More New and Used
from Private Sellers
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Questions About This Book?
Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the edition with a publication date of 1/12/2011.
What is included with this book?
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
Transnational crime is to the early twenty-first century what city gangs and Al Capone were to the early twentieth century. InTransnational Crime and the 21st Century: Criminal Enterprise, Corruption, and Opportunity,noted criminologist Jay S. Albanese uses case studies, interviews, and the most up-to-date research to explore the connections between transnational crime and organized crime. A concise and affordable supplement for courses in comparative, international, and organized crime, this provocative text offers students a solid basis for understanding the nature of transnational crime. FEATURES * Uses clear, straightforward language,making the text accessible to students of all levels * Categorizes crimes bytype(rather than by topic) in order to help students better grasp the interrelationships between transnational and organized crime * Examines the nine most serious forms of transnational crime:drug trafficking, stolen property, counterfeiting, human trafficking, fraud and cybercrime, commercialized sex, extortion and racketeering, money laundering, and corruption * Proposes concrete solutionsfor preventing organized crime syndicates and networks * Takes a systematic approachto risk assessment, delving into the factors that generate illicit markets and allow criminals to be successful
Jay S. Albanese is a criminologist and professor in the Wilder School of Government and Public Affairs at Virginia Commonwealth University.
Table of Contents
|About the Author||p. xvii|
|The Universe of Transnational Crime||p. 1|
|Types of Transnational Crime||p. 3|
|The Ethnicity Trap and Transnational Crime||p. 5|
|Criminal Networks Versus Formal Organizations||p. 6|
|Drug Trafficking||p. 11|
|The Nature of Transnational Drug Trafficking||p. 12|
|The Volume of Drug Trafficking||p. 13|
|Assessing Drug Trafficking Trends||p. 16|
|Focusing on Drug Markets Versus Drugs and Drug Traffickers||p. 17|
|The Legalization Argument and Drug Trafficking||p. 21|
|Drug Use and the Ultimate Solution||p. 22|
|Stolen Property||p. 25|
|Typology of Stolen Property Crimes||p. 25|
|Trafficking in Stolen Consumer Goods||p. 26|
|Weapons Trafficking||p. 27|
|Antiquities and Art||p. 29|
|Natural Resources||p. 31|
|The Essential Enabler for Stolen Property Trafficking||p. 34|
|The Nature of Counterfeiting and Forgery||p. 39|
|The Extent of Counterfeiting and Forgery||p. 40|
|The Harms of Counterfeiting||p. 42|
|Counterfeiting Enforcement||p. 43|
|Counterfeiting Prevention||p. 45|
|Human Trafficking||p. 49|
|What Is Human Trafficking?||p. 49|
|Extrapolating Risk||p. 53|
|A Criminal Enterprise Approach||p. 54|
|Recruiters, Transporters, and Exploiters||p. 57|
|Combining Victim Risk Assessments with Criminal Enterprises||p. 60|
|The Future of Human Trafficking||p. 61|
|Fraud and Cybercrime||p. 66|
|Changes in Property Ownership and Storage||p. 67|
|The Movement of Property||p. 68|
|The Extent of Fraud||p. 69|
|Protecting Property from Larceny||p. 71|
|Crime Prevention Technology Reacts to Criminal Technology||p. 74|
|The Causes and Prevention of Theft and Fraud||p. 75|
|Commercial Vices: Obscenity and Pornography||p. 78|
|Defining Obscenity and Pornography||p. 78|
|How Much Obscenity Is There?||p. 79|
|The Pornography-Harm Link||p. 81|
|The Rise of the Internet||p. 84|
|New Approaches to an Old Problem||p. 85|
|Obscenity: From Sex to Violence||p. 87|
|Why Is Pornography So Popular?||p. 88|
|Extortion and Racketeering||p. 92|
|Infiltration of Business||p. 93|
|The Nature of Extortion||p. 94|
|Protection Rackets||p. 95|
|What Is a Racketeer?||p. 98|
|Hidden Ownership and Ancillary Enterprises||p. 100|
|The Secretive Nature of Criminal Enterprises||p. 103|
|Money Laundering||p. 108|
|The Dimensions of Money Laundering||p. 109|
|Problems of Anti-Money-Laundering Compliance||p. 112|
|Asset Forfeiture||p. 115|
|The Boundaries of Asset Seizure||p. 116|
|Pressures Countering Anti-Money-Laundering Efforts||p. 120|
|Corruption and the Future||p. 125|
|What Is Corruption?||p. 126|
|Costs of Corruption||p. 127|
|How Does Corruption Flourish?||p. 128|
|How Much Corruption Is There?||p. 129|
|Enforcing Anti-Corruption Measures||p. 131|
|The Future: Can Corruption Be Reduced or Eliminated?||p. 133|
|Table of Contents provided by Ingram. All Rights Reserved.|