The rapid mobility of people, money, information, ideas and commodities in the world today has provided new opportunities for crime, and new challenges for law enforcement agencies. Grabosky reviews some of the major themes of crime and crime control in today's small world. He observes that linkages between events and institutions overseas and at home are inevitable, and will proliferate. As this is likely only to increase, he discusses policy implications for crime control in a global village.
Building on an earlier Trends and Issues paper, "The Psychology of Fraud" (No. 199), this paper identifies warning signals for fraud, and proposes some preventive or pre- emptive action. Four fraud types are examined: entrepreneurial fraud; client or employee fraud; direct interpersonal fraud (face-to-face); and indirect mass fraud. Examples of each of these are evident in our daily lives and there are often warning signals. Not all of these "warning signals" are necessarily precursors to fraud, but it should be noted that the most productive investment in fraud control is likely to involve strategies which reduce opportunity and enhance guardianship. The setting or context in which fraud may occur can be more or less conducive to offending. This paper aims to enhance our understanding of the situational elements of fraud risk, to permit the design of effective fraud control systems.
As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about what follows: the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal. Originally published in 2004, this book provides an international study of the manner in which cyber criminals are dealt with by the judicial process. It is a sequel to the groundbreaking Electronic Theft: Unlawful Acquisition in Cyberspace by Grabosky, Smith and Dempsey (Cambridge University Press, 2001). Some of the most prominent cases from around the world are presented in an attempt to discern trends in the handling of cases, and common factors and problems that emerge during the processes of prosecution, trial and sentencing.
Corruption has afflicted Australian public life to varying degrees for the past two centuries. This paper provides an overview of corruption in Australia. It outlines its basic forms, explains why corruption occurs, and spells out what Australian governments and the private sector have done, and can do, to reduce the level of corruption in society.
Results from a national sample provide data on the incidence of alcohol related disorder or crime committed over the past 12 months. Those involved tend to be young and male, and report either consuming alcohol at harmful levels or being binge drinkers.The focus of this paper is on those individuals who are perpetrators rather than victims of such activity. The extent to which individuals have been both victims and perpetrators are also examined.
Fraud, like other crime, can best be explained by three factors: a supply of motivated offenders, the availability of suitable targets and the absence of capable guardians-control systems or someone "to mind the store", so to speak (Cohen & Felson 1979).In this, the first of two papers, the authors focus on motivation and other psychological aspects of fraud. They identify a number of psychological correlates of fraud offending, but note that these are by no means unique to fraud, and do not necessarily differentiate fraudsters from law-abiding citizens. The other two factors, opportunities and guardianship, provide more scope for fraud control and are addressed in a companion paper on "red flags", or situational indicia, of fraud risk.
Understanding Conflict Resolution is a comprehensive introduction to the study of peace and conflict studies. It explores both the historical roots of the study of conflict management, as well as the contemporary settings and the tools available to states, regional and global organizations where these core ideas apply. Drawing on cutting-edge research and examples from around the world, the fifth edition includes: Three new chapters on the key threats and hopes emerging post-2010: one-sided violence, including genocide and terrorism;gendering international affairs; and climate challenges stemming from global warming and the danger of nuclear war Brand new case studies focusing on contemporary events and issues: ISIS; Brexit; Nuclear Arms Race; Refugees as a weapon of war. Learning features such as graphs, data sets, a glossary, annotated further reading lists, and access to a companion website full of online resources. This is an essential text for all students, lecturers and researchers of peace and conflict resolution in international relations, global politics and political science.
This book provides a broad overview of what peace research is all about by an author who has been involved in the field for more than half a century. Among other things it gives a unique review of how peace research emerged in Sweden as the author was a key actor in the most crucial events during this formative period. The book also portrays how the discipline has grown from an initial focus on “alternatives to war” to the comprehensive study of the many dimensions of a “lasting and positive peace”. The author's own work covers causes of war, sanctions, conflict resolution, conflict data, mediation, and quality peace. They demonstrate the range of topics that have to be understood for a peace with quality. This is exemplified by some of the author's writings specifically selected for this volume plus a few ones original to it. Some accounts of the author's involvements in actual peace processes in the 1990s are also included. This publication offers a substantial contribution to understanding the evolution of peace research as a field and is an important reading for scholars, policy makers, journalists, students and any aspiring peace researcher as well as for the public at large. • Peter Wallensteen is a global pioneer of peace research due to his involvement in the creation of the Department of Peace and Conflict Research at Uppsala University ¬– a major center in the field. He served as Head of Department from 1972 to 1999. • Peter Wallensteen set up and directed the well-known Uppsala Conflict Data Program, UCDP, the global resource for the study of armed conflicts and peace negotiations, 1978-2015. • Peter Wallensteen was the first holder of the Dag Hammarskjöld Chair in Peace and Conflict Research at Uppsala University, 1985-2012. • He was also the first holder of the position as the Richard G. Starmann Sr. Research Professor of Peace Studies at the Kroc Institute for International Peace Studies, University of Notre Dame, USA, 2006-2018.
When this book was first published in 2001, the convergence of communications and computing had begun to transform Western industrial societies. Increasing connectivity was accompanied by unprecedented opportunities for crimes of acquisition. The fundamental principle of criminology is that crime follows opportunity, and opportunities for theft abound in the digital age. Electronic Theft named, described and analysed the range of electronic and digital theft, and constituted the first major survey of the field. The authors covered a broad list of electronic misdemeanours, including extortion, defrauding governments, telephone fraud, securities fraud, deceptive advertising and other business practices, industrial espionage, intellectual property crimes, and the misappropriation and unauthorised use of personal information. They were able to capture impressively large amounts of data internationally from both scholarly and professional sources. The book posed and attempted to answer some of the pressing questions to do with national sovereignty and enforceability of laws in 2001.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.