Predicting and Preventing the Theft of Electronic Products

Rachel Armitage, Ken Pease

Research output: Contribution to journalArticle

11 Citations (Scopus)

Abstract

The research presented within this paper was conducted as part of a 2-year project (Project MARC) to develop and render operational a mechanism to assess the risk of theft of electronic products. Clarke and Newman (Secured goods by design - a plan for security coding of electronic products. London: Department of Trade and Industry, 2002) proposed the use of two checklists-one to measure vulnerability, the other to measure security-as a means of categorising products according to their vulnerability to theft. Consultation with key stakeholders yielded the common view that such a mechanism was worth pursuing, but that it must reflect the language of those who would use it. An extensive consultation with stakeholders from ten European member states ensued. Participants were asked to rate a range of electronic products in terms of vulnerability and security, and to explain their ratings. Their responses were used to develop two checklists that incorporate a variety of factors, weighted according to the frequency with which they were expressed. The crime vulnerability checklist developed within this paper is judged fit-for-purpose as a provisional measurement but we urge caution in relation to the security checklist.

Original languageEnglish
Pages (from-to)11-37
Number of pages27
JournalEuropean Journal on Criminal Policy and Research
Volume14
Issue number1
Early online date23 Jun 2007
DOIs
Publication statusPublished - Mar 2008

Fingerprint

larceny
vulnerability
electronics
stakeholder
coding
rating
offense
industry
language

Cite this

@article{5107a21bf8ed445c82802b3762a4b3e2,
title = "Predicting and Preventing the Theft of Electronic Products",
abstract = "The research presented within this paper was conducted as part of a 2-year project (Project MARC) to develop and render operational a mechanism to assess the risk of theft of electronic products. Clarke and Newman (Secured goods by design - a plan for security coding of electronic products. London: Department of Trade and Industry, 2002) proposed the use of two checklists-one to measure vulnerability, the other to measure security-as a means of categorising products according to their vulnerability to theft. Consultation with key stakeholders yielded the common view that such a mechanism was worth pursuing, but that it must reflect the language of those who would use it. An extensive consultation with stakeholders from ten European member states ensued. Participants were asked to rate a range of electronic products in terms of vulnerability and security, and to explain their ratings. Their responses were used to develop two checklists that incorporate a variety of factors, weighted according to the frequency with which they were expressed. The crime vulnerability checklist developed within this paper is judged fit-for-purpose as a provisional measurement but we urge caution in relation to the security checklist.",
keywords = "Crime, Design, Electronic products, Risk-assessment mechanism, Security, Theft, Vulnerability",
author = "Rachel Armitage and Ken Pease",
year = "2008",
month = "3",
doi = "10.1007/s10610-007-9039-2",
language = "English",
volume = "14",
pages = "11--37",
journal = "European Journal on Criminal Policy and Research",
issn = "0928-1371",
publisher = "Springer Netherlands",
number = "1",

}

Predicting and Preventing the Theft of Electronic Products. / Armitage, Rachel; Pease, Ken.

In: European Journal on Criminal Policy and Research, Vol. 14, No. 1, 03.2008, p. 11-37.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Predicting and Preventing the Theft of Electronic Products

AU - Armitage, Rachel

AU - Pease, Ken

PY - 2008/3

Y1 - 2008/3

N2 - The research presented within this paper was conducted as part of a 2-year project (Project MARC) to develop and render operational a mechanism to assess the risk of theft of electronic products. Clarke and Newman (Secured goods by design - a plan for security coding of electronic products. London: Department of Trade and Industry, 2002) proposed the use of two checklists-one to measure vulnerability, the other to measure security-as a means of categorising products according to their vulnerability to theft. Consultation with key stakeholders yielded the common view that such a mechanism was worth pursuing, but that it must reflect the language of those who would use it. An extensive consultation with stakeholders from ten European member states ensued. Participants were asked to rate a range of electronic products in terms of vulnerability and security, and to explain their ratings. Their responses were used to develop two checklists that incorporate a variety of factors, weighted according to the frequency with which they were expressed. The crime vulnerability checklist developed within this paper is judged fit-for-purpose as a provisional measurement but we urge caution in relation to the security checklist.

AB - The research presented within this paper was conducted as part of a 2-year project (Project MARC) to develop and render operational a mechanism to assess the risk of theft of electronic products. Clarke and Newman (Secured goods by design - a plan for security coding of electronic products. London: Department of Trade and Industry, 2002) proposed the use of two checklists-one to measure vulnerability, the other to measure security-as a means of categorising products according to their vulnerability to theft. Consultation with key stakeholders yielded the common view that such a mechanism was worth pursuing, but that it must reflect the language of those who would use it. An extensive consultation with stakeholders from ten European member states ensued. Participants were asked to rate a range of electronic products in terms of vulnerability and security, and to explain their ratings. Their responses were used to develop two checklists that incorporate a variety of factors, weighted according to the frequency with which they were expressed. The crime vulnerability checklist developed within this paper is judged fit-for-purpose as a provisional measurement but we urge caution in relation to the security checklist.

KW - Crime

KW - Design

KW - Electronic products

KW - Risk-assessment mechanism

KW - Security

KW - Theft

KW - Vulnerability

UR - http://www.scopus.com/inward/record.url?scp=36749096815&partnerID=8YFLogxK

U2 - 10.1007/s10610-007-9039-2

DO - 10.1007/s10610-007-9039-2

M3 - Article

VL - 14

SP - 11

EP - 37

JO - European Journal on Criminal Policy and Research

JF - European Journal on Criminal Policy and Research

SN - 0928-1371

IS - 1

ER -