Abelson, R. P. (1981). Psychological status of the script concept. American Psychologist, 36(7), 715–729.
CrossRef
Google Scholar
Andreatta, D., & Favarin, S. (2020). Features of transnational illicit waste trafficking and crime prevention strategies to tackle it. Global Crime, 21(2), 130–153.
CrossRef
Google Scholar
Apena Rogers, F.O. (2019). The crime-commission process of sexual offences on London trains (SOLT): offending in plain sight, not just at night. PhD thesis. Middlesex University.
Google Scholar
Ashby, M. (2016). Using crime science for understanding and preventing theft of metal from the British railway network. PhD thesis. University College London.
Google Scholar
Baratto, G. (2020). Situational crime prevention measures in the illegal online trade of medicines. In The illegal trade of medicines on social media (pp. 37–54). Springer, Cham.
CrossRef
Google Scholar
Basamanowicz, J., & Bouchard, M. (2011). Overcoming the warez paradox: online piracy groups and situational crime prevention. Policy & Internet, 3(2), 1–25.
CrossRef
Google Scholar
Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(6), 1–12.
Google Scholar
Borrion, H., Dehghanniri, H., and Li, Y. (2017). Comparative analysis of crime scripts: one CCTV footage—twenty-one scripts. In Proceedings of the 2017 European Intelligence and Security Informatics Conference (pp. 115–122). Piscataway, NJ: IEEE.
Google Scholar
Bright, D.A., & Delaney, J.J. (2013). Evolution of a drug trafficking network: mapping changes in network structure and function across time. Global Crime, 14(2–3), 238–260.
CrossRef
Google Scholar
Chainey, S., & Guererro, N. (2019). Developing crime analysis in Mexico: case studies of cargo robbery on highways, illegal weapons trafficking, robbery of convenience stores and poppy cultivation. Technical note. https://discovery.ucl.ac.uk/id/eprint/10067263/. Accessed 27 December 2020.
Chiu, Y-N., Leclerc, B., & Townsley, M. (2011). Crime script analysis of drug manufacturing in clandestine laboratories. British Journal of Criminology, 51, 355–374.
CrossRef
Google Scholar
Chopin, J., Beauregard, E., Bitzer, S., & Reale, K. (2019). Rapists’ behaviors to avoid police detection. Journal of Criminal Justice, 61, 81–89.
CrossRef
Google Scholar
Cornish, D.B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R.V. Clarke (Ed.), Crime Prevention Studies Volume 3 (pp. 151–196). Monsey, New York: Criminal Justice Press.
Google Scholar
Dehghanniri, H., & Borrion, H. (2019). Crime scripting: a systematic review. European Journal of Criminology. https://doi.org/10.1177/1477370819850943.
De Vries, M.S. (2012). Converted firearms: a transnational problem with local harm. European journal on criminal policy and research, 18(2), 205–216.
CrossRef
Google Scholar
Dimkov, T., van Cleeff, A., Pieters, W., & Hartel, P. (2010). Two methodologies for physical penetration testing using social engineering. In Proceedings of the 26th annual computer security applications conference. NY: Association for Computing Machinery, 399–408.
Google Scholar
Ekblom, P., & Gill, M. (2016). Rewriting the script: cross-disciplinary exploration and conceptual consolidation of the procedural analysis of crime. European Journal on Criminal Policy and Research, 22(2), 319–339.
CrossRef
Google Scholar
Gill, M. (2016). Preface. In H. Haelterman, Crime script analysis: preventing crimes against business (p. vii). London: Palgrave Macmillan.
Google Scholar
Gilmour, N. (2014). Understanding money laundering—a crime script approach. The European Review of Organised Crime, 1(2), 35–56.
Google Scholar
Haelterman, H. (2011). Re-thinking the cost of supply chain security. Crime, Law and Social Change, 56(4), 289–405.
Google Scholar
Haelterman, H. (2016). Crime script analysis: preventing crimes against business. London: Palgrave Macmillan.
CrossRef
Google Scholar
Hancock, G., & Laycock, G. (2010). Organised crime and crime scripts: prospects for disruption. In K. Bullock, R.V. Clarke, & N. Tilley (Eds.), Situational prevention of organised crimes (pp. 172–192). Devon: Willan Publishing.
Google Scholar
Hardy, J., Bell, P., & Allan, D. (2020). A crime script analysis of the Madoff Investment Scheme. Crime Prevention and Community Safety, 22(1), 68–97.
CrossRef
Google Scholar
Holt, T.J., & Lee, J.R. (2020). A crime script analysis of counterfeit identity document procurement online. Deviant Behavior. https://doi.org/10.1080/01639625.2020.1825915.
Hutchings, A. (2018). Leaving on a jet plane: the trade in fraudulently obtained airline tickets. Crime, Law and Social Change, 70(4), 461–487.
CrossRef
Google Scholar
Hutchings, A., & Pastrana, S. (2019). Understanding eWhoring. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 201–214). IEEE.
Google Scholar
Jordanoska, A., & Lord, N. (2020). Scripting the mechanics of the benchmark manipulation corporate scandals: the ‘guardian’ paradox. European Journal of Criminology, 17(1), 9–30.
CrossRef
Google Scholar
Junger, M., Wang, V., & Schlömer, M. (2020). Fraud against businesses both online and offline: crime scripts, business characteristics, efforts, and benefits. Crime Science. https://doi.org/10.1186/s40163-020-00119-4.
Keatley, D.A., Mcgurk, S., & Allely, C.S. (2020). Understanding school shootings with crime script analysis. Deviant Behavior, 41(9), 1084–1096.
CrossRef
Google Scholar
Kennedy, J.P., Haberman, C.P., & Wilson, J.M. (2018). Occupational pharmaceutical counterfeiting schemes: a crime scripts analysis. Victims & Offenders, 13(2), 196–214.
CrossRef
Google Scholar
Lasky, N., Jacques, S. & Fisher, B.S. (2015). Glossing over shoplifting: how thieves act normal. Deviant Behavior, 36:4, 293–309.
Google Scholar
Lavorgna, A. (2013). Transit crimes in the Internet age: how new online criminal opportunities affect the organization of offline transit crimes. PhD thesis. University of Trento.
Google Scholar
Lavorgna, A. (2015). The online trade in counterfeit pharmaceuticals: new criminal opportunities, trends and challenges. European Journal of Criminology, 12(2), 226–241.
CrossRef
Google Scholar
Leclerc, B. (2014a). New developments in script analysis for situational crime prevention. Moving beyond offender scripts. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 221–236). New York: Routledge.
Google Scholar
Leclerc, B. (2014b). Script analysis for crime controllers: extending the reach of situational crime prevention. In S. Canepelle & F. Calderoni (Eds.), Organized crime, corruption and crime prevention (pp. 13–20). Switzerland: Springer International Publishing.
CrossRef
Google Scholar
Leclerc, B., & Reynald, D. (2017). When scripts and guardianship unite: a script model to facilitate intervention of capable guardians in public settings. Security Journal, 30(3), 793–806.
CrossRef
Google Scholar
Leclerc, B., & Wortley, R. (2014). The reasoning criminal. Twenty-five years on. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 1–11). New York: Routledge.
Google Scholar
Lemieux, A. M., & Bruschi, N. (2019). The production of jaguar paste in Suriname: a product-based crime script. Crime Science, 8(1), 6.
CrossRef
Google Scholar
Leppänen, A., Toiviainen, T., & Kankaanranta, T. (2020). From a vulnerability search to a criminal case: script analysis of an SQL injection attack. International Journal of Cyber Criminology, 14(1), 63–80.
Google Scholar
Leukfeldt, E. R. (2014). Cybercrime and social ties. Trends in Organized Crime, 17(4), 231–249.
Google Scholar
Li, Y.S., & Qi, M.L. (2019). An approach for understanding offender modus operandi to detect serial robbery crimes. Journal of Computational Science, https://doi.org/10.1016/j.jocs.2019.101024.
Lord, N., Spencer, J., Bellotti, E., & Benson, K. (2017). A script analysis of the distribution of counterfeit alcohol across two European jurisdictions. Trends in Organized Crime, 20, 252–272.
CrossRef
Google Scholar
Luong, H.T. (2019). Modus operandi of cross-border drug trafficking in Vietnam. In Transnational drug trafficking across the Vietnam-Laos border (pp. 95–122). Palgrave Macmillan, Cham.
Google Scholar
Masys, A.J. (2016). Disrupting terrorist and criminal networks: crime script analysis through DODAF applications. In A.J. Masys (Ed.), Exploring the security landscape: non-traditional security challenges (pp. 231–247). Switzerland: Springer International Publishing.
CrossRef
Google Scholar
Meyer, S. (2012). Reducing harm from explosive attacks against railways. Security Journal, 25(4), 309–325.
CrossRef
Google Scholar
Morselli, C., & Roy, J. (2008). Brokerage qualifications in ringing operations. Criminology, 46(1), 71–98.
CrossRef
Google Scholar
Osborne, J. R., & Capellan, J. A. (2017). Examining active shooter events through the rational choice perspective and crime script analysis. Security Journal, 30(3), 880–902.
CrossRef
Google Scholar
Peters, B.C. (2020). Nigerian piracy: articulating business models using crime script analysis. International Journal of Law, Crime and Justice. https://doi.org/10.1016/j.ijlcj.2020.100410.
Samonas, S. (2013). Insider fraud and routine activity theory. http://eprints.lse.ac.uk/50344/1/Samonas_Insider_fraud_routine_2013.pdf. Accessed 20 December 2020.
Schank, R.C. (1989). An early work in cognitive science. Current Contents, 38, 14.
Google Scholar
Schank, R.C. & Abelson, R.P. (1977). Scripts, plans, goals and understanding. An inquiry into human knowledge structures. New Jersey: Lawrence Erlbaum Associates.
Google Scholar
Sosnowski, M.C., Weis, J.S., & Petrossian, G.A. (2020). Using crime script analysis to understand the illegal harvesting of live corals: case studies from Indonesia and Fiji. Journal of Contemporary Criminal Justice. https://doi.org/10.1177/1043986220910295.
Staring, R., Bisschop, L., Roks, R., Brein, E., & van de Bunt, H. (2019). Drug crime in the port of Rotterdam. https://repub.eur.nl/pub/127247/Drug-crime-in-the-port-of-Rotterdam-lowres.pdf. Accessed 27 December 2020.
Stickle, B., Hicks, M., Stickle, A., & Hutchinson, Z. (2020). Porch pirates: examining unattended package theft through crime script analysis. Criminal Justice Studies, 33(2), 79–95.
CrossRef
Google Scholar
Tompson, L., & Chainey, S. (2011). Profiling illegal waste activity: using crime scripts as a data collection and analytical strategy. European Journal on Criminal Policy and Research, 17(3), 179–201.
CrossRef
Google Scholar
Tremblay, P., Talon, B., & Hurley, D. (2001). Body switching and related adaptations in the resale of stolen vehicles. Script elaborations and aggregate crime learning curves. British Journal of Criminology, 41(4), 561–579.
CrossRef
Google Scholar
Warren, S., Oxburgh, G., Briggs, P., & Wall, D. (2017). How might crime-scripts be used to support the understanding and policing of cloud crime?. In T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy and Trust (pp. 539–556). Springer, Cham.
Google Scholar
Weekers, D.P. (2020). ‘Conservation’ criminology: understanding and preventing illegal fishing in the Great Barrier Reef Marine Park. PhD thesis. University of Queensland.
Google Scholar
Weirich, C.A. (2019). Situational crime prevention of antiquities trafficking: a crime script analysis. PhD thesis. University of Glasgow.
Google Scholar
Williams, A., Corner, E., & Taylor, H. (2020). Vehicular ramming attacks: assessing the effectiveness of situational crime prevention using crime script analysis. Terrorism and Political Violence. https://doi.org/10.1080/09546553.2020.1810025.
Willison, R. (2005). Considering the offender: addressing the procedural stages of computer crime in an organisational context. Working Paper No. 09-2005. Copenhagen: Copenhagen Business School.
Google Scholar
Willison, R., & Siponen, M. (2009). Overcoming the insider: reducing employee computer crime through situational crime prevention. Communications of the ACM, 52(9), 133–137.
CrossRef
Google Scholar
Zanella, M. (2014). Script analysis of corruption in public procurement. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analysis (pp. 164–185). London and New York: Routledge.
Google Scholar