Computer Crime
Leontiadis N (2014) Structuring disincentives for online criminals. Thesis, Carnegie Mellon University, Pittsburgh, PA.
Willison R (2005) Considering the Offender: Addressing the Procedural Stages of Computer Crime in an Organisational Context. Working Paper No. 09-2005. Copenhagen Business School, Denmark.
Willison R (2006) Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 16(4): 304–324.
Willison R (2008) Applying situational crime prevention to the information systems security context. In: McNally MM and Newman GR (eds) Perspectives on Identity Theft. Crime Prevention Studies, Vol. 23. Monsey, NY: Criminal Justice, 151–167.
Willison R and Siponen M (2006) Overcoming the insider: Reducing employee computer crime through situational crime prevention. Communications of the ACM 52(9): 133–137.
Counterfeit goods and Smuggling of goods
Hiropoulos A, Freilich JD, Chermak S and Newman GR (2013) Cigarette smuggling and terrorism financing. In: Leclerc B and Wortley R (eds) Cognition and Crime: Offender Decision Making and Script Analyses. London: Routledge, 186–208.
Lavorgna A (2015) The online trade in counterfeit pharmaceuticals: New criminal opportunities, trends and challenges. European Journal of Criminology 12(2): 226–241.
Lord N, Spencer J, Bellotti E and Benson K (2017) A script analysis of the distribution of counterfeit alcohol across two European jurisdictions. Trends in Organized Crime, 20(3-4): 252–272.
Drug Crime
Bright DA and Delaney JJ (2013) Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime 14(2–3): 238–260.
Chiu YN, Leclerc B and Townsley M (2011) Crime script analysis of drug manufacturing in clandestine laboratories: Implications for prevention. British Journal of Criminology 51(2): 355–374.
Leontiadis N and Hutchings A (2015) Scripting the crime commission process in the illicit online prescription drug trade. Journal of Cybersecurity 1(1): 81–92. Leukfeldt E (2014) Cybercrime and social ties. Trends in Organized Crime 17(4): 231–249.
Lavorgna A (2013) Scripting OC in the eSociety: Identifying a new structure of online criminal opportunities for offline transit crimes. Paper for the 7th ECPR General Conference, Bordeaux, France, September.
Lavorgna A (2014a) Internet-mediated drug trafficking: Towards a better understanding of new criminal dynamics. Trends in Organized Crime 17(4): 250–270.
Le VKT (2013) Understanding the operational structure of Southeast Asian drug trafficking groups in Australia. Queensland University of Technology.
Jacques S and Bernasco W (2013) Drug dealing. In: Leclerc B and Wortley R (eds) Cognition and Crime: Offender Decision Making and Script Analyses. London: Routledge, 120–139.
Firearms
De Vries MS (2012) Converted firearms: A transnational problem with local harm. European Journal on Criminal Policy and Research 18(2): 205–216.
De Vries MS (2013) From the instrument of delivery to the actual agent of harm: Fighting the criminal purchase of ammunition. European Journal on Criminal Policy and Research 19(1): 1–14.
Heritage crime
Bichler G, Bush S and Malm A (2013) Bad actors and faulty props: Unlocking legal and illicit art trade. Global Crime 14(4): 359–385.
Price V, Sidebottom A and Tilley N (2014) Understanding and preventing lead theft from churches: A script analysis. In: Grove L and Thomas S (eds) Heritage Crime: Progress, Prospects and Prevention. London: Palgrave Macmillan, 128–148.
Theft (incl. Burglary and Robbery)
Ashby M (2016) Using crime science for understanding and preventing theft of metal from the British railway network. PhD thesis, University College London.
Block S (2012) An analysis of internationally exported vehicle thefts in two high-risk cities. PhD dissertation, Graduate School-Newark, Rutgers University, USA.
Borrion, H., Dehghanniri, H., & Li, Y. (2017, September). Comparative analysis of crime scripts: One CCTV footage—twenty-one scripts. In 2017 European Intelligence and Security Informatics Conference (EISIC) (pp. 115-122). IEEE.
Gentry K (2015) Apple picking: The rise of electronic device thefts in Boston subways. In: Newton A and Ceccato V (eds) Safety and Security in Transit Environments: An Interdisciplinary Approach. London: Palgrave Macmillan, 39.
Lantsman L (2013) ‘Moveable currency’: The role of seaports in export oriented vehicle theft. Crime, Law and Social Change 59(2): 157–184. Lasky N, Jacques S and Fisher BS (2015) Glossing over shoplifting: How thieves act normal. Deviant Behavior 36(4): 293–309.
Leukfeldt R and Jansen J (2015) Cyber criminal networks and money mules: An analysis of low-tech and high-tech fraud attacks in the Netherlands. International Journal of Cyber Criminology 9(2): 173–184.
Irregular migration (not a crime)
(Bish, A., Borrion, H., Cockbain, E., & Toubaline, S., 2025).
Corruption and Money laundering
Gilmour N (2014) Understanding money laundering – A crime script approach. European Review of Organized Crime 1(2): 35–56.
Zanella M (2013) Script analysis of corruption in public procurement. In: Leclerc B and Wortley R (eds) Cognition and Crime: Offender Decision Making and Script Analyses. London: Routledge, 164–185.
Sex crime
Balemba S and Beauregard E (2013) Where and when? Examining spatiotemporal aspects of sexual assault events. Journal of Sexual Aggression 19(2): 171–190.
Beauregard E and Leclerc B (2007) An application of the rational choice approach to the offending process of sex offenders: A closer look at the decision-making. Sexual Abuse: A Journal of Research and Treatment 19(2): 115–133.
Beauregard E and Martineau M (2015) An application of CRAVED to the choice of victim in sexual homicide: A routine activity approach. Crime Science 4(1): 1–11.
Beauregard E, Proulx J, Rossmo K, Leclerc B and Allaire J-F (2007) Script analysis of the hunting process of serial sex offenders. Criminal Justice and Behavior 34(8): 1069–1084.
Beauregard E, Rossmo DK and Proulx J (2007) A descriptive model of the hunting process of serial sex offenders: A rational choice perspective. Journal of Family Violence 22(6): 449–463. Bennett M (1993) The Child as Psychologist: An Introduction to the Development of Social Cognition. New York: Harvester Wheatsheaf.
Brayley H, Cockbain E and Laycock G (2011) The value of crime scripting: Deconstructing internal child sex trafficking. Policing 5(2): 132–143.
Cook A, Reynald DM, Leclerc B and Wortley R (2018) Learning about situational crime prevention from offenders: Using a script framework to compare the commission of completed and disrupted sexual offenses. Criminal Justice Review, 0734016818812149.
Deslauriers-Varin N and Beauregard E (2010) Victims’ routine activities and sex offenders’ target selection scripts: A latent class analysis. Sexual Abuse: A Journal of Research and Treatment 22(3): 315–342.
Leclerc B, Wortley R and Smallbone S (2011) Getting into the script of adult child sex offenders and mapping out situational prevention measures. Journal of Research in Crime and Delinquency 48: 209–237.
Savona E, Giommoni L and Mancuso M (2014) Human trafficking for sexual exploitation in Italy. In: Leclerc B and Wortley R (eds) Cognition and Crime: Offender Decision Making and Script Analyses. London: Routledge, 140–163.
Violence
Brookman F, Bennett T, Hochstetler A and Copes H (2011) The ‘code of the street’ and the generation of street violence in the UK. European Journal of Criminology 8(1): 17–31.
Wilkinson D (2011) An emergent situational and transactional theory of urban youth violence. In: Bishop D and Feld BC (eds) The Oxford Handbook of Juvenile Crime and Juvenile Justice, Part IV New York: Oxford University Press.
Terrorism
De Bie JL, De Poot CJ and Van Der Leun JP (2015) Shifting modus operandi of jihadist foreign fighters from the Netherlands between 2000 and 2013: A crime script analysis. Terrorism and Political Violence 27(3): 416–440.
Hopkins M and Chivers S (2018) Understanding and preventing hit-and-run driving: A crime script analysis. Crime Prevention and Community Safety 20(1): 16–29.
Meyer S (2011) Preventing mass killings: Optimal strategies for protecting public targets against terrorist attacks. PhD thesis, University of Oslo, Sweden.
Meyer S (2012) Reducing harm from explosive attacks against railways. Security Journal 25(4): 309–325.
Meyer S (2013) Impeding lone-wolf attacks: Lessons derived from the 2011 Norway attacks. Crime Science 2(1): 1–13.
Meyer S and Ekblom P (2012) Specifying the explosion-resistant railway carriage—a ‘bench’ test of the Security Function Framework. Journal of Transportation Security 5(1): 69–85.
Meyer S, Jore SH and Johansen KW (2015) Troublesome trade-offs: Balancing urban activities and values when securing a city-centre governmental quarter. City, Territory and Architecture 2(1): 1–15.
Yourdon Inc. (1993) Yourdon Systems Method: Model-Driven Systems Development. Englewood Cliffs, NJ: Prentice Hall. Yun M and Roth M (2008) Terrorist hostage-taking and kidnapping: Using script theory to predict the fate of a hostage. Studies in Conflict & Terrorism 31(8): 736–748.
Waste Crime
Baird J, Curry R and Cruz P (2014) An overview of waste crime, its characteristics, and the vulnerability of the EU waste sector. Waste Management & Research 32(2): 97–105.
Dalla Gasperina G (2014) Illegal waste traffic and legitimate market players: Legislative opportunities in Italy. PhD thesis, University of Trento, Italy.
Tompson L and Chainey S (2011) Profiling illegal waste activity: Using crime scripts as a data collection and analytical strategy. European Journal on Criminal Policy and Research 17(3): 179–201.
Sahramäki I and Kankaanranta T (2017) Waste no money-reducing opportunities for illicit waste dumping. Crime, Law and Social Change 68(1–2): 217–232.
Wildlife Crime
Hill JF (2015) A systems thinking perspective on the motivations and mechanisms that drive wildlife poaching. In: Sollund RA (ed., Green Harms and Crimes: Critical Criminology in a Changing World. London: Palgrave Macmillan, 189–219.
Lavorgna A (2014b) Transit crimes in the Internet age: How new online criminal opportunities affect the organization of offline transit crimes. Thesis, University of Trento, Italy. Lavorgna A (2014c) Wildlife trafficking in the Internet age. Crime Science 3(1): 1–12.
Moreto WD and Lemieux A (2015) From CRAVED to CAPTURED: Introducing a product-based framework to examine illegal wildlife markets. European Journal on Criminal Policy and Research 21: 303–320. Morselli C and Roy J (2008) Brokerage qualifications in ringing operations. Criminology 46(1): 71–98.
Osborne JR and Capellan JA (2017) Examining active shooter events through the rational choice perspective and crime script analysis. Security Journal 30(3): 880–902.
Petrossian GA and Pezzella FS (2018) IUU fishing and seafood fraud: Using crime script analysis to inform intervention. The ANNALS of the American Academy of Political and Social Science 679(1): 121–139.
Van Doormaal N, Lemieux AM and Ruiter S (2018) Understanding site selection of illegal border crossings into a fenced protected area: A rational choice approach. Crime Science 7(1): 7.
Other papers
Basamanowicz J (2011) Release groups and digital copyright piracy. School of Criminology, Simon Fraser University, Canada.
Basamanowicz J and Bouchard M (2011) Overcoming the Warez paradox: Online piracy groups and situational crime prevention. Policy & Internet 3(2): 1–25.
Borrion H and Bouhana N (2012) iCARE: A scenario-based method for the RIBS project. In: Proceedings of the 2012 European Intelligence and Security Informatics Conference (EISIC 2012). Piscataway, NJ: IEEE.
Bowers K, Johnson S, Guerette RT, Summers L and Poynton S (2010) Systematic Review of the Empirical Evidence of Spatial Displacement and Diffusion of Benefit among Geographically Focused Policing Initiatives. Report submitted to the Center for Evidence Based Crime Policy at George Mason University (USA) and the National Policing Improvement Agency (UK).
Bowers KJ, Johnson SD, Guerette RT, Summers L and Poynton S (2011) Spatial displacement and diffusion of benefits among geographically focused policing initiatives: A meta-analytical review. Journal of Experimental Criminology 7(4): 347–374.
Bullock K, Clarke RVG and Tilley N (2010) Situational Prevention of Organised Crimes. Cullompton: Willan Publishing.
Caneppele S, Riccardi M and Standridge P (2013) Green energy and black economy: Mafia investments in the wind power sector in Italy. Crime, Law and Social Change 59(3): 319–339.
Cornish DB and Clarke RV (2002) Analyzing organized crimes. In: Piquero AR and Tibbetts SG (eds) Rational Choice and Criminal Behavior: Recent Research and Future Challenges. London: Routledge, 41–62.
Clarke R (1997) Situational Crime Prevention: Successful Case Studies. New York: Harrow and Heston.
Clarke R (2009) Situational crime prevention: Theoretical background and current practice. In: Krohn MD, Lizotte AJ and Penly Hall G (eds) Handbook on Crime and Deviance. New York: Springer, 259–276.
Claus V, Ehrig H and Rozenberg G (1979) Graph-grammars and their application to computer science and biology. International workshop, Bad Honnef, October 30–November 3, 1978. Springer Science & Business Media.
Cornish DB (1994a) Crimes as scripts. In: Zahm D and Cromwell P (eds) Proceedings of the International Seminar on Environmental Criminology and Crime Analysis. Tallahassee, FL: Florida Statistical Analysis Center.
Cornish DB (1994b) The procedural analysis of offending and its relevance for situational prevention. Crime Prevention Studies 3: 151–196.
Cornish DB and Clarke RV (2003) Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies 16: 41–96.
Cornish DB and Clarke RV (2008) The rational choice perspective. In: Wortley R and Mazerolle L (eds) Environmental Criminology and Crime Analysis. Portland, OR: Willan Publishing, 21–47.
Dimkov T (2012) Alignment of organizational security policies: Theory and practice. University of Twente, The Netherlands.
Dimkov T, Van Cleeff A, Pieters W and Hartel PH (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC). New York: Association for Computing Machinery (ACM), 399–408.
Duijn PAC, Kashirin V and Sloot PMA (2014) The relative ineffectiveness of criminal network disruption. Scientific Reports 4: 4238.
Duijn PA and Klerks PP (2014) Social network analysis applied to criminal networks: Recent developments in Dutch law enforcement. In: Masys AJ (ed.) Networks and Network Analysis for Defence and Security. Heidelberg: Springer, 121–159.
Ekblom P and Sidebottom A (2008) What do you mean, ‘Is it secure?’ Redesigning language to be fit for the task of assessing the security of domestic and personal electronic goods. European Journal on Criminal Policy and Research 14(1): 61–87.
Gamman L, Thorpe A, Malpass M and Liparova E (2012) Hey babe take a walk on the wild side! Why role-playing and visualization of user and abuser scripts offer useful tools to effectively think thief and build empathy to design against crime. Design and Culture 4(2): 171–193.
Gilliam FD, Jr and Iyengar S (2000) Prime suspects: The influence of local television news on the viewing public. American Journal of Political Science 44(3): 560–573.
Gillies AC and Smith P (1994) Managing Software Engineering: CASE Studies and Solutions. London: Chapman & Hall.
Haelterman H (2016) Scripting crime against business. In: Haelterman H, Crime Script Analysis. London: Palgrave Macmillan, 113–159.
Hagan J and Levi R (2004) Social skill, the Milosevic indictment, and the rebirth of international criminal justice. European Journal of Criminology 1(4): 445–475.
Hardy CJ, Thompson JB and Edwards HM (1995) The use, limitations and customization of structured systems development methods in the United Kingdom. Information and Software Technology 37(9): 467–477.
Hartel PH, Junger, M and Wieringa RJ (2010) Cyber-crime Science = Crime Science + Information Security. CTIT Technical Report Series, No. 10-34. Enschede: Centre for Telematics and Information Technology (CTIT). URL (accessed 3 May 2019): http://eprints.eemcs.utwente. nl/18500/.
Hobbs D, Winlow S, Hadfield P and Lister S (2005) Violent hypocrisy: Governance and the nighttime economy. European Journal of Criminology 2(2): 161–183.
Holton JA (2007) The coding process and its challenges. In: Bryant A and Charmaz K (eds) The Sage Handbook of Grounded Theory (Part III). Thousand Oaks, CA: Sage, 265–289.
Hutchings A (2018) Leaving on a jet plane: The trade in fraudulently obtained airline tickets. Crime, Law and Social Change 70(4): 461–487.
Hutchings A and Holt TJ (2015) A crime script analysis of the online stolen data market. British Journal of Criminology 55(3): 596–614.
Knapik P, Schoch E, Muller M and Kargl F (2012) Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012). USA: IEEE, 86–93.
Leberatto AC (2015) Survivor scripts and safety scripts in Lima, Peru: Citizens’ cognitive assessments and decisions to maintain safety during victimization events and in their daily routines. PhD dissertation, Graduate School-Newark, Rutgers University, USA.
Leclerc B (2013) New developments in script analysis for situational crime prevention. In: Leclerc B and Wortley R (eds) Cognition and Crime: Offender Decision Making and Script Analyses. London: Routledge, 221–236.
Leclerc B (2014) Script analysis for crime controllers: Extending the reach of situational crime prevention. In: Caneppele S and Calderoni F (eds) Organized Crime, Corruption and Crime Prevention. New York: Springer, 13–20.
Levi M (2008) Organized fraud and organizing frauds: Unpacking research on networks and organization. Criminology and Criminal Justice 8(4): 389–419.
Levy Y and Ellis TJ (2006) A systems approach to conduct an effective literature review in support of information systems research. Informing Science: International Journal of an Emerging Transdiscipline 9(1): 181–212.
Li JC (2015) Adolescent compensated dating in Hong Kong: Choice, script, and dynamics. International Journal of Offender Therapy and Comparative Criminology 59(6): 588–610.
Lord N and Levi M (2017) Organizing the finances for and the finances from transnational corporate bribery. European Journal of Criminology 14(3): 365–389.
Lord N, Spencer J, Bellotti E and Benson K (2017) A script analysis of the distribution of counterfeit alcohol across two European jurisdictions. Trends in Organized Crime, 20(3-4): 252–272.
Meijerink TJ (2013) Carding: crime prevention analysis. PhD dissertation, University of Twente, The Netherlands.
Leclerc B (2017) Script analysis and the SCRIPT acronym. In: Leclerc B and Savona EU (eds) Crime Prevention in the 21st Century. New York: Springer, 49–58.
Leclerc B and Reynald D (2015) When scripts and guardianship unite: A script model to facilitate intervention of capable guardians in public settings. Security Journal 30(3): 793–806.
Olle TW, Hagelstein J, Macdonald G, Rollands C, Sol HG, Van Assche FJM and Verrijn-Stuart AA (1992) Information systems methodologies: A framework for understanding. Journal of the Operational Research Society 43(3): 286–286.
Rege A (2012) Cybercrimes against the electricity infrastructure: exploring hacker and industry perceptions. PhD dissertation, Graduate School-Newark, Rutgers University, USA.
Rowe E, Akman T, Smith RG and Tomison AM (2012) Organised crime and public sector corruption: A crime scripts analysis of tactical displacement risks. Trends and Issues in Crime and Criminal Justice 444: 1.
Samonas S (2013) Insider fraud and routine activity theory. Paper presented at the12th Annual Security Conference, 11 April 2013, Las Vegas, USA.
Sidebottom A, Tompson L, Thornton A, Bullock K, Tilley N, Bowers K and Johnson SD (2015) Gating Alleys to Reduce Crime: A Meta-analysis and Realist Synthesis. What Works: Crime Reduction Systematic Review Series, No. 1. College of Policing, UK.
Smith MJ (2008) Addressing the security needs of women passengers on public transport. Security Journal 21(1): 117–133.
Smith MJ (2009) A six-step model of potential victims’ decisions to change location. Security Journal 22(3): 230–249.
Smith MJ and Clarke RV (2000) Crime and public transport. Crime and Justice 27: 169–233. Snook B, Eastwood J, Gendreau P, Goggin C and Cullen RM (2007) Taking stock of criminal profiling: A narrative review and meta-analysis. Criminal Justice and Behavior 34(4): 437–453.
Somer T, Tiido A, Sample C and Mitchener-Nissen T (2018) Application of journey mapping and crime scripting to the phenomenon of trolling. In: ICCWS 2018 13th International Conference on Cyber Warfare and Security. Academic Conferences and Publishing Limited, 465.
Sytsma VA and Piza EL (2018) Script analysis of open-air drug selling: A systematic social observation of CCTV footage. Journal of Research in Crime and Delinquency 55(1): 78–102.
Vakhitova ZI and Bell PJ (2018) A script analysis of the role of athletes’ support networks as social facilitators in doping in sport. Crime Prevention and Community Safety 20(3): 168–188.
Webster J and Watson RT (2002) Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly 26(2): xiii–xxiii.
Wortley R and Mazerolle L (2013) Situating the theory, analytic approach and application. In: Wortley R and Mazerolle L (eds) Environmental Criminology and Crime Analysis. Portland, OR: Willan Publishing, 1–18.
Borrion H, Ekblom P, Alrajeh D, Borrion A, Keane A, Koch D, Mitchener-Nissen T and Toubaline S (2019) The problem with crime problem-solving: Towards a second generation POP? British Journal of Criminology.
Ekblom P and Gill M (2016) Rewriting the script: Cross-disciplinary exploration and conceptual consolidation of the procedural analysis of crime. European Journal on Criminal Policy and Research 21(2): 319–339.