Sie sind auf Seite 1von 2

Physical Security 1

Introduction

In this technological age, everyone is well connected with each other via a mobile communication
device; either a pager, a mobile phone or a portable laptop. We have seen these devices evolving
through time, changing its size and weight to something which is more discreet and mobile. On
top of these significant changes, prices for these devices have spiraled down to an affordable level,
making it available to the masses. Due to its affordability, these things that were once thought to
be a want have changed into a need for the public.

These significant changes of public lifestyle have sparked a new kind of crime wave that targeted
to these techno-savvy users. Theft crimes have grown gradually over these few years, sparking a
growing concern for law makers. Some victims are a random target while others are chosen
specifically for the data which they have in their devices.

laptop and mobile device theft now contributes towards 50% of loss for an organization
as a result of crime. This figure has increased by 3% from 2006. Based on feedback from
the 194 respondents surveyed, this is an estimated total of US$ 3,881,150 in losses and an
estimated 20 thousand US dollars worth of loss per organization. An additional loss of
US$4,548,000 (an estimated average of US$23,443 per organization) is further suffered
due to theft of confidential information and proprietary information as a consequence of
laptop and mobile device theft.(Annual Computer Crime and Security Survey (CSI
Survey 2007))

The excerpt above depicted the loss in millions for a survey conducted in the United States. It state
that the loss of information due to theft are much more costly compared to the device it self. But
how does theft for these devices occur frequently and not be brought aware to the public? Let us
look at a few reasons why and how these demographics have risen over the years and how the
public are able to counter this crime and not be part of the statistics.

Rational Choice Perspective and Routine Activity Theory

These reasons (discussed later in page 2) have gave us the insights that drives the offenders to
become criminals, the rational in stealing a mobile phone or a laptop and the different kind of
rewards that maybe reaped from these crimes. But how do these crimes actually happen?

Criminologist derived theories of crimes to better understand crimes and the criminal offenders.
The two best known theories are Routine Activity Theory (Cohen and Felson, 1979) and the
Rational Choice Perspective (Cornish and Clarke, 1986).

Let us take a look on how these devices could end up in the hands of the criminals. Routine
Activity Theory states that criminal offences are related to the nature of everyday patterns of
social interaction. In addition, it states that for a crime to happen, the following must be present at
the same place and at the same time:
A suitable target (a laptop or a mobile device)
A potential offender (thief or robber; a criminal)
The absence of an effective guardian (unguarded; not being around the target)

The Rational Choice Perspective tries to understand crime from the perspective of the offender.
Examples of questions below need to be asks and analyze:

What is the offender seeking by committing crime?


How do offenders decide to commit particular crimes?
How do they weigh the risks and rewards involved in these crimes?
How do they set about committing them?

It should be clear from these questions that the Rational Choice Perspective is directly concerned
with the thinking processes of offenders, how they evaluate criminal opportunities and why they
decide to do one thing rather than another. Below are a few examples on how these theories come
into play during the theft of laptops and mobile devices took place.

Das könnte Ihnen auch gefallen