E-Book, Englisch, 304 Seiten
Petherick Applied Crime Analysis
1. Auflage 2014
ISBN: 978-0-323-29641-0
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
A Social Science Approach to Understanding Crime, Criminals, and Victims
E-Book, Englisch, 304 Seiten
ISBN: 978-0-323-29641-0
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Wayne Petherick is Associate Professor of Criminology at Bond University in Australia. Wayne's areas of interest include forensic criminology, forensic victimology, criminal motivations, criminal profiling, and applied crime analysis. He has worked on risk and threat cases, a mass homicide, stalking, rape, and a variety of civil suits involving premises liability and crime prevention. He has presented to audiences in Australia and abroad, and has published in a variety of areas including social science and legal works in the areas of criminal profiling, expert evidence, stalking, serial crimes, criminal motivations, and victimology. Wayne is co-editor of Forensic Criminology, and editor of Profiling and Serial Crime: Theoretical and Practical Issues, now in its third edition.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Applied Crime Analysis: A Social Science Approach to Understanding Crime, Criminals, and Victims;4
3;Copyright;5
4;Contents;6
5;Acknowledgments;14
6;About the Authors;18
7;Foreword;22
8;Chapter 1 - An Introduction to Applied Crime Analysis;28
8.1;Key Terms;28
8.2;INTRODUCTION;28
8.3;1.1 Types of crime analysis;29
8.4;1.2 Applications;35
8.5;Conclusions;39
8.6;References;39
9;Chapter 2 - Logic and Reasoning in Crime Analysis;41
9.1;Key Terms;41
9.2;INTRODUCTION;41
9.3;2.1 Logic and reasoning;41
9.4;2.2 Cognitive tools;45
9.5;2.3 Cognitive errors;48
9.6;2.4 Inductive logic;51
9.7;2.5 Current research on abduction murder;52
9.8;2.6 Deductive logic;55
9.9;2.7 Structured professional judgment;57
9.10;2.8 When probability is the only possibility: analysis of competing hypotheses;59
9.11;Conclusion;63
9.12;References;64
10;Chapter 3 - Physical Evidence and the Crime Scene;66
10.1;Key Terms;66
10.2;INTRODUCTION;66
10.3;3.1 What is science?;67
10.4;3.2 Forensic roles;68
10.5;3.3 What is a crime scene?;69
10.6;3.4 Crime scene types;69
10.7;3.5 What is physical evidence?;72
10.8;3.6 Should the crime analyst visit the crime scene?;80
10.9;3.7 Processing the crime scene;81
10.10;3.8 Reporting results;86
10.11;Conclusion;87
10.12;References;88
11;Chapter 4 - Forensic Victimology;89
11.1;Key Terms;89
11.2;INTRODUCTION;89
11.3;4.1 Victimology defined;89
11.4;4.2 Victim precipitation;90
11.5;4.3 Risk factors for victimization;91
11.6;4.4 Types of victim risk;96
11.7;4.5 Victimology: a suggested approach;98
11.8;Conclusion;105
11.9;References;105
12;Chapter 5 - Detecting Staged Crime Scenes: An Empirically Derived “How-to”;108
12.1;Key Terms;108
12.2;INTRODUCTION;108
12.3;5.1 Staged crimes in the literature;108
12.4;5.2 Red flags for staged homicides;119
12.5;5.3 Determining the presence of staging;120
12.6;5.4 Ferguson checklist: an empirically derived “how-to”;123
12.7;5.5 Staged burglary/homicides;124
12.8;5.6 Staged car accidents;127
12.9;Conclusion;128
12.10;References;129
13;Chapter 6 - Case Linkage;131
13.1;Key Terms;131
13.2;INTRODUCTION;131
13.3;6.1 What is case linkage?;132
13.4;6.2 Theoretical underpinnings of linkage analyses;132
13.5;6.3 Nomothetic case linkage: the use of databases;141
13.6;6.4 Considerations in determining case linkage;143
13.7;Conclusion;147
13.8;References;148
14;Chapter 7 - False Reports;150
14.1;Key Terms;150
14.2;INTRODUCTION;150
14.3;7.1 The problem of false reports;151
14.4;7.2 Incidence and prevalence of false reports;152
14.5;7.3 False reports;153
14.6;7.4 False allegations;159
14.7;7.5 False confessions;161
14.8;7.6 Motivations for false reporting;162
14.9;7.7 Managing false reporters;166
14.10;7.8 Considerations in determining reports;168
14.11;Conclusion;172
14.12;References;173
15;Chapter 8 - Motivations;175
15.1;Key Terms;175
15.2;INTRODUCTION;175
15.3;8.1 Motivations;176
15.4;8.2 The Groth typologies;184
15.5;8.3 The Massachusetts Treatment Center typology;186
15.6;8.4 The Hazelwood adaptation of Groth and colleagues;187
15.7;8.5 Other typologies;190
15.8;8.6 Considerations in determining motive;191
15.9;Conclusion;195
15.10;References;196
16;Chapter 9 - Risk Assessment;199
16.1;Key Terms;199
16.2;INTRODUCTION;199
16.3;9.1 What is risk assessment?;200
16.4;9.2 Types of risk assessment;201
16.5;9.3 The problems with risk assessment;206
16.6;9.4 Communicating risk;209
16.7;9.5 Risk assessment is not yet an exact science;211
16.8;9.6 When harm is likely or imminent;212
16.9;Conclusion;213
16.10;References;214
17;Chapter 10 - Threat Assessment and Management;217
17.1;Key Terms;217
17.2;INTRODUCTION;217
17.3;10.1 First involvement;218
17.4;10.2 Sources of information;220
17.5;10.3 Information analysis;221
17.6;10.4 Intervention;224
17.7;10.5 Monitoring;229
17.8;Conclusion;230
17.9;References;231
17.10;Bibliography of suggested reading;232
18;Chapter 11 - Psychopathology and Criminal Behavior;235
18.1;Key Terms;235
18.2;INTRODUCTION;236
18.3;11.1 What is psychopathology?;236
18.4;11.2 What is forensic psychopathology?;239
18.5;11.3 The nature versus nurture fallacy: the interaction between programing, predisposition, and experience;241
18.6;11.4 Genetics;242
18.7;11.5 Criminal psychopathology: mental states and characteristic pathology associated with the perpetration of crime;245
18.8;11.6 Typical psychopathologies, mental states, and psychopathological characteristics associated with perpetrators of crime;246
18.9;11.7 Compulsive homicide;250
18.10;11.8 Sadistic aggression;252
18.11;11.9 Addiction and criminal behavior;257
18.12;11.10 Disordered thinking;260
18.13;11.11 Delusional subtypes with forensic association;263
18.14;11.12 Delusion as a feature of other forensic psychopathology;264
18.15;11.13 Psychotic disorders;264
18.16;11.14 Personality disorders;266
18.17;Conclusion;271
18.18;Chapter Summary;272
18.19;References;276
19;Chapter 12 - Report Writing, Style, and Components;280
19.1;Key Terms;280
19.2;INTRODUCTION;280
19.3;12.1 Basic components;281
19.4;12.2 Suggested report layout;285
19.5;12.3 Conclusions;292
19.6;Conclusion;295
19.7;Reference;296
20;Appendix A - Threat assessment and management process—organizational settings;297
21;Index;298




