Coverart for item
The Resource Hiding in Plain Sight : Deceptive Tactics and the Criminal Victimization Process, by James F. Kenny, (electronic resource)

Hiding in Plain Sight : Deceptive Tactics and the Criminal Victimization Process, by James F. Kenny, (electronic resource)

Label
Hiding in Plain Sight : Deceptive Tactics and the Criminal Victimization Process
Title
Hiding in Plain Sight
Title remainder
Deceptive Tactics and the Criminal Victimization Process
Statement of responsibility
by James F. Kenny
Creator
Subject
Language
eng
Summary
This book examines the role of deceptive tactics in the criminal victimization process, showing how various forms of manipulative aggression can help disguise dangerous advances. The author approaches crime victimization as the final stage in a purposeful, predictable, dynamic, and progressively dangerous process involving interactions between the target and the aggressor. As they prepare for the attack, aggressors may attempt to distract, confuse, and reduce target resistance. While these tactics provide aggressors certain advantages, they can be recognized, anticipated, and managed. By presenting a framework to identify behaviors of concern early in the process, Kenny shows how preventative action can be taken. Proactive intervention may cause aggressors to withdraw before they are fully committed to and confident in their ability to be successful. Those who take steps to reduce vulnerabilities, limit risky behaviors, and avoid dangerous situations can help prevent themselves from being victimized.--
Assigning source
Provided by publisher
http://library.link/vocab/creatorName
Kenny, James F
Image bit depth
0
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Springer eBooks.
http://library.link/vocab/subjectName
  • Criminology
  • Personality
  • Social psychology
  • Psychology, Pathological
  • Emotions
  • Victimology
  • Forensic psychology
Label
Hiding in Plain Sight : Deceptive Tactics and the Criminal Victimization Process, by James F. Kenny, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=https://doi.org/10.1007/978-3-030-26867-1
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Chapter 1: Stronger Than We Think: More Capable Than We Know -- Chapter 2: The Art of Identifying Deception -- Chapter 3: Deception and the Process toward Criminal Victimization -- Chapter 4: Lurking in the Shadows: Stranger Danger & Target Selection -- Chapter 5: "Getting to Know You": Confirming Target Suitability -- Chapter 6: Choosing Familiar Targets: The Devils You Wish You Didn't Know -- Chapter 7: Enticing the Target: Tactics that Fabricating Trust & Reduce Suspicion -- Chapter 8: Setting the Smoke Screen: Tactics that Disguise Criminal Advances -- Chapter 9: Preparing for the Attack: Tactics that Establish Control -- Chapter 10: Removing the Blindfold: Recognizing Deceptive & Dangerous Advances -- Chapter 11: Stopping the Process from Beginning: Avoid Becoming a Target -- Chapter 12: Reestablishing the Balance of Power: Responding to Deceptive and Aggressive Tactics -- Chapter 13: Bystander Intervention: Helping Friends Address Deceptive Advances -- Index
Control code
978-3-030-26867-1
Dimensions
unknown
Edition
1st ed. 2020.
Extent
1 online resource (XIII, 194 pages)
File format
multiple file formats
Form of item
  • online
  • electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783030268671
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
3 illustrations in color.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)1123171809
Label
Hiding in Plain Sight : Deceptive Tactics and the Criminal Victimization Process, by James F. Kenny, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=https://doi.org/10.1007/978-3-030-26867-1
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Chapter 1: Stronger Than We Think: More Capable Than We Know -- Chapter 2: The Art of Identifying Deception -- Chapter 3: Deception and the Process toward Criminal Victimization -- Chapter 4: Lurking in the Shadows: Stranger Danger & Target Selection -- Chapter 5: "Getting to Know You": Confirming Target Suitability -- Chapter 6: Choosing Familiar Targets: The Devils You Wish You Didn't Know -- Chapter 7: Enticing the Target: Tactics that Fabricating Trust & Reduce Suspicion -- Chapter 8: Setting the Smoke Screen: Tactics that Disguise Criminal Advances -- Chapter 9: Preparing for the Attack: Tactics that Establish Control -- Chapter 10: Removing the Blindfold: Recognizing Deceptive & Dangerous Advances -- Chapter 11: Stopping the Process from Beginning: Avoid Becoming a Target -- Chapter 12: Reestablishing the Balance of Power: Responding to Deceptive and Aggressive Tactics -- Chapter 13: Bystander Intervention: Helping Friends Address Deceptive Advances -- Index
Control code
978-3-030-26867-1
Dimensions
unknown
Edition
1st ed. 2020.
Extent
1 online resource (XIII, 194 pages)
File format
multiple file formats
Form of item
  • online
  • electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783030268671
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
3 illustrations in color.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)1123171809

Library Locations

    • Badia FiesolanaBorrow it
      Via dei Roccettini 9, San Domenico di Fiesole, 50014, IT
      43.803074 11.283055
Processing Feedback ...