Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Crime
‘For my safety’: Experiences of Technology-Facilitated Abuse Among Women with Intellectual Disability or Cognitive Disability

By Bridget Harris and Delanie Woodlock

This research explores experiences of technology-facilitated abuse among women living with intellectual or cognitive disability. The findings are based on interviews with women with intellectual or cognitive disability and frontline workers who provide support services.

This research was commissioned to address major gaps in the evidence about technology-facilitated abuse against women with intellectual or cognitive disability.

The report reveals that the tactics used for technology-facilitated abuse of women with intellectual or cognitive disability are like those faced by all women, but there are some unique differences.

Key recommendations:

  • The research participants were eager to learn about safer ways to use technology and would like accessible information to be available, such as visual guides and documents in Easy Read formats.

  • The frontline workers recommended an integrated approach between the domestic and family violence sector, the disability sector and the justice system, to improve service provision.

Canberra; Office of the eSafety Commissioner, 2021. 61p.

download
A Baseline for Online Safety Transparency. The First Regular Report on Child Sexual Exploitation and Abuse, and Sexual Extortion

In 2024, the Office of the eSafety Commissioner gave their first periodic notices on child sexual exploitation and abuse material and activity (CSEA) to eight online service providers: Apple, Discord, Google, Meta, Microsoft, Skype, Snap and WhatsApp.

These providers are required to respond to the questions in eSafety’s notice every six months commencing 15 June 2024 for a total period of 24 months. This report contains a summary of each of the providers' responses and shines a light on online industry action against child sexual exploitation and abuse.

Key findings

  • Despite the availability of technology to help detect child sexual exploitation and abuse livestreaming or video calls, no providers were using it on all parts of their service(s).

  • While most services were using tools to detect new CSEA, some were not.

  • While most services provided user reporting options and stated they responded to user reports in a reasonable amount of time, there were some providers who took much longer.

  • While most providers were using hash-matching on their services (other than end-to-end encrypted services or parts of services) not all services were using this tool.

  • There are tools, such as language analysis tools, that services can use to detect sexual extortion and stop this criminal activity, but not all of them were using these tools and not all tools were calibrated to keep users of all ages safe.

Canberra: Office of the eSafety Commissioner, 2025. 156p.

download
Harm in the Name of Safety. Victorian Family Violence Workers' Experiences of Family Violence Policing

By Peta Malins and Lauren Caulfield

Harm in the Name of Safety is a damning research report into the harms enacted in the course of  family violence policing, released today by the Beyond Survival Project, Flat Out and RMIT University.

The research documents evidence from 225 Victorian frontline workers about their experiences of police responses to family violence. It finds that harmful family violence policing practices are extremely frequent and widespread across the state, and that alternative community-based response pathways for victim-survivors are urgently needed.

The report details extensive examples of police minimising and dismissing family violence, engaging in racially targeted, sexist and discriminatory police practices, colluding with perpetrators in ways that extend violence and abuse, and misidentifying victim-survivors as perpetrators.

Melbourne: Flat Out Inc.2025. 111p.

download
Cybercrime in Australia 2024

By Isabella Voce Anthony Morgan

The Australian Institute of Criminology has released the Cybercrime in Australia 2024 Statistical Report. This latest report outlines the results from the second annual Australian Cybercrime Survey, which is the largest regular survey of the Australian community about different forms of cybercrime and provides important data on cybercrime victimisation, help-seeking and harms among Australian computer users.Nearly half of all respondents to the survey were a victim of at least one type of cybercrime in the 12 months prior to the survey. Twenty-seven percent of respondents had been a victim of online abuse and harassment, 20.6 percent had been a victim of malware, 21.9 percent had been a victim of identity crime and misuse, and 9.5 percent had been a victim of fraud and scams.The prevalence of online abuse and harassment, malware and fraud and scams victimisation was lower among 2024 respondents than in the previous survey. There was also a significant decrease in data breaches. Respondents were less likely in 2024 than in 2023 to say they were using various online safety strategies, and there was little change in the prevalence of high-risk online behaviours. And more victims were negatively impacted by cybercrime, particularly for social and health related harms. The report provides important evidence of the scale and impact of cybercrime on Australian computer users and where to target efforts to help build community resilience to cybercrime. 

 Statistical Report no. 53. Canberra: Australian Institute of Criminology. 2025. 118p

download
Of Color, Crime and Punishment

By John G. Russell

Seventeen investigations in and an undissipated miasma of suspicion continues to envelop Donald J. Trump. And yet, if his defenders are to be believed, the actions which prompted those investigations are neither technically crimes nor even impeachable offenses. Meanwhile, a U.S. district judge has condemned Michael Flynn’s behavior as “treasonous” and Michael Cohen has been sentenced to three years in prison, but their boss remains free to stalk the halls of power unimpeded, as America hurtles from one “constitutional crisis” to another.

January 3, 2019 In articles 2015,Leading Article |, 4p.

download
Crime Prevention through Environmental Design in New South Wales

By Jack Kelly 

The aim of this research is to inform crime prevention and planning policy development by using an institutional perspective to understand why and how local governments in New South Wales have adopted Crime Prevention through Environmental Design (CPTED) principles into their local planning policies. By both reviewing the literature on the effectiveness of CPTED in reducing crime and the current crop of Development Control Plans (DCP) in New South Wales which have incorporated CPTED, the research will reveal that there is limited empirical evidence to support the assertion that CPTED reduces crime, and that local government needs to adopt a more integrated and contextual approach to embedding CPTED into their policies. From this perspective, the inclusion of CPTED principles in local planning is argued to be counterproductive to a more comprehensive and effective response and eventually results in additional time and cost to the decision. This is in the context that assessment decisions are now being made within tighter approval times. It will be argued that the planning system has a stog tede to adopt ookook o uik fies to poles ithout osideig the overall effectiveness of the philosophy.

The University of Sydney, 13/11/2015, 87p.

download
Unveiling Sextortion in Sport: A Global Inquiry into the Nexus of Sexual Violence, Abuse of Power, and Corruption for Enhanced Safeguarding 

By Whitney Bragagnolo, Yanei Lezama

Sextortion, a distinct form of sexual misconduct intersects with both sexual violence and corruption. Within the sphere of sport, marked by inherent power diferentials and hierarchical structures, cases of sexual abuse and corruption persist, with sextortion emerging as a concerning manifestation of these pervasive issues. While sextortion shares commonalities with other forms of sexual abuse, such as harassment and assault, a distinguishing feature lies in how coercion is leveraged through authority or power imbalances. Unlike more overt forms of abuse, sextortion often involves subtle or implicit threats, where compliance is sought in exchange for perceived privileges or opportunities within the sporting environment. Leveraging Institutional Theory and Applied Ethics, this study aims to provide a comprehensive exploration of sextortion in sport. Despite increasing awareness, research on sextortion in sport remains limited. Previous studies lack data specifc to this elusive misconduct, primarily relying on empirical data related to sexual abuse. This study represents the first empirical investigation into sextortion in sport, drawing on data collected from 49 countries and endeavours to quantifiably communicate the scale of sextortion. Through data analysis of over 500 elite athletes, community sport practitioners, and sport industry professionals aged 17 and above, the research sheds light on experiences related to abuses of entrusted power for sexual gain. Results found 20% (n=96) of global respondents experienced sextortion, including 37 minors at the time of the incident, encompassing diverse genders, abilities, and identities. Sextortion was identified across 41 of the 49 surveyed nationalities and within 19 of 26 sport categories from grassroots to elite levels. This research deepens the understanding of sport-related sextortion and underscores the importance of addressing this pervasive issue through further theoretical and empirical inquiry. It emphasises the critical role of good governance, clear safeguarding protocols, increased awareness of power dynamics, consent, and the importance of diverse regional data in effectively combating sextortion in the sporting domain.     

  Crime, Law and Social Change (2025) 83:13  

download
Why They Speak Up (or Don’t): Reasons For and Against Cybergrooming Disclosure Among Adolescent Victims

By Catherine Schittenhelm , .  Christine Weber , Maxime Kops , Sebastian Wachs 

The ubiquitous use of information and communication technologies among adolescents carries the risk of exposure to online victimization during this vulnerable stage of development, including cybergrooming as a form of sexual victimization. Although established in traditional abuse research, studies on disclosure processes in the specific context of cybergrooming victimization are still pending. The present study exploratively investigated reasons for and against disclosure following cybergrooming victimization in the subsample of n = 400 victims (44.1%; Mage = 15.48 years, girls: 57.5%) from N = 908 adolescent participants. Most victims disclosed to someone (86%), with peer disclosure being more frequent (73%) than disclosure to adults (55%). Findings indicated differences of small effect sizes in reasons for and against disclosure depending on the confidant (peers vs. adults; for example, the reporting of similar experiences by others was more relevant in peer disclosure). However, gender had almost no influence on the assessed reasons. In structural equation models, latent factors of reasons against, and intra- and interindividual reasons for disclosure predicted peer and adult disclosure to varying degrees, with reasons against disclosure being the most predictive in both cases. Disclosure to adults could be better explained than disclosure to peers (R2 peers = 28.6%, R2 adults = 46.9%). In open-ended items, participants provided further reasons, which were grouped into categories (e.g., help-seeking, warning/prevention, fear of bullying/social exclusion). Practical implications like the aspired congruence between reasons for disclosure and confidants’ reactions, and limitations such as the neglect of the processual character of disclosure are outlined.  

Youth Adolescence (2025).

download
Reconsidering Common Conceptions Around Sexual Violence in Conflict Contexts Evidence from the NorthWest of Nigeria, the Lake Chad Basin and Colombia

By Anamika Madhuraj, Francesca Batault, and Sofia Rivas 

Sexual violence in conflict settings is often framed in narrow terms—strategically deployed, militarized, and perpetrated by armed actors. Yet, this framing can obscure more complex realities. Drawing on the Managing Exits from Armed Conflict (MEAC) Project’s evidence from the North West of Nigeria, the Lake Chad Basin (LCB), and Colombia, this brief interrogates and expands upon six common assumptions about conflict-related sexual violence (CRSV). It assesses whether these assumptions hold in the settings where MEAC conducts studies, or whether the reality is more nuanced and varied than often understood. In fast-moving humanitarian and policy environments, simplified narratives about CRSV may take hold out of necessity. But when these narratives become entrenched, they risk obscuring survivor experiences and misdirecting support. By critically examining these common conceptions, this brief surfaces key tensions, contradictions, and overlooked dynamics that challenge some dominant understandings of CRSV. Rather than reinforcing a singular narrative, the findings point to the need for more contextualized and survivor-informed responses. Effective prevention and response efforts must grapple with the full complexity of CRSV—the diversity of perpetrators, hidden forms, and lasting consequences—in order to prevent CRSV and meaningfully support those affected. 

Geneva, SWIT: United Nations Institute for Disarmament Research UNIDIR, 2025. 25p.

download
‘We Work in the Grey Around Decision Making’; How ‘Thematic Discretion can Help Understand Police Decision-Making in Cases of Youth Image-Based Sexual Abuse

By Alishya Dhir

In this paper, I argue that a new term, ‘thematic discretion’, can help us understand police decision-making in cases of youth image-basedsexual abuse (YIBSA). YIBSA can be defined as harmful image-sharing practices amongst young people, inclusive of the non-consensual sharing of private sexual images, upskirting and cyberflashing,alongside other actions. I will be drawing on findings from a doctoral research project investigating YIBSA, which utilised a mixed methods approach, comprising of quantitative analysis of freedom of information requests from 40 police forces in England and Wales, as well as 26qualitative interviews with police and non-police practitioners, also based within England and Wales. Research findings established thatYIBSA is highly complicated, and as a result, police officers utilised discretion at a considerable rate, alongside crafting their own guidelines to direct their decision-making, which is argued to be steeped in sexistand victim-blaming narratives

Policing and Society, An International Journal of Research and Policy, Volume 35, 2025 - Issue 2

download
The Illicit Shadows: An Economic Analysis of Trade Gaps in Cultural Goods Through the Italian Market

By Elia Acciai, Michele Belloni, Marina Della Giusta

This paper provides evidence of a consistent gap in the value of cultural goods exported from Italy and the value declared by its trading partners in official trade statistics for the period 1994-2021 and discusses it in the context of the literature on illicit trafficking in cultural property, a phenomenon that plights a number of both developing and developed countries rich in cultural heritage. Differences between the four categories of cultural goods recorded (archaeological goods, antiquities, paintings, and sculptures) are exploited to highlight potential areas where trafficking might be expected to be larger. We construct a panel dataset to estimate a gravity model of the gap including market size, extent of trade, level of corruption and adoption of protective legislation (UNESCO and UNIDROIT) and discuss results indicating further questions to be investigated in this important and to date under researched policy area.

IZA Discussion Paper No. 16282

Bonn: IZA – Institute of Labor Economics . 2023. 18p.

download
The Effects of Exposure to Refugees on Crime

By Rigissa Megalokonomou and Chrysovalantis Vasilakis

Recent political instability in the Middle East has triggered one of the largest influxes of refugees into Europe. The different departure points along the Turkish coast generate exogenous variation in refugee arrivals across Greek islands. We construct a new dataset on the number and nature of crime incidents and arrested offenders at island level using official police records and newspaper reports. Instrumental variables and difference-in-differences are employed to study the causal relationship between immigration and crime. We find that a 1-percentage-point increase in the share of refugees on destination islands increases crime incidents by 1.7-2.5 percentage points compared with neighboring unexposed islands. This is driven by crime incidents committed by refugees; there is no change in crimes committed by natives on those islands. We find a significant rise in property crime, knife attacks, and rape, but no increase in drug crimes. Results based on reported crimes exhibit a similar pattern. Our findings highlight the need for government provision in terms of infrastructure, social benefits, quicker evaluation for asylum, and social security.


IZA DP No. 16502

Bonn:  IZA – Institute of Labor Economics, 2023. 66p.

download
Examining Burglary Scripts in Community-Based Samples

By Matthew T King-Parke, Ross M Bartels, Tochukwu Onwuegbusi

Burglary is a high-volume and frequently repeated offense. However, little is known about the cognitive scripts that may facilitate first-time burglaries. Thus, this paper reports three studies that examined burglary scripts within community participants. Study 1 (N = 113) involved developing two versions of a Burglary Script Assessment; one that assesses burglary scripts with different motivations and one that does not stipulate a specific motivation. Despite having never committed a burglary, many participants were found to hold a burglary script containing expert-like knowledge. Also, more detailed scripts were associated with a proclivity to enact the script. Study 2 (N = 44) examined whether the four motivated scripts correlated with a relevant construct (i.e. burglary-specific distortions, sensation-seeking, anger rumination). Burglary scripts motivated by desperation and thrill were correlated with burglary distortions and sensation-seeking, respectively. Using an experimental design, Study 3 (N = 146) showed that engaging in mental imagery about burglary increased script detail, relative to a no imagery group. However, phenomenological characteristics of the imagery and criminal attitudes were unrelated to script scores. Collectively, the findings offer new insights into burglary scripts, offering implications for understanding the risk of committing burglary. Limitations and suggestions for future research are discussed.


Deviant Behavior Volume 45, 2024 - Issue 11

download
Deepfakes and the Dangers to National Security and Defense

By Benjamin Ang and Muhammad Faizal

AI-generated disinformation in the form of deepfakes, comprising digitally manipulated video, audio, or images, has hit the headlines in Singapore. Cases from around the world demonstrate that AI-generated deepfakes combined with cyberattacks are not only a threat to the integrity of elections and scam victims but are also a threat to national security and defence. COMMENTARY Deepfake videos of Singapore’s political leaders have been circulating since at least last year, when manipulated video and audio impersonating Senior Minister (then Prime Minister) Lee Hsien Loong circulated online, appearing to promote a cryptocurrency scheme in a TV news interview. Similar videos impersonating Prime Minister (then Deputy Prime Minister) Lawrence Wong were also circulated. This year, more deepfake videos of Senior Minister (SM) Lee have been circulating online, this time showing him commenting on international relations. SM Lee described them as having “malicious intent” and was “dangerous and potentially harmful to our national interests”. To deal with this problem of deepfake videos, the Minister for Digital Development and Information, Ms Josephine Teo, is considering ways to regulate it by proposing a labelling scheme for tools and contents and even discussing a temporary ban to counter such videos, which are anticipated ahead of future Singapore general elections. The earlier cases were commercially motivated scams, but the recent ones have severe national security and defence implications. In SM Lee’s case, the deepfake made it look as if he was commenting on foreign policy, and foreigners unfamiliar with him could be misled, thereby sowing distrust. There is evidence that hostile information campaigns are used to weaken national cohesion or disrupt society in the lead-up to hostilities or as part of geopolitical contestation. 

S. Rajaratnam School of International Studies, NTU Singapore , 2024. 4p.

download
Beyond Fraud and Identity Theft: Assessing the Impact of Data Breaches on Individual Victims

By Cassandra Cross, Thomas Holt 

Data breaches, or the unauthorized access of personal information, are increasing globally as are the number of victims affected. Existing studies restrict their focus on fraud and identity theft as principal consequences of data breaches for individuals, limiting our knowledge of the extent of other harms associated with victimisation. This article assesses the impacts of third-party data breaches within a sample of 552 Australian victims. The findings note specific behavioural factors and data losses were associated with emotional, health, relationship, and financial harms. This article advocates recognition of data breach impacts beyond the financial losses of fraud and identity crime, and expanding support offered to victims in response to such incidents.

Journal of Crime and Justice, 1–24

download
Cooperative Banks and Crime: A Provincial-Level Analysis

By Gianluca Cafiso and Marco Ferdinando Martorana

We investigate the extent to which crime, and the inability to effectively suppress it, affect the performance of local banks in terms of credit extension, asset quality, and profitability. The analysis focuses on cooperative banks in Italy, typically small institutions with strong ties to their local communities, over the period 2013–2023. The findings suggest that both crime and judicial inefficiency, even when considered separately and after controlling for banks’ operational efficiency, significantly influence credit extension and the incidence of non-performing loans. While their impact on overall profitability appears limited, non-interest income is significantly reduced.

Working Paper No. 12025, 

Munich:  Munich Society for the Promotion of Economic Research - CESifo GmbH, 2025. 37p.

download
Banking Crime in The Digital Age: Tackling Emerging Challenges

By Manotar Tampubolon

The rapid advancement of technology has significantly changed the banking industry, allowing for quicker transactions, improved customer experiences, and worldwide connectivity. However, this technological progress has also opened the door to complex banking crimes, including cyberattacks, data breaches, and identity theft. This research examines the intricate challenges that come with integrating technology in banking, focusing on how financial institutions manage the delicate balance between innovation and security. Using a multidisciplinary approach, the study incorporates case studies, regulatory frameworks, and technological safeguards to identify vulnerabilities in digital banking systems. It also evaluates the effectiveness of current legal and institutional measures in tackling emerging threats. The findings indicate that while technology-driven solutions can provide potential defenses, shortcomings in cross-border collaboration and adaptive regulation impede effective crime prevention. Recommendations stress the importance of  unified global policies, advanced threat detection systems, and ongoing staff training to address these evolving challenge

International Journal of Social Science and Human Research ISSN (print): 2644-0679, ISSN (online): 2644-0695 Volume 08 Issue 05 May 2025 

download
Female Perpetrators of Intimate Partner Homicide: Stereotyping and Factors. A Systematic Review of Twenty Years of Literature, 2003–2023

By Sally Crosland, Calli Tzani & Maria Ioannou

When considering intimate partner homicide (IPH), there is a comparative lack of recent research focusing on the specific stereotypes relating to female perpetrators, although recent findings suggest that there is a marked gender difference in instances of IPH perpetration. The current systematic review explored stereotyping of female IPH defendants between 2003 and 2023. Findings suggest stereotypes regarding female IPH perpetrators have a marked effect across several areas. Existence and extent of courtroom and media stereotyping are identified, and factors influencing jury verdicts are considered. Research limitations, implications of findings and directions for further research are specified.

Deviant Behavior, May 2025.

Download
Strip Search on Black Children: Institutional Racism, Sexual Violence, and Blackness

By Yasmin Ibrahim

2023, Liberty Investigates (LI) released a report which reveals that Black girls are three times more likely to be subjected to the most invasive strip search with Black people making up nearly half of all Metropolitan Police (Met) strip searches of female children and teenagers. In the UK, the Met faces long-standing accusations of institutional racism. The recent report re-invokes the plight of Blackness, particularly the underage fungible subjecthood of Black girls and their plight within the institutional culture of the Met. This paper, delving critically into the LI report and the unfortunate Child Q incident, reviews the bodies of Black female children and teenagers as sites of unmitigated transgression, disciplining and violence symbolizing the ‘spirit-murder’ of the child’s psyche and its relationality to Afro- pessimism.

Social Identities, July 2025.

Download
Romance Baiting, Cryptorom and ‘Pig Butchering’: an Evolutionary Step in Romance Fraud

By Cassandra Cross

Romance fraud uses the guise of a genuine relationship to deceive a victim into transferring often large amounts of money to an offender/s. Romance fraud has been in the top three categories of financial loss for Australian victims over the past decade, and this is a trend mirrored internationally. However, in recent years there has been a convergence of romance fraud and investment fraud approaches. Terms such as romance baiting, cryptorom and ‘pig butchering' have all emerged to describe how offenders are evolving in their attempts to defraud victims through offering fake cryptocurrency investment opportunities, using a relationship as the mechanism. This article analyses this shift in romance fraud offending and its embracing of investment scheme opportunities. It highlights the underlying reasons for the success of this amalgamated approach and further demonstrates how it potentially distorts the reporting of fraud as well as prevention messaging targeting these incidents.

Current Issues Criminal Justice Volume 36, 2024 - Issue 3

download