878
Views
14
CrossRef citations to date
0
Altmetric
Articles

Successful and Unsuccessful Pirate Attacks Worldwide: A Situational Analysis

References

  • Becker, H. S. (1962). Outsiders: Studies in the sociology of deviance. Glencoe: The Free Press.
  • Bendall, H. (2010). Cost of piracy: A comparative voyage approach. Maritime Economics and Logistics, 12, 178-195.10.1057/mel.2010.1
  • BMP4. (2011). Best management practices for protection against Somalia based piracy. London: Witherby Publishing.
  • Bodini, S. P. (2011). Fighting maritime piracy under the European convention on human rights. European Journal of International Law, 22, 829-848.10.1093/ejil/chr052
  • Bowden, A. (2010, December). The economic cost of maritime piracy. One Earth Future Working Paper.
  • Braga, A., Weisburd, D., Waring, E., Green Mazerolle, L., & Gajewski, F. (1999). Problem-oriented policing in violent crime places: A randomized controlled experiment. Criminology, 37, 541-580.
  • Brantingham, P., & Brantingham, P. (1975). The spatial patterning of burglary. The Howard Journal of Criminal Justice, 14, 11-23.
  • Brantingham, P., & Brantingham, P. (1984). Patterns in crime. New York, NY: Macmillan.
  • Brantingham, P., & Brantingham, P. (1993). Nodes, paths and edges: Considerations on the complexity of crime and the physical environment. Journal of Environmental Psychology, 13, 3-28.10.1016/S0272-4944(05)80212-9
  • Bullock, K., Clarke, R., & Tilley, N. (2010). Situational prevention of organised crimes. Cullompton: Willan Publishing.
  • Burt, C. (1925). The young delinquent. London: University of London Press.
  • Carney, S. (2009). Cutthroat capitalism: An economic analysis of the Somali pirate business model. Wired Magazine. Retrieved February 13, 2013, from http://www.wired.com/politics/security/magazine/17-07/ff_somali_pirates
  • Chalk, P. (2009). Maritime Piracy: Reasons, Dangers, and Solutions. Testimony before the Committee on Transportation and Infrastructure, Subcommittee on Coast Guard and Maritime Transportation. U.S. House of Representatives, February 4. Santa Monica, CA: RAND.
  • Chalk, P. (2010). Piracy off the horn of Africa: Scope, dimensions, causes and responses. Brown Journal of World Affairs, 16, 89-108.
  • Chang, D. (2010). Piracy laws and the effective prosecution of pirates. Boston College International and Comparative Law Review, 33, 273-288. Retrieved January 30, 2014, from http://lawdigitalcommons.bc.edu/iclr/vol33/iss2/3
  • Childress, S. (2010, September 12). Somali militants try piracy to fund attacks. The Wall Street Journal. Retrieved April 16, from http://online.wsj.com/news/articles/SB10001424052748703720004575477491009472882
  • Clarke, R. V. (1980). ‘Situational’ crime prevention: Theory and practice. British Journal of Criminology, 20, 136-147.
  • Clarke, R. V. (1997). Situational crime prevention: Successful case studies. Albany, NY: Harrow and Heston.
  • Clarke, R. V., & Eck, J. E. (2005). Crime analysis for problem solvers in 60 small steps. Office of Community Oriented Policing Services. Washington, DC: US Department of Justice.
  • Clifton, W. (1993). Convenience store robberies in Gainesville, Florida: An intervention strategy by the Gainesville police department. Gainesville, FL: Gainesville Police Department.
  • Coggins, B. (2012). Global patterns of maritime piracy, 2000–09: Introducing a new dataset. Journal of Peace Research, 49, 605-617.10.1177/0022343312442520
  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608.10.2307/2094589
  • Cornish, D. (1994). The procedural analysis of offending and its relevance for situational prevention. Crime Prevention Studies, 3, 151-196.
  • Cornish, D., & Clarke, R. V. (Eds.). (1986). The reasoning criminal. New York, NY: Springer-Verlag.
  • Cornish, D., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In M. Smith & D. B. Cornish (Eds.), Theory for situational crime prevention: Crime prevention studies (Vol. 16, pp. 41-96). Monsey, NY: Criminal Justice Press.
  • Cowell, A. (2009, November 18). Pirates attack Maersk Alabama again. New York Times.
  • Cullen, F. T., & Agnew, R. (2006). Criminological theory past to present: Essential readings (3rd ed.). Los Angeles, CA: Roxbury.
  • Cusson, M. (1993). Situational deterrence: Fear during the criminal event. Crime Prevention Studies, 1, 55-68.
  • Dahlavang, N. (2006). Thieves, robbers & terrorists: Piracy in the 21st century. Regent Journal of International Law, 4, 17-45.
  • Doob, A., & Webster, C. (2003). Sentence severity and crime: Accepting the null hypotheses. Crime and Justice, 30, 143-195.
  • Dutton, Y. M. (2012). Maritime piracy and the impunity gap: Insufficient national laws or a lack of political will? Tulane Law Review, 86, 1111-11162.
  • Echevarria, A. J., II (2005). Fourth-generation warfare and other myths. Washington, DC: Strategic Policy Studies.
  • Ekblom, P. (1997). Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk, Security and Crime Prevention, 2, 249-265.
  • Elbeck, M., & Tirtiroglu, E. (2010). The threat of piracy on maritime transportation. International Journal of Society Systems Science, 2, 125-133.10.1504/IJSSS.2010.032571
  • Farrington, D. P., & Knight, B. J. (1980). Stealing from a ‘Lost’ letter: Effects of victim characteristics. Criminal Justice and Behavior, 7, 423-436.10.1177/009385488000700406
  • Felson, M. (1994). Crime and everyday life: Insight and implications for society. Thousand Oaks, CA: Pine Forge Press.
  • Felson, M. (2006). Crime and nature. Thousand Oaks, CA: Sage.
  • Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief: Practical theory for crime prevention. Police Research Series, Paper 98. London: Home Office.
  • Felson, M., & Cohen, L. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8, 389-406.10.1007/BF01561001
  • Field, A. P. (2009). Discovering statistics using SPSS (3rd ed.). London: Sage.
  • Fokas, T. (1997). The Barbary Coast revisited: The resurgence of international maritime piracy. University of San Francisco Maritime Law Journal, 9, 427-460.
  • Forsyth, C. J., Gisclair, K. H., & Forsyth, Y. A. (2009). Waterborne crime: Examining contemporary piracy. Deviant Behavior, 30, 669-679.10.1080/01639620902797655
  • Gill, M. (1996). Security at sea: Fraud, piracy and the failure of police cooperation internationally. International Relations, 13, 43-58.10.1177/004711789601300304
  • Goldstein, H. (1979). Improving policing: A problem-oriented approach. Crime & Delinquency, 25, 236-258.
  • Guerette, R., & Clarke, R. V. (2003). Product life cycles and crime: Automated teller machines and robbery. Security Journal, 16, 7-18.10.1057/palgrave.sj.8340122
  • Guilfoyle, D. (2010). The laws of war and the fight against Somali piracy: Combatants or criminals? Melbourne Journal of International Law, 11, 1-13.
  • Hartshorne, M., & May, M. A. (1928). Studies in the nature of character. New York, NY: Macmillan.
  • Hassall, C., & Trethowan, W. H. (1972). Suicide in Birmingham. British Medical Journal, 1, 717-718.10.1136/bmj.1.5802.717
  • Hawkins, O. (2009, March 10). What to do with a captured pirate. BBC News.
  • Helfman, T. (2012). Marauders in the courts: Why the federal courts have got the problem of maritime piracy (partly) wrong. Syracuse Law Review, 62, 53-74.
  • Holt, T. J., Blevins, K. R., & Kuhns, J. B. (2008). Examining the displacement practices of johns with on-line data. Journal of Criminal Justice, 36, 522-528.10.1016/j.jcrimjus.2008.09.009
  • Hong, N., & Ng, A. (2010). The international legal instruments in addressing piracy and maritime terrorism: A critical review. Research in Transportation Economics, 27, 51-60.10.1016/j.retrec.2009.12.007
  • Hope, T., & Murphy, D. (1983). Problems of implementing crime prevention: The experience of a demonstration project. The Howard Journal of Criminal Justice, 22, 38-50.10.1111/hojo.1983.22.issue-1-3
  • Huang, H. (2010). Who are sea cutthroats? A typological analysis of pirates. Crime, Law and Social Change, 53, 277-298.10.1007/s10611-009-9225-x
  • International Maritime Bureau. (2011). Piracy and armed robbery against ships, 1 January–31 December 2011. London: ICC-IMB.
  • Jablonski, R. S., & Oliver, S. (2013). The political economy of plunder: Economic opportunity and modern piracy. Journal of Conflict Resolution, 57, 682-708.10.1177/0022002712448907
  • Jacob, H. (1984). Using published data. Sage University Paper 42. London: Sage.10.4135/9781412986472
  • Kock, R. (1999). 80–20 principle: The secret to success by achieving more with less. New York, NY: Doubleday.
  • Kraska, J., & Wilson, B. (2011, February 23). Combatting piracy in international waters. World Policy Institute.
  • Landes, W. (1978). An economic study of U.S. aircraft hijacking, 1961–1976. The Journal of Law and Economics, 21(1), 1-31.10.1086/jle.1978.21.issue-1
  • Lasley, J. (1998). ‘Designing Out’ gang homicides and street assaults. Research in Brief. Washington, DC: US Department of Justice, National Institute of Justice.
  • Lay, K., & Johnston, K. (2014, June 25). Kidnapped ship’s captain told ransoms may be funneled to Boko Haram. CNN.com
  • Lemieux, A., & Clarke, R. V. (2009). The international ban on ivory sales and its effect on elephant poaching in Africa. British Journal of Criminology, 49, 451-471.10.1093/bjc/azp030
  • Liao, T. F. (1994). Interpreting probability models: Logit, probit, and other generalized linear models (Vol. 101). Thousand Oaks, CA: Sage.
  • Lind, W. S., Nightengale, K., Schmitt, J. F., Sutton, J. W., & Wilson, G. I. (1989, October). The changing face of war: Into the fourth generation (pp. 22-26). Marine Corps Gazette.
  • Loomis, D., Marshall, S., Wolf, S., Runyan, C., & Butts, J. (2002). Effectiveness of safety measures recommended for prevention of workplace homicide. Journal of American Medical Association, 287, 1011-1017.10.1001/jama.287.8.1011
  • Lough, R. (2011, July 6). Piracy ransom cash ends up with Somali militants. Nairobi: Reuters.
  • Marchione, E., & Johnson, S. (2013). Spatial, temporal and spatio-temporal patterns of maritime piracy. Journal of Research in Crime & Delinquency, 50, 504-524.
  • Meyers, L. S., Gamst, G., & Guarino, A. J. (2006). Advanced and multivariate research: Design and interpretation. Thousand Oaks, CA: Sage.
  • Murphy, M. (2007). Contemporary piracy and maritime terrorism. London: Routledge.
  • Murphy, M. (2008). Piracy and the exploitation of sanctuary. In J. Norwitz (Ed.), Armed groups: Studies in national security, counterterrorism, and counterinsurgency (pp. 161-173). Newport, RI: US Naval War College.
  • Murphy, M. (2009). Small boats, weak states, dirty money: The challenge of piracy. New York, NY: Columbia University Press.
  • Murphy, M. (2011a). Somalia, the new barbary? Piracy and Islam in the Horn of Africa. New York, NY: Columbia University Press.
  • Murphy, M. (2011b). Somali piracy: Political lessons for the navy. American Foreign Policy Interests, 33, 17-25.10.1080/10803920.2011.550238
  • Myburgh, P. (2002). Categorising horror: Marine insurance coverage and terrorism. Maritime Studies, 126, 1-9. Retrieved February 1, 2013, from http://www.maritimelaw.org.nz/myburgh/Horror.pdf
  • Neisser, U. (1976). Cognition and reality: Principles and implications of cognitive psychology. San Francisco, CA: Freeman.
  • Nelson, J. E. (2010). Ocean piracy. New York, NY: Nova Science.
  • NRC Handelsblad. (2010, June 17). Vijf jaar cel voor Somalische piraten” [Five years’ imprisonment for Somali pirates]. Retrieved April 16, 2014, from http://vorige.nrc.nl/nieuwsthema/piraterij/article2565802.ece
  • Ong-Webb, G. G. (2007). Piracy in maritime Asia: Current trends. In P. Lehr (Ed.), Violence at Sea: Piracy in the age of global terrorism (pp. 37-93). London: Sage.
  • Orsagh, T., & Chen, J.-R. (1988). The effect of time served on recidivism: An interdisciplinary theory. Journal of Quantitative Criminology, 4, 155-171.10.1007/BF01062871
  • Petrossian, G., & Clarke, R. V. (2014). Explaining and controlling illegal commercial fishing: An application of the CRAVED theft model. British Journal of Criminology, 54, 73-90.10.1093/bjc/azt061
  • Pires, S. F., & Clarke, R. V. (2011). Sequential foraging, itinerant fences and parrot poaching in Bolivia. British Journal of Criminology, 51, 314-335.10.1093/bjc/azq074
  • Pires, S. F., & Clarke, R. V. (2012). Are parrots CRAVED? An analysis of parrot poaching in Mexico. Journal of Research in Crime and Delinquency, 49, 122-146.10.1177/0022427810397950
  • Ploch, L. (2010). Piracy off the Horn of Africa. Darby, PA: DIANE Publishing.
  • Poyner, B. (1994). Lessons from lisson green: An evaluation of walkway demolition on a british housing estate. In R. V. Clarke (Ed.), Crime prevention studies (Vol. 3, pp. 127-150). Monsey, NY: Criminal Justice Press.
  • Psarros, G., Christiansen, A. F., Skjong, R., & Gravir, G. (2011). On the success rates of maritime piracy attacks. Journal of Transportation Security, 4, 309-335.10.1007/s12198-011-0073-4
  • Rengelink, H. (2012). Tackling Somali piracy. Trends in Organized Crime, 15, 180-197.10.1007/s12117-012-9171-3
  • Reppetto, T. A. (1974). Residential Crime. Cambridge, MA: Ballinger.
  • Rotberg, R. (2003). When states fail: Causes and consequences. Princeton, NJ: Princeton University Press.
  • Rothe, D. L., & Collins, V. E. (2011). Got a band-aid? Political discourse, militarized responses, and the Somalia pirate. Contemporary Justice Review, 14, 329-343.10.1080/10282580.2011.589669
  • Salopek, P. (2013, April 25). A hidden victim of Somali pirates: Science. National Geographic News.
  • Scarr, H. A. (1973). Patterns of burglary (2nd ed.). Washington, DC: US Department of Justice, National Institute of Justice Law Enforcement and Criminal Justice.
  • Schnelle, J., Kirchner, R., Galbaugh, F., Domash, M., Carr, A., & Larson, L. (1979). Program evaluation research: An experimental cost-effectiveness analysis of an armed robbery intervention program. Journal of Applied Behavior Analysis, 12, 615-623.10.1901/jaba.1979.12-615
  • Sherman, L., & Rogan, D. (1995). Effects of gun seizures on gun violence: ‘Hot spots’ patrol in Kansas city. Justice Quarterly, 12, 673-693.10.1080/07418829500096241
  • Sterio, M. (2011). The Somali piracy problem: A global puzzle necessitating a global solution. American University Law Review, 59, 1149-1497.
  • Storey, J. E., Kropp, P. R., Hart, S. D., Belfrage, H., & Strand, S. (2014). Assessment and management of risk for intimate partner violence by police officers using the brief spousal assault form for the evaluation of risk. Criminal Justice and Behavior, 41, 256-271.10.1177/0093854813503960
  • Sullivan, A. K. (2010). Piracy in the Horn of Africa and its effects on the global supply chain. Journal of Transportation Security, 3, 231-243.10.1007/s12198-010-0049-9
  • Takeyh, R., & Gvosdev, N. (2002). Do terrorist networks need a home? The Washington Quarterly, 25, 97-108.
  • Talley, W. K., & Rule, E. M. (2008). Piracy in shipping. In W. K. Talley (Ed.), Maritime Safety, Security and Piracy (pp. 89-101). London: Sage.
  • The American Journal of International Law. (2010). Eleven from Somalia to be tried for piracy in federal court in Virginia; Maersk Alabama pirate pleads guilty; United States supports Russian piracy resolution. The American Journal of International Law, 1, 500-501.
  • The World Bank. (2013). The pirates of Somalia: Ending the threat, rebuilding a nation. Washington, DC: International Bank for Reconstruction and Development.
  • Tizard, J. (1976). Psychology and social policy. Bulletin of the British Psychological Society, 29, 225-233.
  • Townsley, M., & Oliverira, A. (2012, 19 November). Space-time dynamics of maritime piracy. Security Journal, 1-13. Online publication. doi:10.1057/sj.2012.45
  • Umana, F. (2013, June 24). The recovery of Somalia: Check back with us again next year. Fund for peace, failed states index. Retrieved January 30, 2014, from http://library.fundforpeace.org/fsi13-somalia
  • US Government Accountability Office. (2010, September). Maritime security: Actions needed to assess and update plan and enhance collaboration among partners involved in countering piracy off the Horn of Africa. Washington, DC: GAO.
  • US National Security Council. (2007). Countering piracy off the Horn of Africa: Partnership & action plan. Washington, DC: National Security Council.
  • Vagg, J. (1995). Rough seas? Contemporary piracy in southeast Asia. British Journal of Criminology, 35, 63-80.
  • van Creveld, M. (1991). Transformation of war. New York, NY: Free Press.
  • Wallis, A., & Ford, D. (1980). Crime prevention through environmental design: The school demonstration in Broward county, Florida. Washington, DC: US Department of Justice, National Institute of Justice.
  • Wilkins, L. T. (1964). Social deviance. London: Tavistock.
  • Wong, M. C., & Tsz Leung, Y. (2012). Maritime piracy: An analysis of attacks and violence. International Journal of Shipping and Transport Logistics, 4, 306-322.10.1504/IJSTL.2012.049315
  • Woolf, M. (2008, April 13). Pirates can claim UK asylum. The Sunday Times. Retrieved January 8, 2014, from http://www.thesundaytimes.co.uk/sto/news/uk_news/article84478.ece
  • Worrall, J. L. (2000). The routine activities of maritime piracy. Security Journal, 13, 35-52.10.1057/palgrave.sj.8340064
  • Young, A. J., & Valencia, M. J. (2003). Conflation of piracy and terrorism in Southeast Asia: Rectitude and utility. Contemporary Southeast Asia, 25, 269-283.10.1355/CS25-2E
  • Zou, K. (2009). New developments in the international law of piracy. Chinese Journal of International Law, 8, 323-345.10.1093/chinesejil/jmp006

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.