Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 19 de 19
Filtrar
1.
PLoS One ; 19(2): e0297145, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38416727

RESUMO

We use bootstrap data envelopment analysis, adjusting for endogeneity, to examine police efficiency in detecting crime in Hong Kong. We address the following: (i) is there a correlation between the detection of crime and triad influence? (ii) does the level of triad influence affect the efficiency in translating inputs (police strength) into outputs (crime detection)? and (iii) how can the allocation of policing resources be adjusted to improve crime detection? We find that nighty-eight percent of Hong Kong police districts in our sample were found to be inefficient in the detection of crime. Variation was found across districts regarding the detection of violent, property and other crimes. Most inefficiencies and potential improvements in the detection of crime were found in the categories violent and other crimes. We demonstrate how less efficient police districts can modify police resourcing decisions to better detect certain crime types while maintaining current levels of resourcing. Finally, we highlight how the method we outline improves efficiency estimation by adjusting for endogeneity and measuring the conditional efficiency of each district (i.e. the efficiency of crime detection taking the instrumental variables (e.g. influence of triads) into consideration). The use of frontier models to assist in evaluating policing performance can lead to improved efficiency, transparency, and accountability in law enforcement, ultimately resulting in better public safety outcomes and publicly funded resource allocation.


Assuntos
Crime , Aplicação da Lei , Humanos , Hong Kong , Aplicação da Lei/métodos , Polícia , Agressão
2.
Drug Alcohol Rev ; 43(1): 56-74, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-37523310

RESUMO

ISSUES: The sale of illicit drugs online has expanded to mainstream social media apps. These platforms provide access to a wide audience, especially children and adolescents. Research is in its infancy and scattered due to the multidisciplinary aspects of the phenomena. APPROACH: We present a multidisciplinary systematic scoping review on the advertisement and sale of illicit drugs to young people. Peer-reviewed studies written in English, Spanish and French were searched for the period 2015 to 2022. We extracted data on users, drugs studied, rate of posts, terminology used and study methodology. KEY FINDINGS: A total of 56 peer-reviewed papers were included. The analysis of these highlights the variety of drugs advertised and platforms used to do so. Various methodological designs were considered. Approaches to detecting illicit content were the focus of many studies as algorithms move from detecting drug-related keywords to drug selling behaviour. We found that on average, for the studies reviewed, 13 in 100 social media posts advertise illicit drugs. However, popular platforms used by adolescents are rarely studied. IMPLICATIONS: Promotional content is increasing in sophistication to appeal to young people, shifting towards healthy, glamourous and seemingly legal depictions of drugs. Greater inter-disciplinary collaboration between computational and qualitative approaches are needed to comprehensively study the sale and advertisement of illegal drugs on social media across different platforms. This requires coordinated action from researchers, policy makers and service providers.


Assuntos
Tráfico de Drogas , Drogas Ilícitas , Mídias Sociais , Adolescente , Criança , Humanos , Publicidade , Comércio
3.
PLoS One ; 17(12): e0277869, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36477257

RESUMO

The popularity of online shopping is steadily increasing. At the same time, fake product reviews are published widely and have the potential to affect consumer purchasing behavior. In response, previous work has developed automated methods utilizing natural language processing approaches to detect fake product reviews. However, studies vary considerably in how well they succeed in detecting deceptive reviews, and the reasons for such differences are unclear. A contributing factor may be the multitude of strategies used to collect data, introducing potential confounds which affect detection performance. Two possible confounds are data-origin (i.e., the dataset is composed of more than one source) and product ownership (i.e., reviews written by individuals who own or do not own the reviewed product). In the present study, we investigate the effect of both confounds for fake review detection. Using an experimental design, we manipulate data-origin, product ownership, review polarity, and veracity. Supervised learning analysis suggests that review veracity (60.26-69.87%) is somewhat detectable but reviews additionally confounded with product-ownership (66.19-74.17%), or with data-origin (84.44-86.94%) are easier to classify. Review veracity is most easily classified if confounded with product-ownership and data-origin combined (87.78-88.12%). These findings are moderated by review polarity. Overall, our findings suggest that detection accuracy may have been overestimated in previous studies, provide possible explanations as to why, and indicate how future studies might be designed to provide less biased estimates of detection accuracy.


Assuntos
Propriedade , Humanos , Projetos de Pesquisa
4.
J Quant Criminol ; : 1-20, 2022 Dec 08.
Artigo em Inglês | MEDLINE | ID: mdl-36532607

RESUMO

Objectives: Routine activity theory suggests that levels of crime are affected by peoples' activity patterns. Here, we examine if, through their impact on people's on- and off-line activities, COVID-19 restriction affected fraud committed on- and off-line during the pandemic. Our expectation was that levels of online offending would closely follow changes to mobility and online activity-with crime increasing as restrictions were imposed (and online activity increased) and declining as they were relaxed. For doorstep fraud, which has a different opportunity structure, our expectation was that the reverse would be true. Method: COVID-19 restrictions systematically disrupted people's activity patterns, creating quasi-experimental conditions well-suited to testing the effects of "interventions" on crime. We exploit those conditions using ARIMA time series models and UK data for online shopping fraud, hacking, doorstep fraud, online sales, and mobility to test hypotheses. Doorstep fraud is modelled as a non-equivalent dependent variable, allowing us to test whether findings were selective and in line with theoretical expectations. Results: After controlling for other factors, levels of crime committed online were positively associated with monthly variation in online activities and negatively associated with monthly variation in mobility. In contrast, and as expected, monthly variation in doorstep fraud was positively associated with changes in mobility. Conclusions: We find evidence consistent with routine activity theory, suggesting that disruptions to people's daily activity patterns affect levels of crime committed both on- and off-line. The theoretical implications of the findings, and the need to develop a better evidence base about what works to reduce online crime, are discussed. Supplementary Information: The online version contains supplementary material available at 10.1007/s10940-022-09564-7.

5.
J Crim Justice ; 82: 101996, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36311900

RESUMO

Introduction: In response to COVID-19, governments imposed various restrictions on movement and activities. According to the routine activity perspective, these should alter where crime occurs. For burglary, greater household occupancy should increase guardianship against residential burglaries, particularly during the day considering factors such as working from home. Conversely, there should be less eyes on the street to protect against non-residential burglaries. Methods: In this paper, we test these expectations using a spatio-temporal model with crime and Google Community Mobility data. Results: As expected, burglary declined during the pandemic and restrictions. Different types of burglary were, however, affected differently but largely consistent with theoretical expectation. Residential and attempted residential burglaries both decreased significantly. This was particularly the case during the day for completed residential burglaries. Moreover, while changes were coincident with the timing and relaxation of restrictions, they were better explained by fluctuations in household occupancy. However, while there were significant decreases in non-residential and attempted non-residential burglary, these did not appear to be related to changes to activity patterns, but rather the lockdown phase. Conclusions: From a theoretical perspective, the results generally provide further support for routine activity perspective. From a practical perspective, they suggest considerations for anticipating future burglary trends.

6.
Crime Sci ; 11(1): 1, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35013699

RESUMO

BACKGROUND: Cryptocurrency fraud has become a growing global concern, with various governments reporting an increase in the frequency of and losses from cryptocurrency scams. Despite increasing fraudulent activity involving cryptocurrencies, research on the potential of cryptocurrencies for fraud has not been examined in a systematic study. This review examines the current state of knowledge about what kinds of cryptocurrency fraud currently exist, or are expected to exist in the future, and provides comprehensive definitions of the frauds identified. METHODS: The study involved a scoping review of academic research and grey literature on cryptocurrency fraud and a 1.5-day expert consensus exercise. The review followed the PRISMA-ScR protocol, with eligibility criteria based on language, publication type, relevance to cryptocurrency fraud, and evidence provided. Researchers screened 391 academic records, 106 of which went on to the eligibility phase, and 63 of which were ultimately analysed. We screened 394 grey literature sources, 128 of which passed on to the eligibility phase, and 53 of which were included in our review. The expert consensus exercise was attended by high-profile participants from the private sector, government, and academia. It involved problem planning and analysis activities and discussion about the future of cryptocurrency crime. RESULTS: The academic literature identified 29 different types of cryptocurrency fraud; the grey literature discussed 32 types, 14 of which were not identified in the academic literature (i.e., 47 unique types in total). Ponzi schemes and (synonymous) high yield investment programmes were most discussed across all literature. Participants in the expert consensus exercise ranked pump-and-dump schemes and ransomware as the most profitable and feasible threats, though pump-and-dumps were, notably, perceived as the least harmful type of fraud. CONCLUSIONS: The findings of this scoping review suggest cryptocurrency fraud research is rapidly developing in volume and breadth, though we remain at an early stage of thinking about future problems and scenarios involving cryptocurrencies. The findings of this work emphasise the need for better collaboration across sectors and consensus on definitions surrounding cryptocurrency fraud to address the problems identified.

7.
Crime Sci ; 9(1): 20, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-33106764

RESUMO

Crisis and disruption are often unpredictable and can create opportunities for crime. During such times, policing may also need to meet additional challenges to handle the disruption. The use of social media by officials can be essential for crisis mitigation and crime reduction. In this paper, we study the use of Twitter for crime mitigation and reduction by UK police (and associated) agencies in the early stages of the Covid-19 pandemic. Our findings suggest that whilst most of the tweets from our sample concerned issues that were not specifically about crime, especially during the first stages of the pandemic, there was a significant increase in tweets about fraud, cybercrime and domestic abuse. There was also an increase in retweeting activity as opposed to the creation of original messages. Moreover, in terms of the impact of tweets, as measured by the rate at which they are retweeted, followers were more likely to 'spread the word' when the tweet was content-rich (discussed a crime specific matter and contained media), and account holders were themselves more active on Twitter. Considering the changing world we live in, criminal opportunity is likely to evolve. To help mitigate this, policy makers and researchers should consider more systematic approaches to developing social media communication strategies for the purpose of crime mitigation and reduction during disruption and change more generally. We suggest a framework for so doing.

8.
Front Bioeng Biotechnol ; 8: 571672, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-33123514

RESUMO

Synthetic biology has the potential to positively transform society in many application areas, including medicine. In common with all revolutionary new technologies, synthetic biology can also enable crime. Like cybercrime, that emerged following the advent of the internet, biocrime can have a significant effect on society, but may also impact on peoples' health. For example, the scale of harm caused by the SARS-CoV-2 pandemic illustrates the potential impact of future biocrime and highlights the need for prevention strategies. Systematic evidence quantifying the crime opportunities posed by synthetic biology has to date been very limited. Here, we systematically reviewed forms of crime that could be facilitated by synthetic biology with a view to informing their prevention. A total of 794 articles from four databases were extracted and a three-step screening phase resulted in 15 studies that met our threshold criterion for thematic synthesis. Within those studies, 13 exploits were identified. Of these, 46% were dependent on technologies characteristic of synthetic biology. Eight potential crime types emerged from the studies: bio-discrimination, cyber-biocrime, bio-malware, biohacking, at-home drug manufacturing, illegal gene editing, genetic blackmail, and neuro-hacking. 14 offender types were identified. For the most commonly identified offenders (>3 mentions) 40% were outsider threats. These observations suggest that synthetic biology presents substantial new offending opportunities. Moreover, that more effective engagement, such as ethical hacking, is needed now to prevent a crime harvest from developing in the future. A framework to address the synthetic biology crime landscape is proposed.

9.
Sensors (Basel) ; 20(17)2020 Sep 02.
Artigo em Inglês | MEDLINE | ID: mdl-32887338

RESUMO

COVID-19 has shown a relatively low case fatality rate in young healthy individuals, with the majority of this group being asymptomatic or having mild symptoms. However, the severity of the disease among the elderly as well as in individuals with underlying health conditions has caused significant mortality rates worldwide. Understanding this variance amongst different sectors of society and modelling this will enable the different levels of risk to be determined to enable strategies to be applied to different groups. Long-established compartmental epidemiological models like SIR and SEIR do not account for the variability encountered in the severity of the SARS-CoV-2 disease across different population groups. The objective of this study is to investigate how a reduction in the exposure of vulnerable individuals to COVID-19 can minimise the number of deaths caused by the disease, using the UK as a case study. To overcome the limitation of long-established compartmental epidemiological models, it is proposed that a modified model, namely SEIR-v, through which the population is separated into two groups regarding their vulnerability to SARS-CoV-2 is applied. This enables the analysis of the spread of the epidemic when different contention measures are applied to different groups in society regarding their vulnerability to the disease. A Monte Carlo simulation (100,000 runs) along the proposed SEIR-v model is used to study the number of deaths which could be avoided as a function of the decrease in the exposure of vulnerable individuals to the disease. The results indicate a large number of deaths could be avoided by a slight realistic decrease in the exposure of vulnerable groups to the disease. The mean values across the simulations indicate 3681 and 7460 lives could be saved when such exposure is reduced by 10% and 20% respectively. From the encouraging results of the modelling a number of mechanisms are proposed to limit the exposure of vulnerable individuals to the disease. One option could be the provision of a wristband to vulnerable people and those without a smartphone and contact-tracing app, filling the gap created by systems relying on smartphone apps only. By combining very dense contact tracing data from smartphone apps and wristband signals with information about infection status and symptoms, vulnerable people can be protected and kept safer.


Assuntos
Infecções por Coronavirus/prevenção & controle , Infecções por Coronavirus/transmissão , Transmissão de Doença Infecciosa/estatística & dados numéricos , Modelos Teóricos , Pandemias/prevenção & controle , Pneumonia Viral/prevenção & controle , Pneumonia Viral/transmissão , Saúde Pública/métodos , Quarentena/organização & administração , Populações Vulneráveis , COVID-19 , Busca de Comunicante/métodos , Infecções por Coronavirus/epidemiologia , Surtos de Doenças/prevenção & controle , Diretrizes para o Planejamento em Saúde , Necessidades e Demandas de Serviços de Saúde , Humanos , Controle de Infecções/métodos , Controle de Infecções/organização & administração , Controle de Infecções/estatística & dados numéricos , Invenções/estatística & dados numéricos , Pneumonia Viral/epidemiologia , Serviços Preventivos de Saúde/métodos , Serviços Preventivos de Saúde/organização & administração , Serviços Preventivos de Saúde/normas , Saúde Pública/estatística & dados numéricos , Administração em Saúde Pública/métodos , Quarentena/métodos , Quarentena/estatística & dados numéricos , Reino Unido/epidemiologia , Populações Vulneráveis/estatística & dados numéricos
10.
Syst Rev ; 9(1): 22, 2020 Feb 03.
Artigo em Inglês | MEDLINE | ID: mdl-32014050

RESUMO

BACKGROUND: When new technologies are developed, it is common for their crime and security implications to be overlooked or given inadequate attention, which can lead to a 'crime harvest'. Potential methods for the criminal exploitation of biotechnology need to be understood to assess their impact, evaluate current policies and interventions and inform the allocation of limited resources efficiently. Recent studies have illustrated some of the security implications of biotechnology, with outcomes of misuse ranging from compromised computers using malware stored in synthesised DNA, infringement of intellectual property on biological matter, synthesis of new threatening viruses, 'genetic genocide,' and the exploitation of food markets with genetically modified crops. However, there exists no synthesis of this information, and no formal quality assessment of the current evidence. This review therefore aims to establish what current and/or predicted crimes have been reported as a result of biotechnology. METHODS: A systematic review will be conducted to identify relevant literature. ProQuest, Web of Science, MEDLINE and USENIX will be searched utilizing a predefined search string, and Backward and Forward searches. Grey literature will be identified by searching the official UK Government website (www.gov.uk) and the Global database of Dissertations and Theses. The review will be conducted by screening title/abstracts followed by full texts, utilising pre-defined inclusion and exclusion criteria. Papers will be managed using Eppi-center Reviewer 4 software, and data will be organised using a data extraction table using a descriptive coding tool. A predefined rating system (speculative, experimental or currently occurring) will be used to sort studies, and a thematic synthesis of the results will be presented. DISCUSSION: Despite the concerns raised about the misuse of biotechnology, no previous work has been conducted from a Crime Science perspective to collate and assess the literature. This systematic review aims to identify the types of offending activity facilitated by biotechnology, including synthetic biology and genetic engineering. The objective of the review is to examine whether this offending activity can be prevented by assessing the conditions necessary for the crime events to occur. It is anticipated that evidence generated from this review will guide future research in this area and aid relevant stakeholders to prioritise and allocate limited resources to biotechnology crime prevention. SYSTEMATIC REVIEW REGISTRATION: PROSPERO CRD42019131685.


Assuntos
Biotecnologia/normas , Crime , Medidas de Segurança/normas , Segurança Computacional , Engenharia Genética , Humanos , Biologia Sintética , Revisões Sistemáticas como Assunto
11.
PLoS One ; 15(1): e0227800, 2020.
Artigo em Inglês | MEDLINE | ID: mdl-31978096

RESUMO

The Internet of Things (IoT) brings internet connectivity to everyday electronic devices (e.g. security cameras and smart TVs) to improve their functionality and efficiency. However, serious security and privacy concerns have been raised about the IoT which impact upon consumer trust and purchasing. Moreover, devices vary considerably in terms of the security they provide, and it is difficult for consumers to differentiate between more and less secure devices. One proposal to address this is for devices to carry a security label to help consumers navigate the market and know which devices to trust, and to encourage manufacturers to improve security. Using a discrete choice experiment, we estimate the potential impact of such labels on participant's purchase decision making, along with device functionality and price. With the exception of a label that implied weak security, participants were significantly more likely to select a device that carried a label than one that did not. While they were generally willing to pay the most for premium functionality, for two of the labels tested, they were prepared to pay the same for security and functionality. Qualitative responses suggested that participants would use a label to inform purchasing decisions, and that the labels did not generate a false sense of security. Our findings suggest that the use of a security label represents a policy option that could influence behaviour and that should be seriously considered.


Assuntos
Segurança Computacional/legislação & jurisprudência , Comportamento do Consumidor/economia , Tomada de Decisões , Internet das Coisas/economia , Privacidade/psicologia , Adolescente , Adulto , Idoso , Comportamento do Consumidor/estatística & dados numéricos , Feminino , Humanos , Internet das Coisas/legislação & jurisprudência , Internet das Coisas/estatística & dados numéricos , Masculino , Pessoa de Meia-Idade , Projetos Piloto , Políticas , Privacidade/legislação & jurisprudência , Inquéritos e Questionários/estatística & dados numéricos , Dispositivos Eletrônicos Vestíveis/economia , Dispositivos Eletrônicos Vestíveis/psicologia , Dispositivos Eletrônicos Vestíveis/estatística & dados numéricos , Adulto Jovem
12.
Proc Natl Acad Sci U S A ; 115(34): E7914-E7923, 2018 08 21.
Artigo em Inglês | MEDLINE | ID: mdl-30082404

RESUMO

Many scholars suggest that visa restrictions push individuals who would have otherwise migrated legally toward illegal channels. This expectation is difficult to test empirically for three reasons. First, unauthorized migration is clandestine and often unobservable. Second, interpersonal ties between migrants and would-be migrants form a self-perpetuating system, which adapts in ways that are difficult to observe or predict. Third, empirical evaluations of immigration policy are vulnerable to endogeneity and other issues of causal inference. In this paper, we pair tailor-made empirical designs with an agent-based computational model (ABM) to capture the dynamics of a migration system that often elude empirical analysis, while grounding agent rules and characteristics with primary data collected in Jamaica, an origin country. We find that some government-imposed restrictions on migrants can deter total migration, but others are ineffective. Relative to a system of free movement, the minimal eligibility conditions required to classify migrants into visa categories alone make migration inaccessible for many. Restrictive policies imposed on student and high-skilled visa categories have little added effect because eligible individuals are likely able to migrate through alternative legal categories. Meanwhile, restrictions on family-based visas result in significant reductions in total migration. However, they also produce the largest reorientation toward unauthorized channels-an unintended consequence that even the highest rates of apprehension do not effectively eliminate.

13.
Crime Sci ; 7(1): 9, 2018.
Artigo em Inglês | MEDLINE | ID: mdl-30956933

RESUMO

In this paper, we introduce two methods to forecast apartment burglaries that are based on repeat and near repeat victimization. While the first approach, the "heuristic method" generates buffer areas around each new apartment burglary, the second approach concentrates on forecasting near repeat chain links. These near repeat chain links are events that follow a near repeat pair of an originating and (near) repeat event that is close in space and in time. We name this approach the "near repeat chain method". This research analyzes apartment burglaries from November 2013 to November 2016 in Vienna, Austria. The overall research goal is to investigate whether the near repeat chain method shows better prediction efficiencies (using a capture rate and the prediction accuracy index) while producing fewer prediction areas. Results show that the near repeat chain method proves to be the more efficient compared to the heuristic method for all bandwidth combinations analyzed in this research.

14.
J Quant Criminol ; 33(3): 569-594, 2017.
Artigo em Inglês | MEDLINE | ID: mdl-32025086

RESUMO

OBJECTIVES: Decades of empirical research demonstrate that crime is concentrated at a range of spatial scales, including street segments. Further, the degree of clustering at particular geographic units remains noticeably stable and consistent; a finding that Weisburd (Criminology 53:133-157, 2015) has recently termed the 'law of crime concentration at places'. Such findings suggest that the future locations of crime should-to some extent at least-be predictable. To date, methods of forecasting where crime is most likely to next occur have focused either on area-level or grid-based predictions. No studies of which we are aware have developed and tested the accuracy of methods for predicting the future risk of crime at the street segment level. This is surprising given that it is at this level of place that many crimes are committed and policing resources are deployed. METHODS: Using data for property crimes for a large UK metropolitan police force area, we introduce and calibrate a network-based version of prospective crime mapping [e.g. Bowers et al. (Br J Criminol 44:641-658, 2004)], and compare its performance against grid-based alternatives. We also examine how measures of predictive accuracy can be translated to the network context, and show how differences in performance between the two cases can be quantified and tested. RESULTS: Findings demonstrate that the calibrated network-based model substantially outperforms a grid-based alternative in terms of predictive accuracy, with, for example, approximately 20 % more crime identified at a coverage level of 5 %. The improvement in accuracy is highly statistically significant at all coverage levels tested (from 1 to 10 %). CONCLUSIONS: This study suggests that, for property crime at least, network-based methods of crime forecasting are likely to outperform grid-based alternatives, and hence should be used in operational policing. More sophisticated variations of the model tested are possible and should be developed and tested in future research.

15.
Crime Delinq ; 61(3): 454-480, 2015 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-25866412

RESUMO

Research demonstrates that crime is spatially concentrated. However, most research relies on information about where crimes occur, without reference to where offenders reside. This study examines how the characteristics of neighborhoods and their proximity to offender home locations affect offender spatial decision making. Using a discrete choice model and data for detected incidents of theft from vehicles (TFV), we test predictions from two theoretical perspectives-crime pattern and social disorganization theories. We demonstrate that offenders favor areas that are low in social cohesion and closer to their home, or other age-related activity nodes. For adult offenders, choices also appear to be influenced by how accessible a neighborhood is via the street network. The implications for criminological theory and crime prevention are discussed.

16.
J Res Crime Delinq ; 52(1): 3-31, 2015 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-25866418

RESUMO

OBJECTIVES: This study builds on research undertaken by Bernasco and Nieuwbeerta and explores the generalizability of a theoretically derived offender target selection model in three cross-national study regions. METHODS: Taking a discrete spatial choice approach, we estimate the impact of both environment- and offender-level factors on residential burglary placement in the Netherlands, the United Kingdom, and Australia. Combining cleared burglary data from all study regions in a single statistical model, we make statistical comparisons between environments. RESULTS: In all three study regions, the likelihood an offender selects an area for burglary is positively influenced by proximity to their home, the proportion of easily accessible targets, and the total number of targets available. Furthermore, in two of the three study regions, juvenile offenders under the legal driving age are significantly more influenced by target proximity than adult offenders. Post hoc tests indicate the magnitudes of these impacts vary significantly between study regions. CONCLUSIONS: While burglary target selection strategies are consistent with opportunity-based explanations of offending, the impact of environmental context is significant. As such, the approach undertaken in combining observations from multiple study regions may aid criminology scholars in assessing the generalizability of observed findings across multiple environments.

17.
J Res Crime Delinq ; 51(4): 509-525, 2014 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-25419001

RESUMO

OBJECTIVES: The Journal of Research in Crime and Delinquency (JRCD) has published important contributions to both criminological theory and associated empirical tests. In this article, we consider some of the challenges associated with traditional approaches to social science research, and discuss a complementary approach that is gaining popularity-agent-based computational modeling-that may offer new opportunities to strengthen theories of crime and develop insights into phenomena of interest. METHOD: Two literature reviews are completed. The aim of the first is to identify those articles published in JRCD that have been the most influential and to classify the theoretical perspectives taken. The second is intended to identify those studies that have used an agent-based model (ABM) to examine criminological theories and to identify which theories have been explored. RESULTS: Ecological theories of crime pattern formation have received the most attention from researchers using ABMs, but many other criminological theories are amenable to testing using such methods. CONCLUSION: Traditional methods of theory development and testing suffer from a number of potential issues that a more systematic use of ABMs-not without its own issues-may help to overcome. ABMs should become another method in the criminologists toolbox to aid theory testing and falsification.

18.
J Res Crime Delinq ; 50(4): 504-524, 2013 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-25076796

RESUMO

OBJECTIVES: To examine patterns in the timing and location of incidents of maritime piracy to see whether, like many urban crimes, attacks cluster in space and time. METHODS: Data for all incidents of maritime piracy worldwide recorded by the National Geospatial Intelligence Agency are analyzed using time-series models and methods originally developed to detect disease contagion. RESULTS: At the macro level, analyses suggest that incidents of pirate attacks are concentrated in five subregions of the earth's oceans and that the time series for these different subregions differ. At the micro level, analyses suggest that for the last 16 years (or more), pirate attacks appear to cluster in space and time suggesting that patterns are not static but are also not random. CONCLUSIONS: Much like other types of crime, pirate attacks cluster in space, and following an attack at one location the risk of others at the same location or nearby is temporarily elevated. The identification of such regularities has implications for the understanding of maritime piracy and for predicting the future locations of attacks.

19.
J Psychol ; 136(6): 597-607, 2002 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-12523448

RESUMO

The authors performed 2 experiments investigating the influence of the belief that a vehicle crashed on witnesses' estimates of the vehicle's speed. In Experiment 1, participants saw a video of a civilian car being driven, after which they were assigned to 1 of 2 conditions. The 1st group was told that the vehicle subsequently crashed; the 2nd group was not told that the vehicle crashed. The results indicted no differences between the 2 groups on a number of factors, including estimates of the vehicle's speed. Experiment 2 was identical except that the video showed a police car using flashing lights and sirens. Participants who had been told that the car had crashed overestimated speed, the likelihood of a crash, and the likelihood of someone being killed. Participants who were not told that the vehicle crashed estimated the speed of the vehicle accurately. Confidence in their estimates of speed was not significantly different between the 2 groups. Results are discussed with regard to police investigations of road accidents.


Assuntos
Acidentes de Trânsito , Condução de Veículo , Julgamento , Rememoração Mental , Polícia , Adolescente , Adulto , Idoso , Feminino , Humanos , Masculino , Pessoa de Meia-Idade , Gravação de Videoteipe
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...