scholarly journals Agent Oriented Methodology for Crime Modelling and Simulation

2019 ◽  
Vol 8 (2S8) ◽  
pp. 1359-1365

Agent-oriented methodology (AOM) is a comprehensive and unified agent methodology for agent-oriented software development. The potential of Agent Oriented Methodology has been revealed in domains like collaborative technology, video surveillance, and economics. However, it has not been explored in crime modelling and simulation. Although AOM is claimed to be able to cope with a complex system development, it is still not yet determined up to what extent this may be true. Therefore, it is vital to investigate to validate this methodology. This paper investigates the adoption of AOM in crime modeling and simulation. The novelty of this paper is to introduce a systematic way to model crime simulation. Through the AOM simulation, it is proven that the AOM can model the complex system in crime domain with various outcomes which supported a few existing research theories such as routine activity theory. AOM can provide a wider research platform which is useful for translating theories and micro-level behavior into models and simulation that can be studied, shared, tested and enhanced.

2021 ◽  
Vol 6 (1) ◽  
pp. 1-18
Author(s):  
Dustin L. Osborne ◽  
Kristin Swartz

Though a handful of studies have explored the relationship between farm characteristics and theft of farm equipment, all have been focused at the micro level. Put differently, they have sought to determine whether a relationship exists between likelihood of theft victimization and the characteristics (e.g., size, location) of individual farming operations. The current study builds upon this work by seeking to determine whether county-level factors (in line with the routine activity theory framework) serve to influence the incidence of farm equipment theft within counties. Data are derived from the National Incident-Based Reporting System, the Census of Agriculture and the United States Census of the Population.  Results are on the whole supportive of the theory's application to the problem and suggest that macro-level investigations constitute a worthwhile approach to better understanding agricultural victimization.


1997 ◽  
Vol 27 (4) ◽  
pp. 771-783 ◽  
Author(s):  
Karen McElrath ◽  
Dale D. Chitwood ◽  
Mary Comerford

This study uses routine activity theory to examine violent and property crime victimization among a sample of 308 injection drug users (IDUs). We estimate prevalence rates and identify factors that contribute to the victimization of IDUs. The findings suggest that victimization rates of IDUs were much higher than rates found for the general urban population. Generally, crime involvement did not contribute significantly to victimization risk. Use of crack-cocaine increased the likelihood of property crime victimization whereas heroin use decreased the probability of both violent and property crime victimization. Other drug lifestyle activities (i.e., waiting in uncomfortable situations to buy drugs) also affected victimization risk Finally, the results suggest that victimization differed by age and by gender, despite controls for drug use and drug lifestyle activities. Explanations for these results are offered.


2021 ◽  
pp. 088626052199743
Author(s):  
Dana Aizenkot

Cyberbullying has been pervading worldwide with negative implications for victims. Therefore, there is an urgent need to better understand this phenomenon and the factors that predict it, as the basis for effective prevention and intervention efforts. The current research aims to examine routine activity theory (RAT) as a theoretical framework predictive of cyberbullying victimization (CV) among children and youth. It was hypothesized that each of the RAT measures and the convergence of all measures predict CV. Data were collected from 5,719 primary, middle, and high school Israeli students (51.9% females) during the 2019–2020 school year via online questionnaires. Regression and moderation analyses were conducted to assess the predictability of CV from RAT measures, separately and converged. All RAT measures, separately and converged, predict CV. While off-line trust negatively predicts CV, other control variables, that is, online trust, educational institution phase, and gender, do not. Implications for school programs and guidelines for parents address the risk and protective factors of CV found. This study provides support for the predictability of CV from RAT and expands the knowledge of risk and protective factors predictive of CV.


2020 ◽  
Vol 21 ◽  
pp. 1552-1593
Author(s):  
Xin (Robert) Luo ◽  
◽  
Han Li ◽  
Qing Hu ◽  
Heng Xu ◽  
...  

Social Forces ◽  
2018 ◽  
Vol 98 (1) ◽  
pp. 329-354 ◽  
Author(s):  
James Hawdon ◽  
Colin Bernatzky ◽  
Matthew Costello

AbstractThe Internet’s relatively unfettered transmission of information risks exposing individuals to extremist content. Using online survey data (N = 768) of American youth and young adults, we examine factors that bring individuals into contact with online material advocating violence. Combining aspects of social structure-social learning theory with insights from routine activity theory, we find that exposure to violence-advocating materials is positively correlated with online behaviors, including the use of social media platforms and the virtual spaces individuals frequent. Target antagonism is also correlated with exposure to violence-advocating materials, but guardianship and online and offline associations are not. Finally, feelings of dissatisfaction with major social institutions and economic disengagement are associated with exposure to violent materials online.


2022 ◽  
Vol 40 (1) ◽  
pp. 265-291
Author(s):  
Solbey Morillo Puente ◽  
Iván Neftalí Ríos Hernández

This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies.


2020 ◽  
Vol 4 (4) ◽  
Author(s):  
Zahrati Fadhilah Taufiq

AbstrakArtikel ini membahas tentang angka kriminalitas di Indonesia pada masa pandemic Covid 19 dengan menganalisis beberapa teori-teori kriminologi. Metode penelitian yang digunakan adalah metode penelitian  yuridis empiris. Hasil penelitian ini adalah terdapat (3) teori yang digunakan sebagai alat untuk menganalisis adanya kejahatan pada masa pandemic, yaitu Opportunity Theory, Teori Kontrol Sosial, Routine Activity Theory. Teori ini dapat digunakan untuk mengetahui penyebab terjadinya kejahatan selama pandemi, dan akhirnya memperhitungkan kebijakan-kebijakan yang akan diambil untuk kedepannya.  Kata Kunci : Covid 19, Angka Kejahatan, Teori Kriminologi.


Author(s):  
Philip N. Ndubueze

Digital and Computer Mediated Communication (CMC) technologies have altered traditional forms of social relationships across modern societies and have raised critical concerns about social order in the cyberspace. The amorphous and borderless nature of virtual communities have allowed various deviants, criminals and terrorists elements to permeate them. The resultant criminogenic atmosphere has created a new research agenda for the discipline of criminology. This paper examines the emergence of cyber criminology as a twenty-first century field of criminology and argues that its growth is a fall-out of concerns about the increasing rate of crime and disorder in the cyberspace. Cyber criminology seeks to offer explanation to the causation of deviance, crime and terrorism in the cyberspace. The paper which is anchored on Jaishankar’s Space Transition Theory and Cohen and Felson’s Routine Activity Theory highlights the challenges, prospects and future direction of the evolving field of cyber criminology and its relevance to the quest for order in the Nigerian cyberspace.


Sign in / Sign up

Export Citation Format

Share Document