Skip to main content

Translational Criminology and Counterterrorism: Global Threats and Local Responses

  • Chapter
  • First Online:
Translational Criminology and Counterterrorism

Part of the book series: SpringerBriefs in Criminology ((BRIEFSTRANSLAT))

Abstract

This “brief” offers an overview of how analysis of crime and terrorism can be evaluated both in terms of research to practice (what we interpret as “translational”) and combining the two literatures relating to global and local effects. The complications that come from merging two sets of literature, drawing from security studies and criminology, may create challenges for the reader unfamiliar with one or the other. However, our take on this series is that it is supposed to introduce readers to different literature, not necessarily expound on it in detail. If one is interested in pursuing this topic further, references are included.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Anarumo, 2011 for a discussion of the views of US local law enforcement towards getting valid intelligence about terrorism threats and the challenges that they face in prevention and response.

  2. 2.

    See footnote 16 in Treverton et al. (2006).

  3. 3.

    Visit www.rutgerscps.org for more information regarding RTM as well as online resources and tutorials on how to use RTM on ARC GIS.

  4. 4.

    Go to www.unglobalpulse.org to see more information about Global Pulse.

  5. 5.

    Cited from Davison (2003, p. 341) and White (2002, p. 4).

  6. 6.

    A botnet is a group of computers that are used to generate viruses, spam, or flood a network with multiple requests to attempt to cause it failure (PCMAG, 2013a).

  7. 7.

    A fast-flux network is a technique used to hide a cybercriminal’s identity (IP address). This allows him/her to create a botnet that can join the network and then disappear before he/she can be traced (Whatis.com, 2013).

  8. 8.

    To see more about staying safe online, go to http://staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud.

  9. 9.

    Patch software is “A fix to a program. In the past, a patch used to mean changing actual executable, machine instructions, but today more often than not, it means replacing an executable module in its entirety such as an .EXE or .DLL file. A profusion of patches to an application implies that its logic was poorly designed in the first place.” (PCMAG, 2013b)

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author

About this chapter

Cite this chapter

Kennedy, L.W., Irvin-Erickson, Y., Kennedy, A.R. (2014). Translational Criminology and Counterterrorism: Global Threats and Local Responses. In: Translational Criminology and Counterterrorism. SpringerBriefs in Criminology(). Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5556-1_1

Download citation

Publish with us

Policies and ethics