Search results

1 – 10 of 979
Article
Publication date: 1 July 2007

Penny Turner

This article presents the findings of a study of the victimisation of three cohorts of young people living in a county town in the East Midlands. Following a brief review of

Abstract

This article presents the findings of a study of the victimisation of three cohorts of young people living in a county town in the East Midlands. Following a brief review of research into contemporary youth victimisation in the UK, it reports the findings of the study and discusses the reasons for variations in rates of victimisation between the three cohorts. It concludes with a discussion of the implications for professionals.

Details

Safer Communities, vol. 6 no. 3
Type: Research Article
ISSN: 1757-8043

Keywords

Article
Publication date: 22 January 2020

Norah Ylang

This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A…

Abstract

Purpose

This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A majority of the research on identity theft has focused on predictors of victimization, reporting behaviors of the victims and their health and mental outcomes. However, little remains known about the individuals who choose to take any identity-theft measures despite concerns over this fast-growing breed of crime.

Design/methodology/approach

Guided by Felson and Cohen’s routine activities theoretical framework (1979), this study uses the 2014 Identity Theft Supplement of the National Crime Victimization Survey to identify the demographic characteristics that influence the use of self-protection measures among individuals in the general population.

Findings

This study finds that these individuals are much more likely to be white, older, female and highly educated. The decision to undertake protection against identity theft is also influenced by the following factors: prior experience of misuse, possession of a bank account in the prior 12 months, current possession of at least one credit card and awareness that one is entitled to a free copy of one’s credit report.

Originality/value

This study addresses the gap in scholarship on identity theft prevention by applying the concept of guardianship in Cohen and Felson’s routine activity theory (1979) to the usage of self-protection measures in a general population. Future findings will identify the areas which agencies and researchers can focus on to inform policies that foster individuals’ own initiatives to take self-protection measures against potential identity theft.

Details

Journal of Financial Crime, vol. 27 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 9 June 2020

Guilherme L. J. Falleiros

This chapter deals with different perspectives and structural transformations between capitalist society and indigenous ways of life. I approach the A’uwẽ-Xavante myth of the theft

Abstract

This chapter deals with different perspectives and structural transformations between capitalist society and indigenous ways of life. I approach the A’uwẽ-Xavante myth of the theft of the jaguar’s fire, one of many versions of the story of the bird-nester, which Lévi-Strauss interprets as the acquisition of culture through cooking technique. I compare it with Proudhon’s study on property as the theft of collective force which he treats as the groundwork of the manufacturing process in capitalist society. This highlights the difference between Proudhon’s ideal mutualism, based on free access to means of production and polytechnic education, and the A’uwẽ-Xavante’s acquisition of power and its technical reproduction. Proudhon’s mutualism envisages auto-organization of collective force in cooperative work favoring its collective appropriation by the workers; while in the A’uwẽ-Xavante way of life, there is an off-centered collective force from which technical acquisition is redistributed. In common with Proudhon’s ideal labor mutualism, A’uwẽ-Xavante’s ways welcome outsiders to their means of production of people; but unlike Proudhon’s, this welcome is not for free: they have to prove their generosity and personal commitment to the game.

Details

Anthropological Enquiries into Policy, Debt, Business, and Capitalism
Type: Book
ISBN: 978-1-83909-659-4

Keywords

Article
Publication date: 5 October 2015

Jonathan Clough

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity…

2565

Abstract

Purpose

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity theft”. It begins with a discussion of the meaning of “identity” in the context of modern transactions, before defining “identity crime” and related terms. Legal responses are then considered before turning to the importance of harmonisation. The transnational nature of modern identity crimes makes it essential that law enforcement agencies not only have suitable offences at their disposal but also the frameworks to facilitate international cooperation.

Design/methodology/approach

Given the increasingly transnational and organized nature of modern identity crime, this paper adopts a comparative approach. It draws upon provisions from Australia, Canada, the UK and the USA. It also looks at responses to identity crime at the regional and international level.

Findings

Although there is currently no international instrument which specifically and comprehensively addresses identity theft, it is argued that there is an urgent need for further international discussion as to the desirability and form of identity theft provisions. While international agreement may not be reached, such discussions are important in assisting countries to develop appropriate legal frameworks and capacity to address the modern fraud environment.

Originality/value

It is hoped that this paper will contribute to, and facilitate, important ongoing discussions as to the most effective ways in which to tackle identity crime at the national and international levels.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 February 1997

Flora Page

Fraud is not yet universally recognised or understood as a crime, in the way that theft is. All sectors of our society recognise shoplifting as a crime, whereas an exaggerated…

Abstract

Fraud is not yet universally recognised or understood as a crime, in the way that theft is. All sectors of our society recognise shoplifting as a crime, whereas an exaggerated insurance claim tends to be seen more as a matter of personal morality than public law and order.

Details

Journal of Financial Crime, vol. 4 no. 4
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 January 1975

Knight's Industrial Law Reports goes into a new style and format as Managerial Law This issue of KILR is restyled Managerial Law and it now appears on a continuous updating basis…

Abstract

Knight's Industrial Law Reports goes into a new style and format as Managerial Law This issue of KILR is restyled Managerial Law and it now appears on a continuous updating basis rather than as a monthly routine affair.

Details

Managerial Law, vol. 18 no. 1
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 1 March 1994

David Ewing

Focuses on the situation regarding library crime and security as itappears today in the UK. Discusses common forms of library abuse such asbook theft, non‐return of items, theft of

1882

Abstract

Focuses on the situation regarding library crime and security as it appears today in the UK. Discusses common forms of library abuse such as book theft, non‐return of items, theft of property, staff/user abuse and vandalism. Examines recent surveys focusing on library crime and looks at methods of reducing various types of abuse. Concludes that book theft is extensive, as is non‐return of items. Theft of property has been widely reported and external vandalism and book mutilation are also common. However, library counting practices are poor and loss has not been properly defined. Recommends that inventories be improved and loss determined precisely in order to improve the accuracy of statistics collected, making for better evidence on theft; tough legal deterrents be implemented and that authorities should also develop their own definite security policies.

Details

Library Management, vol. 15 no. 2
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 30 September 2014

Ludek Seda

This study aims to explain what factors influence the relationship between the university students’ knowledge of the risk of identity theft and the preventive measures they take…

2431

Abstract

Purpose

This study aims to explain what factors influence the relationship between the university students’ knowledge of the risk of identity theft and the preventive measures they take.

Design/methodology/approach

A series of semi-structured interviews was used as the primary data collection tool. The sample for this study comprised 12 undergraduate students (six males and six females) from the Flinders Business School. The interviews were designed as face-to-face interviews.

Findings

The current findings indicate that, despite the fact that students were reasonably knowledgeable regarding the general risk of identity theft, many of the students had only limited knowledge about specific issues related to identity theft. It was found that the limited knowledge or misunderstanding of specific issues prevented students from using appropriate measures that could reduce the risk of identity theft. The students demonstrated a significant misunderstanding of who perpetrators typically were targeting when stealing personal information or what perpetrators of identity theft were looking for.

Originality/value

The results of the study contribute to a better understanding of the students’ knowledge about the risks associated with identity crime. They may also assist governments and other stakeholders with vested interests, such as financial institutions and educational providers, to educate individuals about the circumstances where they are potentially vulnerable to identity theft.

Details

Journal of Financial Crime, vol. 21 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 15 July 2009

Ross B. Emmett and Kenneth C. Wenzer

To the Most Rev. M.A. Corrigan, Archbishop of New York:

Abstract

To the Most Rev. M.A. Corrigan, Archbishop of New York:

Details

Henry George, the Transatlantic Irish, and their Times
Type: Book
ISBN: 978-1-84855-658-4

Book part
Publication date: 1 September 2016

Daniel Bradburd

The chapter examines and challenges the assumed necessity of a linkage between remembered series of exchanges, amicable social relations, and prestige found in the work of Marcel…

Abstract

Purpose

The chapter examines and challenges the assumed necessity of a linkage between remembered series of exchanges, amicable social relations, and prestige found in the work of Marcel Mauss and many subsequent theorists of reciprocity and gift exchange.

Methodology

The chapter uses the nearly 500 year history of the giving and taking of the Koh-i-noor Diamond by rulers of South and Central Asia, commencing with Babur, the first Mughal emperor, and ending with Queen Victoria, which includes some gift giving and much taking by force, to explore what happens when only two of the three elements Mauss assumed central to understanding gift exchange are present.

Findings

Based on a review of the historical material, the chapter demonstrates that though historical narratives or memories of exchanges were central to enhancing the prestige of the parties to the exchange and the diamond itself, that process could and did occur in the absence of any on-going amicable social relations, including in situations in which exchange or transfer of the diamond were coerced and nothing was given in return to the dispossessed former owner of the gem.

Originality/value

By suggesting an alternative configuration of the factors necessary for the association of exchange and prestige, the chapter provides the opportunity to reconsider assumptions common in the literature on gift exchange and further enhance our understanding of this central element of social theory.

Details

The Economics of Ecology, Exchange, and Adaptation: Anthropological Explorations
Type: Book
ISBN: 978-1-78635-227-9

Keywords

1 – 10 of 979