dc.contributor.author | Wortley, Richard | |
dc.contributor.editor | Bonnie Fisher & Martin Gill | |
dc.date.accessioned | 2017-05-03T13:32:42Z | |
dc.date.available | 2017-05-03T13:32:42Z | |
dc.date.issued | 2001 | |
dc.date.modified | 2010-03-23T07:24:18Z | |
dc.identifier.issn | 09551662 | |
dc.identifier.doi | 10.1057/palgrave.sj.8340098 | |
dc.identifier.uri | http://hdl.handle.net/10072/3661 | |
dc.description.abstract | The most widely known classification of situational crime prevention techniques is that presented by Clarke. The latest version of the classification proposed 16 techniques for preventing crime through opportunity reduction. The present paper suggests a complementary classification of 16 techniques for controlling situational precipitators of crime. The new classification is based on the argument that there are two distinct situational forces acting upon potential offenders-the perceived costs and benefits of intended criminal acts (the basis of Clarke's classification) and factors that may induce individuals to commit crimes that they would not have otherwise considered (the basis of the present classification). | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 164059 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Perpetuity Press | |
dc.publisher.place | UK, USA | |
dc.relation.ispartofpagefrom | 63 | |
dc.relation.ispartofpageto | 82 | |
dc.relation.ispartofissue | 4 | |
dc.relation.ispartofjournal | Security Journal | |
dc.relation.ispartofvolume | 14 | |
dc.subject.fieldofresearch | Criminology | |
dc.subject.fieldofresearchcode | 1602 | |
dc.title | A Classification of Techniques for Controlling Situational Precipitators of Crime | |
dc.type | Journal article | |
dc.type.description | C1 - Articles | |
dc.type.code | C - Journal Articles | |
gro.faculty | Arts, Education & Law Group, School of Criminology and Criminal Justice | |
gro.rights.copyright | © 2001 Palgrave Macmillan. This is a post-peer-review, pre-copyedit version of an article published in Security Journal. The definitive publisher-authenticated version is available online at: http://www.palgrave-journals.com/sj/index.html | |
gro.date.issued | 2001 | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Wortley, Richard K. | |