Scripting Stranger Sexual Offenses Against Women

Sexual Abuse ◽  
2019 ◽  
pp. 107906321988905
Author(s):  
Yi-Ning Chiu ◽  
Benoit Leclerc

This study identifies the first crime script for unsolved stranger sexual offenses against women. The purpose is to better understand the crime-commission process of solved and unsolved stranger sexual offenses and identify potential points of intervention for prevention purposes. Crime script analysis was performed on 542 solved ( n = 265) and unsolved ( n = 277) cases based on police data in Queensland, Australia, followed by a comparison between solved and unsolved crime scripts. Results showed that unsolved offenses tended to be associated with the following factors: the offender fleeing/desisting, using minimal force, less intrusive sexual outcomes, and less verbal engagement with the victim. In these cases, there was a lack of information regarding forensic evidence, behavioral clues, and eyewitness leads. This highlights the relevance of focusing on situational crime prevention and policing strategies that may deter stranger sexual crimes at the earliest stages of the script.

Author(s):  
Spencer P. Chainey ◽  
Arantza Alonso Berbotto

AbstractCrime script analysis is becoming an increasingly used approach for examining organized crime. Crime scripts can use data from multiple sources, including open sources of intelligence (OSINT). Limited guidance exists, however, on how to populate the content of a crime script with data, and validate these data. This results in crime scripts being generated intuitively, restricts them from being scrutinised for their quality, and limits the opportunity to combine or compare crime scripts. We introduce a practical process for populating the content of a crime script that involves simple coding procedures and uses document analysis to quality assure data that are extracted from open sources. We illustrate the process with the example of theft of oil from pipelines in Mexico committed by organized crime groups. The structured methodical process we introduce produces a crime script of high quality, helps to improve the systematic analysis of decision-making performed by members of organized crime groups, and can improve the identification of opportunities for crime control.


AMBIO ◽  
2021 ◽  
Author(s):  
Julie Viollaz ◽  
Barney Long ◽  
Cao Tiến Trung ◽  
Josh Kempinski ◽  
Benjamin M. Rawson ◽  
...  

AbstractPoaching can contribute to the failure of biodiversity conservation efforts and inflict diverse harms on human livelihoods. We applied crime script analysis to the case of snare poaching—an illegal hunting activity—in three Vietnamese protected areas. Our goal was to enhance the understanding about the opportunity structure underlying snare poaching to advance the suite of community-based crime prevention activities. We analyzed crime scripts for three types of poachers across nine stages of the poaching process using expert-based elicitation with 13 workshop participants in Vinh, Vietnam, 2018. Five stages were similar, clustered toward the early stages, and two were different, clustered around middle crime stages. Analysis produced systematic crime-specific insight about the procedural aspects and requirements for poaching from preparation to hunt to selling one’s catch. Stages identify multiple entry points to apply prevention techniques and match techniques with different types of snare poaching or poachers. Although this research focused on protected areas, the interdisciplinary approach applied herein may be adapted to other conservation contexts.


2018 ◽  
Vol 55 (1) ◽  
pp. 78-102 ◽  
Author(s):  
Victoria A. Sytsma ◽  
Eric L. Piza

Objectives: Through the use of closed-circuit television (CCTV) video footage, the current study builds upon the drug transaction work of Piza and Sytsma by developing a crime script for open-air drug selling. Methods: Researchers conducted a systematic social observation of CCTV footage of open-air drug markets in Newark, NJ. The data were used to identify sequential stages of drug transactions. Fisher’s exact tests measured whether buyer and seller activities during specific acts of the drug transaction event were related to activities seen in subsequent stages. Results: This study finds three distinct acts to open-air drug events. During the pretransaction act, one party (usually the buyer) initiates the transaction. There must then be an exchange of narcotics for money, which typically occurs in one simultaneous transfer and in one location. There is necessarily posttransaction mobility, with sellers most commonly maintaining their anchor point within the drug territory—particularly when the interactions are buyer initiated. Conclusions: Results of this study contribute to the crime script and situational crime prevention literatures by demonstrating acts inherent in public drug selling and by advocating for a focus on the posttransaction period and seller anchor points within drug markets through leveraging the sentinel role of police officers.


Crime Science ◽  
2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Allison Skidmore

AbstractPoaching is the most direct threat to the persistence of Amur tigers. However, little empirical evidence exists about the modus operandi of the offenders associated with this wildlife crime. Crime science can aid conservation efforts by identifying the patterns and opportunity structures that facilitate poaching. By employing semi-structured interviews and participants observation with those directly involved in the poaching and trafficking of Amur tigers in the Russian Far East (RFE), this article utilizes crime script analysis to break down this criminal event into a process of sequential acts. By using this framework, it is possible account for the decisions made and actions taken by offenders before, during and after a tiger poaching event, with the goal of identifying weak points in the chain of actions to develop targeted intervention strategies. Findings indicate poaching is facilitated by the ability to acquire a firearm, presence of roads that enable access to remote forest regions, availability of specific types of tools/equipment, including heat vision googles or a spotlight and a 4 × 4 car, and a culture that fosters corruption. This crime script analysis elucidates possible intervention points, which are discussed alongside each step in the poaching process.


1997 ◽  
Vol 31 (01n02) ◽  
pp. 127-137
Author(s):  
成富 李

性犯罪在香港整体罪案数字中只占一个很小的比率,而有关性犯罪的本地研究也十分稀少。现行的罪案分类方式明显地不能反映性犯罪的普遍性,也不适用于对罪犯的评估及矫治工作。本文从一个犯罪心理学的角度提出一套简便的分类系统,以犯罪者的动机和行为为基础对犯罪者作出评估,提供预后推测,并建议一套以认知行为治疗法为本的矫治程序,认为值得广泛推行。文内并有个案描述,以资佐证。 Sexual offenses make up only a small portion of the total number of offenses in Hong Kong, and local research related to sexual offenses is also scanty. The current offense classification system not only fails to reflect the prevalence of sexual crimes but is also found irrelevant to the assessment and treatment of sexual offenders. This article attempts to propose a concise classificatory system from the perspective of criminological psychology. The offenders' motives and behaviours are used as the bases of assessment and prognosis. A cognitive-behavioural approach to correctional treatment is outlined and advocated. Case materials are provided for illustration.


Author(s):  
Karen Holt ◽  
James Kissinger ◽  
Corey Spickler ◽  
Vicki Roush

Despite no definitive relationship between pornography and sexual offenses, there exists an assumption that use plays a role in the commission of sexual crimes and may increase risk of recidivism. This has led to the development of post-release restrictions on adult media for those convicted of a sexual offense. We conducted semi-structured interviews with 101 incarcerated individuals convicted of a sexual offense to explore the central research questions: (1) What are the common themes among individual’s experiences regarding pornography and how do they construct the role of pornography in their offending? (2) How do they frame pornography use post-release and understand pornography use as related to risk of re-offense? A qualitative analysis revealed common themes regarding how individuals constructed pornography use and notions of risk. Strategic and targeted monitoring and supervision of those who perceive their pornography use as consuming and facilitating may be a more effective practice than abstinence-only blanket restrictions.


2021 ◽  
pp. 001112872110617
Author(s):  
Julien Chopin ◽  
Eric Beauregard ◽  
Sarah Paquette

This study aims to provide a theoretically grounded analysis of the crime-commission process of solo females involved in sexual offending, using crime scripts. The sample includes 93 cases of sexual assaults perpetrated by female offenders in an extrafamilial context. Latent class analysis was used to identify the scripts involved in female sexual offending as well as to explore the relationship between each step of the crime-commission process. Also, additional variables related to victim, offender, and location characteristics were used to test the external validity of the model. Results suggest four different scripts used by females: Daytime Indoor, Coercive Outdoor, Coercive Indoor, and Nighttime Indoor. Theoretical and practical implications are discussed.


Sign in / Sign up

Export Citation Format

Share Document