Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | p. xi |
About the Author | p. xvii |
The Universe of Transnational Crime | p. 1 |
Types of Transnational Crime | p. 3 |
The Ethnicity Trap and Transnational Crime | p. 5 |
Criminal Networks Versus Formal Organizations | p. 6 |
Drug Trafficking | p. 11 |
The Nature of Transnational Drug Trafficking | p. 12 |
The Volume of Drug Trafficking | p. 13 |
Assessing Drug Trafficking Trends | p. 16 |
Focusing on Drug Markets Versus Drugs and Drug Traffickers | p. 17 |
The Legalization Argument and Drug Trafficking | p. 21 |
Drug Use and the Ultimate Solution | p. 22 |
Stolen Property | p. 25 |
Typology of Stolen Property Crimes | p. 25 |
Trafficking in Stolen Consumer Goods | p. 26 |
Weapons Trafficking | p. 27 |
Antiquities and Art | p. 29 |
Natural Resources | p. 31 |
The Essential Enabler for Stolen Property Trafficking | p. 34 |
Counterfeiting | p. 38 |
The Nature of Counterfeiting and Forgery | p. 39 |
The Extent of Counterfeiting and Forgery | p. 40 |
The Harms of Counterfeiting | p. 42 |
Counterfeiting Enforcement | p. 43 |
Counterfeiting Prevention | p. 45 |
Human Trafficking | p. 49 |
What Is Human Trafficking? | p. 49 |
Extrapolating Risk | p. 53 |
A Criminal Enterprise Approach | p. 54 |
Recruiters, Transporters, and Exploiters | p. 57 |
Combining Victim Risk Assessments with Criminal Enterprises | p. 60 |
The Future of Human Trafficking | p. 61 |
Fraud and Cybercrime | p. 66 |
Changes in Property Ownership and Storage | p. 67 |
The Movement of Property | p. 68 |
The Extent of Fraud | p. 69 |
Protecting Property from Larceny | p. 71 |
Crime Prevention Technology Reacts to Criminal Technology | p. 74 |
The Causes and Prevention of Theft and Fraud | p. 75 |
Commercial Vices: Obscenity and Pornography | p. 78 |
Defining Obscenity and Pornography | p. 78 |
How Much Obscenity Is There? | p. 79 |
The Pornography-Harm Link | p. 81 |
The Rise of the Internet | p. 84 |
New Approaches to an Old Problem | p. 85 |
Obscenity: From Sex to Violence | p. 87 |
Why Is Pornography So Popular? | p. 88 |
Extortion and Racketeering | p. 92 |
Infiltration of Business | p. 93 |
The Nature of Extortion | p. 94 |
Protection Rackets | p. 95 |
What Is a Racketeer? | p. 98 |
Hidden Ownership and Ancillary Enterprises | p. 100 |
The Secretive Nature of Criminal Enterprises | p. 103 |
Money Laundering | p. 108 |
The Dimensions of Money Laundering | p. 109 |
Problems of Anti-Money-Laundering Compliance | p. 112 |
Asset Forfeiture | p. 115 |
The Boundaries of Asset Seizure | p. 116 |
Pressures Countering Anti-Money-Laundering Efforts | p. 120 |
Corruption and the Future | p. 125 |
What Is Corruption? | p. 126 |
Costs of Corruption | p. 127 |
How Does Corruption Flourish? | p. 128 |
How Much Corruption Is There? | p. 129 |
Enforcing Anti-Corruption Measures | p. 131 |
The Future: Can Corruption Be Reduced or Eliminated? | p. 133 |
Glossary | p. 142 |
Index | p. 151 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.