Program Goals
Crime prevention through environmental design (CPTED) operates on the belief that “the proper design and effective use of the built environment can lead to a reduction in the fear and incidence of crime, and an improvement in quality of life” (Crowe, 2000, 46). This approach to crime prevention hypothesizes that, by changing an individual’s perception of a place, crime can be reduced (Brantingham, Brantingham, and Wong, 1991; Cozens, Saville, and Hillier, 2005) and this can apply to both physical environments and cyber or online computing environments While criminal activity may take place in cyber environments, research has found that many traditional criminal justice policies for reducing cybercrime (such as sanctions) have been ineffective (Fisher, Maimon, and Berenblum, 2021).
The goal of crime prevention in the cyber environment is to prevent hacking, also referred to as system trespassing, the unauthorized access of a computer system with criminal intention (Grabosky, 2001). Therefore, the goal of this intervention was to employ principles of CPTED to reduce crime committed in a cyber environment, specifically focused on reducing system trespassing.
Program Components
CPTED offers a range of nonpunitive methods for reducing crime through the purposeful design of environments. Four key principles of CPTED that have emerged are 1) territoriality, 2) surveillance, 3) access control, and 4) place management (Sohn 2016). Territoriality requires creating and maintaining spatial hierarchies and ensuring that clear, well-recognized boundaries exist between public and private areas (Sutton, Cherney, and White, 2008). Surveillance aims to increase the perceived risks associated with offending by increasing the perception that all actions in a space will be observed (Sutton, Cherney, and White, 2008, 63). Access control strategies aim to encourage, restrict, and channel activities while denying access to those who have the potential to commit a crime (Sutton, Cherney, and White, 2008).
Finally, place management (which is the focus of the CrimeSolutions review) relies on the concept that management and maintenance of the physical environment send cues to those using the space. If a place appears not to be maintained, it is less likely to encourage legitimate use. Therefore, this strategy involves direct or indirect evidence to users that there is ownership over the space, and someone will take action against wrongdoing. In the physical environment, this involves keeping public spaces clean and rapidly repairing any vandalism and graffiti. An example of place management in the cyber environment is presenting trespassers with a banner indicating that the infiltrated infrastructure is cared for and supervised by an administrator, to increase the perceived likelihood of corrective action by the owner of the space.
Program Theory
CPTED is rooted primarily in rational choice theories of crime and draws on insights from criminology, environmental psychology, planning, and architecture (Cozens, 2008). Specifically, the place management principle of CPTED draws on the broken windows theory, that the management and maintenance of the physical environment send cues to those who use a space (Maynard, 2004, 9, as cited in Fisher, Maimon, and Berenblum, 2021). Public places that are broken down, dirty, vandalized, full of trash, and that generally look like they are not taken care of are less likely to encourage legitimate use by most groups, and less likely to engender a sense of pride and ownership by the community (Sutton, Cherney, and White, 2008). Conversely, well-maintained spaces that are well used and supervised send out messages to would-be wrongdoers that the community cares (McCamley, 2001). Consistent with this, presenting hackers with a banner indicating that the infiltrated infrastructure is cared for and supervised by an administrator may reduce online trespassers’ activity during the progression of the event by increasing the perceived likelihood of corrective action by the owner of the space, and reduce their likelihood of repeated system-trespassing (Fisher, Maimon, and Berenblum, 2021).