Show simple item record

dc.contributor.authorTownsley, M
dc.contributor.authorOliveira, A
dc.date.accessioned2017-07-12T02:30:46Z
dc.date.available2017-07-12T02:30:46Z
dc.date.issued2015
dc.date.modified2014-08-08T04:03:36Z
dc.identifier.issn0955-1662
dc.identifier.doi10.1057/sj.2012.45
dc.identifier.urihttp://hdl.handle.net/10072/61292
dc.description.abstractThe article examines space-time patterns of maritime piracy around the Horn of Africa. Using rational choice theory and optimal foraging theory as the theoretic frame, 6 years of recorded pirate attack data were used to test whether spatial and temporal attack patterns were independent. The results indicate evidence for a communicability of risk; that is, pirate activity clusters in space and time. Incorporating this finding means that forecasting of high-risk areas could be made more effective. The theoretical implication is that pirates' target selection appears to be consistent with other crime types, such as burglary, car crime and shootings. The results have implications for informing maritime piracy prevention and suppression efforts.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent337193 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherPalgrave Macmillan
dc.publisher.placeUnited Kingdom
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofpagefrom217
dc.relation.ispartofpageto229
dc.relation.ispartofissue3
dc.relation.ispartofjournalSecurity Journal
dc.relation.ispartofvolume28
dc.rights.retentionY
dc.subject.fieldofresearchCauses and Prevention of Crime
dc.subject.fieldofresearchCriminology
dc.subject.fieldofresearchcode160201
dc.subject.fieldofresearchcode1602
dc.titleSpace-Time Dynamics of Maritime Piracy
dc.typeJournal article
dc.type.descriptionC1 - Articles
dc.type.codeC - Journal Articles
gro.facultyArts, Education & Law Group, School of Criminology and Criminal Justice
gro.rights.copyright© 2013 Palgrave Macmillan. This is a post-peer-review, pre-copyedit version of an article published in Security Journal. The definitive publisher-authenticated version Security Journal is available online at: http://dx.doi.org/10.1057/sj.2012.45.
gro.date.issued2013
gro.hasfulltextFull Text
gro.griffith.authorTownsley, Michael K.
gro.griffith.authorOliveira, Alessandro A.


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record