scholarly journals Fraud against businesses both online and offline: crime scripts, business characteristics, efforts, and benefits

Crime Science ◽  
2020 ◽  
Vol 9 (1) ◽  
Author(s):  
Marianne Junger ◽  
Victoria Wang ◽  
Marleen Schlömer
Keyword(s):  
2021 ◽  
pp. 001112872110617
Author(s):  
Julien Chopin ◽  
Eric Beauregard ◽  
Sarah Paquette

This study aims to provide a theoretically grounded analysis of the crime-commission process of solo females involved in sexual offending, using crime scripts. The sample includes 93 cases of sexual assaults perpetrated by female offenders in an extrafamilial context. Latent class analysis was used to identify the scripts involved in female sexual offending as well as to explore the relationship between each step of the crime-commission process. Also, additional variables related to victim, offender, and location characteristics were used to test the external validity of the model. Results suggest four different scripts used by females: Daytime Indoor, Coercive Outdoor, Coercive Indoor, and Nighttime Indoor. Theoretical and practical implications are discussed.


2018 ◽  
Vol 55 (4) ◽  
pp. 466-492 ◽  
Author(s):  
Ajima Olaghere ◽  
Cynthia Lum

Objectives: Routine activities theory attempts to link the intersection of individuals’ everyday routine activities to crime events at particular places. This study examines crime events not just as the product of intersecting macroroutine activities but also microroutines (similar to crime “scripts”) that occur immediately before, during, and after a crime event occurs. Method: Closed-circuit television (CCTV) footage was accessed through Baltimore City Police Department from 2010 to 2011. Ethnographic techniques and systematic social observation of CCTV footage were used to categorize the microroutines of 74 street-level illicit drug transactions. Results: The findings illuminate eight microroutines of drug crime events that classify behaviors associated with illicit drug activity. Conclusions: This study advances our understanding of the link between routine activities and drug crime by examining how illicit transactions unfold from microroutines using a rarely employed, but fruitful source of data (CCTV footage).


2019 ◽  
Vol 22 (4) ◽  
pp. 770-781
Author(s):  
Michael Donegan

Purpose The purpose of this paper is to critically analyse research surrounding mandate fraud and to devise a crime script identifying the crime commission process. It is hoped this will assist in standardising investigation of mandate fraud by law enforcement. Design/methodology/approach The design of this paper follows on from the approach taken by van Hardeveld et al. (2017) in identifying a cybercrime script for carding activity. The current environment surrounding the investigation of digital fraud in the UK is examined through a review of the existing literature. Analysis of the crime commission process for mandate fraud is then outlined in a potential crime script identifying possible intervention points for law enforcement. Findings UK law enforcement’s current response to digital fraud is struggling to provide positive outcomes for victims. There is inconsistency in the investigative approach and practical issues surrounding how the digital fraud problem is tackled. Changing the emphasis of digital fraud investigation to focus on the money laundering networks based in the UK also needs to be considered. Standardising investigation into digital fraud by mapping out digital criminality using crime scripts and routine activity theory could be beneficial for law enforcement. The results of this process could also assist in effectively identifying where law enforcement resources may be best deployed to solve some of the practical issues highlighted. Originality/value There is little literature directly focused on a crime script for mandate fraud. This is despite it being a significant contributor to fraud losses in the UK. For law enforcement, both digital and financial investigation skill sets are required to investigate such offences. Therefore, mapping the crime commission process has significant value for clearly identifying investigative intervention points.


Crime Science ◽  
2020 ◽  
Vol 9 (1) ◽  
Author(s):  
Abigail C. O’Hara ◽  
Ryan K. L. Ko ◽  
Lorraine Mazerolle ◽  
Jonah R. Rimer

Abstract Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Methods Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. Findings The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and unauthorised access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) unauthorised access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Conclusion Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.


Author(s):  
Spencer P. Chainey ◽  
Arantza Alonso Berbotto

AbstractCrime script analysis is becoming an increasingly used approach for examining organized crime. Crime scripts can use data from multiple sources, including open sources of intelligence (OSINT). Limited guidance exists, however, on how to populate the content of a crime script with data, and validate these data. This results in crime scripts being generated intuitively, restricts them from being scrutinised for their quality, and limits the opportunity to combine or compare crime scripts. We introduce a practical process for populating the content of a crime script that involves simple coding procedures and uses document analysis to quality assure data that are extracted from open sources. We illustrate the process with the example of theft of oil from pipelines in Mexico committed by organized crime groups. The structured methodical process we introduce produces a crime script of high quality, helps to improve the systematic analysis of decision-making performed by members of organized crime groups, and can improve the identification of opportunities for crime control.


2018 ◽  
Vol 17 (4) ◽  
pp. 373-398 ◽  
Author(s):  
Elisa Bellotti ◽  
Jon Spencer ◽  
Nick Lord ◽  
Katie Benson

This paper analyses a series of subsequent and connected investigations by a domestic European regulator on the network of distribution of counterfeit alcohol across two jurisdictions. The analysis mixes script analysis, a narrative framework for enhancing the understanding of how crimes unfold and are organized, with multi-node multi-link social network analysis, to observe the social structure in which crime scripts take place. We focus our attention on the key players that occupy strategic positions within the network of the crime commission process, from where they overview and control the various phases (scenes) and perform brokerage activities across the scenes, and on strategies of concealment of illicit products beyond the facade of legitimate business. Our findings indicate that actors in charge of managing the proceeds of the criminal activity are also the ones better positioned to monitor the entire process. The overall structure of the criminal network shows a good level of resilience and efficiency, although actors do not adopt common traits of a criminal lifestyle that facilitate secrecy and covertness. We believe that, by shifting the analysis from the nature of the group organization to the network of links between all the aspects of a crime commission process, the organizational structure and its weakest links become more detectable, easier to compare across proto- and meta-scripts, and ultimately more prone to situational preventive measures.


2016 ◽  
Vol 13 (2) ◽  
pp. 196-214 ◽  
Author(s):  
Jay P. Kennedy ◽  
Cory P. Haberman ◽  
Jeremy M. Wilson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document