{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T00:03:52Z","timestamp":1777507432271,"version":"3.51.4"},"reference-count":66,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000269","name":"Economic and Social Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000269","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/ecrime51433.2020.9493258","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:07:41Z","timestamp":1627420061000},"page":"1-11","source":"Crossref","is-referenced-by-count":6,"title":["Patterns of online repeat victimisation and implications for crime prevention"],"prefix":"10.1109","author":[{"given":"Sara Giro","family":"Correia","sequence":"first","affiliation":[{"name":"Swansea University,HRC School of Law,Swansea,Wales"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Significance testing for proportion of adults who were victims of fraud and computer misuse by personal and household characteristics year ending March 2019 CSEW"},{"key":"ref38","article-title":"Increasingly Everyone&#x2019;s Business: A Progress Report on the Police Response to Domestic Abuse","year":"2015"},{"key":"ref33","article-title":"A Place for Every Crime and Every Crime in its Place","author":"barr","year":"1991","journal-title":"The Distribution of Crime"},{"key":"ref32","first-page":"1","year":"2020","journal-title":"User guide to crime statistics for England and Wales"},{"key":"ref31","year":"0","journal-title":"Crime in England and Wales Annual Trend and Demographic Tables - Year Ending March 2020"},{"key":"ref30","article-title":"Improving estimates of repeat victimisation derived from the Crime Survey for England and Wales","year":"2017","journal-title":"Titchfield"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1086\/449236"},{"key":"ref36","article-title":"Multiple victimisation","author":"genn","year":"1988","journal-title":"Victims of Crime A New Deal?"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.cpcs.8140221"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2011.22"},{"key":"ref60","article-title":"Victims of Fraud Suffer Hotline Blow","year":"2015","journal-title":"Mail on Sunday"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1057\/s41300-018-0051-x"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-019-0099-7"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1375\/acri.40.1.1"},{"key":"ref28","article-title":"Repeat Victimisation in Online Fraud: The &#x2018;ideal&#x2019; and &#x2018;real&#x2019; victims of fraud","author":"hawkins","year":"2019","journal-title":"PhD"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1177\/0004865814521224"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-10-2017-0095"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azy005"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-012-9188-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/1477370818812016"},{"key":"ref2","year":"0","journal-title":"Crime in England and Wales Appendix Tables - Year Ending March 2020"},{"key":"ref1","article-title":"Crime in England and Wales: year ending Sept 2016","year":"2017","journal-title":"Statistical Bulletin"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.bjc.a048138"},{"key":"ref22","author":"farrell","year":"1993","journal-title":"One Bitten Twice Bitten Reapeat Victimisation and its Implications for Crime Prevention"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-008-9055-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/1143014"},{"key":"ref23","author":"sparks","year":"1977","journal-title":"Surveying Victims"},{"key":"ref26","first-page":"77","article-title":"Distributive Justice and the Crime Drop","author":"ignatans","year":"2015","journal-title":"The Criminal Act The Role and Influence of Routine Activity Theory"},{"key":"ref25","author":"hindelang","year":"1978","journal-title":"Victims of Personal Crime an Empirical Foundation for a Theory of Personal Victimisation"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/41.4.595"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2010-017"},{"key":"ref59","article-title":"Broadcasting Support Services call centre goes into administration risking more than 100 jobs","author":"rucki","year":"2018","journal-title":"Manchester Evening News"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1177\/0269758020902890"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.5204\/ijcjsd.v5i4.268"},{"key":"ref56","author":"rea","year":"2014","journal-title":"Designing and conducting survey research A comprehensive guide"},{"key":"ref55","author":"cohen","year":"1988","journal-title":"Statistical Power Analysis for the Behavioral Sciences"},{"key":"ref54","year":"2020","journal-title":"Home Office Counting Rules For Recorded Crime Fraud & Computer Misuse"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44918-8_6"},{"key":"ref52","year":"2020","journal-title":"Record Linkage Functions for Linking and Deduplicating Data Sets"},{"key":"ref10","author":"scholes","year":"2018","journal-title":"The scale and drivers of attrition in reported fraud and cyber crime"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4324\/9781315679877"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.85"},{"key":"ref12","year":"2015","journal-title":"Code of Practice for Victims of Crime"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1057\/s41300-018-0051-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/JCRPP-11-2019-0068"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/13620-004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/026975809200200201"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/police\/pav029"},{"key":"ref18","article-title":"Reducing Repeat Racial Victimisation on an East London Estate","author":"sampson","year":"1991","journal-title":"Crime Detection and Prevention Series"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/police\/paw025"},{"key":"ref4","year":"2006","journal-title":"Fraud Review"},{"key":"ref3","year":"2016","journal-title":"National Cyber Security Strategy 2016&#x2013;2021"},{"key":"ref6","article-title":"Fraud typologies and victims of fraud Literature review","author":"button","year":"2009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azn001"},{"key":"ref8","article-title":"Concentrix: US firm brought in by City of London police to run Action Fraud helpline despite concerns","author":"owen","year":"2015","journal-title":"The Independent"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/0269758017747055"},{"key":"ref49","article-title":"The measurement of fraud and cyber-crime and their implications for crime statistics","author":"flatley","year":"2013","journal-title":"Report to the Crime Statistics Advisory Committee"},{"key":"ref9","first-page":"1","article-title":"Fraud victims failed by police; Hotline staff trained to mislead callers; Vulnerable people labelled as morons; Workers play-fight while taking reports; Computer scoring system decides which cases are investigated","author":"morgan-bentley","year":"2019","journal-title":"The Times"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(04)00067-7"},{"key":"ref45","first-page":"8","article-title":"Repeat Break-and-Enter Victimization: Time Course and Crime Prevention Opportunity","volume":"17","author":"polvi","year":"1990","journal-title":"Journal Of Police Science And Administration"},{"key":"ref48","first-page":"4","article-title":"Administrative Data","author":"newschaffer","year":"2008","journal-title":"Encyclopedia of Epidemiology"},{"key":"ref47","year":"0","journal-title":"Who We Serve"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/43.1.196"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azv131"},{"key":"ref44","article-title":"Victim proneness in repeat victimisation by type of crime","author":"reiss","year":"1980","journal-title":"Indicators of crime and criminal justice Quantitative studies"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.bjc.a048181"}],"event":{"name":"2020 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2020,11,16]]},"end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9493214\/9493247\/09493258.pdf?arnumber=9493258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:57:44Z","timestamp":1659484664000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9493258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/ecrime51433.2020.9493258","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}