Narrative crime script

Last updated

A narrative crime script is a step-by-step account of the procedures and decision-making processes involved in a particular event, usually relating to an illegal activity. [1]

Contents

It is constructed using a logical sequence of events that is easily interpreted by an observer to make themselves a participant viewer. For instance, an observer doesn't need to see firefighters at a burnt house to know they were there. [2]

Criminology

The script-theoretic approach was proposed by Cornish [3] in 1994 as a way to better understand how crimes are committed and how to prevent them. The central element of this approach, the crime script, is a step-by-step account of the actions and decisions involved in a crime. [1]

Crime scripts have been represented in various forms: text/paragraphs, tables and flowchart diagrams. [4]

Crimes have been scripted in the following areas: [4]

A framework was proposed by Borrion for the evaluation of crime scripts that considers the following properties of crime scripts: typology, traceability, transparency, consistency, context, completeness, parsimony, precision, uncertainty, usability, ambiguity, and accuracy. [16]

News scripts

It is constructed using a logical sequence of events that is easily interpreted by an observer to make themselves a participant viewer. For instance, an observer doesn't need to see firefighters at a burnt house to know there were there. [2]

The format of a news crime script is divided into three sections:

The first section starts with the broadcaster delivering a brief announcement of the event of the crime, consisting of basic information that is relevant to the story. This is usually presented with an anchorperson introducing the story in a news segment.

The second section gives the viewer a supported account of the event. This often includes broadcasting images and video that is related to the event and using supporting statements and accounts from family members, bystanders, and witnesses. The purpose of this phase is to expand on the information given in the first section and to support the details included in the original report.

Third, the focus shifts to the identity of the suspect, and the actions taken to apprehend the perpetrator. This includes the description of any suspects or collected leads. It is often in this section that the biases of the report are most apparent. [2]

The majority of research concerning the narrative script of crime reporting is focused on the viewers of the newscast. Research showed that narrative script crime reporting is receptive to racial stereotypes. In a study where subjects were shown broadcasts in keeping with the narrative crime script model, the majority of subjects recalled the race of the suspect as being of color. This was inconsistent with the broadcast which did not always show a colored suspect, if any suspect at all. [2]

A 2000 study tried to relate exposure to local news and viewers fear of crime. Instead, it was found that factors such as gender, socioeconomic status, current place of residence and past exposure to criminals were far more determinant in an individual's relative fear of crime. [2]

Related Research Articles

<span class="mw-page-title-main">Punishment</span> Imposition of an undesirable or unpleasant outcome

Punishment, commonly, is the imposition of painful consequences upon an individual or group, meted out by an authority—in contexts ranging from child discipline to criminal law—as a deterrent to a particular action or behavior that is deemed undesirable. It is, however, possible to distinguish between various different understandings of what punishment is.

<span class="mw-page-title-main">Safety in numbers</span> Hypothesis

Safety in numbers is the hypothesis that, by being part of a large physical group or mass, an individual is less likely to be the victim of a mishap, accident, attack, or other bad event. Some related theories also argue that mass behaviour can reduce accident risks, such as in traffic safety – in this case, the safety effect creates an actual reduction of danger, rather than just a redistribution over a larger group.

<span class="mw-page-title-main">Crime mapping</span> Diagram showing crime incident patterns

Crime mapping is used by analysts in law enforcement agencies to map, visualize, and analyze crime incident patterns. It is a key component of crime analysis and the CompStat policing strategy. Mapping crime, using Geographic Information Systems (GIS), allows crime analysts to identify crime hot spots, along with other trends and patterns.

<span class="mw-page-title-main">Gun violence in the United States</span> Phenomenon of gun violence in the United States

Gun violence is a term of political, economic and sociological interest referring to the tens of thousands of annual firearms-related deaths and injuries occurring in the United States.

Property crime is a category of crime, usually involving private property, that includes, among other crimes, burglary, larceny, theft, motor vehicle theft, arson, shoplifting, and vandalism. Property crime is a crime to obtain money, property, or some other benefit. This may involve force, or the threat of force, in cases like robbery or extortion. Since these crimes are committed in order to enrich the perpetrator they are considered property crimes. Crimes against property are divided into two groups: destroyed property and stolen property. When property is destroyed, it could be called arson or vandalism. Examples of the act of stealing property is robbery or embezzlement.

Operation Ceasefire (also known as the Boston Gun Project and the Boston Miracle) is a problem-oriented policing initiative implemented in 1996 in Boston, Massachusetts. The program was specifically aimed at youth gun violence as a large-scale problem. The plan is based on the work of criminologist David M. Kennedy.

Sibling abuse includes the physical, psychological, or sexual abuse of one sibling by another. More often than not, the younger sibling is abused by the older sibling. Sibling abuse is the most common of family violence in the US, but the least reported. As opposed to sibling rivalry, sibling abuse is characterized by the one-sided treatment of one sibling to another.

The professional practice of behavior analysis is a domain of behavior analysis, the others being radical behaviorism, experimental analysis of behavior and applied behavior analysis. The practice of behavior analysis is the delivery of interventions to consumers that are guided by the principles of radical behaviorism and the research of both experimental and applied behavior analysis. Professional practice seeks to change specific behavior through the implementation of these principles. In many states, practicing behavior analysts hold a license, certificate, or registration. In other states, there are no laws governing their practice and, as such, the practice may be prohibited as falling under the practice definition of other mental health professionals. This is rapidly changing as behavior analysts are becoming more and more common.

Victimisation is the state or process of being victimised or becoming a victim. The field that studies the process, rates, incidence, effects, and prevalence of victimisation is called victimology.

Black Cobra is one of the largest immigrant street gangs in Denmark and is represented in most major Danish cities, with approximately 100 members. The gang is also active in Sweden, having established itself in the Malmö district Rosengård and the Stockholm suburbs of Tensta, Rissne and Rinkeby. The Black Cobra gang also control a youth gang called the Black Scorpions. Their criminal activity involves drug trafficking, robbery, theft, racketeering, extortion and murder. The police describe Black Cobra as a loose network composed of strong leadership figures. Black Cobra members wear black and white shirts with an emblem on the back of a cobra in attack position. The shirts also have Black Cobra written on them, above the emblem in Old English-style writing.

<i>Rickettsia parkeri</i> Species of bacterium

Rickettsia parkeri is a gram-negative intracellular bacterium. The organism is found in the Western Hemisphere and is transmitted via the bite of hard ticks of the genus Amblyomma. R. parkeri causes mild spotted fever disease in humans, whose most common signs and symptoms are fever, an eschar at the site of tick attachment, rash, headache, and muscle aches. Doxycycline is the most common drug used to reduce the symptoms associated with disease.

Trial as an adult is a situation in which a juvenile offender is tried as if they were an adult, whereby they may receive a longer or more serious sentence than would otherwise be possible if they were charged as a juvenile.

David Nelken is a Distinguished Professor of Legal Institutions and Social Change Faculty of Political Science, University of Macerata and the Distinguished Visiting Research Professor, Faculty of Law, Cardiff University. His work focuses primarily on comparative criminal justice and comparative sociology of law. He was elected a Fellow of the British Academy in 2023.

<span class="mw-page-title-main">Neurocriminology</span> Usage of neuroscience in criminology

Neurocriminology is an emerging sub-discipline of biocriminology and criminology that applies brain imaging techniques and principles from neuroscience to understand, predict, and prevent crime.

<span class="mw-page-title-main">Criminology</span> Study of crime and criminal actions/behavior

Criminology is the interdisciplinary study of crime and deviant behaviour. Criminology is a multidisciplinary field in both the behavioural and social sciences, which draws primarily upon the research of sociologists, political scientists, economists, legal sociologists, psychologists, philosophers, psychiatrists, social workers, biologists, social anthropologists, scholars of law and jurisprudence, as well as the processes that define administration of justice and the criminal justice system.

Imagination inflation is a type of memory distortion that occurs when imagining an event that never happened increases confidence in the memory of the event.

Social network analysis in criminology views social relationships in terms of network theory, consisting of nodes and ties. These networks are often depicted in a social network diagram, where nodes are represented as vertices and ties are represented as edges.

Positive criminology is based on the perspective that integration and positive life influences that help individuals develop personally and socially will lead to a reduced risk of criminal behavior and better recovery of offenders. Integration works in three levels: inter-personal, intra-personal and spiritual. Positive influences include participation in recovery programs, such as those for substance use disorders. Factors that can make growth difficult include a long-standing pattern of criminal activity, serious adverse life events, and chronic mental health illness.

David Philip Farrington is a British criminologist, forensic psychologist, and emeritus professor of psychological criminology at the University of Cambridge, where he is also a Leverhulme Trust Emeritus Fellow. In 2014, Paul Hawkins and Bitna Kim wrote that Farrington "is considered one of the leading psychologists and main contributors to the field of criminology in recent years."

Secondary victimisation refers to further victim-blaming from criminal justice authorities following a report of an original victimisation.

References

  1. 1 2 Cornish, D.B. and Clarke, R.V.G. (2006) "The rational choice perspective", in Henry, S. and Lanier, M. (eds) The Essential Criminology Reader, Boulder, CO: Westview. ISBN   978-0813343198
  2. 1 2 3 4 5 Gilliam, Franklin; Shanto, Iyengar (July 2000). "Prime Suspects: The Influence of Local Television News on the Viewing Public". Midwest Political Science Association. 44 (3): 560–573 [561]. JSTOR   2669264.
  3. Cornish, D. B. (1994). "The procedural analysis of offending and its relevance for situational prevention" (PDF). Crime Prevention Studies. 3: 151–196.
  4. 1 2 Dehghanniri, H. and Borrion, H. (2019). "'Crime scripting: A systematic review". European Journal of Criminology. 18 (4): 504–525. doi:10.1177/1477370819850943. S2CID   155271013.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  5. Leukfeldt, R. and Jansen, J. (2015). "Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands" (PDF). International Journal of Cyber Criminology. 9 (2): 173.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  6. Rowe, E., Akman, T., Smith, R. G. and Tomison, A. M. (2012). "Organised crime and public sector corruption: a crime scripts analysis of tactical displacement risks". Trends and Issues in Crime and Criminal Justice. 444: 1.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  7. Price, V., Sidebottom, A. and Tilley, N. (2014). "Understanding and Preventing Lead Theft from Churches: A Script Analysis". In Grove L. and Thomas S. (ed.). Heritage Crime: Progress, Prospects and Prevention. London: Palgrave Macmillan. p. 128. ISBN   9781137357502.{{cite book}}: CS1 maint: multiple names: authors list (link)
  8. Chiu, Y. N., Leclerc, B. and Townsley, M. (2011). "Crime script analysis of drug manufacturing in clandestine laboratories: Implications for Prevention". British Journal of Criminology. 51 (2): 355–374. doi:10.1093/bjc/azr005.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  9. Baird, J., Curry, R., and Cruz, P. (2014). "An overview of waste crime, its characteristics, and the vulnerability of the EU waste sector". Waste Management & Research. 32 (2): 97–105. Bibcode:2014WMR....32...97B. doi:10.1177/0734242X13517161. PMID   24519223. S2CID   31605707.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  10. Tompson, L. and Chainey, S. (2011). "Profiling illegal waste activity: using crime scripts as a data collection and analytical strategy" (PDF). European Journal on Criminal Policy and Research. 17 (3): 179–201. doi:10.1007/s10610-011-9146-y. S2CID   143528398.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  11. De Bie, J. L., De Poot, C. J. and Van Der Leun, J. P. (2015). "Shifting Modus Operandi of Jihadist Foreign Fighters From the Netherlands Between 2000 and 2013: A Crime Script Analysis". Terrorism and Political Violence. 27 (3): 1–25. doi:10.1080/09546553.2015.1021038. S2CID   219643973.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  12. Osborne, J. R. and Joel A. C. (2017). "Examining active shooter events through the rational choice perspective and crime script analysis". Security Journal. 30 (3): 880–902. doi:10.1057/sj.2015.12. S2CID   152456912.
  13. Brayley, H., Cockbain, E. and Laycock, G. (2011). "The value of crime scripting: deconstructing internal child sex trafficking". Policing. 5 (2): 132–143. doi: 10.1093/police/par024 .{{cite journal}}: CS1 maint: multiple names: authors list (link)
  14. Leclerc, B., Wortley, R. and Smallbone, S. (2011). "Getting into the script of adult child sex offenders and mapping out situational prevention measures". Journal of Research in Crime and Delinquency. 48 (2): 209–237. doi:10.1177/0022427810391540. S2CID   146438478.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  15. Vakhitova, Z. I. and Bell, P. J. (2018). "A script analysis of the role of athletes' support networks as social facilitators in doping in sport". Crime Prevention and Community Safety. 20 (3): 168–188. doi:10.1057/s41300-018-0045-8. S2CID   150305045.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  16. Borrion, H. (2013). "Quality assurance in crime scripting". Crime Science. 2 (1): 6. doi: 10.1186/2193-7680-2-6 .