Sign In / Sign Out
Navigation for Entire University
- ASU Home
- My ASU
- Colleges and Schools
- Map and Locations
Brandt, A. (2006). "This Stolen Laptop Will Self-Destruct in 5 Seconds." PC World Magazine June 2006: 46.
Brantingham, P., and P. Brantingham (1995). "Criminality of Place: Crime Generators and Crime Attractors." European Journal on Criminal Policy and Research 3(3): 5-26.
Clarke, R. (1999). Hot Products: Understanding, Anticipating, and Reducing Demand for Stolen Goods. Police Research Series Paper, 112. London: Home Office Policing and Reducing Crime Unit.
Cromwell, P., J. Olson, and D. Avary (1991). "Breaking and Entering: An Ethnographic Analysis of Burglary, Sage, Newbury Park, CA.
Design Council (2003)." Think Thief! A Designer's Guide to Designing Out Crime. London: Design Council.
Duffin, M., G. Keats, and M. Gill (2006). Identity Theft in the UK: The Offender and Victim Perspective. Leicester (U.K.): Perpetuity Research and Consultancy International (PRCI) Ltd.
Eck, J. (1994). "Drug Markets and Drug Places: A Case-Control Study of the Spatial Structure of Illicit Drug Dealing." Doctoral dissertation, University of Maryland, College Park.
Eck, J., R. Clarke, and R. Guerette (2007). "Risky Facilities: Crime Concentration in Homogeneous Sets of Establishments and Facilities." In G. Farrell, K. Bowers, S. Johnson, and M. Townsley (eds.), Imagination for Crime Prevention: Essays in Honor of Ken Pease. Crime Prevention Studies, Vol. 21, pp. 255-264. Monsey, N.Y.: Criminal Justice Press.
Eck, J., and D. Weisburd (1995). "Crime Place in Crime Theory." In J.Eck and D. Weisburd (eds.), Crime and Place. Crime Prevention Studies, Vol. 4, pp. 1-33. Monsey, N.Y.: Criminal Justice Press.
Fagan, C. (2007). "'Lost' Gang Steal Phones." Leicester Mercury, Jan. 30, p. 2.
Great Britain (1974). Health and Safety at Work Etc Act 1974. Elizabeth II. 1974. Chapter 37. London: H.M.S.O.
Gross-Schaefer, A., J. Trigilio, J. Negus, and C. Ro. (2000). "Ethics Education in the Workplace: An Effective Tool to Combat Employee Theft." Journal of Business Ethics 26(2): 89-100.
Hunter, R. and C. Jeffrey (1997). "Preventing Convenience Store Robbery Through Environmental Design." In R.V. Clarke (ed.), Situational Crime Prevention: Successful Case Studies, 2nd ed. pp. 191-199. Monsey, N.Y.: Criminal Justice Press.
Kaplamkiran, T., J. Mailley, S. Whitehead, and G. Farrell (2008). "Mobile Phone Reprogramming: Its Extent and Prevention." Crime Prevention and Community Safety: An International Journal 10(4): 271-279.
Kershaw, C., S. Nicholas, and A. Walker (2008). "Crime in England and Wales 2007/08. Findings from the British Crime Survey and Police Recorded Crime." Home Office Statistical Bulletin. London: Home Office.
Kitteringham, G. (2008). "Lost Laptops = Lost Data: Measuring Data, Managing Threats." Connecting Research in Security to Practice Report. Alexandria, V.A.: ASIS International. Available at: http://www.asisonline.org/foundation/lostlaptop.pdf
LaVigne, N. (1991). "Crime of Convenience: An Analysis of Criminal Decision Making and Convenience Store Crime in Austin." Master's Thesis, University of Texas, Austin.
Laycock, G. (1991). "Operation Identification, or the Power of Publicity?" Security Journal 2(2): 67-72.
Lengel, A. (2007). "Purse Snatchers Know Their Turf; Sophisticated Thieves Cruise Bars, Restaurants in Areas with Night Life." The Washington Post, March 4.
Madensen, T. and J. Eck (2008). "Violence in Bars: Exploring the Impact of Place Manager Decision-Making." Crime Prevention and Community Safety 10(2): 111-125.
McDaniel, M., and J. Jones (1988). "Predicting Employee Theft: A Quantitative Review of the Validity of a Standardized Measure of Dishonesty." Journal of Business and Psychology 2(4): 327-245.
Poyner, B. (1988). "Video Cameras and Bus Vandalism." Journal of Security Administration 11(2): 44-51.
Ratcliffe, J. (2004). "The Hotspot Matrix: A Framework for the Spatio-Temporal Targeting of Crime Reduction." Police Practice and Research 5(1): 5-23.
Rogers, S. (2009). Personal Communication from Steve Rogers, Detective Inspector Crime Support, British Transport Police.
Rufus, A. (2008). "Bold Café Laptop-Theft Foiled in Oakland." East Bay Express, October 3. Accessed April 8, 2010 at http://www.eastbayexpress.com/92510/archives/2008/10/03/boldcafandeacute-laptop-theft-foiled-in-oakland.
Sidebottom, A. and K. Bowers (2009). "Bag Theft in Bars: An Analysis of Relative Risk, Perceived Risk and Modus Operandi." Security Journal 23(3): 206-224.
Sutton, M., J. Schneider, and S. Hetherington (2001). "Tackling Theft With the Market Reduction Approach." Crime Reduction Research Series, Paper 8. London: Home Office.
Smith, C., K. Bowers, and S. Johnson (2006). "Understanding Theft within Licensed Premises: Identifying Initial Steps Towards Prevention." Security Journal 19 (1): 1-19.
Thompson, C., and Z. Arsel (2004). "The Starbucks Brandscape and Consumers' (Anticorporate) Experiences of Glocalization." Journal of Consumer Research 31(3): 631-642.
U.S. Bureau of the Census (2000). Establishment and Firm Size (Including Legal Form of Organization). 1997 Economic Census, Accommodation and Foodservices Subject Series. Washington, D.C.: U.S Bureau of the Census. [Full text ]
U.S. Bureau of Justice Statistics (2008). Criminal Victimization in the United States, 2006 Statistical Tables. Washington, D.C.: U.S. Department of Justice. [Full text ]
United States (1970). Occupational Safety and Health Act of 1970. 29 U.S.C. 651-700 (1970).
U.S. General Accounting Office (2002). Identity Theft: Prevalence and Costs Appear to be Growing. Report to Congressional Requesters. Washington, D.C.: U.S. General Accounting Office. Accessed on December 9, 2008 at http://www.gao.gov/new.items/d02363.pdf.
Van Derbeken, J. (2006). "Laptop Thieves Descend Upon Wireless Cafes: Grab-and-Run Robbers Find Pricey Computers Easy to Resell." San Francisco Chronicle, April 8. Accessed April 8, 2010 at http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/04/08/MNGE9I686K1.DTL.
Van Dijk, J., J. van Kesterem, and P. Smit (2007). Criminal Victimisation in International Perspective: Key Findings from the 2004-2005 ICVS and EU ICS. The Hague, South Holland, N.L.: Boom Juridische uitgevers.
Vincent, B (2005). "Workshop Teaches Pickpocket Recognition." Law and Order 53 (6):116-119.
Vincent, B., and B. Arno (2003). Travel Advisory! How to Avoid Thefts, Cons, and Street Scams While Traveling. Chicago: Bonus Books.
Webb, B. (2005). "Preventing Vehicle Crime." In N. Tilley (ed.), Handbook of Crime Prevention and Community Safety, pp. 458-485. Cullompton, Devon, U.K.: Willan Publishing, Ltd.
Westminster City Council (2009). Café Watch Case Study. The Beacon Scheme, Round 10 Case Studies. London: Communities and Local Government, Improvement and Development Agency.
Whitehead, S., and G. Farrell (2008). "Anticipating Mobile Phone 'Smart Wallet' Crime: Policing and Corporate Social Responsibility." Policing: A Journal of Policy and Practice 2(2): 210-217.
Willcocks, M., A. Nufrio, and X. Camino (2008). "Grippa BCN- Final report." User's test. London: Design Against Crime Research Centre.
You may order free bound copies in any of three ways:
Phone: 800-421-6770 or 202-307-1480
Allow several days for delivery.
Send an e-mail with a link to this guide.
Error sending email. Please review your enteries below.