WorldCat Identities

Newman, Graeme R.

Works: 62 works in 257 publications in 1 language and 10,072 library holdings
Genres: Case studies 
Roles: Author, Editor, Other, Contributor
Classifications: HV8693, 364.67
Publication Timeline
Most widely held works by Graeme R Newman
Just and painful : a case for the corporal punishment of criminals by Graeme R Newman( Book )

18 editions published between 1983 and 1995 in English and held by 1,018 WorldCat member libraries worldwide

The punishment response by Graeme R Newman( Book )

17 editions published between 1978 and 2008 in English and held by 856 WorldCat member libraries worldwide

Comparative deviance : perception and law in six cultures by Graeme R Newman( Book )

18 editions published between 1976 and 2008 in English and Undetermined and held by 753 WorldCat member libraries worldwide

Crime and justice in America, 1776-1976( Book )

10 editions published in 1976 in English and held by 478 WorldCat member libraries worldwide

Understanding violence by Graeme R Newman( Book )

5 editions published in 1979 in English and held by 458 WorldCat member libraries worldwide

Global report on crime and justice( Book )

9 editions published in 1999 in English and held by 420 WorldCat member libraries worldwide

Research and data gathered by the UN Centre for International Crime Prevention. The work combines a wealth of information about crime and justice from UN member states and beyond, and presents emerging crime trends and operations of criminal justice systems on a comparative basis
Crime and deviance : a comparative perspective( Book )

8 editions published between 1980 and 1996 in English and held by 413 WorldCat member libraries worldwide

Policing terrorism : an executive's guide by Graeme R Newman( Book )

6 editions published between 2008 and 2010 in English and held by 372 WorldCat member libraries worldwide

Description from Brief 01: It has been said that 9/11 changed everything. This is certainly true for local police agencies and other chiefs. It is increasingly clear that federal agencies, such as the FBI and the US Secret Service, can no longer work alone in protecting the United States from further attack. Rather, they must work in partnership with other public and private agencies, and most important, with local police. Local police can identify potential terrorists living or operating in their jurisdictions, they can help protect vulnerable targets, and they can coordinate the first response to terror attacks. These are heavy new responsibilities that significantly expand the workload of already busy departments. Many departments welcome these new responsibilities, but they cannot be shrugged off because elected officials and the public will increasingly expect their police to be prepared
Vengeance : the fight against injustice by Pietro Marongiu( Book )

8 editions published between 1987 and 2012 in English and held by 354 WorldCat member libraries worldwide

Secrets of The Dark Knight Revealed! It's all about Vengeance! The authors of this landmark book are eminent criminologists who have brought together insights from history, anthropology, sociology, classical and literary studies, and mythology, that greatly enlarge our understanding of the problems of violence, criminal justice, and vigilantism in
Outsmarting the terrorists by R. V. G Clarke( Book )

6 editions published in 2006 in English and held by 331 WorldCat member libraries worldwide

Given that the war on terror is currently being fought the way crime typically is-after the fact-this country cannot protect its citizens from future terrorist events solely in this way. Instead, measures must be taken to actually stop terrorists before they can attack. Here, the authors argue that government anti-terrorism policy must pay much more attention to reducing opportunities for terrorist attacks by protecting vulnerable targets, controlling the tools and weapons used by terrorists, and by removing the conditions of everyday life that make these attacks possible. While some of this work is done on an ad hoc basis, there are no recognized methods to guide the work, there is limited experience on which to draw, and the government has no trained professionals to oversee the work. In this book, the authors address these deficiencies, and lay out a systematic approach for reducing opportunities for terrorism. The current "take-them-out mindset" may be the main reason why reducing opportunities for terrorism has been so neglected by governments, but another important reason is that the task seems so overwhelmingly difficult. How can we possibly protect every vulnerable target or person? How can we control all the everyday tools that terrorists must use in carrying out their attacks? How can we control their weapons when we cannot even keep guns out the hands of ordinary criminals? In this book, the authors show that these tasks are indeed manageable. They take readers through the methods for preventing terrorism and the policies that will assist in this important work. They show that in order to protect the country from terrorists, security forces must do what the terrorists do: identify vulnerable targets, analyze their specific weaknesses, consider the tools and weapons needed to attack, and assess access to the targets. Once these steps are taken, security agencies can then provide appropriate protection, limit accessibility, anticipate the forces needed to combat a potential attack, and plan carefully for an attack if it does occur. By "outsmarting the terrorists" security forces undertake the same analysis of vulnerabilities and opportunities that terrorists themselves undertake in planning their operations, and can more effectively defeat them before they strike. This books shows how this approach works and can succeed
Superhighway robbery : preventing e-commerce crime by Graeme R Newman( Book )

11 editions published between 2003 and 2013 in English and held by 217 WorldCat member libraries worldwide

This book analyzes the expanding crime opportunities created by the Internet and e-commerce, and it explains how concepts of crime prevention developed in other contexts can be effectively applied in this new environment. The authors note that the Internet and associated e-commerce constitute a lawless "wild frontier" where users of the Internet can anonymously exploit and victimize other users without a high risk of being detected, arrested, prosecuted, and punished. For acquisitive criminals who seek to gain money by stealing it from others, e-commerce through the Internet enables them to "hack" their way into bank records and transfer funds for their own enrichment. Computer programs that are readily available for download on the Web can be used to scan the Web for individual computers that are vulnerable to attack. By using the Internet addresses of other users or using another person's or organization's computers or computing environment, criminals can hide their trails and escape detection. After identifying the multiple opportunities for crime in the world of e-commerce, the book describes specific steps that can be taken to prevent e-commerce crime at particular points of vulnerability. The authors explain how two aspects of situational crime prevention can prevent Internet crime. This involves both a targeting of individual vulnerabilities and a broad approach that requires partnerships in producing changes and modifications that can reduce or eliminate criminal opportunities. The authors apply the 16 techniques of situational crime prevention to the points of vulnerability of the e-commerce system. The points of vulnerability are identified and preventive measures are proposed. In discussing the broad approach of institutionalized and systemic efforts to police e-commerce, the book focuses on ways to increase the risks of detection and sanctions for crime without undue intrusions on the freedom and privacy of legitimate Internet and e-commerce users
Varieties of comparative criminology( Book )

11 editions published in 2001 in English and held by 214 WorldCat member libraries worldwide

Rational choice and situational crime prevention : theoretical foundations( Book )

9 editions published in 1997 in English and held by 193 WorldCat member libraries worldwide

Punishment and privilege( Book )

3 editions published in 1986 in English and held by 192 WorldCat member libraries worldwide

Crime and immigration( Book )

6 editions published in 2007 in English and held by 169 WorldCat member libraries worldwide

Check and card fraud by Graeme R Newman( Book )

5 editions published between 2003 and 2004 in English and held by 23 WorldCat member libraries worldwide

This document describes the problem of check and card fraud, and reviews factors that increase the risks of it. While there are some obvious differences between check and card fraud, the limitations and opportunities for fraud and its prevention and control by local police are similar enough to warrant addressing them together. Some cards, such as debit cards, are used and processed in a similar way to checks, and electronic checks are processed in a similar way to cards, so that traditional distinction between cards and checks is eroding. Apart from the obvious financial loss caused by check and card fraud, it is a serious crime that affects multiple victims and significantly contributes to other types of crime. Check and card fraud is an ideal entry-level crime from which people may graduate to more serious offenses. Other crimes that feed off check and card fraud or facilitate its commission are drug trafficking, identity theft, mail fraud, pickpocketing, fencing, extortion, and organized crime. The biggest problem for police is that people rarely report check and card fraud to them. Only one in four incidents of check and card fraud are reported to the police. Factors contributing to check and card fraud are security flaws in design and production, difficulty in verifying a check or card user₂s identity, and activities of international organized crime groups. Analyzing the local problem of check and card fraud carefully will help police design a more effective response strategy later on. It is important to ask the right questions concerning the incident, offender, victim, and location/time during the investigation. Measurement allows police to determine to what degree their efforts have succeeded, and suggests how they might modify responses if they are not producing the intended results. Considerations for an effective response strategy include working with businesses in raising responsibility awareness, increasing reporting of fraud, training checkout staff, and reducing card application fraud. Working with the community can help educate cardholders and publicize the costs of fraud. Law enforcement agencies can monitor fencing outlets, monitor chat rooms, and target high-risk merchants
Identity theft by Graeme R Newman( Book )

4 editions published in 2004 in English and held by 18 WorldCat member libraries worldwide

This guide addresses identity theft related crimes committed in the United States. The guide is divided into four main sections: the problem of identify theft; factors contributing to identity theft; understanding the individual agency₂s problem; and responses to the problem of identity theft. It begins by describing the problem and reviewing factors that increase the risks of it happening, identifies a series of questions to assist in analyzing a local problem, and reviews responses to the problem and what is known from evaluative research and police practice. Understanding the factors contributing to the problem of identity theft assists in framing local analysis questions, determine good effectiveness measures, recognize key intervention points, and select appropriate responses. It is important then to combine the basic facts with a more specific understanding of the agency problem by asking the right questions and establishing a baseline for measuring effectiveness and thereby designing a more effective response strategy. Lastly, response strategies are presented providing a foundation of ideas for addressing the particular problem of identity theft. However, responses should be tailored to local circumstances. Also, identifying others in the community who share responsibility for the problem of identity theft--who can assist law enforcement in better responding to the problem. In the case of identity theft, there are clear implications for businesses, other government agencies, and consumer advocacy groups
Bomb threats in schools by Graeme R Newman( Book )

5 editions published between 2005 and 2006 in English and held by 13 WorldCat member libraries worldwide

The exploitation of trafficked women by Graeme R Newman( Book )

3 editions published in 2006 in English and held by 9 WorldCat member libraries worldwide

Sting operations by Graeme R Newman( Book )

2 editions published in 2007 in English and held by 5 WorldCat member libraries worldwide

moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.41 (from 0.02 for Outsmartin ... to 0.63 for Varieties ...)

Global report on crime and justice
Alternative Names
Newman, G. F.

Newman, G. R.

Newman, G. R 1939-

Newman, G. R. (Graeme R.)

Newman, Graeme.

Newman, Graeme 1939-

Newman, Graeme R.

Newman, Graeme Reginald 1939-

Newman, Greame 1939-

English (163)

The punishment responseComparative deviance : perception and law in six culturesGlobal report on crime and justiceOutsmarting the terroristsSuperhighway robbery : preventing e-commerce crimeVarieties of comparative criminologyRational choice and situational crime prevention : theoretical foundationsCrime and immigration