NCJ Number
162436
Journal
Security Journal Volume: 7 Issue: 1 Dated: (April 1996) Pages: 71-75
Date Published
1996
Length
5 pages
Annotation
This article applies the modern crime theories of routine activity theory and environmental criminology to retail crime prevention.
Abstract
The routine activity approach to crime analysis notes that ordinary crime requires three minimal elements: a likely offender, a suitable target, and the absence of a capable guardian against crime (Felson, 1994). The routine activity approach is closely linked to environmental criminology theory. This theory has been named and explained by Patricia and Paul Brantingham. They consider closely the routes that offenders and victims take through space and time. Under this theory they distinguish crime attractors from crime generators, and they distinguish between nodes (places where crime occurs), paths (routes through which offenders and victims travel), and edges (lines along which two parts of town meet, for example). They also distinguish between insiders (employees) and outsiders (customers and delivery personnel). After discussing these concepts of routine activity theory and environmental criminology, this article considers how the theories apply in countering shoplifting, floor theft (employee theft directly from the sales area), and storage room theft. Under the theories espoused in this article, control of retail theft requires thinking about space, about micro environments within stores, and about how the store relates to its larger physical environment. Environmental criminology focuses on routings, and the routine activity approach focuses on routines. 7 references
Date Published: January 1, 1996
Downloads
No download available
Similar Publications
- Help-Seeking Among Victims of Elder Abuse: Findings From the National Elder Mistreatment Study
- An Admixture Approach to Trihybrid Ancestry Variation in the Philippines With Implications for Forensic Anthropology
- A Comparison of the Effects of PCR Inhibition in Quantitative PCR and Forensic STR Analysis