Crime prevention
   HOME

TheInfoList



OR:

Crime prevention is the attempt to reduce and deter
crime In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Ca ...
and
criminals In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Can ...
. It is applied specifically to efforts made by
government A government is the system or group of people governing an organized community, generally a state. In the case of its broad associative definition, government normally consists of legislature, executive, and judiciary. Government is ...
s to reduce crime, enforce the law, and maintain
criminal justice Criminal justice is the delivery of justice to those who have been accused of committing crimes. The criminal justice system is a series of government agencies and institutions. Goals include the rehabilitation of offenders, preventing other ...
.


Studies

Criminologist Criminology (from Latin , "accusation", and Ancient Greek , ''-logia'', from λόγος ''logos'' meaning: "word, reason") is the study of crime and deviant behaviour. Criminology is an interdisciplinary field in both the behavioural and so ...
s, commissions, and research bodies such as the
World Health Organization The World Health Organization (WHO) is a specialized agency of the United Nations responsible for international public health. The WHO Constitution states its main objective as "the attainment by all peoples of the highest possible level of ...
,
United Nations The United Nations (UN) is an intergovernmental organization whose stated purposes are to maintain international peace and security, develop friendly relations among nations, achieve international cooperation, and be a centre for harmoniz ...
, the
United States National Research Council The National Academies of Sciences, Engineering, and Medicine (also known as NASEM or the National Academies) are the collective scientific national academy of the United States. The name is used interchangeably in two senses: (1) as an umbrel ...
, the UK Audit Commission have analyzed their and others' research on what lowers rates of interpersonal crime. They agree that governments must go beyond law enforcement and criminal justice to tackle the risk factors that cause crime, because it is more cost effective and leads to greater social benefits than the standard ways of responding to crime. Multiple
opinion poll An opinion poll, often simply referred to as a survey or a poll (although strictly a poll is an actual election) is a human research survey of public opinion from a particular sample. Opinion polls are usually designed to represent the opinion ...
s also confirm public support for investment in prevention. Waller uses these materials in '' Less Law, More Order'' to propose specific measures to reduce crime as well as a crime bill. The ''World Health Organization Guide'' (2004) complements the ''World Report on Violence and Health'' (2002) and the 2003 ''World Health Assembly Resolution'' 56-24 for governments to implement nine recommendations, which were: # Create, implement and monitor a national
action plan Action may refer to: * Action (narrative), a literary mode * Action fiction, a type of genre fiction * Action game, a genre of video game Film * Action film, a genre of film * ''Action'' (1921 film), a film by John Ford * ''Action'' (1980 fil ...
for violence prevention. # Enhance capacity for collecting data on violence. # Define priorities for, and support research on, the causes, consequences, costs and prevention of violence. # Promote primary prevention responses. # Strengthen responses for victims of violence. # Integrate violence prevention into social and educational policies, and thereby promote
gender Gender is the range of characteristics pertaining to femininity and masculinity and differentiating between them. Depending on the context, this may include sex-based social structures (i.e. gender roles) and gender identity. Most cultures ...
and
social equality Social equality is a state of affairs in which all individuals within a specific society have equal rights, liberties, and status, possibly including civil rights, freedom of expression, autonomy, and equal access to certain public goods and ...
. # Increase collaboration and exchange of information on violence prevention. # Promote and monitor adherence to international treaties, laws and other mechanisms to protect
human rights Human rights are moral principles or normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for certain standards of hu ...
. # Seek practical, internationally agreed responses to the global drugs and global
arms trade Arms trade may refer to: *the global markets for any product of the arms industry *Small arms trade *Illegal arms trade (arms trafficking) See also *Arms Trade Treaty *Arms control *Nuclear proliferation * Chemical weapon proliferation *Arms race ...
. The commissions agree on the role of municipalities, because they are best able to organize the strategies to tackle the risk factors that cause crime. The European Forum for Urban Safety and the United States Conference of Mayors have stressed that municipalities must target the programs to meet the needs of youth at risk and women who are vulnerable to violence. To succeed, they need to establish a coalition of key agencies such as schools, job creation, social services, housing and law enforcement around a diagnosis.


Types

Several factors must come together for a crime to occur: # an individual or group must have the desire or motivation to participate in a banned or prohibited behavior; # at least some of the participants must have the skills and tools needed to commit the crime; and, # an opportunity must be acted upon. Primary prevention addresses individual and family-level factors correlated with later criminal participation. Individual level factors such as attachment to school and involvement in pro-social activities decrease the probability of criminal involvement. Family-level factors such as consistent parenting skills similarly reduce individual level risk. Risk factors are additive in nature. The greater the number of risk factors present the greater the risk of criminal involvement. In addition there are initiatives which seek to alter rates of crime at the community or aggregate level. For example, Larry Sherman from the University of Maryland in ''Policing Domestic Violence'' (1993) demonstrated that changing the policy of police response to domestic violence calls altered the probability of subsequent violence. Policing hot spots, areas of known criminal activity, decreases the number of criminal events reported to the police in those areas. Other initiatives include community policing efforts to capture known criminals. Organizations such as America's Most Wanted and Crime Stoppers help catch these criminals. Secondary prevention uses intervention techniques that are directed at youth who are at high risk to commit crime, and especially focus on youth who drop out of school or get involved in
gang A gang is a group or society of associates, friends or members of a family with a defined leadership and internal organization that identifies with or claims control over territory in a community and engages, either individually or collective ...
s. It targets
social program Welfare, or commonly social welfare, is a type of government support intended to ensure that members of a society can meet Basic needs, basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refe ...
s and law enforcement at neighborhoods where
crime rate Crime statistics refer to systematic, quantitative results about crime, as opposed to crime news or anecdotes. Notably, crime statistics can be the result of two rather different processes: * scientific research, such as criminological studies, vi ...
s are high. Much of the crime that is happening in neighbourhoods with high crime rates is related to social and physical problems. The use of secondary crime prevention in cities such as
Birmingham Birmingham ( ) is a City status in the United Kingdom, city and metropolitan borough in the metropolitan county of West Midlands (county), West Midlands in England. It is the second-largest city in the United Kingdom with a population of 1. ...
and Bogotá has achieved large reductions in crime and
violence Violence is the use of physical force so as to injure, abuse, damage, or destroy. Other definitions are also used, such as the World Health Organization's definition of violence as "the intentional use of physical force or power, threatened ...
. Programs such as general social services, educational institutions and the police are focused on youth who are at risk and have been shown to significantly reduce crime. Tertiary prevention is used after a crime has occurred in order to prevent successive incidents. Such measures can be seen in the implementation of new security policies following acts of terrorism such as the September 11, 2001 attacks.
Situational crime prevention Crime prevention is the attempt to reduce and deter crime and criminals. It is applied specifically to efforts made by governments to reduce crime, enforce the law, and maintain criminal justice. Studies Criminologists, commissions, and research b ...
uses techniques focusing on reducing on the opportunity to commit a crime. Some of techniques include increasing the difficulty of crime, increasing the risk of crime, and reducing the rewards of crime.


Situational crime prevention


Introduction and description

Situational crime prevention (SCP) is a relatively new concept that employs a preventive approach by focusing on methods to reduce the opportunities for
crime In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Ca ...
. It was first outlined in a 1976 report released by the British Home Office. SCP focuses on the criminal setting and is different from most criminology as it begins with an examination of the circumstances that allow particular types of crime. By gaining an understanding of these circumstances, mechanisms are then introduced to change the relevant environments with the aim of reducing the opportunities for particular crimes. Thus, SCP focuses on crime prevention rather than the punishment or detection of criminals and its intention is to make criminal activities less appealing to offenders. SCP focuses on opportunity-reducing processes that: * Are aimed at particular forms of crime; * Entail the management, creation or manipulation of the immediate environment in as organised and permanent a manner as possible; and * Result in crime being more difficult and risky or less rewarding and justifiable. The theory behind SCP concentrates on the creation of safety mechanisms that assist in protecting people by making criminals feel they may be unable to commit crimes or would be in a situation where they may be caught or detected, which will result in them being unwilling to commit crimes where such mechanisms are in place. The logic behind this is based on the concept of
rational choice Rational choice theory refers to a set of guidelines that help understand economic and social behaviour. The theory originated in the eighteenth century and can be traced back to political economist and philosopher, Adam Smith. The theory postula ...
- that every criminal will assess the situation of a potential crime, weigh up how much they may gain, balance it against how much they may lose and the probability of failing, and then act accordingly. Situational Crime prevention can be applied using twenty-five opportunity reducing techniques: * Increase the Effort: Includes target hardening (e.g. Tamper-proof packaging), controlling access to facilities (e.g. Electronic card access) , applying screen exits (e.g. Electronic merchandise tags), deflecting offenders (e.g. dispersing pubs) and controlling tools or weapons (e.g. Disabling stolen mobile phones). * Increase the Risks: Includes extending guardianship (e.g.
neighbourhood watch Neighbourhood Watch in the United Kingdom is the largest voluntary crime prevention movement covering England and Wales with upwards of 2.3 million household members. The charity brings neighbors together to create strong, friendly and active comm ...
), Assisting natural surveillance (e.g. adequate street lighting), Reducing anonymity (e.g. compulsory taxi identification cards), utilising place managers (e.g. rewarding vigilance) and strengthening formal surveillance (e.g. Security guards). * Reduce the Rewards: Includes concealing targets (e.g. unmarked bullion trucks), removing targets (e.g. women's refuges), identifyng property (e.g. cattle branding), disrupting markets (e.g. monitoring of
pawn shops A pawnbroker is an individual or business (pawnshop or pawn shop) that offers secured loans to people, with items of personal property used as collateral. The items having been ''pawned'' to the broker are themselves called ''pledges'' or ...
) and denying benefits (e.g.
speed humps In everyday use and in kinematics, the speed (commonly referred to as ''v'') of an object is the magnitude of the change of its position over time or the magnitude of the change of its position per unit of time; it is thus a scalar quanti ...
). * Reduce Provocations: Includes reducing frustrations and stress (e.g. efficient queues and polite service), avoiding disputes (e.g. Separate enclosures for rival soccer fans), reducing emotional arousal (e.g. controls on violent pornography), neutralising peer pressure (e.g. targeting and removing troublemakers from a school) and discouraging imitation (e.g.
V-chip V-chip is a technology used in television set receivers in Canada, Brazil and the United States, that allows the blocking of programs based on their ratings category. It is intended for use by parents to manage their children's television view ...
s in televisions). * Remove the excuses: Includes setting rules (e.g. rental agreements), posting instructions (e.g. 'No Parking' signs), alerting conscience (roadside speed display boards), assisting compliance (e.g. easy library check-out) and controlling drugs and alcohol (e.g. alcohol free zones) One example of SCP in practice is automated traffic enforcement. Automated traffic enforcement systems (ATES) use automated cameras on the roads to catch drivers who are speeding and those who run red lights. Such systems enjoy use all over the world. These systems have been installed and are advertised as an attempt to keep illegal driving incidences down. As a potential criminal, someone who is about to speed or run a red light knows that their risk of getting caught is nearly 100% with these systems. This completely disincentivizes the person from speeding or running red lights in areas in which they know ATES are set up. Though not conclusive, evidence shows that these type of systems work. In a Philadelphia study, some of the city's most dangerous intersections had a reduction of 96% in red light violations after the installation and advertisement of an ATES system.Page, Benton H., ''Automated Traffic Enforcement Systems: The Efficacy of Such Systems and Their Effect on Traffic Law'', p 13, 2009. http://works.bepress.com/benton_page/1/


Applying SCP to information systems (IS)

Situational crime prevention (SCP) in general attempts to move away from the "dispositional" theories of crime commission i.e. the influence of psychosocial factors or genetic makeup of the criminal, and to focus on those environmental and situational factors that can potentially influence criminal conduct. Hence rather than focus on the criminal, SCP focuses on the circumstances that lend themselves to crime commission. Understanding these circumstances leads to the introduction of measures that alter the environmental factors with the aim of reducing opportunities for criminal behavior. Other aspects of SCP include: # targeting specific forms of crime e.g. cybercrime # aiming to increase the effort and decrease potential risks of crime # reducing provocative phenomenaClarke, R (ed) ''Situational Crime Prevention: Successful Case Studies ''(2nd ed.) Harrow and Heston, New York, 1997,


Safeguarding

Another aspect of SCP that is more applicable to the cyber environment is the principle of safeguarding. The introduction of these safeguards is designed to influence the potential offender's view of the risks and benefits of committing the crime. A criminal act is usually performed if the offender decides that there is little or no risk attached to the act. One of the goals of SCP is to implement safeguards to the point where the potential offender views the act unfavourably. For example, drivers approaching a traffic junction where there are speed cameras slow down if there is a nearly 100% chance of being caught trying to run a red light. The use of crime "scripts" has been touted as a method of administering safeguards. Scripts were originally developed in the field of cognitive science and focus on the behavioural processes involved in rational goal-oriented behaviour. Hence scripts have been proposed as tool for examining criminal behaviour. In particular the use of what is termed a "universal script" has been advanced for correctly identifying all the stages in the commission process of a crime.


Application to cybercrimes

It has been suggested that cybercriminals be assessed in terms of their criminal attributes, which include skills, knowledge, resources, access and motives (SKRAM). Cybercriminals usually have a high degree of these attributes and this is why SCP may prove more useful than traditional approaches to crime. Clarke proposed a table of twenty-five techniques of situational crime prevention, but the five general headings are: # Increasing the effort to commit the crime # Increasing the risks of committing the crime # Reducing the rewards of committing the crime # Reducing any provocation for committing the crime # Removing any excuses for committing the crime These techniques can be specifically adapted to cybercrime as follows: ''Increasing the effort'' Reinforcing targets and restricting access- the use of firewalls,
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
, card/password access to ID databases and banning
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
websites and magazines. ''Increasing the risk'' Reinforcing
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
procedures- background checks for employees with database access, tracking keystrokes of computer users, use of photo and thumb print for ID documents/credit cards, requiring additional ID for online purchases, use of
camera A camera is an optical instrument that can capture an image. Most cameras can capture 2D images, with some more advanced models being able to capture 3D images. At a basic level, most cameras consist of sealed boxes (the camera body), with a ...
s at ATMs and at point of sale. ''Reducing the rewards'' Removing targets and disrupting cyberplaces – monitoring Internet sites and incoming spam, harsh penalties for hacking, rapid notification of stolen or lost credit bankcards, avoiding ID numbers on all official documents. ''Reducing provocation and excuses'' Avoiding disputes and temptations – maintaining positive employee-management relations and increasing awareness of responsible use policy. Many of these techniques do not require a considerable investment in hi-tech IT skills and knowledge. Rather, it is the effective utilization and training of existing personnel that is key. It has been suggested that the theory behind situational crime prevention may also be useful in improving
information systems An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical perspective, information systems are composed by four components: task, people ...
(IS) security by decreasing the rewards criminals may expect from a crime. SCP theory aims to affect the motivation of criminals by means of environmental and situational changes and is based on three elements: * Increasing the perceived difficulty of crime; * Increasing the risks; and * Reducing the rewards. IS professionals and others who wish to fight computer crime could use the same techniques and consequently reduce the frequency of computer crime that targets the information assets of businesses and organisations. Designing out crime from the environment is a crucial element of SCP and the most efficient way of using computers to fight crime is to predict criminal behaviour, which as a result, makes it difficult for such behaviour to be performed. SCP also has an advantage over other IS measures because it does not focus on crime from the criminal's viewpoint. Many businesses/organisations are heavily dependent on
information and communications technology Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications and the integration of telecommunications ( telephone lines and wireless signals) and computer ...
(ICT) and information is a hugely valuable asset due to the accessible data that it provides, which means IS has become increasingly important. While storing information in computers enables easy access and sharing by users, computer crime is a considerable threat to such information, whether committed by an external
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
or by an ‘insider’ (a trusted member of a business or organisation).Beebe N.L., Rao V.S., Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems, Security, Proceedings of the 2005 SoftWars Conferenc

Las Vegas 2005
After viruses, illicit access to and theft of, information form the highest percentage of all financial losses associated with computer crime and security incidents. Businesses need to protect themselves against such illegal or unethical activities, which may be committed via electronic or other methods and IS security technologies are vital in order to protect against amendment, unauthorised disclosure and/or misuse of information. Computer intrusion fraud is a huge business with hackers being able to find passwords, read and alter files and read email, but such crime could almost be eliminated if hackers could be prevented from accessing a computer system or identified quickly enough. Despite many years of computer security research, huge amounts of money being spent on secure operations and an increase in training requirements, there are frequent reports of computer penetrations and data thefts at some of the most heavily protected computer systems in the world. Criminal activities in cyberspace are increasing with computers being used for numerous illegal activities, including email surveillance, credit card fraud and software piracy. As the popularity and growth of the Internet continues to increase, many web applications and services are being set up, which are widely used by businesses for their business transactions. In the case of computer crime, even cautious companies or businesses that aim to create effective and comprehensive security measures may unintentionally produce an environment, which helps provide opportunities because they are using inappropriate controls.Willison R., Backhouse J., Opportunities for computer crime: considering systems risk from a criminological perspective, European Journal of Information Systems, Vol 15, p 403 - 414, 2006 Consequently, if the precautions are not providing an adequate level of security, the IS will be at risk.


Application to sexual abuse

Smallbone et al.’s Integrated Theory of Child Sexual Abuse posits that it can be useful to study child sexual abuse as a situationally specific incident, and that on any particular occasion, a variety of different factors can influence whether that incident is likely to occur. One set of factors is situational factors, which form the immediate backdrop to the setting in which the abuse takes place. Situational factors, it is argued, can influence not just whether a person abuses a child, but whether the idea of abusing occurs to them in the first place. The particular opportunities and dynamics of a situation are said to present cues, stressors, temptations and perceived provocations, which trigger motivation. The consideration of situational factors leads to the argument that some offenders may be considered as ‘situational’, marking them out from other types. The ‘situational offender’ is someone who is not primarily attracted to children. Instead, he is stimulated to offend by specific behavioural cues or stressors, often while performing care-giving duties. The authors of the theory argue that modifying the situations experienced by children, through situational crime prevention strategies, could lower the likelihood of abuse, irrespective of the disposition of people who are likely to come into contact with children. The authors concede that there has been little testing of situational interventions, which means there is little evidence to demonstrate their effectiveness. An evaluation of a programme which worked work mothers in London to reduce situational risk of child sexual abuse in the home illustrated some of the challenges that mothers faced in identifying and reducing situational risk: # Increasing understanding about abuse, how and where it happens. # Accepting the possibility of abuse at home and in the family. # Accurately assessing the risks posed to one's own children. # Lowering known risks by negotiating with family members.


Situational crime prevention and fraud

In computer systems that have been developed to design out crime from the environment, one of the tactics used is risk assessment, where business transactions, clients and situations are monitored for any features that indicate a risk of criminal activity. Credit card fraud has been one of the most complex crimes worldwide in recent times and despite numerous prevention initiatives, it is clear that more needs to be done if the problem is to be solved. Fraud management comprises a whole range of activities, including early warning systems, signs and patterns of different
types of fraud In law, fraud is an intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law or criminal law, or it may cause no loss of money, property, or legal right but still be an element o ...
, profiles of users and their activities, security of computers and avoiding customer dissatisfaction. There are a number of issues that make the development of fraud management systems an extremely difficult and challenging task, including the huge volume of data involved; the requirement for fast and accurate fraud detection without inconveniencing business operations; the ongoing development of new fraud to evade existing techniques; and the risk of false alarms. Generally, fraud detection techniques fall into two categories: statistical techniques and
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech r ...
techniques. Important statistical data analysis techniques to detect fraud include: * Grouping and classification to determine patterns and associations among sets of data. * Matching algorithms to identify irregularities in the transactions of users compared to previous proof * Data pre-processing techniques for validation, correction of errors and estimating incorrect or missing data. Important AI techniques for fraud management are: * Data mining – to categorise and group data and automatically identify associations and rules that may be indicative of remarkable patterns, including those connected to fraud. * Specialist systems to programme expertise for fraud detection in the shape of rules. *
Pattern recognition Pattern recognition is the automated recognition of patterns and regularities in data. It has applications in statistical data analysis, signal processing, image analysis, information retrieval, bioinformatics, data compression, computer graphics ...
to identify groups or patterns of behaviour either automatically or to match certain inputs. * Machine learning techniques to automatically detect the characteristics of fraud * Neural networks that can learn suspicious patterns and later identify them.Palshikar G.K., The Hidden Truth: data analysis can be a strategic weapon in your company’s management and control of fraud

Intelligent Enterprise 2002


Applications

Neighborhoods can implement protective strategies to reduce violent crime. The
broken windows theory In criminology, the broken windows theory states that visible signs of crime, anti-social behavior and civil disorder create an urban environment that encourages further crime and disorder, including serious crimes. The theory suggests that po ...
of crime suggests that disorderly neighborhoods can promote crime by showing they have inadequate social control. Some studies have indicated that modifying the
built environment The term built environment refers to human-made conditions and is often used in architecture, landscape architecture, urban planning, public health, sociology, and anthropology, among others. These curated spaces provide the setting for human a ...
can reduce violent crime. This includes deconcentrating high-rise
public housing Public housing is a form of housing tenure in which the property is usually owned by a government authority, either central or local. Although the common goal of public housing is to provide affordable housing, the details, terminology, def ...
, making zoning changes, restricting the number of liquor licenses available in an area, and keeping vacant lots and buildings maintained and secure.


See also

* Crime displacement *
Predictive policing Predictive policing is the usage of mathematics, predictive analytics, and other analytical techniques in law enforcement to identify potential criminal activity. A report published by the RAND Corporation identified four general categories pred ...
* Preventive state


Notes


Bibliography

* Audit Commission, ''Misspent youth: Young people and crime'', London: Audit Commission for Local Authorities and NHS in England and Wales, 1996 * Her Majesty's Inspectorate of Constabulary, ''Beating crime'', London: Home Office, 1998 * Home Office, ''Reducing offending: An assessment of research evidence on ways of dealing with offending behaviour'', edited by Peter Goldblatt and Chris Lewis. London: Home Office, Research and Statistics, 1998 * International Centre for Prevention of Crime, ''Urban Crime Prevention and Youth at Risk: Compendium of promising strategies and programs from around the world'', Montreal, 2005 * International Centre for Prevention of Crime, ''Crime Prevention Digest II: Comparative Analysis of Successful Community Safety'', Montreal, 1999 * International Centre for Prevention of Crime, ''100 Crime Prevention Programs to Inspire Action across the World'', Montreal, 1999 * National Research Council (US), ''Fairness and Effectiveness in Policing: The Evidence'', edited by Wesley Skogan, Washington, DC: The National Academies Press, 2004 * National Research Council (U.S.), ''Juvenile crime, juvenile justice'', edited by Joan McCord, ''et al.'', Washington, DC: National Academies Press, 2001 * National Research Council and Institute of Medicine, ''Violence in families: assessing prevention and treatment programs'', Committee on the Assessment of Family Violence Interventions, Board on Children, Youth, and Families, Edited by Rosemary Chalk and Patricia King. Washington, DC: National Academies Press, 2004 * Sherman, Lawrence, David Farrington, Brandon Welsh, Doris MacKenzie, 2002, ''Evidence Based Crime Prevention'', New York: Routledge * Skogan, Wesley and Susan Hartnett, ''Community Policing: Chicago Style'', New York: Oxford University Press, 1997 * United Nations, Economic and Social Council, ''Guidelines for the Prevention of Crime'', New York: United Nations, Economic and Social Council, Office for Drug Control and Crime Prevention, 2002 * Waller, Irvin, ''Less Law, More Order: The Truth about Reducing Crime'', West Port: Praeger Imprint Series, 2006 * Welsh, Brandon, and David Farrington, eds., ''Preventing Crime: What Works for Children, Offenders, Victims, and Places'', New York: Springer, 2006 * World Health Organization, ''World report on road traffic injury prevention: Summary'', Geneva, 2004 * World Health Organization, ''Preventing violence: A guide to implementing the recommendations of the World Report on Violence and Health'', Geneva: Violence and Injuries Prevention, 2004 * World Health Organization, ''World Report on Violence and Health'', Geneva: Violence and Injuries Prevention, 2002


External links


Institute for the Prevention of Crime

International Center for the Prevention of Crime

Crime Prevention and Social Media Community of Practice
{{Authority control Criminology Law enforcement techniques Espionage techniques