Advertisement

Stopping the Process from Beginning: Avoid Becoming a Target

  • James F. KennyEmail author
Chapter

Abstract

It is difficult to stop someone who is committed to and has attained the means and access to commit the crime. It is easier to stop them before they get to that point. Those individuals that take steps to be unnoticed, unwanted, and unreachable by criminals may not be deemed worthy targets. Those who avoid dangerous situations and contributing to the criminal victimization process may cause aggressors to focus their attention elsewhere. Individuals can make themselves undesirable targets by limiting their vulnerabilities, accessibility, high-risk activities, and rewards. In addition, they can increase the perceived risks of an attack by developing strategies to protect themselves and detect a criminal advance.

References

  1. American Immigration Council. (2018). Violence Against Women Act (VAWA) provides protections for immigrant women and victims of crime. Retrieved July 11, 2018, from https://www.americanimmigrationcouncil.org/research
  2. ASIS International. (2005). Workplace violence prevention and response guideline. Alexandria, VA: ASIS International Commission on Guidelines.Google Scholar
  3. Bureau of Justice Statistics. (n.d.). Detailed place of occurrence for violent and property crimes, annual average 2004–2008. Retrieved April 14, 2019 from https://www.bjs.gov/index.cfm?ty=tpttid=44=survey
  4. Cromwell, P., Olson, J., & Avary, D. (2003). Decision strategies of residential burglars. In P. Cromwell (Ed.), In their own words: Criminals on crime. Los Angeles: Roxbury Publishing Company.Google Scholar
  5. Federal Trade Commission. (2018). Identity theft. Retrieved July 21, 2018 from https://www.identitytheft.gov
  6. Fein, R., Vossekuil, B., & Holden, G. (1995). Threat assessment: An approach to preventing targeted violence. Washington, DC: National Institute of Justice.Google Scholar
  7. Futures Without Violence. (2018). Retrieved July 12, 2018 from https://www.futureswithoutviolence.org/immigrant-women-and-domestic-violence
  8. Government Training Institute. (1998). National symposium on workplace violence. Washington, DC: GTI.Google Scholar
  9. Kondolojy, A. (2016). 5 security changes happening now at Disney Parks. Theme Park Tourist. Retrieved April 13, 2019 from https://www.themeparktourist.com/news/2016615/32008
  10. Metropolitan Police. (2018a). Burglars tend to target windows at they are easier to access than doors. Retrieved July 16, 2018 from https://www.met.police.uk/cp/crime-prevention/residentialburglary
  11. Metropolitan Police. (2018b). Mark your property to deter burglars. Retrieved July 16, 2018 from https://www.met.police.uk/cp/crime-prevention/residentialburglary
  12. Metropolitan Police. (2018c). Give burglars no where to hide. Retrieved October 17, 2018 from https://www.met.police.uk/cp/crime-prevention/residentialburglary
  13. National Crime Insurance Bureau. (2018). NCIB’s 2017 hot spots vehicle theft report. Retrieved July 22, 2018 from https://www.nicb.org
  14. National Institute of Justice. (n.d.). Crime and crime prevention. Retrieved June 5, 2009 from https://www.crimesolutions.gov
  15. National Institute of Occupational Safety and Health. (2006). Workplace violence prevention strategies and research needs, publication no. 2006-144. Washington, DC: NIOSH.Google Scholar
  16. Occupational Safety and Health Administration. (2004). Guidelines for preventing workplace violence for health and social service workers. Washington, DC: U.S. Department of Labor.CrossRefGoogle Scholar
  17. Office of Victims of Crime. (2018). Promising practices in serving crime victims with disabilities. Retrieved July 12, 2018 from https://www.ovc.gov/publications/infores/ServingVictimsWithDisabilities
  18. Patire, T. (2003). Personal protection handbook. New York: Three Rivers Press.Google Scholar
  19. Rape, Abuse, and Incest National Network [RAINN]. (2018). Safety and prevention. Retrieved July 20, 2018 from https://www.rainn.org/articles/safety-and-prevention
  20. Rugala, E., & Isaacs, A. (2004). Workplace violence: Issues in response. Quantico, VA: Critical Incident Response Group, FBI Academy.Google Scholar
  21. Sacco, V., & Kennedy, L. (2002). The criminal event: Perspectives in space and time. Belmont, CA: Wadsworth Thomson Learning.Google Scholar
  22. Schwartz, M., Abramson, W., & Kamper, H. (2004). A national survey on the accessibility of domestic violence and sexual assault services to women with disabilities. Unpublished data. Austin, TX: Safe Place.Google Scholar
  23. Shearing, C., & Stenning, P. (1984). From the panopticon to Disney world: The development of discipline. In A. Doob & E. Greenspan (Eds.), Perspectives in criminal law (pp. 335–349). Aurora: Canada Law Book.Google Scholar
  24. Sinozich, S. (2014). Rape and sexual assault victimization among college-age females, 1995–2013. Washington, DC: Bureau of Justice Statistics.Google Scholar
  25. Stalking Resource Center. (2018). Stalking safety planning. The National Office of victims of crime. Retrieved July 10, 2018 from https://www.victimsofcrime.org/our-programs/stalking-resource-center
  26. U.S. Department of Human Services. (1997). Understanding and responding to violence in the workplace. Washington, DC: USDHHS.Google Scholar
  27. U.S. Department of Labor. (1996). Protecting community workers against violence. Washington, DC: USDL.Google Scholar
  28. U.S. Secret Service. (2008). Prior knowledge of potential school-based violence: Information students learn may prevent a targeted attack. Washington, DC: U.S. Secret Service and U.S. Department of Education.Google Scholar
  29. Victims of Immigration Crime Engagement {VOICE} Office. (2018). Retrieved July 12, 2018 from https://www.ice.gov/voice
  30. Walt Disney World. (2019). Park and resort security measures. Retrieved April 13, 2019 from https://disneyworld.disney.go.com/guest-services/park-security
  31. Wolfgang, M. (1958). Patterns in criminal homicide. Philadelphia, PA: University of Pennsylvania Press.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.Fairleigh Dickinson UniversityTeaneckUSA

Personalised recommendations