Jump to content

Routine activity theory

From Wikipedia, the free encyclopedia
(Redirected from Routine activities theory)

A graphical model of the routine activity theory. The theory stipulates three necessary conditions for most crime; a likely offender, a suitable target, and the absence of a capable guardian, coming together in time and space. The lack of any of the three elements is sufficient to prevent a crime which requires offender-victim contact.

Routine activity theory is a sub-field of crime opportunity theory that focuses on situations of crimes. It was first proposed by Marcus Felson and Lawrence E. Cohen in their explanation of crime rate changes in the United States between 1947 and 1974.[1] The theory has been extensively applied and has become one of the most cited theories in criminology. Unlike criminological theories of criminality, routine activity theory studies crime as an event, closely relates crime to its environment and emphasizes its ecological process,[2] thereby diverting academic attention away from mere offenders.

After World War II, the economy of Western countries started to boom and the Welfare states were expanding. Despite this, crime rose significantly during this time. According to Felson and Cohen, the reason for the increase is that the prosperity of contemporary society offers more opportunities for crime to occur. For example, the use of automobiles, on one hand, enables offenders to move more freely to conduct their violations and, on the other hand, provide more targets for theft. Other social changes such as college enrollment, female labor participation, urbanization, suburbanization, and lifestyles all contribute to the supply of opportunities and, subsequently, the occurrence of crime.[1]

Routine activity theory has its foundation in human ecology and rational choice theory. Over time, the theory has been extensively employed to study sexual crimes, robberies, cyber crimes, residential burglary and corresponding victimizations, among others. It is also worth noting that, in the study of criminal victimization, the routine activity theory is often regarded as "essentially similar"[3][4] to lifestyle theory of criminology by Hindelang, Gottfredson & Garofalo (1978).[5] More recently, routine activity theory has been repeatedly used in multilevel frameworks with social disorganization theory in understanding various neighborhood crimes.

Theoretical framework

[edit]

In routine activity theory, crime is likely to occur when three essential elements of crime converge in space and time: a motivated offender, an attractive target, and the absence of capable guardianship.[1][6]

The analytic focus of routine activity theory takes a macro-level view and emphasizes broad-scale shifts in the patterns of victim and offender behavior. It focuses on specific crime events and offender behavior/decisions. Routine activity theory is based on the assumption that crime can be committed by anyone who has the opportunity. The theory also states that victims are given choices on whether to be victims mainly by not placing themselves in situations where a crime can be committed against them.[citation needed]

Motivated offender

[edit]

Motivated offenders are individuals who are not only capable of committing criminal activity, but are willing to do so.[7] This element that has received the most criticism due to the lack of information regarding what it truly is.[2] A motivated offender can be pointed out as any type of person who has true intent to commit a crime against an individual or property. However, the motivated offender has to be someone who is able to commit the crime, or, in other words, has everything he or she needs to commit a crime, physically, and mentally.[2]

Suitable target

[edit]

In Routine Activity Theory, the term 'target' is preferred over the term 'victim', as they might not be present at the scene of the crime. For example, an owner of a television might be away from their home when a burglar decides to target the television for stealing. The television is the target and the owner's absence indicates the absence of a capable guardian, thereby making the crime more likely according to the theory.[8] A suitable target is any type of individual or property that the motivated offender can damage or threaten in the easiest way possible.[2] If a target is suitable, this means that there is a greater chance that the crime can be committed, rather than, a target that is hard to achieve. The acronym VIVA provides four different attributes of what makes a target actually suitable, in the judgement of the offender.[2] The acronym goes as follows:

V: Value (The value of achieving the target, in a real or symbolic manner)[2]
I: Inertia (The physical obstacles of the target: weight, height, strength, etc.)[2]
V: Visibility (The attribute of exposure which solidifies the suitability of the target)[2]
A: Access (The placement of the individual, or object, that increases, or lessens, the potential risk of the intended attack)[2]

Absence of a suitable guardian

[edit]

Guardianship refers to a person or an object that is effective in deterring criminal offenses,[6] and sometimes crime is stopped by simple presence of guardianship in space and time.[9] A guardian would not necessarily have to be a policeman or a security guard but rather a person whose proximity or presence would lower the chances of a crime happening. This could include a housewife, a doorman, a neighbour or a co-worker. Whilst inadvertent, the presence of a guardian has a powerful impact on the likelihood of a crime taking place. Thus when the guardian is not within the vicinity of the target, the likelihood of a crime occurring is significantly higher.[10]

Empirical evidence

[edit]

Criminologist Lynch (1987), using "domain-specific" models, demonstrates that occupation-related activities generally have a stronger impact on the risk of victimization at work than sociodemographic characteristics. The specific attributes of activities pursued at work exposure, guardianship, attractiveness—were all related to victimization in ways predicted by activity theory.[11] These findings identify specific attributes of occupations that could be modified to reduce the risk of criminal victimization at work. Victimization of workers at work will decline if mobility, public accessibility, and handling of money as part of the occupational role are reduced.

In A Routine Activity Theory Explanation for Women's Stalking Victimizations, criminologists Mustaine & Tewksbury (1999) conducted a self-administered study in the third quarter of 1996 to 861 college or university female students from nine postsecondary institutes from eight states of the US. The study reveals that women's victimization risk of stalking can be explained by individual lifestyle behaviors, including employment, location of residence, substance use (drug and alcohol) and self-protection.[12]

Felson & Cohen (1980) establishes that those who live alone are more likely to be out alone and to have little help in guarding their property, they probably face higher rates of victimization for both personal and property crimes. The 30.6% increase in employed and married female’s participation rates not only subjects these women to greater risk of attack on their way to and from work, but also leaves their home and car less guarded from illegal entry. The 118% increase in the proportion of the population consisting of female college students places more women at risk of attack when carrying out daily activities as students, since they may be less effectively protected by family or friends.

Pratt, Holtfreter & Reisig (2010) using a sample of 922 adults in Florida show that one's online routine activities, shaped by one's sociodemographic characteristics, strongly shape the person's risk of falling victim of Internet fraud.[13] Their findings clearly shed light on the validity of routine activities theory on crimes that targeted Internet users. Using university computer attack data, Maimon et al. (2013) reveal evidence supporting routine activity theory. They find that the risk of computer attacks increases during university official business hours and that foreign-origin attacks are substantially attributed to the number of foreign network users.[14]

Criticisms

[edit]

Routine activity theory is mainly a macro theory of crime and victimization. It requires motivated offenders, but does not explain how such offenders become motivated.[citation needed]

See also

[edit]

References

[edit]
  1. ^ a b c Cohen, Lawrence E.; Felson, Marcus (1979). "Social Change and Crime Rate Trends: A Routine Activity Approach". American Sociological Review. 44 (4): 588–608. CiteSeerX 10.1.1.476.3696. doi:10.2307/2094589. JSTOR 2094589.
  2. ^ a b c d e f g h i Miro, Fernando (January 31, 2014). "Routine Activity Theory". In Miller, J. Mitchell (ed.). The Encyclopedia of Theoretical Criminology (1st ed.). doi:10.1002/9781118517390. ISBN 978-1-118-51739-0.
  3. ^ Garofalo, J. (1987). Reassessing the lifestyle model of criminal victimization. Beverly Hills, California: Sage.
  4. ^ Maxfield, Michael G. (1987). "Lifestyle and Routine Activity Theories of Crime: Empirical Studies of Victimization, Delinquency, and Offender Decision-Making". Journal of Quantitative Criminology. 3 (4): 275–282. doi:10.1007/BF01066831. JSTOR 23365565. S2CID 143901845.
  5. ^ Hindelang, M. J.; Gottfredson, M. R.; Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, Massachusetts: Ballinger. ISBN 978-0-88410-793-4.
  6. ^ a b Cohen, Lawrence E.; Kluegel, James R.; Land, Kenneth C. (1981). "Social Inequality and Predatory Criminal Victimization: An Exposition and Test of A Formal Theory". American Sociological Review. 46 (5): 505–524. doi:10.2307/2094935. JSTOR 2094935.
  7. ^ Felson, Marcus; Cohen, Lawrence E. (1980). "Human Ecology and Crime: A Routine Activity Approach". Human Ecology. 8 (4): 389–406. Bibcode:1980HumEc...8..389F. doi:10.1007/BF01561001. JSTOR 4602572. S2CID 154738413.
  8. ^ https://popcenter.asu.edu/sites/default/files/opportunity_makes_the_thief.pdf page 5
  9. ^ Felson, Marcus (1995). "Those who discourage crime". Crime and Place. 4: 53–66.
  10. ^ https://popcenter.asu.edu/sites/default/files/opportunity_makes_the_thief.pdf Page 4
  11. ^ Lynch, James P. (1987). "Routine Activity and Victimization at Work". Journal of Quantitative Criminology. 3 (4): 283–300. doi:10.1007/BF01066832. JSTOR 23365566. S2CID 143507394.
  12. ^ Mustaine, Elizabeth Ehrhardt; Tewksbury, Richard (1999). "A Routine Activity Theory Explanation for Women's Stalking Victimizations". Violence Against Women. 5 (1): 43–62. doi:10.1177/10778019922181149. PMID 31454870. S2CID 73067179.
  13. ^ Pratt, Travis C.; Holtfreter, Kristy; Reisig, Michael D. (2010). "Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory". Journal of Research in Crime and Delinquency. 47 (3): 267–296. doi:10.1177/0022427810365903. S2CID 146182010.
  14. ^ Maimon, D.; Kamerdze, A.; Cukier, M.; Sobesto, B. (March 1, 2013). "Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective". British Journal of Criminology. 53 (2): 319–343. doi:10.1093/bjc/azs067. ISSN 0007-0955.

Further reading

[edit]
  • Clarke, Ronald V.; Felson, Marcus (1993). "Introduction: Criminology, Routine Activity, and Rational Choice". Advances in Criminological Theory: Routine Activity and Rational Choice. Vol. 5. pp. 1–14.
  • Cohen, Lawrence E.; Felson, Marcus (1979). "Social Change and Crime Rate Trends: A Routine Activity Approach". American Sociological Review. 44 (4): 588–608. CiteSeerX 10.1.1.476.3696. doi:10.2307/2094589. JSTOR 2094589.
  • Felson, M. (1994). Crime and everyday life: Insight and implications for society. Thousand Oaks, CA: Pine.
  • Felson, Marcus; Cohen, Lawrence E. (1980). "Human Ecology and Crime: A Routine Activity Approach". Human Ecology. 8 (4): 389–406. Bibcode:1980HumEc...8..389F. doi:10.1007/BF01561001. JSTOR 4602572. S2CID 154738413.
  • Hawdon, J. E. (1999). "Daily Routines and Crime: Using Routine Activities as Measures of Hirschi's Involvement". Youth & Society. 30 (4): 395–415. doi:10.1177/0044118X99030004001. S2CID 143553735.
  • Lynch, James P. (1987). "Routine Activity and Victimization at Work". Journal of Quantitative Criminology. 3 (4): 283–300. doi:10.1007/BF01066832. JSTOR 23365566. S2CID 143507394.
  • Maxfield, M. G. (1987). "Lifestyle and Routine Activity Theories of Crime: Empirical Studies of Victimization, Delinquency, and Offender Decision-making". Journal of Quantitative Criminology. 3 (4): 275–282. doi:10.1007/BF01066831. JSTOR 23365565. S2CID 143901845.
  • Miller, J. Mitchell, ed. (2014). The Encyclopedia of Theoretical Criminology (1st ed.). John Wiley & Sons. doi:10.1002/9781118517390. ISBN 978-1-118-51739-0.
  • Pratt, Travis C.; Holtfreter, Kristy; Reisig, Michael D. (2010). "Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory". Journal of Research in Crime and Delinquency. 47 (3): 267–296. doi:10.1177/0022427810365903. S2CID 146182010.
  • Rountree, P. W.; Land, K. C.; Miethe, T. D. (1994). "Macro-micro integration in the study of victimization: A hierarchical logistic model analysis across Seattle neighborhoods". Criminology. 32 (3): 387–414. doi:10.1111/j.1745-9125.1994.tb01159.x.
  • Smith, W. R.; Frazee, S. G.; Davison, E. L. (2000). "Furthering the integration of routine activity and social disorganization theories: Small units of analysis and the study of street robbery as a diffusion process". Criminology. 38 (2): 489–524. doi:10.1111/j.1745-9125.2000.tb00897.x.