Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_9959053720002883
    Format: 1 online resource (474 pages)
    Edition: 1st ed.
    ISBN: 9781135981808 , 1135981809 , 9780203431405 , 0203431405 , 9781135981730 , 1135981736
    Series Statement: Routledge international handbooks
    Content: Crime science is precisely what it says it is: the application of science to the phenomenon of crime. This handbook, intended as a crime science manifesto, showcases the scope of the crime science field and provides the reader with an understanding of the assumptions, aspirations and methods of crime science, as well as the variety of topics that fall within its purview. Crime science provides a distinctive approach to understanding and dealing with crime: one that is outcome-oriented, evidence-based and that crosses boundaries between disciplines. The central mission of crime science is to find new ways to cut crime and increase security. Beginning by setting out the case for crime science, the editors examine the roots of crime science in environmental criminology and describe its key features. The book is then divided into two sections. The first section comprises chapters by disciplinary specialists about the contributions their sciences can make or have already made to crime science. The second section of the book comprises a series of exemplary case studies in crime science, showing a wide range of the kind of work that crime scientists do. The editors conclude by drawing on the preceding contributions, as well as germane areas of research, to offer a thoughtful consideration of future directions for crime science. This book is essential reading for social scientists and scientists alike and marks a new phase in the study of crime and its detection and prevention.
    Note: Cover -- Half Title -- Series Page -- Title Page -- Copyright -- Table of Contents -- List of contributors -- Chapter 1: What is crime science? -- Introduction -- Environmental criminology roots -- Key characteristics of crime science -- Conclusion -- Notes -- References -- SECTION 1: Disciplinary contributions to crime science -- Overview -- Chapter 2: Evolutionary psychology -- Human nature -- The adaptationist programme: using evolutionary biology to understand living things -- Conclusions: the promise of a better science -- References -- Chapter 3: Genetics -- Genetic influences on antisocial behaviour -- Molecular genetics -- Gene-environment interactions -- Integrating genetic information into crime-prevention and reduction practices -- Conclusion -- References -- Chapter 4: Sociology -- Introduction -- Sociology -- The social nature of crime -- The real causal importance of the social -- The production and inhibition of patterns of crime event -- The modifiable experience of crime -- Signals and criminal behaviour -- Using sociology in crime science -- References -- Chapter 5: Psychology -- Developmental crime prevention -- Situational crime prevention -- Offender treatment and rehabilitation -- Conclusion -- References -- Chapter 6: Economics -- Economic models of crime -- Market solution to crime -- The Becker model -- Economic tools used to measure efficacy -- A Normative framework and contribution to crime policy -- Conclusion -- Notes -- References -- Chapter 7: Epidemiology -- Introduction -- Evolution of epidemiology as a discipline -- The strategies of epidemiology -- Data collection and quality -- Analysis And interpretation -- Evaluation of efficacy, effectiveness and impact of interventions -- Conclusion -- Acknowledgements -- Note -- References -- Chapter 8: Mathematics -- Introduction -- What is mathematics?. , Mathematical approaches to crime -- Areas of application -- Summary and outlook -- References -- Chapter 9: Geography -- Introduction -- Spatial analysis -- The importance of scale, its complications, and the understanding of place -- Policy mobilities and crime prevention -- Conclusion -- Notes -- References -- Chapter 10: Architecture -- Introduction -- Crime and the built environment -- First-generation CPTED -- Developments in CPTED -- Computational tools for CPTED -- Conclusions -- Acknowledgements -- Notes -- References -- Chapter 11: Engineering -- Introduction -- Engineering in the 21st century -- System: an interdisciplinary concept -- When engineering matters -- Conclusion -- References -- Chapter 12: Computer science -- Introduction -- Crime prevention -- Crime simulation -- Conclusions -- Acknowledgements -- References -- Chapter 13: Forensic science -- Introduction: a conceptual overview of forensic reconstruction, detection and disruption -- The forensic science process and conceptual approach -- Where are the challenges? -- What do we need going forward? -- Conclusion -- References -- SECTION 2: Crime science in action -- Overview -- Chapter 14: Social network analysis -- Introduction -- Social network analysis -- Crime-risk contagion -- Co-offending -- Group structure -- Future/conclusions -- Notes -- References -- Chapter 15: Analysis and prevention of organised crime -- Organised crime, crime science, and situational crime prevention -- What is 'organised crime'? -- Analysis and prevention of organised crimes -- Analysis and prevention of associational structures and systemic conditions -- Conclusion -- Notes -- References -- Chapter 16: Terrorists are just another type of criminal -- Introduction -- Why do people commit terrorist acts? -- Where and when does terrorism occur? -- How do we prevent terrorism? -- Conclusion. , References -- Chapter 17: Evolution, crime science and terrorism: the case of Provisional IRA weaponry -- Introduction -- Evolution: basic mechanisms -- Variation, creativity and innovation -- Selection -- Replication/transmission -- Entities and their environments -- In the face of change -- So what? -- Conclusion -- Notes -- References -- Chapter 18: Fighting cybercrime once it switches from the online world to the real world -- Introduction -- Case study 1: email spam -- Case study 2: fake antivirus scams -- Case study 3: credit card fraud -- Conclusion and challenges going forward -- References -- Chapter 19: The limits of anonymity in Bitcoin -- Background on Bitcoin -- How Bitcoin works -- The Bitcoin ecosystem -- Attributing Bitcoins to real-world owners -- A re-identification attack -- Clustering Bitcoin addresses -- Putting it together -- Tracking flows of Bitcoins -- Conclusions and implications for crime prevention -- Note -- Chapter 20: Crime in the age of the Internet of Things -- Overview -- Definitions -- Challenges to the adoption of IoT -- The first application domain -- Security of industrial control systems -- Current ICS Systems -- Attacks against today's industrial control systems -- Malicious actors -- Selected targeted attacks -- Defences -- Current industrial control systems, a summary -- Future IoT crime -- View from the perspective of crime -- Conclusion -- References -- Chapter 21: Transdisciplinary research in virtual space: can online warning messages reduce engagement with child exploitation material? -- Introduction -- Towards 'transdisciplinary' research in crime science -- Crime science, ICT and online child sexual exploitation offences -- Adopting the lens of environmental criminological theory -- Automated internet warnings as a potential technological crime-prevention strategy. , Case study: roles for transdisciplinary research on automated warnings -- Conclusion -- Acknowledgements -- Notes -- References -- Chapter 22: Those who do big bad things still do little bad things: re-stating the case for self-selection policing -- Introduction -- Why and how should self-selection policing work? -- Which minor offences work best? In search of SSP 'trigger' offences -- So what's the problem? Barriers to adopting self-selection policing -- The future for self-selection policing? -- Notes -- References -- Chapter 23: Agent-based decision-support systems for crime scientists -- Introduction -- Agent-based decision-support systems -- An illustrative example: prototyping strategies for call-for-service despatch -- Discussion -- Note -- References -- Appendix -- Chapter 24: Economic efficiency and the detection of crime: a case study of Hong Kong policing -- Introduction -- Economic concepts relating to efficiency -- Measuring relative efficiency -- Method -- Results -- Conclusion -- Notes -- References -- Chapter 25: No need for X-ray specs: through-the-wall radar for operational policing -- Introduction -- Radar fundamentals -- Sensing through a wall -- Through-the-wall radar in operational policing -- Through-the-wall passive radar -- Summary -- References -- Chapter 26: Electronic noses: the chemistry of smell and security -- What do we want to smell and why? -- How to build an e-nose -- Case study - sniffing out explosives -- Scope for the future -- References -- Chapter 27: Understanding forensic trace evidence -- Introduction -- Examples -- Summary -- References -- Chapter 28: Interpretation of forensic science evidence at every step of the forensic science process: decision-making under uncertainty -- Introduction -- Cognition and decision-making in the forensic process -- crime scene to court -- Summary -- References. , Chapter 29: Better preparation for the future - don't leave it to chance -- Introduction -- Future planning - beware the dystopian view -- Tools for futures planning -- Some worked scenarios -- Conclusion -- References -- Chapter 30: Future crime -- Introduction -- Managing expectations -- Looking to the future through a crime-science lens -- UCL systematic review -- Discussion -- Notes -- References -- Chapter 31: Future directions for crime science -- Introduction -- Academic developments -- Extending the range and depth of research topics -- Old crimes, new opportunities -- Conclusion -- References -- Index. , English
    Additional Edition: ISBN 9780415826266
    Additional Edition: ISBN 0415826268
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Handbooks and manuals.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages