scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Book Review: Breaking and Entering: Burglars on Burglary

01 May 2005-Criminal Justice Review (SAGE PublicationsThousand Oaks • London • New Delhi)-Vol. 30, Iss: 1, pp 102-104
About: This article is published in Criminal Justice Review.The article was published on 2005-05-01. It has received 41 citations till now.
Citations
More filters
Journal Article
TL;DR: The growth and penetration of computer technology in modern life has provided criminals with efficient tools to commit crime by providing opportunities to commit crimes that could not exist without cyberspace.
Abstract: IntroductionThe Internet and World Wide Web have dramatically altered the way we communicate, live, and conduct business around the world. These advancements have modified traditional activities, such as banking, dating, and shopping, into activities in which individuals interact with others but neither leave the house nor actually physically meet people (Newman & Clarke, 2003). The growth and penetration of computer technology in modern life has provided criminals with efficient tools to commit crime by providing opportunities to commit crimes that could not exist without cyberspace. Few criminologists, however, have empirically assessed the impact of computer technology on victimization. As a consequence, there is a lack of understanding in the ability of traditional theories of crime to account for the prevalence and potential reduction of cybercrime victimization. In particular, routine activities theory (Cohen & Felson, 1979) may be successful in this endeavor as it has been traditionally used to examine how technological innovations affect crime patterns and victimization.One of the more common and significant forms of cybercrime victimization is the destruction of data files due to malicious software, or malware (Furnell, 2002; Taylor, Caeti, Loper, Fritsch, & Liederbach, 2006). Malware typically includes computer viruses, worms, and Trojan horse programs that alter functions within computer programs and files. Viruses can conceal their presence on computer systems and networks and spread via e-mail attachments, downloadable files, instant messaging, and other methods (Kapersky, 2003; Szor, 2005; Taylor et al., 2006). Trojan horse programs also often arrive via e-mail as a downloadable file or attachment that people would be inclined to open, such as files titled "XXX Porn" or "Receipt of Purchase." When the file is opened, it executes some form of a malicious code (Furnell, 2002; Szor, 2005; Taylor et al., 2006). In addition, some malware is activated by visiting websites, particularly pornographic websites, which exploit flaws in web browsers (Taylor et al., 2006). Though worms do not involve as much user interaction as other malware because of its ability to use system memory and to send copies of itself, humans can facilitate its spread by simply opening e-mails that have the worm code embedded in the file (Nazario, 2003).Cybercriminals often utilize malware to compromise computer systems and automate attacks against computer networks (Furnell, 2002). These programs can disrupt e-mail and network operations, access private files, delete or corrupt files, and generally damage computer software and hardware (Taylor et al., 2006). The dissemination of viruses across computer networks can be costly for several reasons, including the loss of data and copyrighted information, identity theft, loss of revenue due to customer apprehension about website safety, time spent removing the programs, and losses in personal productivity and system functions (Symantec, 2003; Taylor et al., 2006). This is reflected in the dollar losses associated with malware infection. U.S. companies who participated in a recent Computer Security Institute reported losses of approximately $15 million because of viruses in 2006 alone (CSI, 2007). An infected system in one country can spread malicious software across the globe and cause even greater damage because of the interconnected nature of computer systems. The Melissa virus, for example, caused an estimated $80 million in damages worldwide (Taylor et al., 2006). Thus, malware infection poses a significant threat to Internet users around the globe.A large body of information security research explores the technical aspects of malicious software. These research efforts have placed special emphasis on the creation of software applications like anti-virus programs that can identify and contain malicious software on computer systems (Kapersky, 2003; PandaLabs, 2007; Symantec, 2003). …

214 citations


Cites background from "Book Review: Breaking and Entering:..."

  • ...Most studies have found that the use of physical security devices, including burglar alarms, external lights, extra locks, and other security measures, reduces the risk of burglary and larceny victimization (Coupe & Blake, 2006; Cromwell & Olson, 2004; Miethe & McDowall, 1993)....

    [...]

  • ...…affluence, or visibly display signs of wealth, such as cars and electronics, are more likely to be victimized as burglars associate the wealth of the area with the value of the items within the houses (Coupe & Blake, 2006; Cromwell & Olson, 2004; Miethe & Meier, 1994; Osborn & Tseloni, 1998)....

    [...]

  • ...Research has found that offenders consider the possible rewards of offending as a more important factor in their decisionmaking process than potential consequences (Cromwell & Olson, 2004; Shover, 1996; Wright & Decker, 1994)....

    [...]

  • ...In fact, one of the primary characteristics of adequate guardianship according to burglars is whether a house is occupied (Coupe & Blake, 2006; Cromwell & Olson, 2004; Shover, 1996; Wright & Decker, 1994)....

    [...]

  • ...This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License 405 valuable information to others, such as when they are going to be away from home or how to deactivate a security system (Cromwell & Olson, 2004)....

    [...]

Journal ArticleDOI
TL;DR: The work in this article was supported by the Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHSS and T/CSD) Broad Agency Announcement 11.02, the Government of Australia and SPAWAR Systems Center Pacific (N66001-13-C-0131 to A.H.
Abstract: This work was supported by the Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHSS and T/CSD) Broad Agency Announcement 11.02, the Government of Australia and SPAWAR Systems Center Pacific (N66001-13-C-0131 to A.H.); and the National Institute of Justice, Office of Justice Programs, US Department of Justice (2010-IJ-CX-1676, 2010, to T. H.). The opinions, findings and conclusions or recommendations expressed are those of the authors and do not reflect those of the aforementioned agencies.

157 citations


Cites background from "Book Review: Breaking and Entering:..."

  • ...…challenges to our understanding of offender activities due to their relatively hidden nature, which is substantively different from market actors in real world illicit economies like drug or hawking markets (e.g. Cromwell & Olson, 2004, Jacobs, 1996, Johnson & Natarajan, 1995, Schneider, 2005)....

    [...]

Journal ArticleDOI
TL;DR: The scripts identified appeared to be used by both sexual aggressor of children and sexual aggressors of adults, and a high proportion of crime switching was found among the identified scripts.
Abstract: This study investigates target selection scripts of 72 serial sex offenders who have committed a total of 361 sex crimes on stranger victims. Using latent class analysis, three target selection scripts were identified based on the victim's activities prior to the crime, each presenting two different tracks: (1) the Home script, which includes the (a) intrusion track and the (b) invited track, (2) the Outdoor script, which includes the (a) noncoercive track and the (b) coercive track, and (3) the Social script, which includes the (a) onsite track and the (b) off-site track. The scripts identified appeared to be used by both sexual aggressors of children and sexual aggressors of adults. In addition, a high proportion of crime switching was found among the identified scripts, with half of the 72 offenders switching scripts at least once. The theoretical relevance of these target selection scripts and their practical implications for situational crime prevention strategies are discussed.

124 citations


Cites background from "Book Review: Breaking and Entering:..."

  • ...…explained by numerous factors such as the anticipated success rate, potential “payoff” or high gain (Clarke & Cornish, 1985), ease of entry or physical accessibility (Bernasco & Nieuwbeerta, 2005; Cromwell & Olson, 2004), and level of guardianship (Miethe & Meier, 1990; Tewksbury & Mustaine, 2003)....

    [...]

Journal ArticleDOI
TL;DR: In this paper, the authors investigated whether solitary offenders choose their target areas differently from the way offender groups do, and found that solitary burglars and burglar groups seem to agree on what constitutes an attractive target area, because no evidence for the postulated differences between them is found.
Abstract: Using data on residential burglaries and residential burglars in The Hague, this study addresses the issue of whether solitary offenders choose their target areas differently from the way offender groups do. It is hypothesised that, in general, burglars are attracted to neighbourhoods that are nearby their homes, nearby the city centre, affluent, physically accessible, and characterised by social disorganisation. In addition, differences between solitary burglars and co-offending burglar groups regarding the strength of these criteria are assessed. The results support the postulated relevance of physical accessibility and proximity to the offenders' homes for both single offenders and co-offending groups. However, solitary burglars and burglar groups seem to agree on what constitutes an attractive target area, because no evidence for the postulated differences between them is found. Copyright © 2006 John Wiley & Sons, Ltd.

118 citations


Cites background from "Book Review: Breaking and Entering:..."

  • ...…residential burglary is an offence that is often prepared for and committed in a relatively purposeful and calculated way (Bennett & Wright, 1984; Cromwell & Olson, 1991; Maguire & Bennett, 1982; Nee & Taylor, 2000; Rengert & Wasilchick, 2000; Reppetto, 1974; Taylor & Nee, 1988; Wright &…...

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors address the limitations of previous studies using a multimethods approach, which involves the analyses of national survey data and in-depth interviews with active street offenders.
Abstract: Several researchers point to the anticipation of early death, or a sense of “futurelessness,” as a contributing factor to youth crime. It is argued that young people who perceive a high probability of early death may have little reason to delay gratification for the promise of future benefits, as the future itself is discounted. Consequently, these young people tend to pursue high-risk behaviors associated with immediate rewards, which include crime and violence. Although existing studies lend support to these arguments and show a statistical relationship between anticipated early death and youth crime, this support remains tentative. Moreover, several questions remain regarding the interpretation of this relationship, the meanings that offenders attach to the prospect of early death, and the cognitive processes that link anticipated early death to youth crime. In this article, we address the limitations of previous studies using a multimethods approach, which involves the analyses of national survey data and in-depth interviews with active street offenders.

113 citations

References
More filters
Journal Article
TL;DR: The growth and penetration of computer technology in modern life has provided criminals with efficient tools to commit crime by providing opportunities to commit crimes that could not exist without cyberspace.
Abstract: IntroductionThe Internet and World Wide Web have dramatically altered the way we communicate, live, and conduct business around the world. These advancements have modified traditional activities, such as banking, dating, and shopping, into activities in which individuals interact with others but neither leave the house nor actually physically meet people (Newman & Clarke, 2003). The growth and penetration of computer technology in modern life has provided criminals with efficient tools to commit crime by providing opportunities to commit crimes that could not exist without cyberspace. Few criminologists, however, have empirically assessed the impact of computer technology on victimization. As a consequence, there is a lack of understanding in the ability of traditional theories of crime to account for the prevalence and potential reduction of cybercrime victimization. In particular, routine activities theory (Cohen & Felson, 1979) may be successful in this endeavor as it has been traditionally used to examine how technological innovations affect crime patterns and victimization.One of the more common and significant forms of cybercrime victimization is the destruction of data files due to malicious software, or malware (Furnell, 2002; Taylor, Caeti, Loper, Fritsch, & Liederbach, 2006). Malware typically includes computer viruses, worms, and Trojan horse programs that alter functions within computer programs and files. Viruses can conceal their presence on computer systems and networks and spread via e-mail attachments, downloadable files, instant messaging, and other methods (Kapersky, 2003; Szor, 2005; Taylor et al., 2006). Trojan horse programs also often arrive via e-mail as a downloadable file or attachment that people would be inclined to open, such as files titled "XXX Porn" or "Receipt of Purchase." When the file is opened, it executes some form of a malicious code (Furnell, 2002; Szor, 2005; Taylor et al., 2006). In addition, some malware is activated by visiting websites, particularly pornographic websites, which exploit flaws in web browsers (Taylor et al., 2006). Though worms do not involve as much user interaction as other malware because of its ability to use system memory and to send copies of itself, humans can facilitate its spread by simply opening e-mails that have the worm code embedded in the file (Nazario, 2003).Cybercriminals often utilize malware to compromise computer systems and automate attacks against computer networks (Furnell, 2002). These programs can disrupt e-mail and network operations, access private files, delete or corrupt files, and generally damage computer software and hardware (Taylor et al., 2006). The dissemination of viruses across computer networks can be costly for several reasons, including the loss of data and copyrighted information, identity theft, loss of revenue due to customer apprehension about website safety, time spent removing the programs, and losses in personal productivity and system functions (Symantec, 2003; Taylor et al., 2006). This is reflected in the dollar losses associated with malware infection. U.S. companies who participated in a recent Computer Security Institute reported losses of approximately $15 million because of viruses in 2006 alone (CSI, 2007). An infected system in one country can spread malicious software across the globe and cause even greater damage because of the interconnected nature of computer systems. The Melissa virus, for example, caused an estimated $80 million in damages worldwide (Taylor et al., 2006). Thus, malware infection poses a significant threat to Internet users around the globe.A large body of information security research explores the technical aspects of malicious software. These research efforts have placed special emphasis on the creation of software applications like anti-virus programs that can identify and contain malicious software on computer systems (Kapersky, 2003; PandaLabs, 2007; Symantec, 2003). …

214 citations

Journal ArticleDOI
TL;DR: The work in this article was supported by the Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHSS and T/CSD) Broad Agency Announcement 11.02, the Government of Australia and SPAWAR Systems Center Pacific (N66001-13-C-0131 to A.H.
Abstract: This work was supported by the Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHSS and T/CSD) Broad Agency Announcement 11.02, the Government of Australia and SPAWAR Systems Center Pacific (N66001-13-C-0131 to A.H.); and the National Institute of Justice, Office of Justice Programs, US Department of Justice (2010-IJ-CX-1676, 2010, to T. H.). The opinions, findings and conclusions or recommendations expressed are those of the authors and do not reflect those of the aforementioned agencies.

157 citations

Journal ArticleDOI
TL;DR: The scripts identified appeared to be used by both sexual aggressor of children and sexual aggressors of adults, and a high proportion of crime switching was found among the identified scripts.
Abstract: This study investigates target selection scripts of 72 serial sex offenders who have committed a total of 361 sex crimes on stranger victims. Using latent class analysis, three target selection scripts were identified based on the victim's activities prior to the crime, each presenting two different tracks: (1) the Home script, which includes the (a) intrusion track and the (b) invited track, (2) the Outdoor script, which includes the (a) noncoercive track and the (b) coercive track, and (3) the Social script, which includes the (a) onsite track and the (b) off-site track. The scripts identified appeared to be used by both sexual aggressors of children and sexual aggressors of adults. In addition, a high proportion of crime switching was found among the identified scripts, with half of the 72 offenders switching scripts at least once. The theoretical relevance of these target selection scripts and their practical implications for situational crime prevention strategies are discussed.

124 citations

Journal ArticleDOI
TL;DR: In this paper, the authors investigated whether solitary offenders choose their target areas differently from the way offender groups do, and found that solitary burglars and burglar groups seem to agree on what constitutes an attractive target area, because no evidence for the postulated differences between them is found.
Abstract: Using data on residential burglaries and residential burglars in The Hague, this study addresses the issue of whether solitary offenders choose their target areas differently from the way offender groups do. It is hypothesised that, in general, burglars are attracted to neighbourhoods that are nearby their homes, nearby the city centre, affluent, physically accessible, and characterised by social disorganisation. In addition, differences between solitary burglars and co-offending burglar groups regarding the strength of these criteria are assessed. The results support the postulated relevance of physical accessibility and proximity to the offenders' homes for both single offenders and co-offending groups. However, solitary burglars and burglar groups seem to agree on what constitutes an attractive target area, because no evidence for the postulated differences between them is found. Copyright © 2006 John Wiley & Sons, Ltd.

118 citations

Journal ArticleDOI
TL;DR: In this article, the authors address the limitations of previous studies using a multimethods approach, which involves the analyses of national survey data and in-depth interviews with active street offenders.
Abstract: Several researchers point to the anticipation of early death, or a sense of “futurelessness,” as a contributing factor to youth crime. It is argued that young people who perceive a high probability of early death may have little reason to delay gratification for the promise of future benefits, as the future itself is discounted. Consequently, these young people tend to pursue high-risk behaviors associated with immediate rewards, which include crime and violence. Although existing studies lend support to these arguments and show a statistical relationship between anticipated early death and youth crime, this support remains tentative. Moreover, several questions remain regarding the interpretation of this relationship, the meanings that offenders attach to the prospect of early death, and the cognitive processes that link anticipated early death to youth crime. In this article, we address the limitations of previous studies using a multimethods approach, which involves the analyses of national survey data and in-depth interviews with active street offenders.

113 citations