Search
Search Results
-
Correction to: Forensic Intelligence and Traceology in Digitalised Environments: The Detection and Analysis of Crime Patterns to Inform Practice
Chapter 5 was previously published non-open access. It has now been changed to open access under a CC BY 4.0 license and the copyright holder updated... -
Talking with Spies: From Naïve to Distrustful Researcher
Intelligence officers – generally known as ‘spies’ – will not openly admit, even within their own family circles, that they work for an intelligence... -
A systematic review and meta-analysis of procedural justice and legitimacy in policing: the effect of social identity and social contexts
ObjectivesTo systematically review the effect of social identity and social contexts on the association between procedural justice and legitimacy in...
-
A victim-centred cost–benefit analysis of a stalking prevention programme
Research suggests that stalking inflicts great psychological and financial costs on victims. Yet costs of victimisation are notoriously difficult to...
-
2008 Mumbai Terrorist Attacks
The attacks in Mumbai were an example of how quickly terrorists can operate and indicated that the counterterrorism measures used were not enough to... -
Creating the demand for better crime policy: qualitative frame analysis as a vehicle for social transformation
When the dominant crime narrative embraced by members of the public runs contrary to evidence or exaggerates the incidence or mischaracterises the...
-
Social Network Analysis and Law Enforcement Applications for Intelligence Analysis
This book examines the use of social network analysis (SNA) in operational environments from the perspective of those who actually apply it. A...
-
Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers
Chapter 6 opens with an overview of outsider threats. These range from ‘script kiddies’, to organized criminal gangs, ‘hacktivist’ groups, and... -
Violent and Nonviolent Terrorist Suspects: a Comparative Analysis Based on Data from the Netherlands
What are similarities and differences between violent and nonviolent terrorist suspects? Our study aims to answer this question by comparing violent...
-
Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective
The rapid integration of information technology has been met with an alarming rate of cyber-attacks conducted by malicious hackers using... -
The role of informal networks in promoting illegal wildlife trade: a qualitative analysis from Uganda
Illegal wildlife trade (IWT) poses a threat to many countries in Africa, Asia, South and Central America. While the role of informal networks in...
-
Orienting the Development of Crime Analysis Processes in Police Organisations Covering the Digital Transformations of Fraud Mechanisms
A significant, and likely dominant, proportion of fraud is now conducted online. Police struggle to integrate this emerging reality into their...
-
Social Network Analysis and the Characteristics of Criminal Networks
This chapter examines what Sparrow (1991, Soc. Networks 13(3), 251–274) describes as the ‘characteristics of criminal networks’. In his push for... -
Money laundering as a service: Investigating business-like behavior in money laundering networks in the Netherlands
In order to launder large amounts of money, (drug) criminals can seek help from financial facilitators. According to the FATF, these facilitators are...
-
Predicting Recidivism Risk Meets AI Act
Quantitative recidivism risk assessment can be used at the pretrial detention, trial, sentencing, and / or parole stage in the justice system. It has...
-
Bots against corruption: Exploring the benefits and limitations of AI-based anti-corruption technology
Countries have been develo** and deploying anti-corruption tools based on artificial intelligence with hopes of them having positive capabilities....
-
Hacking the Human
Hacking the human has three main parts. The first part analyzes social engineering methods and practices. The second part is the world of... -
A structured methodical process for populating a crime script of organized crime activity using OSINT
Crime script analysis is becoming an increasingly used approach for examining organized crime. Crime scripts can use data from multiple sources,...
-
The fight against the financing of terrorism—selected challenges and potential solutions
The fight against terrorism has been a significant challenge for civilised countries. Although the “war on terrorism” has been in full effect since...
-
The Police Response to Terrorism – Draft Chapter
This chapter reviews the police response to terrorism. There are 12 sections to this chapter. The first section of the chapter examines the...