Routine activity theory: Difference between revisions

Content deleted Content added
adding url for reference
 
(36 intermediate revisions by 18 users not shown)
Line 1:
{{Short description|Theory in criminology}}
{{use mdy dates|date=July 2020}}
 
[[File:Routine activity theory.png|thumb|300px|A graphical model of the routine activity theory. The theory stipulates three necessary conditions for most crime; a likely offender, a suitable target, and the absence of a capable guardian, coming together in time and space. The lack of any of the three elements is sufficient to prevent a crime which requires offender-victim contact.]]
'''Routine activity theory''' is a sub-field of [[crime opportunity theory]] that focuses on situations of crimes. It was first proposed by [[Marcus Felson]] and [[Lawrence E. Cohen]] in their explanation of crime rate changes in the United States between 1947 and 1974.<ref name=":0Cohen Felson Social Change and Crime Rate Trends">{{Citecite journal |last1=Cohen |first1=Lawrence E. |last2=Felson |first2=Marcus|date=1979 |title=Social Change and Crime Rate Trends: A Routine Activity Approach|jstor=2094589 |journal=American Sociological Review |date=1979 |volume=44 |issue=4 |pages=588–608 |doi=10.2307/2094589 |citeseerxjstor=10.1.1.476.36962094589 |oclc=9964473170 }}</ref> The theory has been extensively applied and has become one of the most cited theories in criminology. Unlike criminological theories of criminality, routine activity theory studies crime as an event, closely relates crime to its environment and emphasizes its ecological process,<ref name="Encyclopedia of Theoretical Criminology"/><ref name="Thomas Jeong Wolff Testing Routine Activity Theory">{{cite journal |last1=Thomas |first1=Christopher |last2=Jeong |first2=Jinuk |last3=Wolff |first3=Kevin T |title=Testing Routine Activity Theory: Behavioural Pathways Linking Temperature to Crime |url= https://www.researchgate.net/publication/387118615_Testing_Routine_Activity_Theory_Behavioural_Pathways_Linking_Temperature_to_Crime|journal=The British Journal of Criminology |date=16 December 2024 |doi=10.1093/bjc/azae091 }}</ref> thereby diverting academic attention away from mere offenders.
 
After [[World War II]], the economy of Western countries started to boom and the Welfare states were expanding. Despite this, crime rose significantly during this time. According to Felson and Cohen, the reason for the increase is that the prosperity of contemporary society offers more opportunities for crime to occur. For example, the use of automobiles, on one hand, enables offenders to move more freely to conduct their violations and, on the other hand, provide more targets for theft. Other social changes such as college enrollment, female labor participation, urbanization, suburbanization, and lifestyles all contribute to the supply of opportunities and, subsequently, the occurrence of crime.<ref name=":0"Cohen Felson Social Change and Crime Rate Trends"/>
 
Routine activity theory has its foundation in human ecology and [[rational choice theory]]. Over time, the theory has been extensively employed to study sexual crimes, robberies, cyber crimes, residential burglary and corresponding victimizations, among others. It is also worth noting that, in the study of criminal victimization, the routine activity theory is often regarded as "essentially similar"<ref>{{Citecite book |titlelast1=Garofalo |first1=James |chapter=Reassessing the lifestyle model of criminal victimization |pages=23–42 |editor1-last=GarofaloGottfredson |editor1-first=JMichael R. |publishereditor2-last=SageHirschi |yeareditor2-first=Travis |title=Positive Criminology |date=1987 |___locationpublisher=BeverlySage Hills,Publications |isbn=978-0-608-01455-5 California}}</ref><ref>{{Citecite journal |lastlast1=Maxfield |firstfirst1=Michael G.|date=1987 |title=Lifestyle and Routine Activity Theories of Crime: Empirical Studies of Victimization, Delinquency, and Offender Decision-Making|jstor=23365565 |journal=Journal of Quantitative Criminology |date=1987 |volume=3 |issue=4 |pages=275–282 |id={{INIST|7621465}} |doi=10.1007/BF01066831 |s2cidjstor=14390184523365565 }}</ref> to [[Lifestyle theory|lifestyle theory of criminology]] by {{harvp|Hindelang|Gottfredson|Garofalo|1978}}.<ref>{{cite book |last1=Hindelang |first1=Michael J. |last2=Gottfredson |first2=Michael R. |last3=Garofalo |first3=James |title=Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization |date=1978 |publisher=Ballinger Publishing Company |isbn=978-0-88410-793-4 }}{{pn|date=July 2025}}</ref> More recently, routine activity theory has been empirically evaluated as a mechanism explaining the long-noted association between warmer weather and some types of crime.<ref name="Thomas Jeong Wolff Testing Routine Activity Theory"/>
|Gottfredson|Garofalo|1978}}.<ref>{{Cite book |title=Victims of personal crime: An empirical foundation for a theory of personal victimization. |last1=Hindelang |first1=M. J. |last2=Gottfredson |first2=M. R.|last3=Garofalo|first3=J.|publisher=Ballinger |year=1978|isbn=978-0-88410-793-4 |___location=Cambridge, Massachusetts}}</ref> More recently, routine activity theory has been repeatedly used in multilevel frameworks with [[social disorganization theory]] in understanding various neighborhood crimes.
 
==Theoretical framework==
In routine activity theory, crime is likely to occur when three essential elements of crime converge in space and time: a motivated offender, an attractive target, and the absence of capable guardianship.<ref name=":0"Cohen Felson Social Change and Crime Rate Trends"/><ref name="Social Inequality" />
 
The analytic focus of routine activity theory takes a macro-level view and emphasizes broad-scale shifts in the patterns of victim and offender behavior. It focuses on specific crime events and offender behavior/decisions. Routine activity theory is based on the assumption that crime can be committed by anyone who has the opportunity. The theory also statesimply that victims arecan givenincrease choicesor ondecrease whethertheir torisk beof victimsvictimization mainly by notwhether they placing themselves in situations where a crime can be committed against them.{{cn|date=February 2024}}
 
===Motivated offender===
Motivated offenders are individuals who are not only capable of committing criminal activity, but are willing to do so.<ref>{{Citecite journal |last1=Felson |first1=Marcus |last2=Cohen |first2=Lawrence E.|date=1980 |title=Human Ecology and Crime: A Routine Activity Approach|jstor=4602572 |journal=Human Ecology |date=1980 |volume=8 |issue=4 |pages=389–406 |doi=10.1007/BF01561001 |s2cidjstor=1547384134602572 |bibcode=1980HumEc...8..389F }}</ref> This element that has received the most criticism due to the lack of information regarding what it truly is.<ref name="Encyclopedia of Theoretical Criminology">{{Citecite book |doi=10.1002/9781118517390.wbetc198 |chapter=Routine Activity Theory |last=Miro |first=Fernando |date=January 31, 2014 |title=The Encyclopedia of Theoretical Criminology |editiondate=first2014 |editor-firstlast1=J.Miró Mitchell|first1=Fernando |editor-lastpages=Miller1–7 |isbn=978-10-118470-5173965844-0 |doi=10.1002/9781118517390 |year=20144 }}</ref> A motivated offender can be pointed out as any type of person who has true intent to commit a crime against an individual or property. However, the motivated offender has to be someone who is able to commit the crime, or, in other words, has everything he or she needs to commit a crime, physically, and mentally.<ref name="Encyclopedia of Theoretical Criminology" />
 
===Suitable target===
In Routine Activity Theory, the term 'target' is preferred over the term 'victim', as they might not be present at the scene of the crime. For example, an owner of a television might be away from their home when a burglar decides to target the television for stealing. The television is the target and the owner's absence indicates the absence of a capable guardian, thereby making the crime more likely according to the theory.{{sfn|Felson|Clarke|1998|p=5}} A suitable target is any type of individual or property that the motivated offender can damage or threaten in the easiest way possible.<ref name="Encyclopedia of Theoretical Criminology" /> If a target is suitable, this means that there is a greater chance that the crime can be committed, rather than, a target that is hard to achieve. The acronym VIVA provides four different attributes of what makes a target actually suitable, in the judgement of the offender.<ref name="Encyclopedia of Theoretical Criminology" /> The acronym goes as follows:
 
: V: Value (The value of achieving the target, in a real or symbolic manner)<ref name="Encyclopedia of Theoretical Criminology" />
: I: Inertia (The physical obstacles of the target: weight, height, strength, etc.)<ref name="Encyclopedia of Theoretical Criminology" />
: V: Visibility (The attribute of exposure which solidifies the suitability of the target)<ref name="Encyclopedia of Theoretical Criminology" />
: A: Access (The placement of the individual, or object, that increases, or lessens, the potential risk of the intended attack)<ref name="Encyclopedia of Theoretical Criminology" />
 
: '''V: Value''' (The value of achieving the target, in a real or symbolic manner)<ref name="Encyclopedia of Theoretical Criminology" />
: '''I: Inertia''' (The physical obstacles of the target: weight, height, strength, etc.)<ref name="Encyclopedia of Theoretical Criminology" />
: '''V: Visibility''' (The attribute of exposure which solidifies the suitability of the target)<ref name="Encyclopedia of Theoretical Criminology" />
: '''A: Access''' (The placement of the individual, or object, that increases, or lessens, the potential risk of the intended attack)<ref name="Encyclopedia of Theoretical Criminology" />
 
===Absence of a suitable guardian===
Guardianship canrefers beto a person or an object that is effective in deterring offense tocriminal occuroffenses,<ref name="Social Inequality">{{cite journal |last1=Cohen |first1=Lawrence E. |last2=Kluegel |first2=James R. |last3=Land |first3=Kenneth C. |title=Social Inequality and Predatory Criminal Victimization: An Exposition and Test of A Formal Theory|journal=American Sociological Review|date=1981|volume=46 |issue=5 |pages=505–524|doi=10.2307/2094935 |jstor=2094935 }}</ref> and sometimes crime is stopped by simple presence of guardianship in space and time.<ref>{{Citecite book journal|lastlast1=Felson |firstfirst1=Marcus |datechapter=1995Those Who Discourage Crime |titlepages=Those53–66 who|chapter-url=https://popcenter.asu.edu/sites/default/files/library/CrimePrevention/Volume_04/03-Felson.pdf discourage|editor1-last=Eck crime|journaleditor1-first=John E. |editor2-last=Weisburd |editor2-first=David |title=Crime and Place |date=1995 |series=Crime Prevention Studies |volume=4 |pagespublisher=53–66Criminal Justice Press |isbn=978-1-881798-05-7 }}</ref> A guardian would not necessarily have to be a policeman or a security guard but rather a person whose proximity or presence would lower the chances of a crime happening. This could include a housewife, a doorman, a neighbor or a co-worker. Whilst inadvertent, the presence of a guardian has a powerful impact on the likelihood of a crime taking place. Thus when the guardian is not within the vicinity of the target, the likelihood of a crime occurring is significantly higher.{{sfn|Felson|Clarke|1998|p=4}}
 
==Empirical evidence==
Criminologist {{harvp|Lynch|1987}}, using "___domain-specific" models, demonstrates that occupation-related activities generally have a stronger impact on the risk of victimization at work than sociodemographic characteristics. The specific attributes of activities pursued at work exposure, guardianship, attractiveness—were all related to victimization in ways predicted by activity theory.<ref>{{Citecite journal |lastlast1=Lynch |firstfirst1=James P.|date=1987 |title=Routine Activity and Victimization at Work|jstor=23365566 |journal=Journal of Quantitative Criminology |date=1987 |volume=3 |issue=4 |pages=283–300 |doi=10.1007/BF01066832 |s2cidjstor=14350739423365566 }}</ref> These findings identify specific attributes of occupations that could be modified to reduce the risk of criminal victimization at work. Victimization of workers at work will decline if mobility, public accessibility, and handling of money as part of the occupational role are reduced.
 
In ''A Routine Activity Theory Explanation for Women's Stalking Victimizations'', criminologists {{harvp|Mustaine|Tewksbury|1999}} conducted a self-administered study in the third quarter of 1996 to 861 college or university female students from nine postsecondary institutes from eight states of the US. The study reveals that women's victimization risk of stalking can be explained by individual lifestyle behaviors, including employment, ___location of residence, substance use (drug and alcohol) and self-protection.<ref>{{cite journal |last1=Mustaine |first1=Elizabeth Ehrhardt |last2=Tewksbury |first2=Richard|date=1999 |title=A Routine Activity Theory Explanation for Women's Stalking Victimizations |journal=Violence Against Women |date=January 1999 |volume=5 |issue=1 |pages=43–62 |doi=10.1177/10778019922181149 |pmid=31454870|s2cid=73067179|url=https://semanticscholar.org/paper/877c776d5266702fdf83cb464d242d26e7f98991 }}</ref>
 
{{harvp|Felson|Cohen|1980}} establishes that those who live alone are more likely to be out alone and to have little help in guarding their property, they probably face higher rates of victimization for both personal and property crimes. The 30.6% increase in employed and married female’sfemale's participation rates not only subjects these women to greater risk of attack on their way to and from work, but also leaves their home and car less guarded from illegal entry. The 118% increase in the proportion of the population consisting of female college students places more women at risk of attack when carrying out daily activities as students, since they may be less effectively protected by family or friends.
 
{{harvp|Pratt|Holtfreter|Reisig|2010}} using a sample of 922 adults in Florida show that one's online routine activities, shaped by one's sociodemographic characteristics, strongly shape the person's risk of falling victim of Internet fraud.<ref>{{Citecite journal |last1=Pratt |first1=Travis C. |last2=Holtfreter |first2=Kristy |last3=Reisig |first3=Michael D.|year=2010 |title=Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory |journal=Journal of Research in Crime and Delinquency |date=August 2010 |volume=47 |issue=3 |pages=267–296 |doi=10.1177/0022427810365903|s2cid=146182010 }}</ref> Their findings clearly shed light on the validity of routine activities theory on crimes that targeted Internet users. Using university computer attack data, {{harvp|Maimon|Kamerdze|Cukier|Sobesto|2013}} reveal evidence supporting routine activity theory. They find that the risk of computer attacks increases during university official business hours and that foreign-origin attacks are substantially attributed to the number of foreign network users.<ref>{{Citecite journal |last1=Maimon |first1=D. |last2=Kamerdze |first2=A. |last3=Cukier |first3=M. |last4=Sobesto |first4=B.|date=2013-03-01 |title=Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective |journal=British Journal of Criminology |languagedate=enMarch 2013 |volume=53 |issue=2 |pages=319–343 |doi=10.1093/bjc/azs067|issn=0007-0955 }}</ref>
 
==Criticisms==
Routine activity theory is mainly a macro theory of crime and victimization. It requires motivated offenders, but does not explain how such offenders become motivated.{{cn|date=February 2024}}
 
==See also==
Line 50 ⟶ 49:
 
==References==
{{reflistReflist}}
 
Luo, Xin (Robert); Li, Han; Hu, Qing; and Xu, Heng (2020) "Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective," Journal of the Association for Information Systems: Vol. 21 : Iss. 6 , Article 5.
==Sources==
DOI: 10.17705/1jais.00646
* {{cite book |last1=Felson |first1=Marcus |last2=Clarke |first2=Ronald V |title=Opportunity Makes the Thief: Practical Theory for Crime Prevention |date=1998 |publisher=Home Office, Policing and Reducing Crime Unit, Research, Development and Statistics Directorate |isbn=978-1-84082-159-8 |url=https://popcenter.asu.edu/sites/default/files/opportunity_makes_the_thief.pdf }}
Available at: https://aisel.aisnet.org/jais/vol21/iss6/5
 
==Further reading==
* {{Citecite book |first1ref=Ronald V.none |last1doi=Clarke |first2=Marcus |last2=Felson |date=199310.4324/9781315128788-1 |chapter=Introduction: Criminology, Routine Activity, and Rational Choice |title=Advances in Criminological Theory: Routine Activity and Rational Choice |volumedate=52017 |last1=Clarke |first1=Ronald V. |last2=Felson |first2=Marcus |pages=1–14 |isbn=978-1-315-12878-8 }}
* {{Cite journal |last1=Cohen|first1=Lawrence E.|last2=Felson|first2=Marcus|date=1979|title=Social Change and Crime Rate Trends: A Routine Activity Approach|jstor=2094589|journal=American Sociological Review|volume=44|issue=4|pages=588–608|doi=10.2307/2094589|citeseerx=10.1.1.476.3696}}
* {{Citecite book |lastref=Felsonnone |firstlast1=M.Felson |datefirst1=1994Marcus |title=Crime and everydayEveryday lifeLife: InsightInsights and implicationsImplications for societySociety |___locationdate=Thousand Oaks, CA1994 |publisher=Pine Forge Press |isbn=978-0-08-039902-7 |oclc=1420085852 }}
* {{Cite journal |last1ref=Felsonnone |first1last=MarcusHawdon |last2first=Cohen |first2=LawrenceJ. E. |date=19801999 |title=HumanDaily EcologyRoutines and Crime: AUsing Routine ActivityActivities as Measures of Hirschi's Involvement Approach|jstor=4602572|journal=HumanYouth & Society Ecology|volume=830 |issue=4 |pages=389–406395–415 |doi=10.10071177/BF01561001|s2cid=1547384130044118X99030004001 }}
* {{cite book |ref=none |doi=10.1002/9781118517390 |title=The Encyclopedia of Theoretical Criminology |date=2014 |isbn=978-0-470-65844-4 |editor-last1=Miller |editor-first1=J. Mitchell }}
* {{Cite journal |last=Hawdon |first=J. E. |date=1999 |title=Daily Routines and Crime: Using Routine Activities as Measures of Hirschi's Involvement |journal=Youth & Society |volume=30 |issue=4 |pages=395–415|doi=10.1177/0044118X99030004001 |s2cid=143553735 }}
* {{Citecite journal |lastref=Lynchnone |firstlast1=JamesRountree |first1=P. W. |datelast2=1987Land |titlefirst2=RoutineK. ActivityC. and|last3=Miethe Victimization|first3=T. at WorkD. |jstordate=233655661994 |journaltitle=JournalMacro-micro integration in the study of Quantitativevictimization: A hierarchical logistic model analysis across Seattle neighborhoods |journal=Criminology |volume=332 |issue=43 |pages=283–300387–414 |doi=10.10071111/BF01066832|s2cid=143507394j.1745-9125.1994.tb01159.x }}
* {{Citecite journal|ref=none |last1=Smith |first1=W. R. |lastlast2=MaxfieldFrazee |firstfirst2=MS. G. |last3=Davison |first3=E. L. |date=19872000 |title=LifestyleFurthering the integration of routine activity and Routinesocial Activitydisorganization Theoriestheories: Small units of Crime:analysis Empiricaland Studiesthe study of Victimization,street Delinquency,robbery andas Offendera diffusion process. Decision-making |journal=Journal of Quantitative Criminology |volume=338 |issue=42 |pages=275–282489–524 |doi=10.10071111/BF01066831 |jstor=23365565|s2cid=143901845j.1745-9125.2000.tb00897.x }}
* {{Cite book |title=The Encyclopedia of Theoretical Criminology |edition=first |editor-first=J. Mitchell |editor-last=Miller |isbn=978-1-118-51739-0 |doi=10.1002/9781118517390 |year=2014 |publisher=John Wiley & Sons}}
* {{Cite journal |last1=Pratt|first1=Travis C.|last2=Holtfreter|first2=Kristy|last3=Reisig|first3=Michael D.|year=2010|title=Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory|journal=Journal of Research in Crime and Delinquency|volume=47|issue=3|pages=267–296|doi=10.1177/0022427810365903|s2cid=146182010}}
* {{Cite book |first1=Ronald V. |last1=Clarke |first2=Marcus |last2=Felson |date=1993 |chapter=Introduction: Criminology, Routine Activity, and Rational Choice |title=Advances in Criminological Theory: Routine Activity and Rational Choice |volume=5 |pages=1–14}}
* {{cite journal |last1=Rountree |first1=P. W. |last2=Land |first2=K. C. |last3=Miethe |first3=T. D. |date=1994 |title=Macro‐micro integration in the study of victimization: A hierarchical logistic model analysis across Seattle neighborhoods |journal=Criminology |volume=32 |issue=3 |pages=387–414|doi=10.1111/j.1745-9125.1994.tb01159.x }}
* {{cite journal |last1=Smith |first1=W. R. |last2=Frazee |first2=S. G. |last3=Davison |first3=E. L. |date=2000 |title=Furthering the integration of routine activity and social disorganization theories: Small units of analysis and the study of street robbery as a diffusion process. |journal=Criminology |volume=38 |issue=2 |pages=489–524|doi=10.1111/j.1745-9125.2000.tb00897.x }}
 
[[Category:Criminology]]