Pattern theory of crime

2019 ◽  
pp. 91-98
Author(s):  
Martin A. Andresen
2018 ◽  
Vol 25 (3) ◽  
pp. 838-844
Author(s):  
Tage Alalehto

Purpose In the field of crime prevention there are several theoretical approaches explaining why crime occurs and how to prevent it. Three of them – routine activity theory, crime pattern theory and the theory of crime-as-choice – are logically tested in this work. The point of departure is to test if the theories are logical consistent and logical valid, irrespective of whether the criterion for criminal intent is changed from direct intention to negligence. Design/methodology/approach The issues will be explored in a logical structure by a first-order logic propositional analysis. Findings The analysis shows that all three theories are logical consistent, but only routine activity theory is logical valid. The conclusion is that crime prevention should in general assume that routine activity theory is the legitimate theory and that social prevention as a prevention strategy is logically unnecessary to adopt because it does not matter whether the offender is motivated (direct intention) or not (negligence). Practical implications It does not really matter if the authors theoretically treat white-collar offenders as motivated, because if they have committed an actus reus, they are an offender according to the objective requisites. This means that the best strategies to prevent a potential white-collar criminal are situational prevention, i.e. complicate their access to money, where it becomes irrelevant if the potential offender has a mens rea or not. What counts is the prevention of actus reus by a potential offender. Originality/value As far as I know, no one has previously investigated the logical consistency and/or logical validity of routine activity theory, crime pattern theory and the theory of crime-as-choice as theories of crime prevention.


1992 ◽  
Vol 37 (11) ◽  
pp. 1225-1225
Author(s):  
No authorship indicated

Author(s):  
Ulf Grenander ◽  
Michael I. Miller

Pattern Theory provides a comprehensive and accessible overview of the modern challenges in signal, data, and pattern analysis in speech recognition, computational linguistics, image analysis and computer vision. Aimed at graduate students in biomedical engineering, mathematics, computer science, and electrical engineering with a good background in mathematics and probability, the text includes numerous exercises and an extensive bibliography. Additional resources including extended proofs, selected solutions and examples are available on a companion website. The book commences with a short overview of pattern theory and the basics of statistics and estimation theory. Chapters 3-6 discuss the role of representation of patterns via condition structure. Chapters 7 and 8 examine the second central component of pattern theory: groups of geometric transformation applied to the representation of geometric objects. Chapter 9 moves into probabilistic structures in the continuum, studying random processes and random fields indexed over subsets of Rn. Chapters 10 and 11 continue with transformations and patterns indexed over the continuum. Chapters 12-14 extend from the pure representations of shapes to the Bayes estimation of shapes and their parametric representation. Chapters 15 and 16 study the estimation of infinite dimensional shape in the newly emergent field of Computational Anatomy. Finally, Chapters 17 and 18 look at inference, exploring random sampling approaches for estimation of model order and parametric representing of shapes.


Author(s):  
Sujung Cho ◽  
Brett Lacey

Agnew introduced a new integrated theory; the General Theory of Crime and Delinquency, in which he attempted to corral the most influential predictors of criminal behavior into more parsimonious propositions of multiple life domains—self, family, peer, school, and work—as well as constraints against crime and motivations for it. This study presents a partial test of the theory using longitudinal data of 2,351 Korean adolescents. A group-based modeling approach (latent class growth analysis) was run to examine direct effects of life domains on peer delinquency as well as mediating effects of constraints and motivation on their relationships. The study identified three subgroups: early onset/decreasing (3.2%), moderate (12.4%), and low/none (84.4%). The findings revealed that the self and peer domains exhibited a positive impact on the early onset/decreasing trajectory group compared to the low/none group with the constraint exhibiting a negative impact. The moderate trajectory group demonstrated that the self-domain was significant but was not rendered insignificant after controlling for constraints and motivations. The study provided moderate support for life domains within Agnew’s new theory for peer delinquency in nonwestern countries.


2021 ◽  
pp. 026839622110278
Author(s):  
Sixuan Zhang ◽  
Dorothy Leidner ◽  
Xin Cao ◽  
Ning Liu

Extant research on the antecedents of workplace cyberbullying pays little attention to the role of perpetrator traits in influencing workplace cyberbullying, as well as the unique occurrence context that distinguishes workplace cyberbullying with juvenile cyberbullying, workplace bullying, and adult cyberbullying in general. To fill these gaps, we consider the antecedents of workplace cyberbullying under the theoretical lens of the general theory of crime and routine activities theory. We build a model incorporating low self-control, a widely discussed perpetrator trait in criminology theories, with three types of routine activities representing the unique occurrence context for workplace cyberbullying--mWork, boundary spanning in ESM, and proactive email checking. We tested our model with 2025 employees in the U.S.. Our findings demonstrate that low self-control and the three routine activities are strong motivators for workplace cyberbullying. Our findings further show that the effect of low self-control on workplace cyberbullying is amplified by the three routine activities. The study contributes to our understanding of why workplace cyberbullying occurs and offers potential implications for managers interested in reducing incidences of workplace cyberbullying in their organization.


2020 ◽  
Vol 194 ◽  
pp. 05035
Author(s):  
Manni Wu ◽  
Wenjun Zheng ◽  
Zonglin Liu

Minority settlements have good local landscape features and rich cultural heritage. However, due to complex geographical conditions and lagging economic development, there are many potential security threats in their human settlements. Based on the landscape ecological security pattern theory, aiming at eliminating the practical dilemma of frequent fires and difficult rescue in mountainous settlements in southwestern China, this paper proposes a planning idea to improve the settlement environment’s own disaster resilience and ecological endurance ability through the adjustment of landscape pattern. Taking the reconstruction planning and design of Xiaozhai Village in Longji of Guangxi province as an example, based on the geographical structure and resource characteristics of the village, a four-in-one landscape fire security pattern for mountain settlement is constructed, including building group, road evacuation system, natural fire protection network of water system and biological fire protection forest belt. The study provides a reference for the protection, renewal and re-planning of minority settlement.


2016 ◽  
Vol 27 (3) ◽  
pp. 422-450 ◽  
Author(s):  
MOHAMMAD A. TAYEBI ◽  
UWE GLÄSSER ◽  
MARTIN ESTER ◽  
PATRICIA L. BRANTINGHAM

Crime reduction and prevention strategies are vital for policymakers and law enforcement to face inevitable increases in urban crime rates as a side effect of the projected growth of urban population by the year 2030. Studies conclude that crime does not occur uniformly across urban landscapes but concentrates in certain areas. This phenomenon has drawn attention to spatial crime analysis, primarily focusing on crime hotspots, areas with disproportionally higher crime density. In this paper, we present CrimeTracer1, a personalized random walk-based approach to spatial crime analysis and crime location prediction outside of hotspots. We propose a probabilistic model of spatial behaviour of known offenders within their activity spaces. Crime Pattern Theory concludes that offenders, rather than venture into unknown territory, frequently select targets in or near places they are most familiar with as part of their activity space. Our experiments on a large real-world crime dataset show that CrimeTracer outperforms all other methods used for location recommendation we evaluate here.


Sign in / Sign up

Export Citation Format

Share Document