Results 11 to 20 of about 1,817,484 (292)

The Crime Lab in the Age of the Genetic Panopticon [PDF]

open access: yes, 2017
Scientific evidence really nails this man to the wall, the Harris County, Texas prosecutor told the jurors in closing statements. At trial, George Rodriguez claimed he was innocent and that he had been working a factory the day of the crime.
Garrett, Brandon L.
core   +3 more sources

Cyber-crime Science = Crime Science + Information Security [PDF]

open access: yes, 2010
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter   +2 more
core   +8 more sources

Immigration status and property crime:an application of estimators for underreported outcomes [PDF]

open access: yes, 2014
This paper studies the individual-level relationship between immigration and property crime in England and Wales using crime self-reports from the Crime and Justice Survey. Models that account for underreporting are used, since this is a major concern in
Papadopoulos, Georgios
core   +1 more source

Journey to crime of 'itinerant crime groups' [PDF]

open access: yes, 2010
Purpose - Most researchers have found that property crimes have a local focus: offenders tend to operate in the vicinity of their residence. This has led the police to organise themselves to concentrate their resources in highly populated, urban areas ...
Van Daele, Stijn, Vander Beken, Tom
core   +2 more sources

Systematic review of situational prevention methods for crime against species

open access: yesCrime Science, 2021
Illegal activities concerning terrestrial species (TS) are responsible for a variety of health, environmental, economic and security issues. The majority of academic research associated with species relates to conservation, with few publications ...
Dorothea Delpech   +2 more
doaj   +1 more source

Money for Crime and Money from Crime: Financing Crime and Laundering Crime Proceeds [PDF]

open access: yesEuropean Journal on Criminal Policy and Research, 2015
This article summarises briefly what is known internationally about how ‘organised crimes’ are financed and how this differs from the financing of licit businesses. It shows how illicit financing might and does operate, noting that a key issue is the social capital of offenders and their access to illicit finance which ironically, may be easier if ...
openaire   +1 more source

Operationalizing deployment time in police calls for service

open access: yesCrime Science, 2023
Analyses of emergency calls for service data in the United States suggest that around 50% of dispatched police deployment time is spent on crime-related incidents.
Samuel Langton   +2 more
doaj   +1 more source

Special Section Introduction: Exploring the Nexus between Human Vulnerabilities and Environmental Crime

open access: yesJournal of Illicit Economies and Development, 2022
This essay introduces the concept of environmental crime in its multiple forms and highlights the ways both the crimes themselves and related legislations compound existing vulnerabilities and generate new ones within communities, most often in the so ...
Virginia Comolli, Alastair MacBeath
doaj   +1 more source

i-JEN: Visual interactive Malaysia crime news retrieval system [PDF]

open access: yes, 2011
Supporting crime news investigation involves a mechanism to help monitor the current and past status of criminal events. We believe this could be well facilitated by focusing on the user interfaces and the event crime model aspects.
Crestani, Fabio   +5 more
core   +1 more source

Do sports stadiums generate crime on days without matches? A natural experiment on the delayed exploitation of criminal opportunities [PDF]

open access: yes, 2018
Crime pattern theory claims that busy places generate crime through immediate and delayed exploitation. In delayed exploitation, offenders notice criminal opportunities during opening hours but return to exploit them later.
Bernasco, Wim   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy