Criminological Theory

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 4239 Experts worldwide ranked by ideXlab platform

R. Willison - One of the best experts on this subject based on the ideXlab platform.

  • HICSS - Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying Criminological Theory to the IS security context
    37th Annual Hawaii International Conference on System Sciences 2004. Proceedings of the, 2004
    Co-Authors: R. Willison
    Abstract:

    There is currently a paucity of literature focusing on the relationship between the actual actions of staff members, who perpetrate some form of computer abuse, and the organisational environment in which such actions take place. A greater understanding of such a relationship may complement existing security practices by possibly highlighting new areas for safeguard implementation. In addition, if insights are afforded into the actions of dishonest staff, prior to the actual perpetration of a crime, then organisations may be able to expand their preventive scope, rather than relying solely on technical safeguards to stop the actual commission of some form of computer abuse. To help facilitate a greater understanding of the offender/environment dynamic, this paper assesses the feasibility of applying Criminological Theory to the IS security context. More specifically, three theories are advanced, which focus on the offender's behaviour in a criminal setting. After opening with a description of the theories, the paper provides an account of the Barings Bank collapse. Events highlighted in the case study are used to assess whether concepts central to the theories are supported by the data. The paper concludes by summarising the major findings and discussing future research possibilities.

  • understanding the offender environment dynamic for computer crimes assessing the feasibility of applying Criminological Theory to the is security context
    Hawaii International Conference on System Sciences, 2004
    Co-Authors: R. Willison
    Abstract:

    There is currently a paucity of literature focusing on the relationship between the actual actions of staff members, who perpetrate some form of computer abuse, and the organisational environment in which such actions take place. A greater understanding of such a relationship may complement existing security practices by possibly highlighting new areas for safeguard implementation. In addition, if insights are afforded into the actions of dishonest staff, prior to the actual perpetration of a crime, then organisations may be able to expand their preventive scope, rather than relying solely on technical safeguards to stop the actual commission of some form of computer abuse. To help facilitate a greater understanding of the offender/environment dynamic, this paper assesses the feasibility of applying Criminological Theory to the IS security context. More specifically, three theories are advanced, which focus on the offender's behaviour in a criminal setting. After opening with a description of the theories, the paper provides an account of the Barings Bank collapse. Events highlighted in the case study are used to assess whether concepts central to the theories are supported by the data. The paper concludes by summarising the major findings and discussing future research possibilities.

  • Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying Criminological Theory to the IS security context
    37th Annual Hawaii International Conference on System Sciences 2004. Proceedings of the, 2004
    Co-Authors: R. Willison
    Abstract:

    There is currently a paucity of literature focusing on the relationship between the actual actions of staff members, who perpetrate some form of computer abuse, and the organisational environment in which such actions take place. A greater understanding of such a relationship may complement existing security practices by possibly highlighting new areas for safeguard implementation. In addition, if insights are afforded into the actions of dishonest staff, prior to the actual perpetration of a crime, then organisations may be able to expand their preventive scope, rather than relying solely on technical safeguards to stop the actual commission of some form of computer abuse. To help facilitate a greater understanding of the offender/environment dynamic, this paper assesses the feasibility of applying Criminological Theory to the IS security context. More specifically, three theories are advanced, which focus on the offender's behaviour in a criminal setting. After opening with a description of the theories, the paper provides an account of the Barings Bank collapse. Events highlighted in the case study are used to assess whether concepts central to the theories are supported by the data. The paper concludes by summarising the major findings and discussing future research possibilities.

Joe Scollo - One of the best experts on this subject based on the ideXlab platform.

Marie Beaulieu - One of the best experts on this subject based on the ideXlab platform.

  • Criminological Theory and elder abuse research fruitful relationship or worlds apart
    Ageing International, 2010
    Co-Authors: Thomas Goergen, Marie Beaulieu
    Abstract:

    By definition, elder abuse research touches upon topics also covered by Criminological theories. However, up until now, attempts to apply Criminological theories to this field of research are scarce and the potential of Criminological Theory to enhance the understanding of elder abuse phenomena appears underdeveloped. The paper explores potentials and limitations of applying both theories and their related concepts from criminology to elder abuse. Financial elder abuse and abuse and neglect in domestic caregiving are chosen as types of offences to discuss the usefulness of Criminological Theory. A special focus is on Routine Activity Theory (RAT). While basic concepts of RAT (“suitable target”, “absence of capable guardians”) are directly applicable to elder abuse, motivational components have to be added or strengthened to make RAT a powerful framework to understand elder abuse. This is in concordance with general criticisms of RAT focussing upon the mechanisms through which at the intersection of individual and environment, individuals are moved to commit criminal or abusive acts. Wikstrom’s Situational Action Theory of Crime Causation is discussed with regard to its potential of understanding and explaining incidents of elder abuse and neglect.

  • Criminological Theory and Elder Abuse Research—Fruitful Relationship or Worlds Apart?
    Ageing International, 2010
    Co-Authors: Thomas Goergen, Marie Beaulieu
    Abstract:

    By definition, elder abuse research touches upon topics also covered by Criminological theories. However, up until now, attempts to apply Criminological theories to this field of research are scarce and the potential of Criminological Theory to enhance the understanding of elder abuse phenomena appears underdeveloped. The paper explores potentials and limitations of applying both theories and their related concepts from criminology to elder abuse. Financial elder abuse and abuse and neglect in domestic caregiving are chosen as types of offences to discuss the usefulness of Criminological Theory. A special focus is on Routine Activity Theory (RAT). While basic concepts of RAT (“suitable target”, “absence of capable guardians”) are directly applicable to elder abuse, motivational components have to be added or strengthened to make RAT a powerful framework to understand elder abuse. This is in concordance with general criticisms of RAT focussing upon the mechanisms through which at the intersection of individual and environment, individuals are moved to commit criminal or abusive acts. Wikstrom’s Situational Action Theory of Crime Causation is discussed with regard to its potential of understanding and explaining incidents of elder abuse and neglect.

David Weisburd - One of the best experts on this subject based on the ideXlab platform.

Travis C Pratt - One of the best experts on this subject based on the ideXlab platform.

  • The Handbook of Criminological Theory - Theory Testing In Criminology
    The Handbook of Criminological Theory, 2015
    Co-Authors: Travis C Pratt
    Abstract:

    We seem to be facing a virtual embarrassment of riches with respect to contem-porary Criminological Theory. To be sure, it appears that we have as many v arieties of explanations as to why people break the law as ways that Wile E. Coyote has used to try to snuff out the Roadrunner. We have control theories (social control, self‐control, power‐control, control balance, see Gottfredson & Hirschi, 1990; Hagan, Gillis, & Simpson, 1985; Hirschi, 1969; Tittle, 1995), learning theories (Akers, 2009; Bandura, 1978), strain theories (classic strain, revised strain, general strain, see Agnew, 1985, 1992; Merton, 1938), rational‐choice theories (from deterrence to Bayesian updating, see Anwar & Loughran, 2011; Nagin & Pogarsky, 2001), theories of support and theories of coercion (Colvin, 2000; Cullen, 1994), as well as those from feminist camps (Daly & Chesney‐Lind, 1988), the Marxian tradition (Quinney, 1974), those aimed at the macro level (Pratt & Cullen, 2005) and those that focus on individuals (Andrews & Bonta, 2010), and integrated theories (Braithwaite, 1989), mid‐range theories (Currie, 1997), general theories (Gottfredson & Hirschi, 1990), and the list goes on. Clearly, we are not suffering from a shortage of ideas.The problem is that we have arguably reached a point where the production of new theoretical explanations is outpacing the production of empirical tests of the core propositions of the theories that we already have. Empirical tests – particularly those conducted under a wide variety of methodological conditions – are necessary if we are, as a field, ever going to know which of our theories are better than others. Ideally, enough tests of a Theory’s core statements would accumulate to the point where a meta‐analysis could be undertaken – something that has already occurred to a limited extent in Criminological Theory (Braga & Weisburd, 2012; Hoeve

  • social support and homicide a cross national test of an emerging Criminological Theory
    Journal of Criminal Justice, 2002
    Co-Authors: Travis C Pratt, Timothy W Godsey
    Abstract:

    The social support (also known as social altruism) perspective in Criminological Theory has emerged as a potentially important explanation of aggregate levels of crime. Recent studies have tested the Theory's ability to predict levels of violent and property crimes at the city and state levels in the United States, yet a formal test of the Theory using data from outside of the U.S. has yet to be conducted. Accordingly, this article draws on insights from social support Theory in a cross-national context. Consistent with the core proposition of the Theory, the analyses show that, net of statistical controls, the indicator of social support is inversely and significantly related to rates of violent crime (measured by homicides). The implications of these results for Criminological Theory development and for the construction of effective crime control policies are discussed.