crime script
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 31)

H-INDEX

7
(FIVE YEARS 2)

Author(s):  
Ben Stickle ◽  
Melody Hicks ◽  
Amy Stickle ◽  
Zachary Hutchinson

2021 ◽  
pp. 001112872110617
Author(s):  
Julien Chopin ◽  
Eric Beauregard ◽  
Sarah Paquette

This study aims to provide a theoretically grounded analysis of the crime-commission process of solo females involved in sexual offending, using crime scripts. The sample includes 93 cases of sexual assaults perpetrated by female offenders in an extrafamilial context. Latent class analysis was used to identify the scripts involved in female sexual offending as well as to explore the relationship between each step of the crime-commission process. Also, additional variables related to victim, offender, and location characteristics were used to test the external validity of the model. Results suggest four different scripts used by females: Daytime Indoor, Coercive Outdoor, Coercive Indoor, and Nighttime Indoor. Theoretical and practical implications are discussed.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nicholas Gilmour

Purpose This paper aims to demonstrate the benefit of applying crime script analysis at a macro level to expose money laundering as an interconnected series of events that contradict understanding which defines money laundering as a series of typological studies. Design/methodology/approach Using previously captured data and detailed research studies alongside the professional experience of the author, this study creates a horizontal crime script for three distinct methods of money laundering – to determine characteristic nodes and identify pathways. Findings Despite significant research into money laundering typologies, this paper demonstrates that the process of money laundering cannot be separated into typological studies. By applying crime script analysis to each method of money laundering prior to analysing the nodes, activities and behaviours, money laundering can be identified as a series of interconnected services, business formalities and management activities. Practical implications This study is of value to government policymakers, regulators and financial institutions considering future preventative measures. It is also of value to financial investigators and law enforcement agencies intent on investigating money laundering. By applying the method of analysis outlined in this paper to each method of money laundering and then combining them together, it is possible to understand money laundering as a holistic process, in which webs of interconnected criminal events can be identified for investigative and preventative purposes. Originality/value Interest in crime script analysis is now supporting understanding of different crime types. This study goes beyond the analysis of individual types of money laundering and applies it in a “test format” against three methods of money laundering to create, for the first time, a holistic or macro appreciation of the interconnected series of events, activities and behaviours which exist beyond the characteristics routinely captured in money laundering typology reports.


Author(s):  
Spencer P. Chainey ◽  
Arantza Alonso Berbotto

AbstractCrime script analysis is becoming an increasingly used approach for examining organized crime. Crime scripts can use data from multiple sources, including open sources of intelligence (OSINT). Limited guidance exists, however, on how to populate the content of a crime script with data, and validate these data. This results in crime scripts being generated intuitively, restricts them from being scrutinised for their quality, and limits the opportunity to combine or compare crime scripts. We introduce a practical process for populating the content of a crime script that involves simple coding procedures and uses document analysis to quality assure data that are extracted from open sources. We illustrate the process with the example of theft of oil from pipelines in Mexico committed by organized crime groups. The structured methodical process we introduce produces a crime script of high quality, helps to improve the systematic analysis of decision-making performed by members of organized crime groups, and can improve the identification of opportunities for crime control.


2021 ◽  
pp. 001112872110298
Author(s):  
Claire Seungeun Lee

E-commerce is the practice of purchasing, selling, transferring, and exchanging goods, services, or information through the Internet, a computer, and/or other devices. With the development of e-commerce markets, fraud is increasingly reported. This study uses a crime script analysis to examine how customer-to-customer (C2C) fraud occurs on China’s online platforms with a particular focus on the online marketplace Baidu Tieba and Tencent QQ, a tool that allows customers to make contact and negotiate deals and payment methods. The findings demonstrate that C2C fraud develops through pre-operation, operation, finalization, and exit stages, sharing commonalities with other online identity fraud processes. Implications for policy and interventions are also discussed in regard to e-commerce fraud in China and elsewhere.


Crime Science ◽  
2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Allison Skidmore

AbstractPoaching is the most direct threat to the persistence of Amur tigers. However, little empirical evidence exists about the modus operandi of the offenders associated with this wildlife crime. Crime science can aid conservation efforts by identifying the patterns and opportunity structures that facilitate poaching. By employing semi-structured interviews and participants observation with those directly involved in the poaching and trafficking of Amur tigers in the Russian Far East (RFE), this article utilizes crime script analysis to break down this criminal event into a process of sequential acts. By using this framework, it is possible account for the decisions made and actions taken by offenders before, during and after a tiger poaching event, with the goal of identifying weak points in the chain of actions to develop targeted intervention strategies. Findings indicate poaching is facilitated by the ability to acquire a firearm, presence of roads that enable access to remote forest regions, availability of specific types of tools/equipment, including heat vision googles or a spotlight and a 4 × 4 car, and a culture that fosters corruption. This crime script analysis elucidates possible intervention points, which are discussed alongside each step in the poaching process.


Crime Science ◽  
2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Christine A. Weirich

AbstractThe Syrian Civil War created an opportunity for increased trafficking of antiquities and has resulted in a renewed awareness on the part of a global audience. The persistence of criminal and organisational networks which facilitate antiquities trafficking networks (ATNs) has been recognised as significant, leading to increased interest in the development of new and improved methods of understanding such networks. While this field of research has traditionally been dominated by relevant areas such as archaeology, law, art and museum studies, there is a noticeable gap in crime prevention research. This paper presents a crime script of Syrian antiquities trafficking networks during the Syrian Civil War which has been generated from open source journalistic data. In creating a broad crime script for such a prevalent issue, this paper aims to demonstrate the need for further crime script analysis and specifically crime prevention research more generally within the study of antiquities trafficking.


Sign in / Sign up

Export Citation Format

Share Document