Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged opportunity theory
Superhighway Robbery

By Graeme R. Newman and Ronald V. Clarke

In Superhighway Robbery, Graeme Newman and Ronald Clarke provide a grounded, pragmatic analysis of how the digital revolution didn't necessarily create new types of criminals, but rather provided them with a much more efficient set of tools. They move away from the sensationalized "hacker" myths of the early 2000s to focus on the cold reality of Situational Crime Prevention. The book's central thesis is that the internet acts as a vast infrastructure—a superhighway—that significantly reduces the effort required to commit traditional crimes like theft, fraud, and piracy while increasing the potential rewards and lowering the risk of being caught.

By applying their famous CRAVED model to the digital world, the authors explain that data and software are the ultimate targets because they are easily concealable, removable, and available. They argue that the most effective way to stop cybercrime is not to wait for a change in human nature, but to change the digital environment itself. This involves "designing out" crime by making digital targets harder to reach and less profitable to exploit. Ultimately, Newman and Clarke strip away the mystery of the "Information Age" to reveal that cybercrime is essentially a matter of opportunity, and by closing those digital windows of opportunity, we can make the superhighway a significantly safer place.

In the digital realm, the CRAVED model explains why certain data or media becomes a prime target for "superhighway robbery." Concealability is at an all-time high because digital files take up no physical space and can be hidden in encrypted folders or behind innocuous filenames, making them easy to possess without detection. These files are incredibly Removable because they can be copied or moved across the globe in milliseconds, allowing a thief to "steal" an item while the original remains in place. The Availability of these targets is virtually limitless; once a movie or piece of software is uploaded to a server, it is accessible to anyone with a connection, twenty-four hours a day.

The Value of digital goods remains high because they often represent thousands of hours of professional labor or sensitive personal information that can be sold on the dark web. These items are also highly Enjoyable, as they often consist of popular entertainment, games, or high-end tools that people naturally want to use. Finally, they are perfectly Disposablebecause there is a massive, ready-made market of willing buyers or downloaders, ensuring that a criminal can quickly offload their "loot" for profit or social capital without the logistical headaches of physical fencing.

Cullompton, Devon. UK. Willan. 2003.

download
Policy Thoughts on Bounded Rationality of Identity Thieves

By Graeme R. Newman

This essay critiques a study by Copes and Vieraitis regarding the "bounded rationality" of identity thieves, arguing that a focus on offender psychology and rationalizations is insufficient for developing effective crime reduction policies[cite: ]Newman contends that current criminal justice approaches rely too heavily on punishment and victim vindication, which, while politically satisfying, fail to reduce the prevalence of identity theft.

The author advances the following arguments regarding the development of effective policy:

* Policies based on the "deep psychology" of offenders or their denial of victims are largely fruitless because these rationalizations are often unconscious defense mechanisms. Instead of asking “why” offenders commit crimes, policy should focus on “how” they are accomplished.

* Newman distinguishes between crime mitigation (reducing damage to victims) and crime prevention (reducing the number of crimes)[cite:. While legislation and credit reporting agencies have improved mitigation efforts for victims, these measures do not address the root causes of the crime.

* Effective prevention must target the technological and business arrangements that create opportunities for theft. This involves shifting focus from the offender to the "significant players" (businesses) who can implement standard security procedures, such as the use of PINs for credit cards, to harden targets.

* The essay concludes that businesses often view fraud merely as a cost of doing business rather than a crime to be prevented[cite:. Therefore, the government must establish policies that compel businesses to accept responsibility for crime reduction and eliminate the opportunities they create through their products and services[cite.

Criminology and Public Policy Vol. 8. Issue 2.

download
Perspectives on Identity Theft

By Megan M. McNally and Graeme R. Newman

From the cover: There has been a glaring lack of scholarly attention to the crime of identity theft, according to the editors. The chapters in this volume attempt to fill some of this gap by exploring theory and research on identity theft, as well as situational measures to prevent its occurrence.

The editors' introduction outlines several key issues related to the definition, extent and commission of identity theft. The chapter by Graeme Newman applies the opportunity perspective to the study of identity theft. Megan

McNally uses the "script" approach to examine the meaning and mechanics of identity theft in all of its forms. Henry Pontell, Gregory Brown and Anastasia Tosouni present new findings on how identity theft affects victims, based on data collected by the Identity Theft Resource Center. Heith Copes and Lynne Vieraitis describe how a sample of identity theft offenders viewed their crimes. Michael Levi recounts the evolution of identity fraud and its control in the U.K. Russell Smith presents a framework for evaluating preventive measures, particularly document-based systems, biometric technologies and identity cards. Sara Berg considers how information technology can be used within a situational crime prevention framework to fight identity theft. Robert Willison examines the use of situational crime prevention to protect sensitive personal information in the context of information systems security.

Crime Prevention Studies, volume 23. Willan Publishing. Culmcott House, Uffculme, Cullompton Devon EX 15 3AT, U.K. 2008. 195p.

Read
Applying Routine Activity Theory to Crimes Against Vulnerable Adults and the Elderly 

By Robin Joy

Routine Activity Theory, a criminological theory that describes the circumstances in which crime occurs, can be applied to crimes against vulnerable adults and the elderly. Using a variety of data sources this report examines this theory and finds: 1. Vulnerable Adults are more likely to be victimized by someone they know. 2. People charged with violating the Vulnerable Adult statutes have criminal histories that indicate a specialization in criminal activity, compared to those of the general offending population. 3. People charged with violating the Vulnerable Adult statutes are significantly older than the general offending population. 4. Most crimes against the vulnerable and the elderly take place in a private home. 5. The elderly are more likely to be victims of larceny, while the vulnerable adults are more likely to be victims of fraud. Routine Activity Theory can explain the victimization against the vulnerable and elderly. Using this framework, policy makers and stakeholders can begin to create policies and programs that can help keep vulnerable and elderly Vermonters safe.   

Montpelier, VT: Crime Research Group, 2022. 17p.

download