Skip to main content

Environmental Criminology and Cybercrime: Shifting Focus from the Wine to the Bottles

  • Reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

This chapter addresses the ability of the criminological approaches that comprise Environmental Criminology to constitute an adequate theoretical framework to analyze and understand the situational aspects of crimes committed through cyberspace and to define the most appropriate prevention strategies. The chapter begins by examining how these approaches have been applied. Subsequently, the reasons why the environmental approach can offer much more in this area if some apparent obstacles are overcome are presented. Finally, a method of applying these midrange theoretical frameworks to different cybercrimes is proposed. Relying on multiple empirical studies, it is stated that the essential premise of the environmental approach is also observed in cybercrime: the existence of situational patterns. These patterns are derived from the different ways in which offenders and targets, in the absence of guardians, converge in cyber places: digital interaction environments that shape the situational opportunities in which people interact. The chapter ends by summarizing the application possibilities of approaches such as the Crime Pattern Theory and Situational Crime Prevention in connection with the Routine Activity Theory and the Rational Choice Theory. It is proposed that many of the geographical applications derived from these approaches and some of their basic theoretical premises need to be adapted while seeking to enhance their strengths and mitigate the effects of their weaknesses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 649.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Agarwal, N., Gupta, R., Singh, S. K., & Saxena, V. (2017). Metadata based multi-labelling of YouTube videos. In 7th international conference on cloud computing, data science & engineering-confluence (pp. 586–590). Noida: IEEE. https://doi.org/10.1109/CONFLUENCE.2017.7943219.

    Chapter  Google Scholar 

  • Aldridge, J., & DĂ©cary-HĂ©tu, D. (2014). Not an ‘Ebay for Drugs’: The Cryptomarket ‘Silk Road’ as a paradigm shifting criminal innovation. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2436643.

  • Barr, R., & Pease, K. (1990). Crime placement, displacement, and deflection. Crime and Justice, 12, 277–318. https://doi.org/10.1086/449167.

    Article  Google Scholar 

  • Birks, D., Townsley, M., & Stewart, A. (2012). Generative explanations of crime: Using simulation to test criminological theory. Criminology, 50(1), 221–254. https://doi.org/10.1111/j.1745-9125.2011.00258.x.

    Article  Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.

    Google Scholar 

  • Bossler, A., & Holt, T. J. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. New York: Routledge.

    Google Scholar 

  • Bottoms, A. (2012). Developing socio-spatial criminology. In M. Maguire, R. Morgan, & R. Reiner (Eds.), The Oxford handbook of criminology (pp. 450–488). Oxford: Oxford University Press. https://doi.org/10.1093/he/9780199590278.003.0016.

    Chapter  Google Scholar 

  • Bowers, K., & Johnson, S. D. (2016). Situational prevention. In D. Weisburd, D. P. Farrington, & C. Gill (Eds.), What works in crime prevention and rehabilitation: Lessons from systematic reviews (pp. 111–136). New York: Springer.

    Chapter  Google Scholar 

  • Braga, A. A. (2005). Hot spots policing and crime prevention: A systematic review of randomized controlled trials. Journal of Experimental Criminology, 1(3), 317–342. https://doi.org/10.1007/s11292-005-8133-z.

    Article  Google Scholar 

  • Brantingham, P. L. (2011). Computational criminology. In 2011 European intelligence and security informatics conference (EISIC) (pp. 3–3). Athens, Greece IEEE.

    Google Scholar 

  • Brantingham, P. L., & Brantingham, P. J. (1981). Notes on the geometry of crime. In P. J. Brantingham & P. L. Brantingham (Eds.), Environmental criminology (pp. 27–53). Beverly Hills: SAGE.

    Google Scholar 

  • Brantingham, P., & Brantingham, P. (1995). Criminality of place. European Journal on Criminal Policy and Research, 3(3), 5–26. https://doi.org/10.1007/BF02242925.

    Article  Google Scholar 

  • Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., & Chon, S. (2014). An analysis of the nature of groups engaged in cyber crime. International Journal of Cyber Criminology, 8(1), 1–20.

    Google Scholar 

  • Burnap, P., & Williams, M. L. (2015). Cyber hate speech on twitter: An application of machine classification and statistical modeling for policy and decision making. Policy and Internet, 7(2), 223–242. https://doi.org/10.1002/poi3.85.

    Article  Google Scholar 

  • Caneppele, S., & Aebi, M. F. (2017). Crime drop or police recording flop? On the relationship between the decrease of offline crime and the increase of online and hybrid crimes. Policing: A Journal of Policy and Practice. https://doi.org/10.1093/police/pax055.

  • Capone, D., & Nichols, W. J. (1976). Urban structure and criminal mobility. American Behavioral Scientist, 20(2), 199–213. https://doi.org/10.1177/000276427602000203.

    Article  Google Scholar 

  • Choi, K. S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394–402. https://doi.org/10.1016/j.chb.2017.03.061.

    Article  Google Scholar 

  • Clarke, R. V. (1992). Situational crime prevention: Successful case studies. New York: Harrow and Heston Publishers.

    Google Scholar 

  • Clarke, R. V. (1997). Situational crime prevention: Successful case studies (2nd ed.). Guilderland: Harrow and Heston Publishers.

    Google Scholar 

  • Clarke, R. V. (2010). Crime science. In E. McLaughlin & T. Newburn (Eds.), The SAGE handbook of criminological theory (pp. 271–283). London: SAGE. https://doi.org/10.4135/9781446200926.n15.

    Chapter  Google Scholar 

  • Clarke, R. V. (2018). Book review [Review of the book Place matters: Criminology for the twenty-first century, by Weisburd, D., Eck, J. E., Braga, A. A., & Cave, B.]. Journal of Criminal Justice Education, 29(1), 157–159.

    Article  Google Scholar 

  • Clarke, R. V., & Weisburd, D. (1994). Diffusion of crime control benefits: Observations on the reverse of displacement. Crime Prevention Studies, 2, 165–184.

    Google Scholar 

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.

    Article  Google Scholar 

  • Cornish, D. B., & Clarke, R. V. (1986). The reasoning criminal. New York: Springer.

    Book  Google Scholar 

  • Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies, 16, 41–96.

    Google Scholar 

  • Cozens, P. M., Saville, G., & Hillier, D. (2005). Crime prevention through environmental design (CPTED): A review and modern bibliography. Property Management, 23(5), 328–356. https://doi.org/10.1108/02637470510631483.

    Article  Google Scholar 

  • Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204. https://doi.org/10.1177/0269758015571471.

    Article  Google Scholar 

  • Cullen, F. T., & Kulig, T. C. (2018). Evaluating theories of environmental criminology: Strengths and weaknesses. In G. J. N. Bruinsma & S. D. Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 160–176). Oxford: Oxford University Press. https://doi.org/10.1093/oxfordhb/9780190279707.013.7.

    Chapter  Google Scholar 

  • DĂ©cary-HĂ©tu, D., & Morselli, C. (2011). Gang presence in social network sites. International Journal of Cyber Criminology, 5(2), 876–890.

    Google Scholar 

  • Eck, J. (1994). Drug markets and drug places: A case-control study of the spatial structure of illicit drug dealing. Doctoral dissertation, University of Maryland.

    Google Scholar 

  • Ekblom, P. (1997). Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk Security and Crime Prevention, 2, 249–266.

    Google Scholar 

  • Felson, M. (1986). Linking criminal choices, routine activities, informal control, and criminal outcomes. In D. Cornish & R. Clarke (Eds.), The reasoning criminal (pp. 119–128). Secaucus: Springer.

    Chapter  Google Scholar 

  • Felson, M. (2012). PrĂ³logo. In F. MirĂ³-Llinares (Ed.), El Cibercrimen. FenomenologĂ­a y criminologĂ­a de la delincuencia en el ciberespacio [Foreword] (pp. 13–16). Madrid: Martial Pons.

    Google Scholar 

  • Felson, M., & Eckert, M. (2016). Crime and everyday life (5th ed.). Los Angeles: SAGE.

    Google Scholar 

  • Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96–104. https://doi.org/10.1145/2818717.

    Article  Google Scholar 

  • Gabor, T. (1981). The crime displacement hypothesis: An empirical examination. Crime & Delinquency, 27(3), 390–404. https://doi.org/10.1177/001112878102700306.

    Article  Google Scholar 

  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243–249. https://doi.org/10.1177/a017405.

    Article  Google Scholar 

  • Guerette, R. T., & Bowers, K. J. (2009). Assessing the extent of crime displacement and diffusion of benefits: A review of situational crime prevention evaluations. Criminology, 47(4), 1331–1368. https://doi.org/10.1111/j.1745-9125.2009.00177.x.

    Article  Google Scholar 

  • Guerry, A. M. (1833). Essai sur la statistique morale de la France. Paris: Crochard.

    Google Scholar 

  • Guo, R. M. (2008). Stranger danger and the online social network. Berkeley Technology Law Journal, 23(1), 617–644. https://doi.org/10.15779/Z38J69J.

    Article  Google Scholar 

  • Harries, K. D. (1976). Cities and crime: A geographic model. Criminology, 14, 369–386. https://doi.org/10.1111/j.1745-9125.1976.tb00029.x.

    Article  Google Scholar 

  • Harries, K. (1999). Mapping crime: Principles and practice. Washington, DC: National Institute of Justice.

    Google Scholar 

  • Hartel, P. H., Junger, M., & Wieringa, R. J. (2010). Cyber-crime science = crime science + information security. University of Twente. Retrieved from https://research.utwente.nl/files/5095739/0_19_CCS.pdf

  • Hinduja, S., & Kooi, B. (2013). Curtailing cyber and information security vulnerabilities through situational crime prevention. Security Journal, 26(4), 383–402. https://doi.org/10.1057/sj.2013.25.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/10.1080/01639620701876577.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2013). Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice, 29(4), 420–436. https://doi.org/10.1177/1043986213507401.

    Article  Google Scholar 

  • Holt, T. J., Smirnova, O., & Hutchings, A. (2016). Examining signals of trust in criminal markets online. Journal of Cybersecurity, 2(2), 137–145. https://doi.org/10.1093/cybsec/tyw007.

    Article  Google Scholar 

  • Holt, T. J., van Wilsem, J., van de Weijer, S., & Leukfeldt, R. (2018). Testing an integrated self-control and routine activities framework to examine malware infection victimization. Social Science Computer Review. https://doi.org/10.1177/0894439318805067.

  • Hosseinmardi, H., Mattson, S. A., Rafiq, R. I., Han, R., Lv, Q., & Mishra, S. (2015). Detection of cyberbullying incidents on the Instagram social network. arXiv preprint arXiv:1503.03909.

    Google Scholar 

  • Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163–1178. https://doi.org/10.1080/01639625.2016.1169829.

    Article  Google Scholar 

  • Hutchings, A., & Holt, T. J. (2014). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596–614. https://doi.org/10.1093/bjc/azu106.

    Article  Google Scholar 

  • Hutchings, A., & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11–30. https://doi.org/10.1080/17440572.2016.1197123.

    Article  Google Scholar 

  • Jeffery, C. R. (1977). Crime prevention through environmental design. Beverly Hills: SAGE.

    Google Scholar 

  • Junger, M., Montoya, L., Hartel, P., & Heydari, M. (2017). Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe. In 2017 international conference on cyber situational awareness, data analytics and assessment (cyber SA) (pp. 1–8). London, United Kingdom, IEEE. https://doi.org/10.1109/CyberSA.2017.8073391.

  • Khey, D. N., & Sainato, V. A. (2013). Examining the correlates and spatial distribution of organizational data breaches in the United States. Security Journal, 26(4), 367–382. https://doi.org/10.1057/sj.2013.24.

    Article  Google Scholar 

  • Kigerl, A. (2012). Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4), 470–486. https://doi.org/10.1177/0894439311422689.

    Article  Google Scholar 

  • Kigerl, A. C. (2013). Infringing nations: Predicting software piracy rates, bittorrent tracker hosting, and p2p file sharing client downloads between countries. International Journal of Cyber Criminology, 7(1), 62–80.

    Google Scholar 

  • Klausen, J., Barbieri, E. T., Reichlin-Melnick, A., & Zelin, A. Y. (2012). The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53.

    Google Scholar 

  • Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior and Social Networking, 17(8), 551–555. https://doi.org/10.1089/cyber.2014.0008.

    Article  Google Scholar 

  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409.

    Article  Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2016). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology, 57(3), 704–722. https://doi.org/10.1093/bjc/azw009.

    Article  Google Scholar 

  • Maimon, D., Kamerdze, A., Cukier, M., & Sobesto, B. (2013). Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective. British Journal of Criminology, 53(2), 319–343. https://doi.org/10.1093/bjc/azs067.

    Article  Google Scholar 

  • Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52(1), 33–59. https://doi.org/10.1111/1745-9125.12028.

    Article  Google Scholar 

  • Maimon, D., Wilson, T., Ren, W., & Berenblum, T. (2015). On the relevance of spatial and temporal dimensions in assessing computer susceptibility to system trespassing incidents. British Journal of Criminology, 55(3), 615–634. https://doi.org/10.1093/bjc/azu104.

    Article  Google Scholar 

  • Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. https://doi.org/10.1080/01639620903004903.

    Article  Google Scholar 

  • Medina-Ariza, J. J. (2011). PolĂ­ticas y estrategias de prevenciĂ³n del delito y seguridad ciudadana. Madrid: Edisofer.

    Google Scholar 

  • MirĂ³-Llinares, F. (2011). La oportunidad criminal en el ciberespacio: aplicaciĂ³n y desarrollo de la teorĂ­a de las actividades cotidianas para la prevenciĂ³n del cibercrimen. Revista ElectrĂ³nica de Ciencia Penal y CriminologĂ­a, 13(7), 1–55.

    Google Scholar 

  • MirĂ³-Llinares, F. (2012). El cibercrimen. FenomenologĂ­a y criminologĂ­a de la delincuencia en el ciberespacio. Madrid: Marcial Pons.

    Google Scholar 

  • MirĂ³-Llinares, F. (2015). That cyber routine, that cyber victimization: Profiling victims of cybercrime. In R. G. Smith, R. C. C. Cheung, & L. Y. C. Lau (Eds.), Cybercrime risks and responses (pp. 47–63). London: Palgrave Macmillan. https://doi.org/10.1057/9781137474162_4.

    Chapter  Google Scholar 

  • MirĂ³-Llinares, F., & Johnson, S. D. (2018). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N. Bruinsma & S. D. Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford: Oxford University Press. https://doi.org/10.1093/oxfordhb/9780190279707.013.39.

    Chapter  Google Scholar 

  • MirĂ³-Llinares, F., & Rodriguez-Sala, J. J. (2016). Cyber hate speech on twitter: Analyzing disruptive events from social media to build a violent communication and hate speech taxonomy. International Journal of Design and Nature and Ecodynamics, 11(3), 406–415. https://doi.org/10.2495/DNE-V11-N3-406-415.

    Article  Google Scholar 

  • MirĂ³-Llinares, F., Moneva, A., & Esteve, M. (2018). Hate is in the air! But where? Introducing an algorithm to detect hate speech in digital microenvironments. Crime Science, 7(15), 1–12. https://doi.org/10.1186/s40163-018-0089-1.

    Article  Google Scholar 

  • Näsi, M., Räsänen, P., Kaakinen, M., Keipi, T., & Oksanen, A. (2017). Do routine activities help predict young adults’ online harassment: A multi-nation study. Criminology & Criminal Justice, 17(4), 418–432. https://doi.org/10.1177/1748895816679866.

    Article  Google Scholar 

  • Navarro, J. N., & Jasinski, J. L. (2013). Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys. Women & Criminal Justice, 23(4), 286–303. https://doi.org/10.1080/08974454.2013.784225.

    Article  Google Scholar 

  • Newman, G. R., & Clarke, R. V. (2003). Superhighway robbery: Preventing e-commerce crime. New York: Routledge.

    Google Scholar 

  • Pease, K. (2001). Crime futures and foresight: Challenging criminal behaviour in the information age. In D. Wall (Ed.), Crime and the Internet (pp. 30–40). London: Routledge.

    Google Scholar 

  • Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and Internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/10.1177/0022427810365903.

    Article  Google Scholar 

  • Quetelet, L. A. J. (1842). A treatise on man and the development of his faculties. Edinburgh: W. and R. Chambers.

    Google Scholar 

  • Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12(2), 99–118. https://doi.org/10.1057/cpcs.2009.22.

    Article  Google Scholar 

  • Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/10.1177/0022427811425539.

    Article  Google Scholar 

  • Reyns, B. W., & Henson, B. (2016). The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory. International Journal of Offender Therapy and Comparative Criminology, 60(10), 1119–1139. https://doi.org/10.1177/0306624X15572861.

    Article  Google Scholar 

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169. https://doi.org/10.1177/0093854811421448.

    Article  Google Scholar 

  • Rossmo, D. K. (1999). Geographic profiling. Boca Raton: CRC Press.

    Book  Google Scholar 

  • Sampson, R. J., Raudenbush, S. W., & Earls, F. (1997). Neighborhoods and violent crime: A multilevel study of collective efficacy. Science, 277, 918–924. https://doi.org/10.1126/science.277.5328.918.

    Article  Google Scholar 

  • Shaw, C. R., & McKay, H. D. (1942). Juvenile delinquency and urban areas: A study of rates of delinquency in relation to differential characteristics of local communities in American cities. Chicago: University of Chicago Press.

    Google Scholar 

  • Sherman, L. W., Gartin, P. R., & Buerger, M. E. (1989). Hot spots of predatory crime: Routine activities and the criminology of place. Criminology, 27(1), 27–56. https://doi.org/10.1111/j.1745-9125.1989.tb00862.x.

    Article  Google Scholar 

  • Shu, K., Sliva, A., Sampson, J., & Liu, H. (2018). Understanding cyber attack behaviors with sentiment information on social media. In R. Thomson, C. Dancy, A. Hyder, & H. Bisgin (Eds.), Social, cultural, and behavioral modeling (pp. 377–388). Cham: Springer. https://doi.org/10.1007/978-3-319-93372-6_41.

    Chapter  Google Scholar 

  • Vakhitova, Z. I., & Reynald, D. M. (2014). Australian Internet users and guardianship against cyber abuse: An empirical analysis. International Journal of Cyber Criminology, 8(2), 156–171.

    Google Scholar 

  • Van Wilsem, J. (2013). ‘Bought it, but never got it’: Assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178. https://doi.org/10.1093/esr/jcr053.

    Article  Google Scholar 

  • Vishwanath, A. (2014). Habitual Facebook use and its impact on getting deceived on social media. Journal of Computer-Mediated Communication, 20(1), 83–98. https://doi.org/10.1111/jcc4.12100.

    Article  Google Scholar 

  • Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183–205. https://doi.org/10.1080/15614260701377729.

    Article  Google Scholar 

  • Wei, C., Sprague, A., Warner, G., & Skjellum, A. (2008, March). Mining spam email to identify common origins for forensic application. In Proceedings of the 2008 ACM symposium on applied computing (pp. 1433–1437). Fortaleza, Brazil, ACM.

    Google Scholar 

  • Weisburd, D., & Green, L. (1995). Policing drug hot spots: The Jersey City drug market analysis experiment. Justice Quarterly, 12(4), 711–735. https://doi.org/10.1080/07418829500096261.

    Article  Google Scholar 

  • Weisburd, D., Bernasco, W., & Bruinsma, G. (Eds.). (2009). Putting crime in its place. New York: Springer.

    Google Scholar 

  • Weisburd, D., Telep, C. W., Hinkle, J. C., & Eck, J. E. (2010). Is problem-oriented policing effective in reducing crime and disorder? Findings from a Campbell systematic review. Criminology & Public Policy, 9(1), 139–172. https://doi.org/10.1111/j.1745-9133.2010.00617.x.

    Article  Google Scholar 

  • Welsh, B. C., & Farrington, D. P. (2009). Public area CCTV and crime prevention: An updated systematic review and meta-analysis. Justice Quarterly, 26(4), 716–745. https://doi.org/10.1080/07418820802506206.

    Article  Google Scholar 

  • Wolfe, S. E., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Routine cell phone activity and exposure to sext messages: Extending the generality of routine activity theory and exploring the etiology of a risky teenage behavior. Crime & Delinquency, 62(5), 614–644. https://doi.org/10.1177/0011128714541192.

    Article  Google Scholar 

  • Wortley, R., & Townsley, M. (Eds.). (2016). Environmental criminology and crime analysis (2nd ed.). London: Routledge.

    Google Scholar 

  • Yar, M. (2005). The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427. https://doi.org/10.1177/147737080556056.

    Article  Google Scholar 

Download references

Acknowledgments

We thank the editors of this fantastic handbook and especially Prof. Tom Holt from Michigan State University, for their confidence in us to write this chapter on Environmental Theories. We would also like to thank Prof. Marcus Felson of Texas State University for his insights in several discussions that have served to consolidate the research presented here. Finally, we would like to thank Prof. Steven Kemp of the University of Girona for his comments that have greatly improved the translation of this work.

Funding

This research has been funded by the Spanish Ministry of Economy, Industry, and Competitiveness under the Criminology, empirical evidence, and criminal policy project: on incorporating scientific evidence to decision-making regarding criminalization of conducts (Reference DER2017-86204-R).

This research has been funded by the Spanish Ministry of Education, Culture and Sports under the University Faculty Training (FPU) Grant (Reference FPU16/01671).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asier Moneva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

MirĂ³-Llinares, F., Moneva, A. (2020). Environmental Criminology and Cybercrime: Shifting Focus from the Wine to the Bottles. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_30

Download citation

Publish with us

Policies and ethics