Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-vsgnj Total loading time: 0 Render date: 2024-07-17T11:02:43.098Z Has data issue: false hasContentIssue false

PART IC - Factors that Facilitate Transnational Crimes

from PART I - OVERVIEW: TRANSNATIONAL CRIME

Published online by Cambridge University Press:  20 June 2019

Mangai Natarajan
Affiliation:
John Jay College of Criminal Justice, City University of New York
Get access
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Andreas, P. (2000). Border games: Policing the US–Mexico divide. Ithaca, NY: Cornell University Press.Google Scholar
Bilton, N. (2017). American kingpin: The epic hunt for the criminal mastermind behind the Silk Road. New York: Portfolio/Penguin.Google Scholar
Correa-Cabrera, G. (2017). Los Zetas: Criminal corporations, energy and civil war in Mexico. Austin, TX: University Of Texas Press.Google Scholar
Farah, D. (2013). Fixers, super fixers, and shadow facilitators: How networks connect. In Miklaucic, M. and Brewer, J. (Eds.), Convergence: Illicit networks and national security in the age of globalization. Washington, DC: National Defense University Press.Google Scholar
Glickman, N. (2000). The Jewish white slave trade and the untold story of Raquel Liberman. New York: Garland.Google Scholar
Global Witness. (2009). Undue diligence: How banks do business with corrupt regimes. London: Global Witness.Google Scholar
Goodman, M. (2016). Future crimes: Inside the digital underground and the battle for our connected world. New York: Penguin Books.Google Scholar
Grabosky, P. (2015). Cybercrime. Oxford: Oxford University Press.Google Scholar
Greenmeier, L. (2015, February 8). Human traffickers caught on hidden Internet. Scientific American. Retrieved from www.scientificamerican.com/article/human-traffickers-caught-on-hidden-internet/.Google Scholar
International Consortium of Investigative Journalists (ICIJ). (2017). The Panama Papers: Exposing the rogue offshore financial services industry. Retrieved from www.icij.org/investigations/panama-papers/.Google Scholar
Kaplan, D. E. & Dubro, A. (2003). Yakuza: Japan’s criminal underworld. Berkeley, CA: University of California Press.Google Scholar
Naím, M. (2006) Illicit: How smugglers, traffickers and copycats are hijacking the global economy. New York: Anchor.Google Scholar
Nordstrom, C. (2007). Global outlaws: Crime, money and power in the contemporary world. Berkeley and Los Angeles, CA: University of California.Google Scholar
Portman, R. & Carper, T. (2018). Combating the opioid crisis: Exploiting vulnerabilities in international mail. United States Senate Permanent Subcommittee on Investigations. Retrieved from www.portman.senate.gov/public/index.cfm/files/serve?File_id=12F93202-C8EC-4AF1-8A66-181EE6716F37.Google Scholar
Seagrave, S. (1995). Lords of the Rim: The invisible empire of the overseas Chinese. London and New York: Bantam Press.Google Scholar
Sharman, J. C. (2011) The money laundry: Regulating criminal finance in the global economy. Ithaca, NY: Cornell University Press.Google Scholar
Shelley, L. (2010). Human trafficking: A global perspective. Cambridge and New York: Cambridge University Press.Google Scholar
Thoumi, F. E. (2003). Illegal drugs, economy and society in the Andes. Washington, DC: Woodrow Wilson Center Press.CrossRefGoogle Scholar
Tinti, P. & Reitano, T. (2017). Migrant, refugee, smuggler, savior. Oxford: Oxford University Press.Google Scholar
Triandafyllidou, A. (2018). Migrant smuggling: Novel insights and implications or migrant control policies. The Annals of the American Academy of Political and Social Science, 676 (1), 212221.Google Scholar
United Nations International Drug Control Programme. (1997). World drug report. Oxford: Oxford University Press.Google Scholar
Vincent, I. (2005). Bodies and souls: The tragic plight of three Jewish women forced into prostitution in the Americas. New York: William Morrow.Google Scholar

WEBSITES

Global Initiative on Transnational Organized Crime. http://globalinitiative.net/.

International Narcotics Control Strategy Report (issued annually). www.state.gov/j/inl/rls/nrcrpt/.

International Organization for Migration. www.iom.int.

Terrorism, Transnational Crime and Corruption Center (TraCCC). http://traccc.gmu.edu/.

United Nations Office on Drugs and Crime. www.unodc.org.

REFERENCES

Ekblom, P. (1997). Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk, Security and Crime Prevention, 2(4), 249265.Google Scholar
Ekblom, P. (1999). Can we make crime prevention adaptive by learning from other evolutionary struggles? Studies on Crime and Crime Prevention, 8(1), 2751.Google Scholar
Ekblom, P. (2000, March). Future crime prevention – a “mindset kit” for the seriously foresighted. London: Policing and Reducing Crime Unit. London: Home Office Research Development and Statistics Directorate. Retrieved from www.foresight.gov.uk/Crime%20Prevention/Futire_Crime_Prevention_Mindset_Kit_March_2000.Google Scholar
Felson, M. (2002). Crime and everyday life. Third Edition. Thousand Oaks, CA: Sage and Pine Forge Press.Google Scholar
Felson, M. (2006). Crime and nature. Thousand Oaks, CA: Sage and Pine Forge Press.CrossRefGoogle Scholar
Felson, M. & Clarke, R. V. (1997). Business and crime prevention. Monsey, NY: Criminal Justice Press.Google Scholar
Felson, M. & Peiser, R. (1998). Reducing crime through real estate development and management. Washington, DC: Urban Land Institute.Google Scholar
Levi, M. & Reuter, P. (2006). Money laundering: A review of current controls and their consequences. In Tonry, M. (Ed.), Crime and justice: An annual review of research, Vol. 34. Chicago: Chicago University Press.Google Scholar
Newman, G. & Clarke, R. V. (2003). Superhighway robbery: Preventing e-commerce crime. Portland, OR: Willan.Google Scholar
Newman, O. (1972). Defensible space: Crime prevention through urban design. New York: Macmillan.Google Scholar
Van Duyne, P. & Levi, M. (2005), Drugs and money. London: RoutledgeGoogle Scholar
Williams, M. (2004). Understanding king punisher and his order: Vandalism in an online community – motives, meanings and possible solutions. Internet Journal of Criminology. Retrieved from www.internet-journalofcriminology.com.Google Scholar

REFERENCES

Arena, M. P. & Arrigo, B. A. (2006). The terrorist identity: Explaining the terrorist threat. New York: New York University Press.Google Scholar
Becker, H. (1963). Outsiders: Studies in the sociology of deviance. New York: The Free Press.Google Scholar
Durkheim, E. (1951). The division of labour. New York: The Free Press.Google Scholar
Ferracuti, F. (1982). A sociopsychiatric interpretation of terrorism. The Annals of the American Academy of Political and Social Science, 129140.Google Scholar
Grabosky, P. & Stohl, M. (2010), Crime and terrorism. London: Sage.CrossRefGoogle Scholar
Hagan, J. (1988). Modern criminology: Crime, criminal behaviour, and its control. New York: McGraw-Hill.Google Scholar
Hamm, M. S. (2007). Terrorism as crime. New York: New York University Press.Google Scholar
Laqueur, W. (1977). Terrorism. Boston: Little, Brown.Google Scholar
Lombroso, C. (1876). L’uomo delinquente. Turin: Bocca.Google Scholar
Merton, R. K. (1968). Social theory and social structure. New York: The New Press.Google Scholar
Ruggiero, V. (2005). Understanding political violence. London: Open University Press.Google Scholar
Ruggiero, V. (2017a). The radicalization of democracy. Critical Criminology, 25(4), 593607.CrossRefGoogle Scholar
Ruggiero, V. (2017b). Hybrids: On the crime-terror nexus. International Journal of Comparative and Applied Criminal Justice, doi.org/10.1080/01924036.2017.1411283.Google Scholar
Sykes, G. & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664670.Google Scholar
Turk, A. T. (1982). Political criminality: The defiance and defence of authority. London: Sage.Google Scholar

REFERENCES

Aronowitz, A. A. (2009). Human trafficking, human misery: The global trade in human beings. Westport, CT: Praeger.Google Scholar
Bernat, F. (2017). Migration and crime. Oxford Research Encyclopedia of Criminology. Online Publication Date: April 2017. doi: 10.1093/acrefore/9780190264079.013.93.Google Scholar
Beutin, R., Canoy, M., Horvath, A., Hubert, A., Lerais, F., & Sochacki, M. (2007). Reassessing the link between public perception and migration policy. European Journal of Migration & Law, 9(4), 389418.Google Scholar
Clarke, R. V. (2002). Protecting immigrants from victimization: The scope for situational crime prevention. In Freilich, J. D. et al. (Eds.), Migration, culture conflict and crime (pp. 103119). Burlington, VT: Ashgate.Google Scholar
Ferraro, V. (2016). Immigration and crime in the new destinations, 2000–2007: A test of the disorganizing effect of migration. Journal of Quantitative Criminology, 32, 2345.Google Scholar
Finckenauer, J. & Voronin, Y. (2001). The threat of Russian organized crime. Washington, DC: US Department of Justice, National Institute of Justice, NCJ 187085.Google Scholar
Franko Aas, K. (2007). Globalization and crime. London: Sage Publications.Google Scholar
Guerette, R. T. (2007). Immigration policy, border security and migrant deaths: An impact evaluation of life saving efforts under the Border Safety Initiative. Criminology & Public Policy, 6(2), 201222.CrossRefGoogle Scholar
Howard, G. J., Newman, G., & Freilich, J. D. (2002). Further evidence on the relationship between population and diversity and violent crime. International Journal of Comparative and Applied Criminal Justice, 26(2), 203229.Google Scholar
Melossi, D., de Giorgi, A., & Massa, E. (2009). The “normality” of “second generations” in Italy and the importance of legal status: A self-report delinquency study. Sociology of Crime, Law & Deviance, 13, 4765.CrossRefGoogle Scholar
Natarajan, M. (2005). Dealing with domestic violence in India: A problem solving model for police. In Freilich, J. D. & Guerette, R. (Eds.), Migration, culture conflict, crime and terrorism. Burlington, VT: Ashgate.Google Scholar
Sampson, R. J. (2008). Rethinking crime and immigration. Contexts, 7(1), 2833.Google Scholar
Sohoni, D. & Sohoni, T. W. P. (2014). Perceptions of immigrant criminality: Crime and social boundaries. Sociological Quarterly, 55, 4971.Google Scholar
Stupi, E. K., Chiricos, T., & Gerz, M. (2016). Perceived criminal threat from undocumented immigrants: Antecedents and consequences for policy preferences. Justice Quarterly, 33, 239266.Google Scholar
Zingher, J. N. (2014). The ideological and electoral determinants of laws targeting undocumented migrants in the U.S. states. State Politics & Policy Quarterly, 14, 90117.Google Scholar

REFERENCES

Borbieva, N. (2012). Kidnapping women. Anthropological Quarterly, 85(1), 141169.Google Scholar
Counts, D. A., Brown, J. K., & Campbell, J. C. (Eds.). (1999). To have and to hit: Cultural perspectives on wife beating. Urbana, IL: University of Illinois Press.Google Scholar
Duneier, M. (2000). Sidewalk. New York: Farrar, Straus and Giroux.Google Scholar
Ferrell, J. (1995). Culture, crime and cultural criminology. Journal of Criminal Justice and Popular Culture, 3(3), 2542.Google Scholar
Fonseca, I. (1996). Bury me standing: The Gypsies and their journey. New York: Vintage.Google Scholar
Gibbs, J. L. (2001). The Kpelle moot. In Podolefsky, A. and Brown, P. J. (Eds.), Applying cultural anthropology (pp. 234–241). London: Mayfield Publishing.Google Scholar
Goffman, E. (1963). Behavior in public places: Notes on the social organization of gatherings. New York: Free Press.Google Scholar
Harris, L. (2002). Crime and culture: Challenges facing law enforcement. Institute for Criminal Justice Education. Retrieved from www.icje.org/id162.htm.Google Scholar
Lee, R. (1993). The Dobe Ju/’hoansi. Fort Worth, TX: Harcourt Brace.Google Scholar
Levine, K. L. (2003). Negotiating the boundaries of crime and culture: A sociolegal perspective on cultural defense strategies. Law and Social Inquiry, 28(1), 3986.CrossRefGoogle Scholar
Rosen, L. (1989). The anthropology of justice: Law as culture in Islamic society. New York: Cambridge University Press.Google Scholar
Sutherland, A. (2000). Cross-cultural law: The case of the Gypsy offender. In Spradley, J. and McCurdy, D. W. (Eds.), Conformity and conflict: Readings in cultural anthropology (pp. 286–293). Boston: Allyn and Bacon.Google Scholar
Walley, C. J. (1997). Searching for “voices”: Feminism, anthropology, and the global debate over female genital operations. Cultural Anthropology, 12, 405438.Google Scholar
Weitzer, R. & Tuch, S. (2002). Perceptions of racial profiling. Criminology, 40(2), 435456.Google Scholar
Werner, C. (2009). Bride abduction in post-Soviet Central Asia. Journal of the Royal Anthropological Institute, 15, 314331.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×