References
- Becker, H. S. (1962). Outsiders: Studies in the sociology of deviance. Glencoe: The Free Press.
- Bendall, H. (2010). Cost of piracy: A comparative voyage approach. Maritime Economics and Logistics, 12, 178-195.10.1057/mel.2010.1
- BMP4. (2011). Best management practices for protection against Somalia based piracy. London: Witherby Publishing.
- Bodini, S. P. (2011). Fighting maritime piracy under the European convention on human rights. European Journal of International Law, 22, 829-848.10.1093/ejil/chr052
- Bowden, A. (2010, December). The economic cost of maritime piracy. One Earth Future Working Paper.
- Braga, A., Weisburd, D., Waring, E., Green Mazerolle, L., & Gajewski, F. (1999). Problem-oriented policing in violent crime places: A randomized controlled experiment. Criminology, 37, 541-580.
- Brantingham, P., & Brantingham, P. (1975). The spatial patterning of burglary. The Howard Journal of Criminal Justice, 14, 11-23.
- Brantingham, P., & Brantingham, P. (1984). Patterns in crime. New York, NY: Macmillan.
- Brantingham, P., & Brantingham, P. (1993). Nodes, paths and edges: Considerations on the complexity of crime and the physical environment. Journal of Environmental Psychology, 13, 3-28.10.1016/S0272-4944(05)80212-9
- Bullock, K., Clarke, R., & Tilley, N. (2010). Situational prevention of organised crimes. Cullompton: Willan Publishing.
- Burt, C. (1925). The young delinquent. London: University of London Press.
- Carney, S. (2009). Cutthroat capitalism: An economic analysis of the Somali pirate business model. Wired Magazine. Retrieved February 13, 2013, from http://www.wired.com/politics/security/magazine/17-07/ff_somali_pirates
- Chalk, P. (2009). Maritime Piracy: Reasons, Dangers, and Solutions. Testimony before the Committee on Transportation and Infrastructure, Subcommittee on Coast Guard and Maritime Transportation. U.S. House of Representatives, February 4. Santa Monica, CA: RAND.
- Chalk, P. (2010). Piracy off the horn of Africa: Scope, dimensions, causes and responses. Brown Journal of World Affairs, 16, 89-108.
- Chang, D. (2010). Piracy laws and the effective prosecution of pirates. Boston College International and Comparative Law Review, 33, 273-288. Retrieved January 30, 2014, from http://lawdigitalcommons.bc.edu/iclr/vol33/iss2/3
- Childress, S. (2010, September 12). Somali militants try piracy to fund attacks. The Wall Street Journal. Retrieved April 16, from http://online.wsj.com/news/articles/SB10001424052748703720004575477491009472882
- Clarke, R. V. (1980). ‘Situational’ crime prevention: Theory and practice. British Journal of Criminology, 20, 136-147.
- Clarke, R. V. (1997). Situational crime prevention: Successful case studies. Albany, NY: Harrow and Heston.
- Clarke, R. V., & Eck, J. E. (2005). Crime analysis for problem solvers in 60 small steps. Office of Community Oriented Policing Services. Washington, DC: US Department of Justice.
- Clifton, W. (1993). Convenience store robberies in Gainesville, Florida: An intervention strategy by the Gainesville police department. Gainesville, FL: Gainesville Police Department.
- Coggins, B. (2012). Global patterns of maritime piracy, 2000–09: Introducing a new dataset. Journal of Peace Research, 49, 605-617.10.1177/0022343312442520
- Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608.10.2307/2094589
- Cornish, D. (1994). The procedural analysis of offending and its relevance for situational prevention. Crime Prevention Studies, 3, 151-196.
- Cornish, D., & Clarke, R. V. (Eds.). (1986). The reasoning criminal. New York, NY: Springer-Verlag.
- Cornish, D., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In M. Smith & D. B. Cornish (Eds.), Theory for situational crime prevention: Crime prevention studies (Vol. 16, pp. 41-96). Monsey, NY: Criminal Justice Press.
- Cowell, A. (2009, November 18). Pirates attack Maersk Alabama again. New York Times.
- Cullen, F. T., & Agnew, R. (2006). Criminological theory past to present: Essential readings (3rd ed.). Los Angeles, CA: Roxbury.
- Cusson, M. (1993). Situational deterrence: Fear during the criminal event. Crime Prevention Studies, 1, 55-68.
- Dahlavang, N. (2006). Thieves, robbers & terrorists: Piracy in the 21st century. Regent Journal of International Law, 4, 17-45.
- Doob, A., & Webster, C. (2003). Sentence severity and crime: Accepting the null hypotheses. Crime and Justice, 30, 143-195.
- Dutton, Y. M. (2012). Maritime piracy and the impunity gap: Insufficient national laws or a lack of political will? Tulane Law Review, 86, 1111-11162.
- Echevarria, A. J., II (2005). Fourth-generation warfare and other myths. Washington, DC: Strategic Policy Studies.
- Ekblom, P. (1997). Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk, Security and Crime Prevention, 2, 249-265.
- Elbeck, M., & Tirtiroglu, E. (2010). The threat of piracy on maritime transportation. International Journal of Society Systems Science, 2, 125-133.10.1504/IJSSS.2010.032571
- Farrington, D. P., & Knight, B. J. (1980). Stealing from a ‘Lost’ letter: Effects of victim characteristics. Criminal Justice and Behavior, 7, 423-436.10.1177/009385488000700406
- Felson, M. (1994). Crime and everyday life: Insight and implications for society. Thousand Oaks, CA: Pine Forge Press.
- Felson, M. (2006). Crime and nature. Thousand Oaks, CA: Sage.
- Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief: Practical theory for crime prevention. Police Research Series, Paper 98. London: Home Office.
- Felson, M., & Cohen, L. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8, 389-406.10.1007/BF01561001
- Field, A. P. (2009). Discovering statistics using SPSS (3rd ed.). London: Sage.
- Fokas, T. (1997). The Barbary Coast revisited: The resurgence of international maritime piracy. University of San Francisco Maritime Law Journal, 9, 427-460.
- Forsyth, C. J., Gisclair, K. H., & Forsyth, Y. A. (2009). Waterborne crime: Examining contemporary piracy. Deviant Behavior, 30, 669-679.10.1080/01639620902797655
- Gill, M. (1996). Security at sea: Fraud, piracy and the failure of police cooperation internationally. International Relations, 13, 43-58.10.1177/004711789601300304
- Goldstein, H. (1979). Improving policing: A problem-oriented approach. Crime & Delinquency, 25, 236-258.
- Guerette, R., & Clarke, R. V. (2003). Product life cycles and crime: Automated teller machines and robbery. Security Journal, 16, 7-18.10.1057/palgrave.sj.8340122
- Guilfoyle, D. (2010). The laws of war and the fight against Somali piracy: Combatants or criminals? Melbourne Journal of International Law, 11, 1-13.
- Hartshorne, M., & May, M. A. (1928). Studies in the nature of character. New York, NY: Macmillan.
- Hassall, C., & Trethowan, W. H. (1972). Suicide in Birmingham. British Medical Journal, 1, 717-718.10.1136/bmj.1.5802.717
- Hawkins, O. (2009, March 10). What to do with a captured pirate. BBC News.
- Helfman, T. (2012). Marauders in the courts: Why the federal courts have got the problem of maritime piracy (partly) wrong. Syracuse Law Review, 62, 53-74.
- Holt, T. J., Blevins, K. R., & Kuhns, J. B. (2008). Examining the displacement practices of johns with on-line data. Journal of Criminal Justice, 36, 522-528.10.1016/j.jcrimjus.2008.09.009
- Hong, N., & Ng, A. (2010). The international legal instruments in addressing piracy and maritime terrorism: A critical review. Research in Transportation Economics, 27, 51-60.10.1016/j.retrec.2009.12.007
- Hope, T., & Murphy, D. (1983). Problems of implementing crime prevention: The experience of a demonstration project. The Howard Journal of Criminal Justice, 22, 38-50.10.1111/hojo.1983.22.issue-1-3
- Huang, H. (2010). Who are sea cutthroats? A typological analysis of pirates. Crime, Law and Social Change, 53, 277-298.10.1007/s10611-009-9225-x
- International Maritime Bureau. (2011). Piracy and armed robbery against ships, 1 January–31 December 2011. London: ICC-IMB.
- Jablonski, R. S., & Oliver, S. (2013). The political economy of plunder: Economic opportunity and modern piracy. Journal of Conflict Resolution, 57, 682-708.10.1177/0022002712448907
- Jacob, H. (1984). Using published data. Sage University Paper 42. London: Sage.10.4135/9781412986472
- Kock, R. (1999). 80–20 principle: The secret to success by achieving more with less. New York, NY: Doubleday.
- Kraska, J., & Wilson, B. (2011, February 23). Combatting piracy in international waters. World Policy Institute.
- Landes, W. (1978). An economic study of U.S. aircraft hijacking, 1961–1976. The Journal of Law and Economics, 21(1), 1-31.10.1086/jle.1978.21.issue-1
- Lasley, J. (1998). ‘Designing Out’ gang homicides and street assaults. Research in Brief. Washington, DC: US Department of Justice, National Institute of Justice.
- Lay, K., & Johnston, K. (2014, June 25). Kidnapped ship’s captain told ransoms may be funneled to Boko Haram. CNN.com
- Lemieux, A., & Clarke, R. V. (2009). The international ban on ivory sales and its effect on elephant poaching in Africa. British Journal of Criminology, 49, 451-471.10.1093/bjc/azp030
- Liao, T. F. (1994). Interpreting probability models: Logit, probit, and other generalized linear models (Vol. 101). Thousand Oaks, CA: Sage.
- Lind, W. S., Nightengale, K., Schmitt, J. F., Sutton, J. W., & Wilson, G. I. (1989, October). The changing face of war: Into the fourth generation (pp. 22-26). Marine Corps Gazette.
- Loomis, D., Marshall, S., Wolf, S., Runyan, C., & Butts, J. (2002). Effectiveness of safety measures recommended for prevention of workplace homicide. Journal of American Medical Association, 287, 1011-1017.10.1001/jama.287.8.1011
- Lough, R. (2011, July 6). Piracy ransom cash ends up with Somali militants. Nairobi: Reuters.
- Marchione, E., & Johnson, S. (2013). Spatial, temporal and spatio-temporal patterns of maritime piracy. Journal of Research in Crime & Delinquency, 50, 504-524.
- Meyers, L. S., Gamst, G., & Guarino, A. J. (2006). Advanced and multivariate research: Design and interpretation. Thousand Oaks, CA: Sage.
- Murphy, M. (2007). Contemporary piracy and maritime terrorism. London: Routledge.
- Murphy, M. (2008). Piracy and the exploitation of sanctuary. In J. Norwitz (Ed.), Armed groups: Studies in national security, counterterrorism, and counterinsurgency (pp. 161-173). Newport, RI: US Naval War College.
- Murphy, M. (2009). Small boats, weak states, dirty money: The challenge of piracy. New York, NY: Columbia University Press.
- Murphy, M. (2011a). Somalia, the new barbary? Piracy and Islam in the Horn of Africa. New York, NY: Columbia University Press.
- Murphy, M. (2011b). Somali piracy: Political lessons for the navy. American Foreign Policy Interests, 33, 17-25.10.1080/10803920.2011.550238
- Myburgh, P. (2002). Categorising horror: Marine insurance coverage and terrorism. Maritime Studies, 126, 1-9. Retrieved February 1, 2013, from http://www.maritimelaw.org.nz/myburgh/Horror.pdf
- Neisser, U. (1976). Cognition and reality: Principles and implications of cognitive psychology. San Francisco, CA: Freeman.
- Nelson, J. E. (2010). Ocean piracy. New York, NY: Nova Science.
- NRC Handelsblad. (2010, June 17). Vijf jaar cel voor Somalische piraten” [Five years’ imprisonment for Somali pirates]. Retrieved April 16, 2014, from http://vorige.nrc.nl/nieuwsthema/piraterij/article2565802.ece
- Ong-Webb, G. G. (2007). Piracy in maritime Asia: Current trends. In P. Lehr (Ed.), Violence at Sea: Piracy in the age of global terrorism (pp. 37-93). London: Sage.
- Orsagh, T., & Chen, J.-R. (1988). The effect of time served on recidivism: An interdisciplinary theory. Journal of Quantitative Criminology, 4, 155-171.10.1007/BF01062871
- Petrossian, G., & Clarke, R. V. (2014). Explaining and controlling illegal commercial fishing: An application of the CRAVED theft model. British Journal of Criminology, 54, 73-90.10.1093/bjc/azt061
- Pires, S. F., & Clarke, R. V. (2011). Sequential foraging, itinerant fences and parrot poaching in Bolivia. British Journal of Criminology, 51, 314-335.10.1093/bjc/azq074
- Pires, S. F., & Clarke, R. V. (2012). Are parrots CRAVED? An analysis of parrot poaching in Mexico. Journal of Research in Crime and Delinquency, 49, 122-146.10.1177/0022427810397950
- Ploch, L. (2010). Piracy off the Horn of Africa. Darby, PA: DIANE Publishing.
- Poyner, B. (1994). Lessons from lisson green: An evaluation of walkway demolition on a british housing estate. In R. V. Clarke (Ed.), Crime prevention studies (Vol. 3, pp. 127-150). Monsey, NY: Criminal Justice Press.
- Psarros, G., Christiansen, A. F., Skjong, R., & Gravir, G. (2011). On the success rates of maritime piracy attacks. Journal of Transportation Security, 4, 309-335.10.1007/s12198-011-0073-4
- Rengelink, H. (2012). Tackling Somali piracy. Trends in Organized Crime, 15, 180-197.10.1007/s12117-012-9171-3
- Reppetto, T. A. (1974). Residential Crime. Cambridge, MA: Ballinger.
- Rotberg, R. (2003). When states fail: Causes and consequences. Princeton, NJ: Princeton University Press.
- Rothe, D. L., & Collins, V. E. (2011). Got a band-aid? Political discourse, militarized responses, and the Somalia pirate. Contemporary Justice Review, 14, 329-343.10.1080/10282580.2011.589669
- Salopek, P. (2013, April 25). A hidden victim of Somali pirates: Science. National Geographic News.
- Scarr, H. A. (1973). Patterns of burglary (2nd ed.). Washington, DC: US Department of Justice, National Institute of Justice Law Enforcement and Criminal Justice.
- Schnelle, J., Kirchner, R., Galbaugh, F., Domash, M., Carr, A., & Larson, L. (1979). Program evaluation research: An experimental cost-effectiveness analysis of an armed robbery intervention program. Journal of Applied Behavior Analysis, 12, 615-623.10.1901/jaba.1979.12-615
- Sherman, L., & Rogan, D. (1995). Effects of gun seizures on gun violence: ‘Hot spots’ patrol in Kansas city. Justice Quarterly, 12, 673-693.10.1080/07418829500096241
- Sterio, M. (2011). The Somali piracy problem: A global puzzle necessitating a global solution. American University Law Review, 59, 1149-1497.
- Storey, J. E., Kropp, P. R., Hart, S. D., Belfrage, H., & Strand, S. (2014). Assessment and management of risk for intimate partner violence by police officers using the brief spousal assault form for the evaluation of risk. Criminal Justice and Behavior, 41, 256-271.10.1177/0093854813503960
- Sullivan, A. K. (2010). Piracy in the Horn of Africa and its effects on the global supply chain. Journal of Transportation Security, 3, 231-243.10.1007/s12198-010-0049-9
- Takeyh, R., & Gvosdev, N. (2002). Do terrorist networks need a home? The Washington Quarterly, 25, 97-108.
- Talley, W. K., & Rule, E. M. (2008). Piracy in shipping. In W. K. Talley (Ed.), Maritime Safety, Security and Piracy (pp. 89-101). London: Sage.
- The American Journal of International Law. (2010). Eleven from Somalia to be tried for piracy in federal court in Virginia; Maersk Alabama pirate pleads guilty; United States supports Russian piracy resolution. The American Journal of International Law, 1, 500-501.
- The World Bank. (2013). The pirates of Somalia: Ending the threat, rebuilding a nation. Washington, DC: International Bank for Reconstruction and Development.
- Tizard, J. (1976). Psychology and social policy. Bulletin of the British Psychological Society, 29, 225-233.
- Townsley, M., & Oliverira, A. (2012, 19 November). Space-time dynamics of maritime piracy. Security Journal, 1-13. Online publication. doi:10.1057/sj.2012.45
- Umana, F. (2013, June 24). The recovery of Somalia: Check back with us again next year. Fund for peace, failed states index. Retrieved January 30, 2014, from http://library.fundforpeace.org/fsi13-somalia
- US Government Accountability Office. (2010, September). Maritime security: Actions needed to assess and update plan and enhance collaboration among partners involved in countering piracy off the Horn of Africa. Washington, DC: GAO.
- US National Security Council. (2007). Countering piracy off the Horn of Africa: Partnership & action plan. Washington, DC: National Security Council.
- Vagg, J. (1995). Rough seas? Contemporary piracy in southeast Asia. British Journal of Criminology, 35, 63-80.
- van Creveld, M. (1991). Transformation of war. New York, NY: Free Press.
- Wallis, A., & Ford, D. (1980). Crime prevention through environmental design: The school demonstration in Broward county, Florida. Washington, DC: US Department of Justice, National Institute of Justice.
- Wilkins, L. T. (1964). Social deviance. London: Tavistock.
- Wong, M. C., & Tsz Leung, Y. (2012). Maritime piracy: An analysis of attacks and violence. International Journal of Shipping and Transport Logistics, 4, 306-322.10.1504/IJSTL.2012.049315
- Woolf, M. (2008, April 13). Pirates can claim UK asylum. The Sunday Times. Retrieved January 8, 2014, from http://www.thesundaytimes.co.uk/sto/news/uk_news/article84478.ece
- Worrall, J. L. (2000). The routine activities of maritime piracy. Security Journal, 13, 35-52.10.1057/palgrave.sj.8340064
- Young, A. J., & Valencia, M. J. (2003). Conflation of piracy and terrorism in Southeast Asia: Rectitude and utility. Contemporary Southeast Asia, 25, 269-283.10.1355/CS25-2E
- Zou, K. (2009). New developments in the international law of piracy. Chinese Journal of International Law, 8, 323-345.10.1093/chinesejil/jmp006