Show simple item record

dc.contributor.authorWortley, Richard
dc.contributor.authorMcFarlane, Matthew
dc.date.accessioned2018-08-14T03:25:23Z
dc.date.available2018-08-14T03:25:23Z
dc.date.issued2011
dc.date.modified2012-04-10T22:51:41Z
dc.identifier.issn09551662en_US
dc.identifier.doi10.1057/sj.2009.22en_US
dc.identifier.urihttp://hdl.handle.net/10072/44375
dc.description.abstractA field experiment was conducted in a university library to assess the effect of symbolic territorial cues on preventing the theft of a photocopy card which was left on a library desk. Territoriality was conceived as comprising two dimensions – ownership and guardianship. In a 2 × 2 design, ownership was operationized by signing or not signing the card, and guardianship was operationized by leaving the card next to library books or on its own. Both territorial cues were successful in reducing theft levels. It was argued that the crime prevention role of territorial cues needs to be conceived of in terms that are broader than alerting potential offenders to increased levels of surveillance.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_US
dc.languageEnglishen_US
dc.publisherPalgrave Macmillan Ltd.en_US
dc.publisher.placeUnited Kingdomen_US
dc.relation.ispartofstudentpublicationNen_US
dc.relation.ispartofpagefrom149en_US
dc.relation.ispartofpageto156en_US
dc.relation.ispartofissue2en_US
dc.relation.ispartofjournalSecurity Journalen_US
dc.relation.ispartofvolume24en_US
dc.rights.retentionYen_US
dc.subject.fieldofresearchCriminology not elsewhere classifieden_US
dc.subject.fieldofresearchcode160299en_US
dc.titleThe role of territoriality in crime prevention: A field experimenten_US
dc.typeJournal articleen_US
dc.type.descriptionC1 - Peer Reviewed (HERDC)en_US
dc.type.codeC - Journal Articlesen_US
dc.description.versionPost-printen_US
gro.facultyArts, Education & Law Group, School of Criminology and Criminal Justiceen_US
gro.rights.copyright© 2011 Palgrave Macmillan. This is a post-peer-review, pre-copyedit version of an article published in Security Journal. The definitive publisher-authenticated version Security Journal Volume 24, Issue 2, pp 149–156, 2011 is available online at: https://doi.org/10.1057/sj.2009.22en_US
gro.date.issued2011
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record