We begin this guide by describing the problem of theft of customers' personal property from cafés and bars and reviewing associated risk factors. We then identify a series of questions to help you analyze your local problem, and, finally, review responses to this type of problem. At present, evaluative research-whether carried out independently or by the police-is scarce; consequently it is not possible to draw any firm conclusions as to which responses to theft of customers' personal property from cafés and bars are the most effective. Nevertheless, we review several responses to this problem and make tentative statements as to their effectiveness.
Theft of customers' personal property from cafés and bars is one aspect of the larger set of theft- and property-related problems. This guide, however, is limited to addressing the particular harms created by the unlawful removal of customers' personal property from cafés and bars. Table 1 shows some of the different types of theft that might occur in a café or bar environment and the extent to which the offender is visible to the victim at the time of the offense. Unless otherwise stated, the phrase 'theft of customers' personal property' will be used interchangeably with 'theft in cafés and bars.
|Victim not present||Victim present but unaware of offender||Offender visible to victim but not recognized as such||Offender seen by victim|
|Type of Offense|
|Unattended bag theft||Pocket-picking and similar offenses involving stealth||Distraction theft||Snatch offenses†|
Table 1: Different Types of Theft that Occur in Cafés and Bars
† Snatch offenses differ from personal robbery because there is no violence or threat of violence associated with them.
For the purpose of this guide, the two types of problems-theft from customers in cafés and theft from customers in bars†† are considered together but independently from the crimes of larceny/theft/robbery in general for the following reasons. The two types of premises (and associated victims and offenders) share a number of characteristics that contribute to the crime problems experienced. Consequently there is considerable overlap in terms of the types of appropriate crime reduction tactics. To elaborate, both types of premises are semi-private spaces that provide similar services and the opportunity for social interaction. Both generally have a substantial turnover of patrons, comprising both regulars and infrequent visitors. In both types of facilities the likelihood of crime occurrence is a function of many things, including: 1) the type of security employed, both in terms of staff (and their training) and physical measures; 2) the internal layout of the facility; and 3) the types of people who frequent the property and the purposes of their visits. To some extent at least, each factor is within the managers' influence. Moreover, cafés and bars are likely to be subject to similar legal regulations that might be useful when trying to encourage certain responses from place managers†††, or that place managers might use to achieve desired outcomes.
†† Here, a bar is defined as a business that serves drinks, including alcohol, for consumption on the premises, while a café is defined as a facility where meals and non-alcoholic drinks are served and consumed. Bars do vary considerably and may include "neighborhood" bars, jazz clubs, wine bars, and dance clubs (Madensen and Eck, 2008). Note that typical restaurants are not included here.
††† Place managers monitor places and are therefore in a position to discourage crime (Eck, 1994).
Although cafés and bars display similar crime-related characteristics, they also exhibit differences that are worth considering. For example, dance or nightclubs might leave women patrons especially vulnerable to bag theft because bags are often poorly attended to while they are dancing. On the other hand, café patrons might be more at risk of laptop computer theft because they are more likely to take them to such facilities. In what follows, these differences will be highlighted where they are important to crime-prevention planning.
Related problems not directly addressed in detail in this guide (those with asterisks are briefly touched upon), each of which requires separate analysis, include:
Some of these related problems are covered in other guides in this series, all of which are listed at the end of this guide. For the most up-to-date listing of current and future guides, visit www.popcenter.org.
Theft of customers' personal property from cafés and bars is a problem that has largely been overlooked in research literature. Reasons for this-discussed in more detail below-are that many crimes go unreported and data are rarely recorded or analyzed by crime reduction agencies in a way that would draw attention to the extent of the problem. However, the problem is substantial, serious, and could increase over time, meaning that addressing it is important.
There have always been large numbers of bars in the United States and elsewhere†. However, the popularity of coffee shops and other types of cafés has risen steadily. For example, in 1990 there were approximately 200 freestanding coffee houses in the United States. In 2004, there were more than 14,000.1 This impacts the volume of crime that occurs at these types of locations. Simply put, if there are more cafés and bars, more people will visit them, and the opportunities for crime in such establishments will increase.
† According to the U.S. Census Bureau (2000), in 1997 there were nearly 7,000 coffee shops in the United States, and more than 52,000 licensed venues. Recent figures suggest there are more than 21,400 coffee shops in the United States. In 2007, there were about 51,000 licensed bars in the United Kingdom alone.
Results from the National Crime Victimization Survey (NCVS)2 suggest that only one-third of completed thefts in the United States are reported to the police. Even when victims do report offenses to the police, the extent of the problem may still be distorted. For example, the victim may be unaware that an offense has occurred and report the stolen item(s) as lost property.3 Furthermore, police might not consider reported incidents serious enough to formally record them.
Analysis of police-recorded crime data is also problematic as there is no specific category for recording thefts of customers' personal property from cafés and bars. For example, in the United States, these crimes are recorded under the general category of larceny, which refers to the taking of money or property where no force or threat thereof occurs. Because this is a general category, statistics are not routinely available for the specific crimes that are the focus of this guide, and figures can be derived only when sufficient additional information is recorded about the location of offenses.
In the United States, summary data regarding pocket picking and purse snatching, for example, are readily available as part of the analysis of Uniform Crime Reports published by the U.S. Department of Justice†. Data regarding theft in cafés and bars are not.
Data from the International Crime Victim Survey (ICVS) and the European Survey on Crime and Safety (EU ICS) provide an estimate of crime risk across 30 countries and the 33 main cities within them. The estimated rate of personal property theft in2004 in the United States†† was 77 (pocket picking = 33) crimes per 1,000 population at risk4. In London (U.K.), the corresponding figure was 102 (pocket picking = 52) crimes per 1,000 population at risk. These rates are higher than those for other types of acquisitive crime covered in the survey†††.
†† This estimate is based on 1,001 surveys conducted in 2004 in a New York City using a random sample of the population.
††† For the New York City sample of the ICVS, the rates per 1,000 population at risk were 23, 19, and 66 for the crimes of robbery, burglary, and theft from vehicle respectively.
Although official statistics for theft in cafés and bars are not publicly available, summary data from a large-city police force in the United States are instructive. The data relate to grand larceny crimes recorded in 2004. Of the total recorded, one-quarter occurred in bars/clubs or eateries. Unfortunately data were unavailable for suburban or rural agencies at the time of this writing, but we suggest that bars are high-risk facilities in most contexts.
Consideration of where pocket-picking and purse-snatching offenses occur is also instructive. Analyses of the NCVS 20065 indicate that just under one-quarter of all offenses occurred in bars, restaurants, and nightclubs. Similarly, secondary analysis of 2006 British Crime Survey (BCS) data suggests that about one-quarter of cell phone thefts occur in such facilities.
However, the above statistics consider only a fraction of the crimes that occur in bars. The results from a study conducted in a chain of bars licensed to sell alcohol in London (U.K.) provide more detail. Over two years (January 2005 to December 2006), police recorded a total of 1,023 incidents of theft in the 26 bars considered.6 This equates to about 1.5 crimes per day across the 26 establishments. Put another way, the rate of crime across the bars, expressed as the number of crimes per seats available, equated to 101 crimes per 1,000 seats per year.
These calculations are limited because they do not account for the amount of time patrons are exposed to the risk of this crime type. For example, houses may be burgled at any time. However, people can be victimized in bars only when they are in them. As this is usually less than 24 hours†, the quoted rates underestimate the actual risk.
† In fact, the highest risk of theft in cafés and bars is likely to be concentrated within a relatively short period of time rather than being consistent throughout the day (Smith et al., 2006). This pattern is also referred to as an "acute" temporal clustering of crimes (Ratcliffe, 2004).
To summarize, measuring the extent of theft in cafés and bars is difficult due to the way these crimes are recorded. Nevertheless, available estimates suggest that the risk of this type of crime is greater than that for other types of acquisitive crime.
According to data from the NCVS, arrests are made for about 4 percent of cases of pocket picking or snatch theft. For theft in general the figure is less than 1 percent. Reasons for low-detection rates include: 1) the problem of identification-items stolen are rarely registered to the rightful owner in a way that would facilitate their identification if recovered; and 2) theft of this kind is generally a crime of stealth††, so the victim is unlikely to be able to provide a description of the offender.
†† In a study conducted in London (U.K.), 89 percent of victims did not notice the crime occurring and 35 percent realized an offense had occurred only when they were about to leave the bar (Smith et al., 2006).
As a consequence of low clearance rates, systematic data about the types of offenders who commit theft in cafés and bars are lacking. These offenders may have the same profile as pocket-pickers, or the possibility exists that they may be employees. For example, some research suggests that there is a significant amount of theft by employees in retail stores.7 Moreover, conversations with police officers in the United States suggest that some café and bar employees are arrested for committing theft in the establishments in which they work.
As with many forms of crime, the incidence of theft in bars is not random. The Washington Post noted that almost all incidents of purse thefts in restaurants and bars occurred in three of the city's seven police districts.8 Analysis9 of crimes at a sample of 26 bars in London (U.K.) showed that about 60 percent of thefts occurred in only 20 percent of the premises considered. Although analyses of thefts in cafés are unavailable, the pattern of concentration described has so far proven to be so consistent10 for other crime types that we are willing to speculate the same would hold true here.
Research also suggests that the risk of theft in bars may cluster within bars. The hotspot map shown below-reproduced from an earlier study11-indicates that bag theft was unevenly distributed. There appears to be an elevated risk around the south but not the north entrance.
Figure 1. An example of a micro-environmental hotspot to show how risk varies within a bar
Offenders use a variety of techniques to steal from others depending on a range of factors such as the type of place, the time of day, the items targeted, the victim, and the offender(s) themselves. Some common techniques are described below (a one-page illustrated summary of which can be found at http://www.designagainstcrime.com/index.php?q=perpetratortechniques):
Bag thieves do not always work alone. Working in teams is especially fruitful in distraction offenses.12 For such offenses, a 'stall' often stops the victim (e.g., by asking for the time) while a 'blocker' obstructs the victim's view so the theft goes unnoticed. Sometimes, a third party takes the stolen items from the pocket-picker.13
Although it is not always possible to identify those most at risk of theft in cafés and bars, several risk/protective factors have been identified for the general crime of theft. Analyses of NCVS data suggest that individuals between the ages of 16 and 19 are at the greatest risk of purse-snatching or pocket-picking offenses.14 There do not appear to be gender differences in the risk of these types of crime.
Results from the BCS suggest that people who visit cafés and bars three or more times a week are at more than twice the risk of theft (snatch and stealth) than those who do not.15 One reason for this may be that those with active social lives are simply exposed to the risk of crime more of the time. However, it may also suggest that cafés and bars are particularly risky facilities for this type of crime.
Analysis of 965 incidents of police-recorded crime data (January 2005-December 2006) concerning bag theft in a chain of London (U.K.) pubs conducted for this guide indicated that, in contrast to the pattern observed for theft, 85 percent of victims were female and most were between the ages of 21 and 25. Also, younger females (under 25) were at a greater risk of victimization than older females (26-50). For males the reverse was true. Additionally, forms of identification such as driving licenses or passports, were more frequently stolen from younger customers (presumably because they need these to enter the bar).
The most immediate impacts of this type of crime are borne by victims. Costs include the replacement of stolen goods†, lost output due to time taken off work to report the crime and conduct related business such as canceling stolen credit cards, and coping with any injuries sustained. When personal identification is stolen, the risk of identity theft may be significant.†† To illustrate, in one study an interviewed offender stated: "Stolen handbags were the source (of personal identification stolen) I am afraid. Women are more susceptible than men because of where they carry their handbags...hot targets were shoe shops and coffee shops [because of the high tables]"16 Moreover, analysis of identity theft in the United States indicates that in about one-third of cases, the identification used in the offense was acquired from a lost or stolen purse or wallet.17 Given this link to identity theft (and credit card fraud†††), what might be thought of as a trivial crime should perhaps be considered a more serious crime multiplier, where one crime facilitates others.
† The economic costs of thefts in cafés are unavailable, but, according to NCVS results, victims of pocket picking (one technique used for this type of crime) lose about $32 million per year.
†† See Problem-Specific Guide No. 25, Identity Theft, for further information.
††† See Problem-Specific Guide No. 21, Check and Card Fraud, for further information.
Thefts in cafés and bars can also affect business revenue. For example, in one study, one-quarter of theft victims reported they intended to avoid the venue in the future.18 Of course, as with any crime, there is also a cost to the criminal justice system.
The following section outlines factors that contribute to theft in cafés and bars. Understanding these will help you frame your own local analysis questions, determine good effectiveness measures, recognize key intervention points, and select appropriate responses.
Analysis of bag theft in bars in London (U.K.) indicates that where bags are placed influences crime risk.19 Bags left on the floor or on the back of customers' chairs are at about twice the average risk, whereas bags placed on tables or on the person were at a much lower risk (1/6th and 1/27th of the average, respectively). Obviously, the risk is highest for unattended bags; the study reported that in at least one-third of recorded thefts, the bag was unattended at the time of the offense. This suggests that (personal) guardianship of customers' property is often ineffective perhaps because the provision of suitable storage facilities (particularly for bulky items) is insufficient, forcing patrons to leave items in risky locations such as the floor.†
† Other reasons could be that customers leave property unattended when they visit the bar or restroom. Also, because of legislation banning smoking in cafés and bars in many states in the United States and everywhere in the United Kingdom, customers may leave their property unattended when going outside for a cigarette.
Many establishments do provide some sort of storage for personal items. These range from coat and bag hooks in semi-secure storage such as bag/coat checks to secure storage such as lockers. The risk of theft is likely to be reduced when these are used; however, there is generally only anecdotal evidence to show this.
Of course, an offender's readiness to offend is reduced when there is little to be gained. In the case of theft, at least some of the items that people routinely carry on their person-and hence found in high concentrations in cafés and bars-satisfy the20 acronym CRAVED, which defines a hot product††: Concealable, Removable, Available, Valuable, Enjoyable, and Disposable. Three CRAVED items that most people have when frequenting cafés and bars are cash, credit/debit cards, and some form of identification. Cash and credit cards are CRAVED for reasons that require no explanation. Identification is valuable to thieves for the purpose of identity theft.†††
††† Hot products are those items favored by thieves. They tend to have a high value-to-weight ratio and are easy to dispose of. Cash is the ultimate hot product as it requires no work before the offender can use it.
††† See Problem-Specific Guide No. 25, Identity Theft, for further information.
Table 2 below-generated from a re-analysis of a London-based study21-indicates that items fitting the CRAVED profile are those most frequently stolen. The first two columns indicate whether an offender acquired stolen items by stealing a bag and all of its contents or by dipping into the bag and selecting particular items. The third column indicates how much more likely a particular item was to be taken when specifically targeted (i.e., dipped) than when stolen as part of the contents of an entire bag. It appears that four of the five† CRAVED items shown in the table not only are likely to be stolen during thefts in bars, but are more likely to be specifically targeted, suggesting evidence of offender targeting decisions.
† Considering cell phone theft, there is little difference in the two figures (dipping versus theft of the entire bag). Cell phones are specifically targeted, but the results suggest they are not targeted as much as other CRAVED items during dipping offenses. However, the analysis focused only on theft of or from bags. Cell phones are not always in bags and are often left on tables in cafés and bars. Such incidents were unavailable for analysis.
|Bag Taken (%)||Items Dipped from Bag (%)||Ratio|
* CRAVED items
Table 2: Items Stolen in Bars as a Result of the Theft of the Entire Bag or Dipped from the Bag (CRAVED items in black bold type)
Laptop computers are another hot product that are often stolen but not necessarily stored in bags.22 The availability of wireless connectivity in many cafés, coffee shops, and bars means that laptops are routinely used at and found on table tops at these venues. Moreover, laptops make good targets for thieves as customers are often distracted in these environments and laptops are rarely secured.†
† For more on this, see Kitteringham (2008).
Considering future trends, it is worth noting that cell phone functionality is continually advancing. Current models routinely feature MP3 players and high resolution cameras. However, the "smart wallet technology”23, which will allow users to pay electronically for goods and services using their cell phone, is a significant change in functionality that is likely to appeal to thieves. If this technology becomes ubiquitous, cell phone theft is likely to increase and the types of associated multiplier crimes (e.g., identity theft) will become even more serious.†† Other payment technologies that allow consumers to pay for goods wirelessly are also likely to make theft from the person an increasingly attractive crime.
†† As part of their feelgoodaboutmobiles brand, Some companies within the cell phone industry are developing software to secure cell phones in case of theft. Proposed remote functions include locking the cell phone, wiping sensitive information, and automatically sending text messages to pre-designated numbers if the sim card is changed without the owner's authorization. Similar technology exists for laptops (Brandt, 2006).
Cafés and bars generate and attract theft†††, perhaps more so than other facilities, due to:
††† Brantingham and Brantingham (1995) suggest that a high volume of crime may occur at certain facilities simply because large numbers of people congregate at them. A high density of people will create opportunities for crime that may be exploited by offenders who happen to be there, but who did not necessarily visit the facility to commit crime. At such facilities, referred to as crime generators, the volume of crime will be high, but the risk of crime (=volume/population at risk) low. In contrast, crime attractors are facilities that offenders know provide good opportunities for crime and they will travel to them to offend. At such facilities the risk of crime will be high, but the volume of crime need not be
The information provided above is only a generalized description of theft in cafés and bars. You must combine the basic facts with a more specific understanding of your local problem. Analyzing the local problem carefully will help you design a more effective response strategy.
In addition to criminal justice agencies, the following groups have an interest in the problem of theft in cafés and bars and should be considered for the contribution they might make to gathering information about the problem and responding to it:
Following are some critical questions you should ask when analyzing your particular theft problem, even if the answers are not always readily available. Your answers to these and other questions will help you define and understand your local problem and choose the most appropriate set of responses later on.
† See Problem-Solving Tools Guide No. 6, Understanding Risky Facilities, for further information.
†† Anecdotal evidence suggests that some thieves watch people at ATMs (sometimes referred to as shoulder surfing) to acquire their PIN number and then later attempt to steal their purse or wallet when, for example, they leave their bags unattended or in vulnerable locations in cafés and bars.
††† Smith et al. (2006) found that thefts in a chain of bars tended to occur when the bar was at around 60 percent capacity or above (as estimated by the victim), at around 6:00 p.m., and within 75 minutes of the victim visiting the bar. Where there are hot times, an increase in guardianship at that time of day is more likely to be effective than when the risk of crime is more uniform over the course of the day.
† See Problem-Solving Tools Guide No. 3, Using Offender Interviews to Inform Police Problem Solving, for further information.
Measurement allows you to determine to what degree your efforts have succeeded, and suggests how you might modify your responses if they are not producing intended results. You should take measures of your problem before you implement responses to determine how serious the problem is, and after you implement them to determine whether they have been effective. All measures should be taken in both the target area and the surrounding and/or non-target area. For detailed guidance on measuring effectiveness, see Problem-Solving Tool Guide No. 1, Assessing Responses to Problems: An Introductory Guide for Police Problem-Solvers.
The types of data collected will depend on the particular problem to be addressed and the intervention(s) implemented. For example, if the aim of intervention is to change the way customers secure bags and other CRAVED goods, then in addition to measuring what was implemented (process measures) and any changes in theft rates (outcome measures), a useful intermediate outcome measure would be the degree to which changes have been observed in the way customers secure their property.
To measure potential success, you should establish the following measures.
† For more detailed explanations on the concepts of displacement and diffusion, see Problem-Solving Tools Guide No. 1, Assessing Responses to Problems: An Introductory Guide for Police Problem-Solvers, and No. 10, Analyzing Crime Displacement and Diffusion.
Analysis of your local problem should give you a better understanding of the factors contributing to it. Once you have analyzed your local problem and established a baseline for measuring effectiveness, you should consider possible responses to address the problem.
The following response strategies provide a foundation of ideas for addressing your particular problem. These are drawn from a variety of research studies and police reports. Several may apply to your community's problem, but it is critical that you tailor responses to local circumstances, and that you can justify each response based on reliable analysis. In most cases, an effective strategy will involve several different responses. Law enforcement responses alone are seldom effective in reducing or solving the problem. Do not limit yourself to considering what police can do; carefully consider whether others in your community share responsibility for the problem and can help police better respond to it. The responsibility of responding, in some cases, may need to be shifted toward those who can implement more effective responses. (For more detailed information on shifting and sharing responsibility, see Response Guide No. 3, Shifting and Sharing Responsibility for Public Safety Problems).
In one form or another, crime reduction strategies are likely to build on one of the following techniques: target hardening, concealment or removal, access control, natural and formal surveillance, anonymity reduction, place manager utilization, guardianship extension, and benefit reduction or removal. These strategies naturally overlap. For example, by increasing natural surveillance, guardianship is likely to be enhanced.
In many cases, solutions will involve working with place managers or owners of high-risk venues. In such cases, readers are advised to consult Problem-Solving Tools Guide No. 6, Understanding Risky Facilities, which focuses on understanding risky facilities and how to work with place managers to reduce crime.
What follows should help you consider what might be appropriate in your area and help you identify some of the issues associated with implementing such interventions. In many cases, the responses discussed have not been subjected to rigorous evaluation, but are included to illustrate the range of tactics possible.
The intervention's effectiveness may depend on identifying and manipulating the aspects of the venue that are most likely to impede perpetrators' preferred Modus Operandi; therefore, it is important to carefully investigate these. For example, in a venue where snatch theft is prevalent, changing the venue layout to make escape routes less convenient to thieves may reduce offenses.† In contrast, if most thefts are due to patrons leaving items unattended, the solution might be to improve secure storage facilities.
† For an example of how layout can impact thefts that depend on quick and easy escape routes, see the Tesco case study (Design Council, 2003).
Appropriate responses will vary across different types of establishments. For example, coffee shops and fast food chains are quite different because of the likely variations in clientele and hours of operation. Moreover, the risk of victimization may vary by time of day even within the same type of facility. Different problems will require different solutions.
A further consideration is a venue's geographical context. Effectiveness may depend on whether the venue is isolated or within a larger entertainment district. For example, considering detection strategies, an offender may be more likely to linger in an entertainment district than in other areas.
As discussed, the theft of property in cafés and bars often occurs when items are left unattended. This suggests that secure storage facilities are either inadequate or inconvenient. In this case, the provision of convenient secure storage facilities may help reduce theft.
Many different types of secure storage exist, but they should be tailored to the particular environment. To illustrate, cloakrooms are useful and provide high levels of security in clubs or bars with a dance floor. However, in coffee shops where customers may spend only 10 minutes drinking coffee, cloakrooms would likely be underused and inconvenient and, therefore, cost-ineffective. Examples of storage solutions have been identified by the Design Against Crime Research Centre at Central Saint Martins College, London (DACRC) and include (also see Appendix B):
1.Providing anti-theft furniture. Where customer turnover is high, using furniture designed for crime prevention may be cost effective and practical. A number of examples of anti-theft furniture exist. Those below were commissioned as part of a design project at the Design Against Crime Research Centre (DACRC). For each design—the range reflecting the need to have different types of designs for different types of venues—the anti-theft feature is integral. For example, a chair†† shown at both ends of the figure allows customers to secure their bags off the floor enhancing their role as capable guardians. The chair designs are intended to be attractive and to reduce opportunities for theft.
Examples of anti-theft furniture (source www.inthebag.org.uk)
†† Designed by Jackie Piper, Marcus Willcocks, and Lorraine Gamman
2.Providing retro-fitted secure storage. Facilities that already have furniture should consider installing to tables and chairs retro-fitted bag clips, on which customers can hang their bags. When positioned near customer seating, these may enhance natural guardianship and secure bags. In many venues throughout the UK, commercially available clips can be fitted to tables and chairs. However, these clips are underused by customers25 often because clips are installed out of sight or are breakable (or appear to be), which could damage bags. Some clips fit only certain types of bags; hence the needs of typical victims should be considered (often this means designs that accommodate women's handbags). Thus, if used, careful consideration should be given to which design to install and how to publicize them.
Example of a clip that can be attached underneath tables to provide customers with the opportunity to secure their bags (source Grippa (DACRC, London))
The DACRC is currently testing new designs and ways to increase customer use. Following is one new design, along with an image of a publicity approach.
Major coffee shop chains and fast food outlets have shown interest in design solutions such as bag clips and anti-theft furniture, but, at the time of writing, are not yet using them.
3.Providing lockers. Lockers are an alternative method for storing customers' valuable items. Keys may be provided for free or for a small deposit, or combination locks may be used. Lockers should be located in areas that staff can observe to reduce the likelihood of thieves tampering with them.
Careful consideration should be given to publicizing anti-theft furniture. The challenge is to raise awareness of storage facilities so they are used but not raise the fear of crime unnecessarily. A risk in publicizing anti-theft furniture is that if patrons use the furniture but theft still occurs, victims may pursue legal action against venues for providing ineffective security.
An alternative approach is to publicize furniture with an emphasis on other issues, such as health and safety. For instance, place managers could encourage, or require, customers to keep their bags off the floor. According to the American Occupational Safety and Health Act (1970)26 (see also the U.K. Health and Safety at Work Act 197427), it is the employer's duty to ensure employees, as well as customers, are protected from health and safety hazards. Bags on the floor can be a trip hazard; hence an argument could be made that bags should be kept off the floor. †††
††† In some ski resorts, customers are asked to keep bags off the floor so they aren’t dampened by melting snow. In restaurants in Mexico, customers are sometimes invited to store bags on a bag tree next to the table. The degree to which such measures reduce theft is unknown.
An example of an alternative table clip (source Grippa (DACRC, London))
Registering CRAVED items such as cell phones could help prevent theft by making it easier to identify stolen property and return recovered items to rightful owners. This may deter thieves as registered items would be more difficult to dispose of, and, with registered cell phones, inoperable if stolen.†
† The effectiveness of such schemes is unknown, but car registration has been mandatory in most countries for some time, so a consideration of its effectiveness may be instructive. In a review, Webb (2005) concludes that registration schemes’ potential impacts on crime have been hampered by problems that include database inaccuracies and inadequate enforcement. It is possible that other registration schemes could experience similar problems. Important to this kind of scheme are coverage and continuity. If records are not maintained or coverage is limited, then such schemes are unlikely to have positive impacts.
4.Providing online registration programs linked to police. One existing scheme implemented in the United Kingdom and United States is Immobilize (www.immobilize.net). This is a free service that encourages owners to register details of their cell phones and other CRAVED goods. Cell phone owners must register their phone's make and model and its International Mobile Equipment Identity (IMEI) number. The latter allows the phone to be blocked if it is stolen, rendering it unusable†† (although this can be circumvented through reprogramming28). When registered items are lost or stolen, registered owners can inform Immobilize, which means police and other agencies can use the database to identify stolen goods. For a small fee ($2.99 at the time of writing; visit www.checkmend.com/us/), owners may also search the database to check that secondhand goods they wish to purchase are legitimately owned by the seller.
†† Blocked phones can be reprogrammed for use. However, police can detect unblocked phones (visit www.immobilize.net).
According to Immobilize, in the United Kingdom, information collected assists in more than 250 cases each week. As with all property registration schemes, the effectiveness of the scheme depends on subscription levels; if few people register property, success will be limited. It is therefore essential to heavily publicize such schemes, if adopted.
5.Sending text bombs to stolen phones. A tactic that has been used in Holland and will be used in Australia involves repeatedly sending messages (text bombs) to stolen handsets rendering them unusable.29 The effectiveness of this type of intervention has not been evaluated. Moreover, the cost of implementing this type of scheme should be considered. If cell phone network service providers support the initiative, costs may be minimal. Otherwise, the cost of sending the messages may outweigh potential benefits.
6.Providing raditional property marking. The rationale of this scheme is that if desirable goods are marked and registered, thieves will be deterred from stealing them, and would experience difficulties selling them if stolen. This type of scheme may differ from the Immobilize registration scheme because the property is often overtly marked (which Immobilize does not require). Despite their popularity, the effectiveness of property marking schemes is unknown, and research suggests that any positive effects may be better attributed to the scheme's publicity rather than the property marking itself.30 If a market disruption approach is implemented with the goal of hindering the disposal of stolen goods, crime reduction agencies such as the police need to work closely with store owners. They should implement any existing local ordinances that require stores to establish proof of ownership for used goods they purchase, and they should encourage stores to publicize their involvement in the scheme.31, ††† The success of such schemes will, of course, be a function of how many secondhand goods stores and pawn shops participate, how many people mark their property, and how quickly updated lists of stolen goods are distributed to participating stores.
††† See Problem-Specific Guide No. 57, Stolen Goods Markets, for further information.
7.Educating victims about the rapid cancellation of credit and debit cards. When thefts are reported, the opportunity exists to educate victims about the risks of further crimes such as identity theft. As part of a project conducted by the authors and the Metropolitan Police in London (U.K.), victims who reported thefts in participating bars or at local police stations were given a leaflet that explained how to protect themselves from a range of crimes (e.g., credit card fraud) and listed relevant phone numbers (e.g., credit card companies). The aim was to empower victims to take swift action rather than simply raise their fear of crime. If victims' keys are stolen, it is wise to provide advice about how to replace their locks.
8.Publicizing the use of safer storage by customers. To encourage customers to secure their bags in a series of bars in London (U.K.), the Safer Southwark Partnership provided bag clips under bar tables and publicized their existence using "talking signs." Placed in the ladies' restrooms, the signs are triggered by motion sensors and convey the following message: "This is a message on behalf of Safer Southwark Partnership: we hope you are having a good evening; please, however, take care of your bag." No formal evaluation of the scheme exists, but some feedback suggests positive impacts. The use of talking signs requires careful consideration. For instance, the signs may require continued maintenance, and they may annoy customers if they are constantly activated.
Because victims are likely to be younger, it may also be useful to reinforce messages about personal responsibility for safety in areas such as college campuses. Publicity may be used to encourage those at risk to store property more responsibly and to take simple measures such as zipping up or locking bags.
9.Promoting personal security measures. There are a number of products available designed to enable patrons to better secure valuable goods in risky environments, some of which are discussed below and an extensive review of which is available at www.inthebag.org.uk. As part of a campaign to reduce theft and robbery and to promote the use of this type of product, British Transport Police recently gave away a range of anti-theft products32
Example of anti-theft bags. These designs are made of hard materials to prevent slashing and incorporate other design features such as having an inward facing zip to prevent dipping. (source Grippa (DACRC, London))
Lanyards are another way to secure personal items such as cell phones and laptops. Secured to valuable items, an audible alarm is activated if someone attempts to steal them (low-tech solutions exist). Educating the public about the availability of such products may be useful if common perpetrator techniques are likely to be disrupted by their use. It might be particularly effective to promote products that appeal to women if they are the primary victims.
An example of a lanyard (source DACRC, London)
Other examples include personal table clips that customers can carry with them for use at any location, and solutions that aim to camouflage or conceal valuable items such as laptops. Although police agencies are unlikely to distribute or endorse these products, educating the public about their existence may be helpful.
An example of a portable bag clip that attaches to tables (source www.inthebag.org.uk)
10.Improving natural surveillance. Increasing the visibility of theft in cafés and bars is possible by improving natural surveillance, which can be achieved by considering crime prevention in the design of new cafés and bars or by retro-fitting solutions to address identified problems. A study of the effectiveness of security in convenience stores suggests that impact is greater where a store's internal configuration facilitates unobstructed surveillance.33† Although the influence of internal layout on the risk of theft in cafés and bars is unknown, it is worth considering in any analysis of the problem. Points to consider include:
† See Problem-Specific Guide No. 49, Robbery of Convenience Stores, for further information.
The central point is that if offenders are more likely to be seen (or perceive they will), they may be discouraged from undertaking thefts. In fact, actual intervention by staff or customers may be unnecessary as long as offenders' perceptions are influenced by the layout.34
11.Using CCTV. Depending on the specific problem, the use of CCTV may be beneficial. However, it may not reduce crime if it requires constant monitoring and staff are unable to do this. Where CCTV is used successfully, convictions should be publicized to ensure that offenders' perceptions of risk are affected.35, †
† See Response Guide No. 4, Video Surveillance of Public Places, for more information.
12.Employing door staff in bars. Properly trained door staff can keep a watchful eye on people entering and exiting bars and act as a deterrent to would-be thieves. This could be an expensive option unless crime is a substantial problem or door staff can fulfill other useful roles.
13.Training staff. Also key to improving surveillance is staff training. Staff who can act as place managers need to know what is expected of them. Staff may consider crime prevention to be beyond their responsibility36 or be unaware of how they might contribute to the problem and solution.†† Where policies (or lack of them) contribute to the problem of theft, successful and sustained solutions may require their revision or an approach that leverages the action of place managers and staff.††† Simple measures would include training staff to be vigilant and to encourage customers to secure property on their person or to use anti-theft furniture. Leverage from the police, in terms of publicizing venues with good or bad track records, could provide an incentive for establishments to involve staff in crime prevention.
†† See Problem-Solving Tools Guide No. 6, Understanding Risky Facilities, for more information.
††† Even staff that collect and clean glasses can play a role.
14.Requiring theft prevention through licensing. Making certain crime prevention practices mandatory (such as training new staff in security procedures) prior to license provision could be a useful leverage tactic. Anything in the manager's economic interest could be effective; for example, increasing customers' comfort and safety or avoiding liability. In a 'Café Watch' case study in Westminster (U.K.), which aimed to combat violence and other problems in cafés, ways that interested parties could work together were explored, along with the statutory powers available to them. As part of the response, targeted inspections by Crime Prevention Officers and Environmental Health Enforcement Officers were carried out using Health and Safety Executive (HSE) guidance as a baseline. The study concluded that there was a 50 percent reduction in crime in participating premises within a year.37
Other related strategies can be found in Problem-Specific Guide No. 1,Assaultsin and Around Bars. This guide also discusses licensing laws in more detail.
15.Screening staff. Although we have not focused on theft by employees, it is worth mentioning that internal theft could be a cause for concern, particularly in establishments where the labor pool is highly transient and skill level requirements are minimal. This may ultimately lead to hiring correctional clients and other high-risk employees. In such situations, it may be advisable to use staff screening or a background check to ensure employees are unlikely to contribute to an internal theft problem. Research on the effectiveness of pre-screening is mixed. One study demonstrated a 40 percent shrinkage loss reduction for five major retail chains two years after pre-screening tests were used. However, outcomes appear to depend on the business type, and this strategy raises concerns about ethics and staff morale.38
16.Undertaking sting operations. Sting operations, in which bags are left unattended but are watched covertly by plain-clothed police officers, may be used.† A complementary approach would be to place a concealed GPS transmitter in unattended bags.†† A change in the position of the GPS transmitter would signal the bag is moving. In addition to helping to detect crimes in progress, analysis of where thieves go post-offense may provide useful intelligence on, for example, potential locations of stolen goods markets. Although there is no formal evidence of the effectiveness of such strategies or published examples of their use, the Metropolitan Police (London, U.K.) have used this type of strategy.
† See Response Guide No. 6, Sting Operations, for further information.
†† See Problem-Specific Guide No. 52, Bicycle Theft, for further information.
Editors' Note: This list was compiled to offer examples to help readers implement ideas included in this guide. The appearance of this list is not to be construed as endorsement by the U.S. Department of Justice or the authors of this guide. This list is non-exhaustive; we encourage you to research other products and services that may be of use to you in theft prevention. All website URLs are accurate at the time of writing.
by Hookit: http://www.hookit.net.au/home.html
Chelsea Clip: http://www.selectadna.co.uk/chelsea-clips.html?gclid=CPvLjbfg65ACFQFaMAod0RATPA
Prensus-Portable Hanging Device: http://www.prensusphd.com/
HangBag Company: http://www.hangbagcompany.com/
Handbag Hangers: http://www.handbaghanger.com.au/
Hooky Handbag Hook: http://www.quirkybags.co.uk/handbag-hooks-and-lights.html
Hot HangUps: http://www.hot-hang-ups.com/
The Little Hooker: http://www.cwdesignllc.com/servlet/StoreFront?gclid=CIu-kfXi65ACFQiKMAodwGFKQQ
Pretty Pink Toes: http://www.prettypinktoes.co.uk/handbaghanger.aspx
Purse Angels-The Handbag Guardian: http://www.purseangels.co.uk/?gclid=CLfLhL7d65ACFQ7tlAodlTqkrA
Purse Hanger.com: http://www.purse-hanger.com/
Purse Hanger.net: http://www.pursehanger.net/
so Hooked: http://www.so-hooked.com/
Pacsafe-Travel Security: http://www.pacsafe.com/www/index.php
TamperSeal TSA-Approved Luggage Straps: http://www.tamperseal.com/tsa-luggage-straps-c-28.html?osCsid=41d0aa911a8f0eaff3cf31752d73bdb1
The table below summarizes the responses to theft of customers' personal property from cafés and bars, the mechanism by which they are intended to work, the conditions under which they ought to work best, and some factors you should consider before implementing a particular response. It is critical that you tailor responses to local circumstances, and that you can justify each response based on reliable analysis. In most cases, an effective strategy will involve implementing several different responses. Remember that law enforcement responses alone are seldom effective in reducing or solving the problem.
|Improving Opportunities for Secure but Convenient Storage|
|#||Response||How It Works||Works Best If…||Considerations|
|1||Providing anti-theft furniture||Provides customers with opportunities to store bags securely||Furniture is both attractive and convenient for customers||May be expensive unless furniture needs replacement for other reasons|
|2||Providing retro-fitted secure storage||Allows customers to hang bags underneath tables keeping them off the floor||Clips are visible to customers and appear sturdy||This is less costly than using anti-theft furniture but may not be as robust or as effective|
|3||Providing lockers||Provides customers secure storage facilities for items they are unable to watch over||Lockers are visible to staff and others; customers expect to remain in establishment long enough to justify using lockers; customers are aware of lockers||Designated space(s) for the lockers will be required; locks should be secure but easy to use and require minimal maintenance; lockers should be large enough to allow customers to store bags and items (e.g., laptops) of different sizes|
|Registration, Recovery, and Removing Benefits|
|#||Response||How It Works||Works Best If…||Considerations|
|4||Providing online registration schemes linked to police||Facilitates reporting theft to police and increases chances of recovering stolen property; some registered electronic devices can be disabled, rendering them useless||There is a high adoption, victims report thefts swiftly, secondhand goods shops cooperate and advertise their involvement, and the scheme is widely publicized periodically||May require laws that encourage secondhand goods shops to check for proof of ownership when they purchase secondhand goods|
|5||Sending text bombs to stolen cell phones||Irritates thieves and renders cell phones inoperable||Phones are unlikely to be exported to other countries or rapidly reprogrammed; cell phone service providers support the initiative||Financial costs of running the intervention may be high|
|6||Providing traditional property marking||Deters thieves by increasing risks of detection; increases difficulty of disposing of stolen property||Scheme is widely publicized and widely used, and detections are publicized||Unproven effectiveness; may require laws that encourage secondhand goods shops to check for proof of ownership when they purchase secondhand goods|
|7||Educating victims about the rapid cancellation of credit and debit cards||Reduces victims' risk of further victimization by credit card fraud and identify theft||Victims are provided with timely, comprehensive, and detailed information; message empowers victims rather than simply raising their fear||Some program costs to produce up-to-date information materials|
|Raising Awareness of Risk and Personal Security Solutions|
|#||Response||How It Works||Works Best If…||Considerations|
|8||Publicizing the use of safer storage by customers||Encourages customers to secure personal items||Secure storage is possible and practical; message is positive and empowering and does not increase fear of crime||Signs may be costly or annoying to some customers|
|9||Promoting personal security measures||Increases difficulty in stealing valuables||Products highlighted are readily available, discounted, aesthetically appealing, and functional||Recommendations should be impartial, accurate, and suitably comprehensive; may require extensive marketing|
|Increasing Guardianship and Surveillance|
|#||Response||How It Works||Works Best If…||Considerations|
|10||Improving natural surveillance||Increases offenders' perception that they will be observed||The facility's original layout promotes natural surveillance; there are enough staff to keep a watchful eye on customers and their property||May be expensive to redesign layout; other customers may be reluctant to intervene; may require staff training and policy on theft intervention|
|11||Using CCTV||Deters thieves by increasing likelihood of detection||Crimes occur in areas with little natural surveillance and are obscured from the direct view of staff; CCTV is monitored||Costs for equipment and monitoring; privacy concerns|
|12||Employing door staff in bars||By screening exits, and observing customer behavior, door staff may prevent thieves from entering or deter them from stealing||Staff are well trained and visibility is good within the venue||Can be expensive and may be unlikely to work where thieves are skilled at stealth offenses|
|Licensing, Management, and Staffing|
|#||Response||How It Works||Works Best If…||Considerations|
|13||Training staff||Increases likelihood of detecting thieves and vulnerable property||There are formal, recognized procedures in place for security practices||Costs to train staff|
|14||Requiring theft prevention through licensing||Improves routine security practices||Compliance is ensured; security measures are in establishments' financial interests||May be opposed by hospitality industry; licensing issuance and compliance costs|
|15||Screening staff||Decreases likelihood of hiring thieves||Screening measures are in establishments' financial interests||May cause staffing problems by discouraging applications; unproven effectiveness|
|#||Response||How It Works||Works Best If…||Considerations|
|16||Undertaking sting operations||Increases likelihood of detection||Prolific offenders are known to target particular locations, venues targeted are crime hotspots, CCTV cameras can be used to monitor offender activity||May require authorizing legislation; enforcement costs|
 Thompson and Arsel (2004).
 NCVS (2008).
 Vincent (2005).
 Van Dijk, van Kesteren and Smit (2007).
 U.S. Department of Justice (2008).
 Sidebottom and Bowers (2009).
 McDaniel and Jones (1988).
 Lengel (2007).
 Sidebottom and Bowers (2009).
 Eck, Clarke and Guerette (2007).
 Smith, Bowers and Johnson (2006).
 Fagan (2007).
 Vincent (2005).
 Kershaw, Nicholas and Walker (2008).
 Kershaw, Nicholas and Walker. (2008).
 Duffin, Keats and Gill (2006).
 United States General Accounting Office (2002).
 Smith et al., (2006).
 Sidebottom and Bowers (2009).
 Clarke (1999).
 Sidebottom and Bowers (2008).
 Smith, Bowers and Johnson (2006); East Bay Express (2008); San Francisco Chronicle (2006).
 Whitehead and Farrell (2008).
 Vincent and Arno (2003).
 Willcocks, Nufrio and Camino (2008).
 U.S. Department of Labor (1970)
 UK Health and Safety Executive (1974)
 Kaplankiran et al. (2008).
 Laycock (1991).
 Sutton, Schneider and Hetherington (2001).
 Rogers (2009).
 Hunter (1997).
 Cromwell, Olson and Avary (1991).
 Poyner (1988).
 Eck and Weisburd (1995).
 The Beacons Scheme (2009).
 Gross-Schaefer et al (2000).
Brandt, A. (2006). "This Stolen Laptop Will Self-Destruct in 5 Seconds." PC World Magazine June 2006: 46.
Brantingham, P., and P. Brantingham (1995). "Criminality of Place: Crime Generators and Crime Attractors." European Journal on Criminal Policy and Research 3(3): 5-26.
Clarke, R. (1999). Hot Products: Understanding, Anticipating, and Reducing Demand for Stolen Goods. Police Research Series Paper, 112. London: Home Office Policing and Reducing Crime Unit.
Cromwell, P., J. Olson, and D. Avary (1991). "Breaking and Entering: An Ethnographic Analysis of Burglary, Sage, Newbury Park, C.A.
Design Council (2003)." Think Thief! A Designer's Guide to Designing Out Crime. London: Design Council.
Duffin, M., G. Keats, and M. Gill (2006). Identity Theft in the UK: The Offender and Victim Perspective. Leicester (U.K.): Perpetuity Research and Consultancy International (PRCI) Ltd.
Eck, J. (1994). "Drug Markets and Drug Places: A Case-Control Study of the Spatial Structure of Illicit Drug Dealing." Doctoral dissertation, University of Maryland, College Park.
Eck, J., R. Clarke, and R. Guerette (2007). "Risky Facilities: Crime Concentration in Homogeneous Sets of Establishments and Facilities." In G. Farrell, K. Bowers, S. Johnson, and M. Townsley (eds.), Imagination for Crime Prevention: Essays in Honor of Ken Pease. Crime Prevention Studies, Vol. 21, pp. 255-264. Monsey, N.Y.: Criminal Justice Press
Eck, J., and D. Weisburd (1995). "Crime Place in Crime Theory." In J.Eck and D. Weisburd (eds.), Crime and Place. Crime Prevention Studies, Vol. 4, pp. 1-33. Monsey, N.Y.: Criminal Justice Press
Fagan, C. (2007). "'Lost' Gang Steal Phones." Leicester Mercury, Jan. 30, p. 2.
Great Britain (1974). Health and Safety at Work Etc Act 1974. Elizabeth II. 1974. Chapter 37. London: H.M.S.O.
Gross-Schaefer, A., J. Trigilio, J. Negus, and C. Ro. (2000). "Ethics Education in the Workplace: An Effective Tool to Combat Employee Theft." Journal of Business Ethics 26(2): 89-100.
Hunter, R. and C. Jeffrey (1997). "Preventing Convenience Store Robbery Through Environmental Design." In R.V. Clarke (ed.), Situational Crime Prevention: Successful Case Studies, 2nd ed. pp. 191-199. Monsey, N.Y.: Criminal Justice Press.
Kaplamkiran, T., J. Mailley, S. Whitehead, and G. Farrell (2008). "Mobile Phone Reprogramming: Its Extent and Prevention." Crime Prevention and Community Safety: An International Journal 10(4): 271-279.
Kershaw, C., S. Nicholas, and A. Walker (2008). "Crime in England and Wales 2007/08. Findings from the British Crime Survey and Police Recorded Crime." Home Office Statistical Bulletin. London: Home Office.
Kitteringham, G. (2008). "Lost Laptops = Lost Data: Measuring Data, Managing Threats." Connecting Research in Security to Practice Report. Alexandria, V.A.: ASIS International. Available at: http://www.asisonline.org/foundation/lostlaptop.pdf
LaVigne, N. (1991). "Crime of Convenience: An Analysis of Criminal Decision Making and Convenience Store Crime in Austin." Master's Thesis, University of Texas, Austin.
Laycock, G. (1991). "Operation Identification, or the Power of Publicity?" Security Journal 2(2): 67–72
Lengel, A. (2007). "Purse Snatchers Know Their Turf; Sophisticated Thieves Cruise Bars, Restaurants in Areas with Night Life." The Washington Post, March 4.
Madensen, T. and J. Eck (2008). "Violence in Bars: Exploring the Impact of Place Manager Decision-Making." Crime Prevention and Community Safety 10(2): 111–125.
McDaniel, M., and J. Jones (1988). "Predicting Employee Theft: A Quantitative Review of the Validity of a Standardized Measure of Dishonesty." Journal of Business and Psychology 2(4): 327-245.
Poyner, B. (1988). "Video Cameras and Bus Vandalism." Journal of Security Administration 11(2): 44-51.
Ratcliffe, J. (2004). "The Hotspot Matrix: A Framework for the Spatio-Temporal Targeting of Crime Reduction." Police Practice and Research 5(1): 5-23.
Rogers, S. (2009). Personal Communication from Steve Rogers, Detective Inspector Crime Support, British Transport Police.
Rufus, A. (2008). "Bold Café-Laptop Theft Foiled in Oakland." East Bay Express, October 3. Accessed April 8, 2010 at http://www.eastbayexpress.com/92510/archives/2008/10/03/boldcafandeacute-laptop-theft-foiled-in-oakland.
Sidebottom, A. and K. Bowers (2009). "Bag Theft in Bars: An Analysis of Relative Risk, Perceived Risk and Modus Operandi." Security Journal 23(3): 206-224.
Sutton, M., J. Schneider, and S. Hetherington (2001). "Tackling Theft With the Market Reduction Approach." Crime Reduction Research Series, Paper 8. London: Home Office.
Smith, C., K. Bowers, and S. Johnson (2006). "Understanding Theft within Licensed Premises: Identifying Initial Steps Towards Prevention." Security Journal 19 (1): 1-19.
Thompson, C., and Z. Arsel (2004). "The Starbucks Brandscape and Consumers' (Anticorporate) Experiences of Glocalization." Journal of Consumer Research 31(3): 631-642.
U.S. Bureau of the Census (2000). Establishment and Firm Size (Including Legal Form of Organization). 1997 Economic Census, Accommodation and Foodservices Subject Series. Washington, D.C.: U.S Bureau of the Census. [Full text ]
U.S. Bureau of Justice Statistics (2008). Criminal Victimization in the United States, 2006 Statistical Tables. Washington, D.C.: U.S. Department of Justice. [Full text ]
United States (1970). Occupational Safety and Health Act of 1970. 29 U.S.C. §§ 651-700 (1970).
U.S. General Accounting Office (2002). Identity Theft: Prevalence and Costs Appear to be Growing. Report to Congressional Requesters. Washington, D.C.: U.S. General Accounting Office. Accessed on December 9, 2008 at http://www.gao.gov/new.items/d02363.pdf.
Van Derbeken, J. (2006). "Laptop Thieves Descend Upon Wireless Cafes: Grab-and-Run Robbers Find Pricey Computers Easy to Resell." San Francisco Chronicle, April 8. Accessed April 8, 2010 at http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/04/08/MNGE9I686K1.DTL.
Van Dijk, J., J. van Kesterem, and P. Smit (2007). Criminal Victimisation in International Perspective: Key Findings from the 2004-2005 ICVS and EU ICS. The Hague, South Holland, N.L.: Boom Juridische uitgevers.
Vincent, B (2005). "Workshop Teaches Pickpocket Recognition." Law and Order 53 (6):116-119.
Vincent, B., and B. Arno (2003). Travel Advisory! How to Avoid Thefts, Cons, and Street Scams While Traveling. Chicago: Bonus Books.
Webb, B. (2005). "Preventing Vehicle Crime." In N. Tilley (ed.), Handbook of Crime Prevention and Community Safety, pp. 458-485. Cullompton, Devon, U.K.: Willan Publishing, Ltd.
Westminster City Council (2009). Café Watch Case Study. The Beacon Scheme, Round 10 Case Studies. London: Communities and Local Government, Improvement and Development Agency.
Whitehead, S., and G. Farrell (2008). "Anticipating Mobile Phone 'Smart Wallet' Crime: Policing and Corporate Social Responsibility." Policing: A Journal of Policy and Practice 2(2): 210-217.
Willcocks, M., A. Nufrio, and X. Camino (2008). "Grippa BCN- Final report." User's test. London: Design Against Crime Research Centre.
The quality and focus of these submissions vary considerably. With the exception of those submissions selected as winners or finalists, these documents are unedited and are reproduced in the condition in which they were submitted. They may nevertheless contain useful information or may report innovative projects.
Reducing thefts from elderly persons in shopping areas [Goldstein Award Finalist], Merseyside Police Department (UK), 2010
You may order free bound copies in any of three ways:
Phone: 800-421-6770 or 202-307-1480
Allow several days for delivery.
Send an e-mail with a link to this guide.
Error sending email. Please review your enteries below.