Crime Script Analysis of Adolescent Prostitution Exploitation: Focusing on 8 Stage Processes and Prevention Strategies

2021 ◽  
Vol 12 (2) ◽  
pp. 75-119
Author(s):  
Eun-hye Kim ◽  
Myng-gi Hong ◽  
Eui-Gab Hwang
Crime Science ◽  
2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Allison Skidmore

AbstractPoaching is the most direct threat to the persistence of Amur tigers. However, little empirical evidence exists about the modus operandi of the offenders associated with this wildlife crime. Crime science can aid conservation efforts by identifying the patterns and opportunity structures that facilitate poaching. By employing semi-structured interviews and participants observation with those directly involved in the poaching and trafficking of Amur tigers in the Russian Far East (RFE), this article utilizes crime script analysis to break down this criminal event into a process of sequential acts. By using this framework, it is possible account for the decisions made and actions taken by offenders before, during and after a tiger poaching event, with the goal of identifying weak points in the chain of actions to develop targeted intervention strategies. Findings indicate poaching is facilitated by the ability to acquire a firearm, presence of roads that enable access to remote forest regions, availability of specific types of tools/equipment, including heat vision googles or a spotlight and a 4 × 4 car, and a culture that fosters corruption. This crime script analysis elucidates possible intervention points, which are discussed alongside each step in the poaching process.


Author(s):  
Ben Stickle ◽  
Melody Hicks ◽  
Amy Stickle ◽  
Zachary Hutchinson

Sexual Abuse ◽  
2020 ◽  
pp. 107906322098106
Author(s):  
Madeleine van der Bruggen ◽  
Arjan Blokland

This study’s aim is to contribute to the knowledge on the steps involved in child sexual exploitation material (CSEM) crimes committed in Darkweb CSEM communities. Due to the anonymous and illegal nature of these communities, academic research is scarce. This study provides a crime script analysis of member communication data from four CSEM Darkweb fora obtained by law enforcement. For cross-validation, suspect interviews from a relevant case file were analyzed. A step-by-step description of the crime process, starting with the preparations necessary to access Darkweb CSEM fora and ending with the postactivity behaviors of exiting the crime scene and preventing detection, is given, focusing on the casts, activities, probs, and personal and contextual requirements at each stage. The findings highlight the scope of the CSEM problem, as well as the influence the Darkweb has on the way the crime is committed. Suitable targets for law enforcement intervention are discussed.


2019 ◽  
Vol 17 (1) ◽  
pp. 9-30 ◽  
Author(s):  
Aleksandra Jordanoska ◽  
Nicholas Lord

This article implements a crime script analysis to understand the procedural dynamics of corporate benchmark-rigging in the financial services industry. In 2012 several global banks were implicated in the manipulation of various trading benchmarks, portraying the industry as affected by serious, pervasive and ‘organized’ corporate crimes. Yet their dynamics have been relatively little studied by criminologists. To address this gap, we analyse official enforcement documentation, supplemented with data from interviews with key informants in the UK financial markets. We analyse the range of interactions between the relevant actors, their actions and the resources essential to the manipulations, and deconstruct the benchmark manipulations into four scenes (calculated positioning and identification of co-collaborators; recruitment; (ephemeral) manipulation; recompense and solicitation). The analysis reveals that regulatory and organizational systems play a paradoxical role of both ‘capable guardians’ and ‘facilitators of misconduct’; this has implications for criminological theory.


2021 ◽  
pp. 001112872110298
Author(s):  
Claire Seungeun Lee

E-commerce is the practice of purchasing, selling, transferring, and exchanging goods, services, or information through the Internet, a computer, and/or other devices. With the development of e-commerce markets, fraud is increasingly reported. This study uses a crime script analysis to examine how customer-to-customer (C2C) fraud occurs on China’s online platforms with a particular focus on the online marketplace Baidu Tieba and Tencent QQ, a tool that allows customers to make contact and negotiate deals and payment methods. The findings demonstrate that C2C fraud develops through pre-operation, operation, finalization, and exit stages, sharing commonalities with other online identity fraud processes. Implications for policy and interventions are also discussed in regard to e-commerce fraud in China and elsewhere.


Author(s):  
Spencer P. Chainey ◽  
Arantza Alonso Berbotto

AbstractCrime script analysis is becoming an increasingly used approach for examining organized crime. Crime scripts can use data from multiple sources, including open sources of intelligence (OSINT). Limited guidance exists, however, on how to populate the content of a crime script with data, and validate these data. This results in crime scripts being generated intuitively, restricts them from being scrutinised for their quality, and limits the opportunity to combine or compare crime scripts. We introduce a practical process for populating the content of a crime script that involves simple coding procedures and uses document analysis to quality assure data that are extracted from open sources. We illustrate the process with the example of theft of oil from pipelines in Mexico committed by organized crime groups. The structured methodical process we introduce produces a crime script of high quality, helps to improve the systematic analysis of decision-making performed by members of organized crime groups, and can improve the identification of opportunities for crime control.


Sign in / Sign up

Export Citation Format

Share Document