Abstract
In this fourth chapter, it is argued that crime script analysis can prove to be a useful tool to assist management and crime prevention practitioners in assuring that the required controls to mitigate crime are in place and fit for purpose. It links the scripting exercise to (enterprise) risk management and goes on to explore the main building blocks and key features of a somewhat simplified scripting methodology tailored to those tasked with designing or redesigning controls in a workplace environment. Using a step-by-step approach, it further shows how to develop and visualize a proper crime script, how to identify potential intervention points and what to take into consideration when selecting or (re)designing the most adequate preventive controls. Prior to touching upon each of these topics, this chapter will first position script analysis in the wider context of (crime) risk management.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
COSO—the Committee of Sponsoring Organisations of the Treadway Commission—is a joint initiative of five private sector organizations and is dedicated to providing thought leadership through the development of frameworks and guidance on enterprise risk management, internal control and fraud deterrence. For more info, see www.coso.org
- 2.
- 3.
Source: www.businessdictionary.com.
- 4.
Source: www.investopedia.com.
- 5.
Probabilistic techniques include ‘at-risk’ models (e.g. value at risk, cash flow at risk, and earning at risk), assessment of loss events, and back-testing. They measure the likelihood and impact of a range of outcomes based on distributional assumptions of the behaviour of events (COSO 2004: 38).
- 6.
Commonly used non-probabilistic techniques are sensitivity analysis, scenario analysis, and stress testing. Contrary to probabilistic techniques, they are used to quantify the impact of a potential risk event but do not assign likelihood of event occurrence (COSO 2004: 41).
- 7.
Benchmarking techniques are used as they can provide management insight into the likelihood or impact of risks based on experiences of other organisations. They can equally be applied internally, for example, to compare measures of one department or division with others of the same entity (COSO 2004: 44).
- 8.
In attempting to develop a more comprehensive typology of repeat victimization, Farrell and Pease (2008: 121) distinguish between various types of repeats, acknowledging that, in practice, many of them overlap and more than one will be present for any given crime. In their typology of repeats, ‘tactical repeats’ are referred to as repeats where the same tactics are being applied. Other types of repeats include ‘spatial’, ‘temporal’ and ‘crime-type’ repeats (Farrell and Pease 2008: 122).
- 9.
This phenomenon is also referred to as ‘near repeats’.
- 10.
In the case of repeat victimization by the same offender, it is argued, this offender often has a very precise script activated which involves no search time and no capable guardian, as the target is already known in advance (Bouloukos and Farrell 1997: 226). If measures have been put in place to prevent repeat victimization, however, this anticipated script is interrupted, which may cause the offender to desist (at least until a new plan can be formulated) or to give up entirely (Ibid.).
- 11.
Leclerc (in Ekblom and Gill 2015) refers to a script as ‘a journey into the head of the offender during the commission of a crime’, a journey that holds the potential to reveal the offender’s motives as well as other previously unseen situational aspects.
- 12.
Connecting procedural analysis of crime with the wider “human factors” literature on performance errors’, according to Ekblom and Gill (2015), may significantly extend the scope of situational crime prevention. Errors in performance that are due to incompetence, yet according to Ekblom and Gill (Ibid.), may stem from ‘failure to select the script best able to meet the agent’s goals in that situation; failure to understand that improvisation, not stereotyped response, is necessary in particular circumstances; failure to combine script elements in appropriate sequence; or failure in execution’.
- 13.
As Cornish (1994: 169) points out, ‘the potential cost-effectiveness of crime prevention strategies that can address crime “genera” rather than crime “species” makes it tempting to pursue generalization to ever-higher levels of abstraction’. By doing so, however, one may overlook the complexity of much crime as well as the impact of the situational conditions that impact crime commission in its specific setting.
- 14.
In an attempt to define how crime scripts should be developed and what information should be included, Borrion identifies the following 12 quality assurance criteria: typology, traceability, transparency, consistency, context, completeness, parsimony, precision, uncertainty, usability, ambiguity, and accuracy. Yet according to Borrion (2013), these criteria are aimed at supporting the specification, verification, and validation of functional requirements for control measures.
- 15.
Based on a qualitative analysis of 1889 posts, the authors were able to identify a number of key processes and actors including sellers, buyers, suppliers, moderators, administrators, and teachers (Hutchings and Holt 2014: 15–16).
- 16.
This particular study further included a detailed assessment of several open-source case studies (Gilmour 2014: 40).
- 17.
In this respect, however, it is worth noting that offenders, victims, witnesses, or crime controllers do not always provide accurate accounts of their own perceptions, actions and decision making (see also Eck and Weisburd 1995: 18), which means that data obtained from these parties will often need to be verified with that retrieved from other sources.
- 18.
Ekblom and Gill (2015) define ‘agents’ as people in general with offenders being a specific subset.
- 19.
As Cornish (1994: 156) point outs, identifying the time scales involved may prove to be very difficult as some opportunities noted on one particular occasion may be exploited at a much later date. Similarly, a variety of preliminary activities may be carried out over a period of days, weeks, or even longer before the actual crime event (Cornish 1994: 156).
- 20.
In their analysis of the online market for stolen data, Hutchings and Holt note that although their study is based primarily on stolen data markets, some aspects of the script process may also be applicable to other online black markets such as those that specialize in drugs or weapons (Hutchings and Holt 2014: 16).
- 21.
According to the authors, ‘behaviors that are observable and can be identified as common patterns in sexual offending represent excellent targets for the development of prevention efforts involving parents, family members, professionals and community members’ (Kaufman et al. 2006: 106).
- 22.
Organized crime is a classic example of a crime type where multiple offenders are involved.
- 23.
According to Madensen (2007, in Eck and Guerette 2012: 358), place managers have four main functions. They organize the physical environment, regulate conduct, control access, and acquire resources. They make decisions about the physical and social environment of places and may produce crime by failing to take the right decisions (or to take no decisions at all).
- 24.
As Ekblom and Gill (2015) continue, the competence–performance distinction is central to linking functional and causal perspectives on behaviour sequences. Its practical significance ‘resides in understanding and influencing how offenders acquire, develop and evolve procedural competences as resources for committing crime’ and in ‘how competence is converted into performance on specific occasions’ (Ekblom and Gill 2015). ‘The versatility of competences and the capacity for improvisation where these reach the limits of their scope during performance both determine the adaptability of offenders’ (Ibid.).
- 25.
As argued by Ekblom and Gill (2015), an understanding of scripts can be far richer if the ‘traditional crime science focus on decisions’ would be extended to incorporate dual-process thinking and behaviour, meaning a focus on both a ‘frequent, unconscious, habitual process’ as well as on a ‘rarer, narrow-capacity, deliberative process’.
- 26.
In this section, ‘controls’ and ‘measures’ are used interchangeably.
- 27.
- 28.
As argued by Bowers and Johnson (2003), research indicates that crime displacement is not a necessary outcome of crime prevention activity, and it is also possible that crime reduction schemes may have a diffusion of benefits. Furthermore, it has been argued that even where displacement occurs, there may be some benefit to this (e.g. offenders choosing to commit less serious types of crimes than those prevented). A systematic review of 102 evaluations of situational crime prevention initiatives by Guerette and Bowers (2009) further supports the view that crime does not necessarily relocate in the aftermath of situational interventions.
- 29.
According to Clarke and Weisburd (1994, in Johnson et al. 2012: 338), crime-control benefits might be diffused through two mechanisms. First, as offenders will rarely be aware of the full scope and boundaries of a preventive intervention, they may overestimate its coverage and perceive an unjustified increase in the risk of being apprehended. Second, offenders may perceive the effort required to seek alternative opportunities (i.e. opportunities outside the scope of the intervention), or the effort associated with targeting those that are more difficult to attack as a result of the intervention, as outweighing the perceived benefits (Clarke and Weisburd 1994, in Johnson et al. 2012: 339).
- 30.
Improved customer loyalty and employee commitment, higher supply chain visibility and improved efficiency are just some examples of beneficial side effects (or ‘collateral benefits’) that are frequently referred to in literature as resulting from the introduction of (anti-terrorism) supply chain security measures (Tyska and Fennelly 2001; Rice and Spayd 2005; Peleg-Gillai et al. 2006).
References
AIRMIC, Alarm, & IRM. (2010). A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000. Retrieved October 1, 2015, from https://www.theirm.org/media/886062/ISO3100_doc.pdf
Albanese, J. S. (2010). Assessing risk, harm, and threat to target resources against organized crime: A method to identify the nature and severity of the professional activity of organized crime and its impacts (p. 20). Working Papers Series No. 12. Santiago: Global Consortium on Security Transformation (GCST).
Bamfield, J. (1994). Electronic Article Surveillance: Management learning in curbing theft. In M. Gill (Ed.), Crime at work (pp. 156–174). Leicester: Perpetuity Press.
Beck, A., & Willis, A. (1994). Customer and staff perceptions of the role of closed circuit television in retail security. In M. Gill (Ed.), Crime at work (pp. 186–202). Leicester: Perpetuity Press.
Bichler, G., & Clarke, R. V. (1997). Eliminating pay phone toll fraud at the port authority bus terminal in Manhattan. In R. V. Clarke (Ed.), Situational crime prevention. Successful case studies (2nd ed., pp. 98–112). New York: Harrow and Heston.
Bichou, K. (2008). Security and risk-based models in shipping and ports: Review and critical analysis. Retrieved November 5, 2012, from http://www.internationaltransportforum.org/jtrc/discussionpapers/DP200820.pdf
de Bie, J. L., de Poot, C. J., & van der Leun, J. P. (2015). Shifting modus operandi of Jihadist foreign fighters from the Netherlands between 2000 and 2013: A crime script analysis. Terrorism and Political Violence, 27(3), 416–440.
BIS—Bank for International Settlements. (2005). Compliance and the compliance function in banks. Retrieved October 2, 2015, from http://www.bis.org/publ/bcbs113.pdf
Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(6), 1–12.
Bouloukos, A. C., & Farrell, G. (1997). On the displacement of repeat victimization. In G. Newman, R. V. Clarke, & S. G. Shoham (Eds.), Rational choice and situational crime prevention. Theoretical foundations (pp. 219–231). Aldershot: Ashgate Dartmouth.
Bowers, K. J., & Johnson, S. D. (2003). Measuring the geographical displacement and diffusion of benefit effects of crime prevention activity. Journal of Quantitative Criminology, 19(3), 275–301.
Brayley, H., Cockbain, E., & Laycock, G. (2011). The value of crime scripting: Deconstructing internal child sex trafficking. Policing, 5(2), 132–143.
Cascarino, R. E. (2013). Corporate fraud and internal control. A framework for prevention (p. 388). New Jersey: Wiley & Sons Inc.
Clarke, R. V. (Ed.). (1992). Situational crime prevention. Successful case studies (p. 286). New York: Harrow and Heston.
Clarke, R. V. (Ed.). (1997a). Situational crime prevention. Successful case studies (2nd ed., p. 357). New York: Harrow and Heston.
Clarke, R. V. (1997b). Introduction. In R. V. Clarke (Ed.), Situational crime prevention. Successful case studies (2nd ed., pp. 1–44). New York: Harrow and Heston.
Clarke, R. V. (2005). Seven misconceptions of situational crime prevention. In N. Tilley (Ed.), Handbook of crime prevention and community safety (pp. 39–70). Devon: Willan Publishing.
Clarke, R. V. (2008). Situational crime prevention. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis (pp. 178–194). Devon: Willan Publishing.
Clarke, R. V., & Eck, J. (2003). Become a problem-solving crime analyst. London: Jill Dando Institute of Crime Science, University College London. Retrieved June 21, 2007, from http://www.jdi.ucl.ac.uk/publications/other_publications/55steps
Clarke, R. V., & Felson, M. (2004). Introduction: Criminology, routine activity, and rational choice. In R. V. Clarke & M. Felson (Eds.), Routine activity and rational choice (pp. 1–14). New Jersey: Transaction Publishers.
Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies, Volume 3 (pp. 151–196). Monsey, NY: Criminal Justice Press.
Cornish, D. B. (2014). Foreword. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. xvii–xxi). New York: Routledge.
Cornish, D. B., & Clarke, R. V. (2008). The rational choice perspective. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis (pp. 21–47). Devon: Willan Publishing.
Cornish, D. B., & Smith, M. J. (2012). On being crime specific. In N. Tilley & G. Farrell (Eds.), The reasoning criminologist. Essays in honour of Ronald V. Clarke (pp. 30–45). Abingdon, Oxon: Routledge.
COSO. (2004). Enterprise Risk Management—Integrated framework. Application techniques (p. 105). The Committee of Sponsoring Organizations of the Treadway Commission.
Crowe, T. (2000). Crime prevention through environmental design (2nd ed., p. 333). National Crime Prevention Institute. Boston: Butterworth-Heinemann.
Deloitte & Touche. (2012). Risk assessment in practice (p. 22). Research commissioned by COSO—Committee of Sponsoring Organisations of the Treadway Commission.
Deloitte. (2014). Deloitte on disruption. Deloitte Development LLC. Retrieved July 28, 2015, from http://www2.deloitte.com/us/en/pages/risk/articles/deloitte-on-disruption.html
Duff, R. A., & Marshall, S. E. (2000). Benefits, burdens and responsibilities: Some ethical dimensions of situational crime prevention. In A. von Hirsch, D. Garland, & A. Wakefield (Eds.), Ethical and social perspectives on situational crime prevention (pp. 17–35). Oxford and Portland, OR: Hart Publishing.
Eck, J. E., & Guerette, R. T. (2012). Place-based crime prevention: Theory, evidence, and policy. In B. C. Welsh & D. P. Farrington (Eds.), The Oxford handbook of crime prevention (pp. 354–383). New York: Oxford University Press.
Eck, J., & Weisburd, D. (1995). Crime places in crime theory. In J. Eck & D. Weisburd (Eds.), Crime prevention studies, Volume 4. Crime and place (pp. 1–33). Monsey, NY: Criminal Justice Press.
Ekblom, P., & Gill, M. (2015). Rewriting the script: Cross-disciplinary exploration and conceptual consolidation of the procedural analysis of crime. European Journal on Criminal Policy and Research. doi:10.1007/s10610-015-9291-9.
Ekwall, D. (2009). The displacement effect in cargo theft. International Journal of Physical Distribution & Logistics Management, 39(1), 47–62.
Farrell, G., & Pease, K. (2008). Repeat victimisation. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis (pp. 117–135). Devon: Willan Publishing.
Felson, M. (1998). Crime and everyday life (2nd ed., p. 223). London: Pine Forge Press.
Gill, M. (1994). Introducing crime at work. In M. Gill (Ed.), Crime at work (pp. 1–10). Leicester: Perpetuity Press.
Gill, M. (Ed.). (1998). Crime at work, Volume 2: Increasing the risk for offenders (p. 217). Leicester: Perpetuity Press.
Gilmour, N. (2014). Understanding money laundering. A crime script approach. The European Review of Organised Crime, 1(2), 35–56.
Grabosky, P. N. (1996). Unintended consequences of crime prevention. In R. Homel (Ed.), Crime prevention studies, Volume 4. The politics and practice of situational crime prevention (pp. 25–56). Monsey, NY: Criminal Justice Press.
Grove, L., & Farrell, G. (2012). Once bitten, twice shy: Repeat victimization and its prevention. In B. C. Welsh & D. P. Farrington (Eds.), The Oxford handbook of crime prevention (pp. 404–419). New York: Oxford University Press.
Guerette, R. T. (2009). Analyzing crime displacement and diffusion. Center for Problem Oriented Policing Tool Guide No. 10. Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services.
Guerette, R. T., & Bowers, K. J. (2009). Assessing the extent of crime displacement and diffusion of benefits: A review of situational crime prevention evaluations. Criminology, 47(4), 1331–1368.
Haelterman, H. (2009). Situational crime prevention and supply chain security: An ex ante consideration of preventive measures. Journal of Applied Security Research, 4, 483–500.
Haelterman, H. (2011). Re-thinking the cost of supply chain security. Crime, Law and Social Change, 56(4), 389–405.
Haelterman, H. (2013). Situational crime prevention and supply chain security. Theory for best practice (p. 60). CRISP Report. Alexandria, VA: ASIS Foundation Research Council.
Haelterman, H., Callens, M., & Vander Beken, T. (2012). Controlling access to pick-up and delivery vans: The cost of alternative measures. European Journal on Criminal Policy and Research, 18(2), 163–182.
Hamilton-Smith, N. (2002). Anticipated consequences: Developing a strategy for the targeted measurement of displacement and diffusion of benefits. In N. Tilley (Ed.), Crime prevention studies, Volume 14. Evaluation for crime prevention (pp. 11–52). Monsey, NY/Devon: Criminal Justice Press/Willan Publishing.
Hamilton-Smith, N., & Mackenzie, S. (2010). The geometry of shadows: A critical review of organised crime risk assessment. Policing & Society, 20(3), 257–279.
Hardie, J., & Hobbs, B. (2005). Partners against crime: The role of the corporate sector in tackling crime. In R. V. Clarke & G. R. Newman (Eds.), Crime prevention studies, Volume 18. Designing out crime from products and systems (pp. 85–140). Monsey, NY/Cullompton, UK: Criminal Justice Press/Willan Publishing.
Hirschfield, A. (2005). Analysis for intervention. In N. Tilley (Ed.), Handbook of crime prevention and community safety (pp. 629–673). Cullompton, UK: Willan Publishing.
Hutchings, A., & Holt, T. J. (2014). A crime script analysis of the online stolen data market. British Journal of Criminology. doi:10.1093/bjc/azu106. Retrieved January 12, 2015, from http://bjc.oxfordjournals.org/
ISO—International Organization for Standardization. (2015). ISO 31000 Risk Management. Retrieved October 3, 2015, from http://www.iso.org/iso/home/standards/iso31000.htm
Jacques, C. (1994). Ram raiding: The history, incidence and scope for prevention. In M. Gill (Ed.), Crime at work (pp. 42–55). Leicester: Perpetuity Press.
Johnson, S. D., Guerette, R. T., & Bowers, K. J. (2012). Crime displacement and diffusion of benefits. In B. C. Welsh & D. P. Farrington (Eds.), The Oxford handbook of crime prevention (pp. 337–353). New York: Oxford University Press.
Kaufman, K. L., Mosher, H., Carter, M., & Estes, L. (2006). An empirically based situational prevention model for child sexual abuse. In F. Wortley & S. Smallbone (Eds.), Crime prevention studies, Volume 19. Situational prevention of child sexual abuse (pp. 101–144). Monsey, NY: Criminal Justice Press.
Knutsson, J., & Clarke, R. V. (2006). Introduction. In J. Knutsson & R. V. Clarke (Eds.), Crime prevention studies, Volume 20. Putting theory to work: Implementing situational prevention and problem-oriented policing (pp. 1–8). Monsey, NY/Cullompton, UK: Criminal Justice Press/Willan Publishing.
Laycock, G. (2005). Deciding what to do. In N. Tilley (Ed.), Handbook of crime prevention and community safety (pp. 674–698). Cullompton, UK: Willan Publishing.
Leclerc, B., & Wortley, R. (2014). The reasoning criminal. Twenty-five years on. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 1–11). New York: Routledge.
Mayhew, P., Clarke, R. V. G., Sturman, A., & Hough, J. M. (1976). Crime as opportunity. Home Office Research Study No. 34 (p. 29). London: Her Majesty’s Stationery Office.
Moreto, W. D., & Clarke, R. V. (2014). Script analysis of the transnational illegal market in endangered species. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 209–220). New York: Routledge.
Morgan, R., & Cornish, D. (2006). Understanding local transport crime problems. In M. J. Smith & D. B. Cornish (Eds.), Secure and tranquil travel: Preventing crime and disorder on public transport (pp. 29–42). London: UCL Jill Dando Institute of Crime Science.
Newburn, T. (2007). Criminology (p. 1019). Devon: Willan Publishing.
Newman, G. (1997). Introduction: Towards a theory of situational crime prevention. In G. Newman, R. V. Clarke, & S. G. Shoham (Eds.), Rational choice and situational crime prevention. Theoretical foundations (pp. 1–23). Aldershot: Ashgate Dartmouth.
Newman, G. R., & Clarke, R. V. (2003). Superhighway robbery. Preventing E-commerce crime (p. 224). Cullompton, UK: Willan Publishing.
Peleg-Gillai, B., Bhat, G., & Sept, L. (2006). Innovators in supply chain security: Better security drives business value (The Manufacturing Innovation Series, p. 35). Washington, DC: Stanford University—The Manufacturing Institute.
POP Center—Center for Problem-Oriented Policing. n.d. Twenty five techniques of situational prevention. Retrieved June 23, 2011, from http://www.popcenter.org/25techniques
Rice, J. B., & Spayd, P. W. (2005). Investing in supply chain security: Collateral benefits. Special Report Series. IBM Center for the Business of Government. Retrieved October 16, 2008, from http://www.businessofgovernment.org/pdfs/Rice_Report.pdf
Ritter, L., Barrett, J. M., & Wilson, R. (2007). Securing global transportation networks. A total security management approach (p. 276). New York: McGraw-Hill.
Samonas, S. (2013). Insider fraud and routine activity theory. London School of Economics and Political Science. Retrieved December 27, 2014, from http://eprints.lse.ac.uk/50344
Savona, E. U., Giommoni, L., & Mancuso, M. (2014). Human trafficking for sexual exploitation in Italy. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 140–163). New York: Routledge.
Shapland, J. (2000). Situational prevention: Social values and social viewpoints. In A. von Hirsch, D. Garland, & A. Wakefield (Eds.), Ethical and social perspectives on situational crime prevention (pp. 113–123). Oxford and Portland, OR: Hart Publishing.
Smith, M. J., & Clarke, R. V. (2012). Situational crime prevention: Classifying techniques using “good enough” theory. In B. C. Welsh & D. P. Farrington (Eds.), The Oxford handbook of crime prevention (pp. 291–315). New York: Oxford University Press.
Tilley, N. (2005). Introduction: Thinking realistically about crime prevention. In N. Tilley (Ed.), Handbook of crime prevention and community safety (pp. 3–13). Devon: Willan Publishing.
Tompson, L., & Chainey, S. (2011). Profiling illegal waste activity: Using crime scripts as a data collection and analytical strategy. European Journal on Criminal Policy and Research, 17, 179–201.
Tusikov, N., & Fahlman, R. (2009). Threat and risk assessment. In J. Ratcliffe (Ed.), Strategic thinking in criminal intelligence (pp. 147–164). Sydney: The Federation Press.
Tyska, L. A., & Fennelly, L. J. (2001). Cargo theft prevention. A handbook for logistics security (p. 421). Alexandria, VA: American Society for Industrial Security.
Vander Beken, T. (2004). Risky business: A risk-based methodology to measure organized crime. Crime, Law and Social Change, 41(5), 471–516.
Vettenburg, N., Burssens, D., Goris, P., Melis, B., Van Gils, J., Verdonck, D., & Walgrave, L. (2003). Preventie Gespiegeld. Visie en instrumenten voor wenselijke preventie (p. 120). Heverlee: Lannoo Campus.
Waring, A. E., & Glendon, A. I. (1998). Managing risk. Critical issues for survival and success into the 21st century (p. 493). London: Thomson Learning.
Welsh, B. C., & Farrington, D. P. (1999). Value for money? A review of the costs and benefits of situational crime prevention. British Journal of Criminology, 39(3), 345–368.
Williams, K. S. (2004). Textbook on criminology (5th ed., p. 569). New York: Oxford University Press.
Wortley, R. (2001). A classification of techniques for controlling situational precipitators of crime. Security Journal, 14(4), 63–82.
Wortley, R. (2008). Situational precipitators of crime. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis (pp. 48–69). Devon: Willan Publishing.
Wortley, R., & Mazerolle, L. (Eds.). (2008a). Environmental criminology and crime analysis (p. 294). Devon: Willan Publishing.
Wortley, R., & Mazerolle, L. (2008b). Environmental criminology and crime analysis: Situating the theory, analytic approach and application. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis (pp. 1–18). Devon: Willan Publishing.
Author information
Authors and Affiliations
Copyright information
© 2016 The Editor(s) (if applicable) and The Author(s)
About this chapter
Cite this chapter
Haelterman, H. (2016). Scripting Crime Against Business. In: Crime Script Analysis. Crime Prevention and Security Management. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-54613-5_4
Download citation
DOI: https://doi.org/10.1057/978-1-137-54613-5_4
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-54612-8
Online ISBN: 978-1-137-54613-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)