agencies have improved mitigation efforts for victims, these measures do not address the root causes of the crime.

* Effective prevention must target the technological and business arrangements that create opportunities for theft. This involves shifting focus from the offender to the "significant players" (businesses) who can implement standard security procedures, such as the use of PINs for credit cards, to harden targets.

* The essay concludes that businesses often view fraud merely as a cost of doing business rather than a crime to be prevented[cite:. Therefore, the government must establish policies that compel businesses to accept responsibility for crime reduction and eliminate the opportunities they create through their products and services[cite.

Criminology and Public Policy Vol. 8. Issue 2.

download
Perspectives on Identity Theft

By Megan M. McNally and Graeme R. Newman

From the cover: There has been a glaring lack of scholarly attention to the crime of identity theft, according to the editors. The chapters in this volume attempt to fill some of this gap by exploring theory and research on identity theft, as well as situational measures to prevent its occurrence.

The editors' introduction outlines several key issues related to the definition, extent and commission of identity theft. The chapter by Graeme Newman applies the opportunity perspective to the study of identity theft. Megan

McNally uses the "script" approach to examine the meaning and mechanics of identity theft in all of its forms. Henry Pontell, Gregory Brown and Anastasia Tosouni present new findings on how identity theft affects victims, based on data collected by the Identity Theft Resource Center. Heith Copes and Lynne Vieraitis describe how a sample of identity theft offenders viewed their crimes. Michael Levi recounts the evolution of identity fraud and its control in the U.K. Russell Smith presents a framework for evaluating preventive measures, particularly document-based systems, biometric technologies and identity cards. Sara Berg considers how information technology can be used within a situational crime prevention framework to fight identity theft. Robert Willison examines the use of situational crime prevention to protect sensitive personal information in the context of information systems security.

Crime Prevention Studies, volume 23. Willan Publishing. Culmcott House, Uffculme, Cullompton Devon EX 15 3AT, U.K. 2008. 195p.

Read
Applying Routine Activity Theory to Crimes Against Vulnerable Adults and the Elderly 

By Robin Joy

Routine Activity Theory, a criminological theory that describes the circumstances in which crime occurs, can be applied to crimes against vulnerable adults and the elderly. Using a variety of data sources this report examines this theory and finds: 1. Vulnerable Adults are more likely to be victimized by someone they know. 2. People charged with violating the Vulnerable Adult statutes have criminal histories that indicate a specialization in criminal activity, compared to those of the general offending population. 3. People charged with violating the Vulnerable Adult statutes are significantly older than the general offending population. 4. Most crimes against the vulnerable and the elderly take place in a private home. 5. The elderly are more likely to be victims of larceny, while the vulnerable adults are more likely to be victims of fraud. Routine Activity Theory can explain the victimization against the vulnerable and elderly. Using this framework, policy makers and stakeholders can begin to create policies and programs that can help keep vulnerable and elderly Vermonters safe.   

Montpelier, VT: Crime Research Group, 2022. 17p.

download