There is emerging evidence that the performance of risk assessment instruments is weaker when used for clinical decision‐making than for research purposes. For instance, research has found lower agreement between evaluators when the risk assessments are conducted during routine practice. We examined the field interrater reliability of the Short‐Term Assessment of Risk and Treatability: Adolescent Version (START:AV). Clinicians in a Dutch secure youth care facility completed START:AV assessments as part of the treatment routine. Consistent with previous literature, interrater reliability of the items and total scores was lower than previously reported in non‐field studies. Nevertheless, moderate to good interrater reliability was found for final risk judgments on most adverse outcomes. Field studies provide insights into the actual performance of structured risk assessment in real‐world settings, exposing factors that affect reliability. This information is relevant for those who wish to implement structured risk assessment with a level of reliability that is defensible considering the high stakes.
Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By conducting interviews with cybersecurity experts and applying crime script analysis, we developed a comprehensive script that describes the typical progression of attackers through organizational systems and networks in order to eventually steal data. This script integrates phases identified in previous academic literature and expert-defined phases that resemble phases from industry threat models. However, in contrast to prior cybercrime scripts and industry threat models, we did not only identify sequential phases, but also illustrate the circular nature of network attacks. This finding challenges traditional perceptions of crime as a linear process. In addition, our findings underscore the importance of considering both successful and failed attacks in cybercrime research to develop more effective cybersecurity strategies.
MULTIFILE
‘The fear of crime’ is “upon everybody’s tongue” nowadays (Farrall & Gadd 2004:1). The concept is widely accepted as social problem across the globe (Gray, Jackson & Farrall 2008, Garland 2001) as it is held to impinge ‘(…) upon the well-being of a large proportion of the population’ (Farralll et al. 1997:658). But do we actually have a valid picture of a genuine ‘social problem of striking dimensions’ (Ditton 1999:83)? Critical voices say we don’t. ‘The fear of crime’ - as we generally know it - is seen by them as ‘(…) a product of the way it has been researched rather than the way it is’ (Farrall et al. 1997:658). And still, 45 years after the start of research, ‘surprisingly little can be said conclusively about the fear of crime‘ (Ditton & Farrall 2000:xxi). This research contributes to a growing body of knowledge - from especially the last fifteen years - that treats ‘the fear of crime’ as ‘(…) a complex allocation of interacting feelings, perceptions, emotions, values and judgments on the personal as well as the societal level’ (Pleysier 2010:43). One often replicated and paradoxical observation catches the eye: citizens perceive a growing threat of crime to their society, but consequently perceive a low risk that they themselves will fall victim of crime. Taking a social psychological approach (e.g. see Farrall et al. 2000; Jackson 2008), we will search for suitable explanations for this paradoxical observation in the fear of crime’s research tradition. The aim of this research is ‘to integrate social psychological concepts related to the individual’s identity and evaluation of his position in an increasingly complex society, to enhance our understanding of the fear of crime concept’ (Pleysier & Cops 2016:3).
MULTIFILE