Search results
1 – 10 of 806A considerable amount of police evaluation research focuses on innovative approaches to reduce crime at places. This is hardly coincidental; policing and place-based scholars have…
Abstract
Purpose
A considerable amount of police evaluation research focuses on innovative approaches to reduce crime at places. This is hardly coincidental; policing and place-based scholars have found crime is highly concentrated, and when police focus on these places, they can prevent and reduce crime. The regularity of such findings led Weisburd (2015) to assert the existence of a “law of crime concentration.” Given that bold assertion, the authors test whether the law of crime concentration is generalizable to one of the most common public safety concerns that police handle—traffic crashes.
Design/methodology/approach
To determine whether the law of crime concentration applies to traffic crashes, the authors examined crash locations and times in all counties in Utah across four years. Following and expanding on Weisburd's methods, the authors calculate the bandwidth of concentration for these crashes and analyze various types by severity and possible explanations for variations in crash concentrations across the state.
Findings
A small proportion of street segments and intersections experience a disproportionately high number of crashes, and the degree of concentration of crashes may be even higher than that of crime. Further, there are variations in the levels of crash concentration across counties and in the severity of injuries resulting from the crashes.
Practical implications
Place-based criminologists and policing scholars have not often explored traffic crashes in their analyses. Yet, traffic problems take up a significant amount of law enforcement time and resources and are often priorities for most law enforcement agencies. Given what the authors know from traffic, policing and crime and place research, targeted approaches at micro traffic crash hot spots can be beneficial for public safety prevention.
Originality/value
This study is the first to explore the application of Weisburd's Law of Crime Concentration to traffic crashes. Given that police spend a significant amount of time and resources on traffic-related problems in their jurisdiction, finding more effective, evidence-based approaches to address this public safety concern should be a high priority for police and researchers alike.
Details
Keywords
Julien Le Maux and Nadia Smaili
The purpose of this paper is to provide a review of the literature on white-collar crime that combines the perspectives of criminology and management sciences research.
Abstract
Purpose
The purpose of this paper is to provide a review of the literature on white-collar crime that combines the perspectives of criminology and management sciences research.
Design/methodology/approach
Based on a systematic review of white-collar crime recidivism, this paper defines crime and the white-collar criminal from a different perspective. The literature review was conducted using a multidisciplinary approach.
Findings
This paper offers an insightful discussion of white-collar recidivism. In particular, it highlights the interesting use of “Post Conviction Risk Assessment,” a tool used in criminology literature, and aims to show that the probability of recidivism in white-collar crime can be effectively measured and evaluated. This tool is commonly used by American professionals in combatting criminal recidivism.
Originality/value
This study provides interesting insights into white-collar crime recidivism. It has a number of implications for probation officers and criminologists evaluating the recidivism risk of white-collar criminals for reintegration purposes.
Details
Keywords
Sarah Knight, Abbie Maroño and David Keatley
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to…
Abstract
Purpose
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to other factors underlying extremist behaviours. While the end goal of many extremists may be functionally similar, the pathways into extremism vary, and the literature has demonstrated that a “one-size-fits-all” explanation does not exist. Motivational drivers are complex and dynamic; therefore, attempting to identify a terrorist “profile” has limited applied efficacy.
Design/methodology/approach
This study applied a temporal approach (“crime script analysis” or CSA) to identify, map and compare the sequential stages (or “scenes”) in the life histories of violent and non-violent extremists who have committed acts of extremism across different age groups. Crime scripts comprising mainly qualitative data for 40 male extremists (20 violent, 20 non-violent “cases”) were developed, and CSA was conducted according to the age at which they committed their first extremist offence.
Findings
Results demonstrated key temporal, developmental differences between the pathways of extremists who commit their first offence at different ages. One key difference was that for both the violent and non-violent extremists, those under 30 used the internet as a main means of joining networks and spreading information, whereas the over 30s made more personal, community links.
Originality/value
This research can aid identification of potential environmental triggers and potential increased susceptibility to triggers across certain age groups.
Details
Keywords
Shubhasree Bhadra and Kamakhya Narain Singh
News items like “A whopping 2 lakh gullible investors were cheated…….” amply illustrate the extent of problems and hardships caused by financial frauds related to Ponzi schemes…
Abstract
Purpose
News items like “A whopping 2 lakh gullible investors were cheated…….” amply illustrate the extent of problems and hardships caused by financial frauds related to Ponzi schemes, collective investment schemes (CIS), unregulated deposit schemes, etc. In India, over the years, many Ponzi and unregulated investment schemes have taken place, causing huge economic and financial loss to Indian economy. This paper aims to examine why investment such schemes like Ponzi schemes and CIS become popular, how such schemes got operated in different periods and what could be done to safeguard the interests of investors.
Design/methodology/approach
The analysis is done based on secondary data and research work of various researchers, organisation and institutions, which are available in the public domain.
Findings
This paper has tried to analyse various characteristics of such fraudulent schemes, like their modus operandi, promotional activity, background of promoters and legal process involved in recouping financial loss of millions of investors. This paper also examines the demand-side factors that are responsible for popularity of those schemes in India. Noting the regulatory changes and other initiative taken by regulatory authorities to control the supply of unregulated investment schemes, this paper indicates potential actions, which could be undertaken to make people aware about the risks and issues related with such fraudulent schemes.
Originality/value
This paper gives an overview about various aspects of unregulated investment schemes, which have duped numerous people at different point of time. To the best of the authors’ knowledge, this research work is original and has not been published in any other journal.
Details
Keywords
Rebecca Phythian, Stuart Kirby and Lauren Swan-Keig
The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can…
Abstract
Purpose
The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can facilitate and enhance this process, barriers to effective agency information exchange are consistently reported. This paper aims to categorise how information sharing takes place in a law enforcement operational setting and whether there is scope to improve the process.
Design/methodology/approach
There were two stages to the method; firstly, a select group of practitioners with intelligence-related experience (n = 28) were interviewed to identify the most common approaches to operational information sharing. This generated a categorisation model, which was tested with a larger group of practitioners (n = 73). A mixed-methods approach was adopted.
Findings
The research found consensus surrounding four different approaches to information sharing, labelled as: (1) inform and request, (2) meet and share, (3) customised database and (4) integrated systems. These are used at various levels of frequency, dependent on the operational context.
Originality/value
This research provides original evidence-based research to show law enforcement practitioners vary in the way they share information. By demystifying and categorising the process, it provides understanding for practitioners, policymakers and researchers, allowing barriers to be more readily tackled in a much more cost-effective manner.
Details
Keywords
Abdullah Oguz, Nikhil Mehta and Prashant Palvia
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…
Abstract
Purpose
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.
Design/methodology/approach
The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.
Findings
A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.
Originality/value
As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.
Details
Keywords
Alexander Joseph Vanhee and Rachel McNealey
The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…
Abstract
Purpose
The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.
Design/methodology/approach
The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.
Findings
The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.
Originality/value
To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.
Details
Keywords
The growing number of Muslim consumers pursuing a lifestyle of health and sustainability (LOHAS) under the conditions of the COVID-19 pandemic is interesting to assess; however…
Abstract
Purpose
The growing number of Muslim consumers pursuing a lifestyle of health and sustainability (LOHAS) under the conditions of the COVID-19 pandemic is interesting to assess; however, existing research focusing on this topic remains scarce. This study aims to address the research gaps and add to the body of knowledge from previous literature related to Islamic religiosity, environmental knowledge, LOHAS and Muslim customer well-being.
Design/methodology/approach
The sample used in this study is Muslim customers, including university students in a medical department and medical workers in Indonesia, using proportional random sampling methods with a total sample of 308 respondents.
Findings
The results demonstrate that Islamic religiosity positively and significantly impacts environmental knowledge, LOHAS and Muslim customer well-being. Similarly, environmental knowledge positively and significantly influences LOHAS, and subsequently, LOHAS fruitfully impacts Muslim customer well-being.
Practical implications
The results can assist managers of eco-friendly and healthy products or services and public policymakers in their effort to enhance LOHAS, particularly for Indonesian Muslim consumers to accomplish well-being considering their Islamic religiosity.
Social implications
The results of this study help society protect a sustainable environment by increasing their environmental knowledge and LOHAS. Based on Islamic religion, society recognize how important environmental issues are to keep the environment safe in the future and build the culture of LOHAS to achieve their well-being.
Originality/value
This study contributes to the body of marketing literature for Muslim green consumer behaviour in particular and the LOHAS of the Muslim customer segment based on Islamic religiosity.
Details
Keywords
Maryam Kamaei, Salameh Abolhasani and Naghmeh Farhood
The purpose of this research is to analyze the role of gender in the commission of white collar crimes and investigate it in five countries: Norway, Portugal, America, India and…
Abstract
Purpose
The purpose of this research is to analyze the role of gender in the commission of white collar crimes and investigate it in five countries: Norway, Portugal, America, India and Iran.
Design/methodology/approach
Descriptive analytical method is used in this article.
Findings
A total of five observations were examined about the rank and percentage of women's participation in white-collar crimes, namely, from Norway (rank 3, 7%), USA (rank 26, 5%), Portugal (29th rank, 13%), India (rank 135, 11%) and Iran (rank 143, 5%). As is visually obvious, there seems to be no relationship between the level of gender equality and the percentage of women involved in white-collar crimes. However, according to Hobbs, in most research, the issue of gender and its effect on the occurrence of white-collar crimes have not been addressed, but by using the limited statistics and limited information available, it can be concluded that a small number of women have committed this crime. According to global crime reports, only 15 out of 200 prosecutions for white-collar crimes involve women.
Originality/value
To the best of the authors’ knowledge, this article is original and has been submitted only to this journal and has not been submitted to another journal at the same time.
Details
Keywords
Mary S. Mangai, Tyanai Masiya and Galaletsang Masemola
This paper aims to explore police perspectives on community engagement strategies within the context of crime prevention in South Africa, focusing on Johannesburg metropolitan…
Abstract
Purpose
This paper aims to explore police perspectives on community engagement strategies within the context of crime prevention in South Africa, focusing on Johannesburg metropolitan police stations. The study’s objective is to scrutinise the effectiveness and challenges of community policing strategies.
Design/methodology/approach
Through a qualitative research approach, this study conducted unstructured interviews with station commanders and visible policing officers across 10 Johannesburg metropolitan police stations.
Findings
The findings reveal that community policing strategies, such as community–policing forums, sector policing, street patrollers and social media utilisation, can effectively engage communities as partners in crime prevention. However, certain challenges such as resource limitations and difficulties in policing-specific regions, were also identified.
Originality/value
This study contributes to the broader understanding of community–policing partnerships and the practical implications of community–policing strategies in South Africa, suggesting areas for improvement and adaptation to the unique South African context. This knowledge can help optimise efforts to foster stronger relationships between police and communities, bolster public trust and ultimately improve crime prevention outcomes.
Details