A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.
Keywords: Attack modeling, crime commission process, crime script, situational crime prevention.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 702References:
[1] R. Clarke, "Situational Crime Prevention: Successful Case Studies. New York: Harrow and Heston," ISBN 0-911577-39-4, 1997.
[2] D. B. Cornish, "The procedural analysis of offending and its relevance for situational prevention," Crime prevention studies, vol. 3, pp. 151--196, 1994.
[3] E. Beauregard and M. Martineau, "An application of CRAVED to the choice of victim in sexual homicide: a routine activity approach," Crime Science, vol. 4, no. 1, pp. 1-11, 2015.
[4] E. Beauregard, J. Proulx, K. Rossmo, B. Leclerc, and J.-F. Allaire, "Script analysis of the hunting process of serial sex offenders," Criminal Justice and Behavior, vol. 34, no. 8, pp. 1069--1084, 2007.
[5] Y. N. Chiu, B. Leclerc, and M. Townsley, "Crime Script Analysis of Drug Manufacturing in Clandestine Laboratories Implications for Prevention," (in English), British Journal of Criminology, vol. 51, no. 2, pp. 355-374, Mar 2011, doi: 10.1093/bjc/azr005.
[6] L. Gamman, A. Thorpe, M. Malpass, and E. Liparova, "Hey Babe Take a Walk on the Wild Side! Why Role-playing and Visualization of User and Abuser Scripts Offer Useful Tools to Effectively Think Thief and Build Empathy to Design Against Crime," Design and Culture, vol. 4, no. 2, pp. 171--193, 2012.
[7] T. J. Meijerink, "Carding: crime prevention analysis," 2013.
[8] S. Meyer, "Impeding lone-wolf attacks: lessons derived from the 2011 Norway attacks," Crime Science, vol. 2, no. 1, pp. 1--13, 2013.
[9] S. Meyer, S. H. Jore, and K. W. Johansen, "Troublesome trade-offs: balancing urban activities and values when securing a city-centre governmental quarter," City, Territory and Architecture, vol. 2, no. 1, pp. 1--15, 2015.
[10] R. Willison, "Applying Situational Crime Prevention to the Information Systems Security Context (From Perspectives on Identity Theft, P 151-167, 2008, Megan M. McNally and Graeme R. Newman, eds.--See NCJ-223725)," 2008.
[11] R. Willison, "Understanding the offender/environment dynamic for computer crimes," Information Technology \& People, vol. 19, no. 2, pp. 170--186, 2006.
[12] R. Wortley and L. Mazerolle, Environmental criminology and crime analysis. Willan, 2013.
[13] S. Balemba and E. Beauregard, "Where and when? Examining spatiotemporal aspects of sexual assault events," Journal of sexual aggression, vol. 19, no. 2, pp. 171--190, 2013.
[14] J. Basamanowicz, "Release groups and digital copyright piracy," Arts & Social Sciences: School of Criminology, 2011.
[15] G. Bichler, S. Bush, and A. Malm, "Bad actors and faulty props: unlocking legal and illicit art trade," Global Crime, vol. 14, no. 4, pp. 359--385, 2013.
[16] M. S. De Vries, "Converted firearms: a transnational problem with local harm," European journal on criminal policy and research, vol. 18, no. 2, pp. 205--216, 2012.
[17] M. S. De Vries, "From the instrument of delivery to the actual agent of harm: fighting the criminal purchase of ammunition," European journal on criminal policy and research, vol. 19, no. 1, pp. 1--14, 2013.
[18] N. Gilmour, "Understanding Money Laundering--A Crime Script Approach," Eur. Rev. Organ. Crime, vol. 1, no. 2, pp. 35--56, 2014.
[19] V. K. T. Le, "Understanding the operational structure of Southeast Asian drug trafficking groups in Australia," Queensland University of Technology, 2013.
[20] N. Leontiadis, "Structuring disincentives for online criminals," Carnegie Mellon University Pittsburgh, PA, 2014.
[21] H. Dehghanniri and H. Borrion, "Crime scripting: A systematic review," European Journal of Criminology, p. 1477370819850943, 2019.
[22] P. Ekblom and M. Gill, "Rewriting the Script: Cross-Disciplinary Exploration and Conceptual Consolidation of the Procedural Analysis of Crime," European Journal on Criminal Policy and Research, pp. 1--21, 2016.
[23] B. Leclerc, "Script Analysis and the SCRIPT Acronym," in Crime Prevention in the 21st Century: Springer, 2017, pp. 49-58.
[24] H. Borrion, "Quality assurance in crime scripting," Crime Science, vol. 2, no. 1, p. 6, 2013.
[25] R. Willison and M. Siponen, "Overcoming the insider: reducing employee computer crime through Situational Crime Prevention," Communications of the ACM, vol. 52, no. 9, pp. 133--137, 2009.
[26] H. Brayley, E. Cockbain, and G. Laycock, "The value of crime scripting: deconstructing internal child sex trafficking," Policing, vol. 5, no. 2, pp. 132--143, 2011.
[27] S. Jacques and W. Bernasco, "Drug dealing," Cognition and Crime: Offender Decision Making and Script Analyses, p. 120, 2013.
[28] L. Tompson and S. Chainey, "Profiling illegal waste activity: using crime scripts as a data collection and analytical strategy," European Journal on Criminal Policy and Research, vol. 17, no. 3, pp. 179--201, 2011.
[29] H. Dehghanniri, E. Letier, and H. Borrion, "Improving security decision under uncertainty: A multidisciplinary approach," in Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), International Conference on, 2015: IEEE, 2015, pp. 1-7.
[30] J. F. Hill, "A Systems Thinking Perspective on the Motivations and Mechanisms That Drive Wildlife Poaching," Green Harms and Crimes: Critical Criminology in a Changing World, p. 189, 2015.
[31] D. B. Cornish and R. V. Clarke, "The rational choice perspective," Environmental criminology and crime analysis, p. 21, 2008.
[32] J. Basamanowicz and M. Bouchard, "Overcoming the Warez paradox: online piracy groups and situational crime prevention," Policy & Internet, vol. 3, no. 2, pp. 1--25, 2011.
[33] A. Hiropoulos, J. D. Freilich, S. Chermak, and G. R. Newman, "10 Cigarette smuggling and terrorism financing," Cognition and Crime: Offender Decision Making and Script Analyses, p. 186, 2013.
[34] A. Lavorgna, "Internet-mediated drug trafficking: towards a better understanding of new criminal dynamics," Trends in organized crime, vol. 17, no. 4, pp. 250--270, 2014.
[35] B. Leclerc and D. Reynald, "When scripts and guardianship unite: A script model to facilitate intervention of capable guardians in public settings," Security Journal, 2015.
[36] E. Leukfeldt, "Cybercrime and social ties. Phishing in Amsterdam," Trends in Organized Crime. 2014b, vol. 17, no. 4, pp. 231--249, 2014.
[37] S. Samonas, "Insider fraud and routine activity theory," 2013.
[38] G. H. Bower, J. B. Black, and T. J. Turner, "Scripts in memory for text," Cognitive psychology, vol. 11, no. 2, pp. 177-220, 1979.
[39] C. Morselli and J. Roy, "Brokerage qualifications in ringing operations," Criminology-Beverly Hills then Columbus-, vol. 46, no. 1, p. 71, 2008.
[40] B. Leclerc, R. Wortley, and S. Smallbone, "Getting into the script of adult child sex offenders and mapping out situational prevention measures," Journal of research in crime and delinquency, p. 0022427810391540, 2011.
[41] M. J. Smith, "A six-step model of potential victims' decisions to change location," Security journal, vol. 22, no. 3, pp. 230--249, 2009.
[42] J. Orloff, "The power of intuition," Townsend Letter for Doctors and Patients, no. 255, pp. 133--135, 2004.
[43] M. J. Tyre, S. D. Eppinger, and E. M. Csizinszky, "Systematic versus intuitive problem solving on the shop floor: does it matter?," 1993.
[44] R. M. Dawes, "The value of being explicit when making clinical decisions," Basic processes in helping relationships, pp. 37-58, 1982.
[45] A. Tesser and J. E. Collins, "Emotion in social reflection and comparison situations: Intuitive, systematic, and exploratory approaches," Journal of personality and social psychology, vol. 55, no. 5, p. 695, 1988.
[46] H. Borrion, H. Dehghanniri, and Y. Li, "Comparative analysis of crime scripts: One CCTV footage—twenty-one scripts," in 2017 European Intelligence and Security Informatics Conference (EISIC), 2017: IEEE, pp. 115-122.
[47] H. Goldstein, "Improving policing: A problem-oriented approach," Crime & delinquency, vol. 25, no. 2, pp. 236-258, 1979.
[48] G. Newman, R. V. Clarke, and S. G. Shoham, "Rational choice and situational crime prevention," Aldershot: Dartmouth, 1997.
[49] T. Read and N. Tilley, "Not rocket science," Problem-solving and Crime, 2000.
[50] H. Dehghanniri and H. Borrion, "Toward a More Structured Crime Scripting Method," in Requirements Engineering Conference Workshops (REW), IEEE International, 2016: IEEE, pp. 94-97.
[51] D. T. Ross and K. E. Schoman Jr, "Structured analysis for requirements definition," Software Engineering, IEEE Transactions on, no. 1, pp. 6-15, 1977.
[52] A. van Lamsweerde, "Goal-oriented requirements engineering: A guided tour," presented at the Requirements Engineering, 2001. Proceedings. Fifth IEEE International Symposium on, 2001.
[53] A. van Lamsweerde, R. Darimont, and E. Letier, "Managing conflicts in goal-driven requirements engineering," Software Engineering, IEEE Transactions on, vol. 24, no. 11, pp. 908-926, 1998.
[54] E. S. Yu, "Modeling organizations for information systems requirements engineering," in Requirements Engineering, 1993, Proceedings of IEEE International Symposium on, 1993: IEEE, pp. 34-41.
[55] M. Laguna and J. Marklund, Business process modeling, simulation and design. Chapman and Hall/CRC, 2013.
[56] C. Ouyang, M. Dumas, W. M. Van Der Aalst, A. H. Ter Hofstede, and J. Mendling, "From business process models to process-oriented software systems," ACM transactions on software engineering and methodology (TOSEM), vol. 19, no. 1, p. 2, 2009.