File #2644: "2019_Book_CybercrimePrevention.pdf"

2019_Book_CybercrimePrevention.pdf

Text

1|Series Editor’s Preface|6
1|Acknowledgements|8
1|Contents|10
1|List of Tables|12
1|Chapter 1 Setting the Scene|13
2|Abstract|13
2|Introduction|13
2|Approaches to Crime Prevention|15
2|Factors Associated with Cyber-Dependent Offending|17
2|Parameters of the Review|18
2|Overview of the Book|19
2|References|23
1|Part I Primary Forms of Prevention|27
1|Chapter 2 Situational Crime Prevention|28
2|Abstract|28
2|Introduction|29
2|Theoretical Underpinnings of the Intervention|29
2|Current Applications|30
2|Evidence Base for the Intervention|32
2|Future Applications and Adaptations to Digital Contexts|37
2|References|39
1|Chapter 3 Universal Communication Strategies|45
2|Abstract|45
2|Introduction|45
2|Theoretical Underpinnings of the Intervention|46
2|Current Applications|47
2|Evidence Base for Intervention|48
2|Future Applications and Adaptations to Digital Contexts|53
2|References|54
1|Part II Secondary Forms of Prevention|59
1|Chapter 4 Educational Workshops|60
2|Abstract|60
2|Introduction|61
2|Theoretical Underpinnings of the Intervention|61
2|Current Applications|62
2|Evidence Base for Intervention|62
2|Future Applications and Adaptations to Digital Contexts|67
2|References|68
1|Chapter 5 Mentoring Programs|72
2|Abstract|72
2|Introduction|73
2|Theoretical Underpinnings of the Intervention|73
2|Current Applications|75
2|Evidence Base for the Intervention|76
2|Future Applications and Adaptations to Digital Contexts|80
2|References|81
1|Chapter 6 Targeted Warnings and Police Cautions|86
2|Abstract|86
2|Introduction|86
2|Theoretical Underpinnings of the Intervention|87
2|Current Applications|88
2|Evidence Base for the Intervention|90
2|Future Applications and Adaptations to Digital Contexts|94
2|References|96
1|Part III Tertiary Forms of Prevention|100
1|Chapter 7 Positive Diversions|101
2|Abstract|101
2|Introduction|101
2|Theoretical Underpinnings of the Intervention|102
2|Current Applications|103
2|Evidence Base for Intervention|104
2|Future Applications and Adaptations to Digital Contexts|110
2|References|112
1|Chapter 8 Restorative Justice|117
2|Abstract|117
2|Introduction|118
2|Theoretical Underpinnings of the Intervention|118
2|Current Applications|120
2|Evidence Base for Intervention|121
2|Future Applications and Adaptations to Digital Contexts|125
2|References|128
1|Part IV New Directions|131
1|Chapter 9 Designing and Evaluating Crime Prevention Solutions for the Digital Age|132
2|Abstract|132
2|Navigating the Cybercrime Intervention Minefield|134
3|Selecting the Appropriate Study Design|135
3|Sourcing the Best Possible Data|138
3|Being Attentive to Ethical Issues|146
3|Acknowledging Generalisability Concerns|147
2|Charting a Path Forward for Researchers and Practitioners|147
2|References|149
1|Index|154