Skip to main content

Geolocation in Crime Detection and Prevention

  • Chapter
  • First Online:
Investigating and Preventing Crime in the Digital Era
  • 495 Accesses

Abstract

The present chapter aims at depicting the role of geolocation techniques in the criminal justice system. Geolocation is intended as the process of attaching a specific location, through the use of geographic references, to an object or a subject. The chapter analyses the developments in geographic information and technology, from Geographic Information Systems to Global Navigation Satellite Systems, before tackling their current and potential role both in crime detection and in crime prevention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Reichenbach (1958), p. 109 ff.

  2. 2.

    Environmental Criminology was first born out of a groundbreaking suggestion by Jeffery (1971), suggesting that crime prevention could be enhanced by improving the tactical design of the built environment (e.g. better lighting or natural visibility in parks or public streets) in which the daily lives of society members unfold. Such tactical design, based on statistical evidence and data, would cause a decrease both in crime rates and in societal fear of crime. This theory was named “Crime Prevention Through Environmental Design” (CPTED).

  3. 3.

    The legal doctrine literature in this field has extensively developed in the last decade, both in Europe and in the United States. See e.g. Vervaele (2014).

  4. 4.

    The ambition to create an “atlas” of crime is shared by many authors: e.g. Turnbull et al. (2000); Besson (2005).

  5. 5.

    Longley et al. (2015), pp. 11–13.

  6. 6.

    Uttal (2000), p. 247 ff; Ignaccolo (2021), pp. 246–251.

  7. 7.

    Kahlaoui (2018), pp. 50–64.

  8. 8.

    Trorey (1952), pp. 1–4; Falkner and Dennis (2002), pp. 15–27.

  9. 9.

    The most famous instance of blanket street-view-image capturing for business purposes is Google Street View: Anguelov et al. (2010), p. 32 ff.

  10. 10.

    The most recent figures and developments are recollected by Zhang (2021).

  11. 11.

    Williams (2020), p. 54 ff.

  12. 12.

    See: www.justice.gov/open/open-data.

  13. 13.

    See: www.fbi.gov/services/cjis/ucr/publications.

  14. 14.

    See: ec.europa.eu/eurostat/web/gisco.

  15. 15.

    See: www.bkg.bund.de.

  16. 16.

    See: www4.istat.it/it/archivio/195710.

  17. 17.

    Burrough (1986), p. 16.

  18. 18.

    Longley et al. (2015), pp. 31–32.

  19. 19.

    Yang et al. (2011), p. 3875 ff.

  20. 20.

    Robins et al. (2003), p. 137 ff.

  21. 21.

    Levine (2006), p. 41 ff.

  22. 22.

    Albert and Reginald (1999), p. 7 ff.

  23. 23.

    Biron et al. (2019), p. 1263 ff.

  24. 24.

    The technique is explained extensively by its creator in Caplan and Kennedy (2010).

  25. 25.

    Dong and Chen (2017), p. 19 ff.

  26. 26.

    Ceruzzi (2018), pp. 105–122.

  27. 27.

    Ibidem, pp. 157–172.

  28. 28.

    See: www.euspa.europa.eu/european-space/galileo/What-Galileo.

  29. 29.

    Kumar et al. (2021) p. 3 ff.

  30. 30.

    Faqir (2013), p. 433 ff.

  31. 31.

    Roxin et al. (2007), pp. 1–9.

  32. 32.

    Ibidem.

  33. 33.

    González-Cabañas et al. (2021), p. 1093 ff.

  34. 34.

    E.g. Dhingra (2019).

  35. 35.

    See, for official US data in 2008: bja.ojp.gov/sites/g/files/xyckuh186/files/Publications/Vera-CrimeAnalysts.pdf.

  36. 36.

    Elmes et al. (2014), pp. 19–38.

  37. 37.

    See the U.S. Office of Justice Programs’ website: www.ojp.gov/pdffiles1/nij/178919.pdf.

  38. 38.

    Baraka and Murimi (2019), p. 36 ff.

  39. 39.

    Early instances of such applications are collected in La Vigne and Wartell (1998), vol 1, pp. 3–14.

  40. 40.

    U.S. Constitution, IV Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

  41. 41.

    Schlesinger (1977), p. 50 ff.

  42. 42.

    Taslitz (2009), p. 2 ff.

  43. 43.

    LaFave (2020), vol 2, pp. 3–24.

  44. 44.

    U.S. Supreme Court, Katz v. United States, 389 U.S. 347 (1967). Wilkins (1987), p. 1087 ff.

  45. 45.

    Kerr (2009), p. 561 ff.

  46. 46.

    LaFave (2020); Militello (2020), p. 54 ff.

  47. 47.

    U.S. Supreme Court, Carpenter v. United States, 585 U.S. (2018). Wilson (2021), p. 155 ff.

  48. 48.

    See especially the concurring opinion of U.S. Supreme Court’s Justice Sonia Sotomayor, to the decision in the case known as United States v. Jones, 565 US (2012). Kerr (2012), p. 312 ff.

  49. 49.

    Griffin and Miller 2008 p. 159 ff.

  50. 50.

    Wolfson and Lease (2011), pp. 1–10.

  51. 51.

    McKenna et al. (2018), p. 591 ff.

  52. 52.

    U.S. Supreme Court, Dow Chemical Co. v. United States, 106 S. Ct. 1819 (1986).

  53. 53.

    U.S. Supreme Court, Kyllo v. United States, 533 U.S. 27 (2001).

  54. 54.

    U.S. Court of Appeals, Leaders of a Beautiful Struggle v. Baltimore Police Department, 456 F. Supp. 3d at 702–03 (4. Cir 2020), reheard en banc 2 F.4th 330 (fourth Cir. 2021). Ferguson (2021); Wilson (2021), p 155 ff. However, its principle was declined to extend by a Pennsylvania District Court in United States v. Bowers, W.D.Pa., October 11, 2021, 548 F.Supp.3d 504.

  55. 55.

    ECtHR, Uzun v Germany, Judgment of 2 September 2010, Appl no 35623/05.

  56. 56.

    E.g. Bu-Pasha et al. (2016), p. 312 ff.

  57. 57.

    Hawelka et al. (2014), p. 260 ff; Lemieux (2015), p. 3 ff.

  58. 58.

    Cavallaro et al. (2020), p. 8 ff.

  59. 59.

    Keyvanpour et al. (2011), p. 872 ff; Al-Zaidy et al. (2012), p. 147 ff; Al-Saif and Al-Dossari (2018), p. 377.

  60. 60.

    Panneck (2019), p. 511 ff.

  61. 61.

    Holson (2018).

  62. 62.

    Saviano and Tondo (2021).

  63. 63.

    King (2019).

  64. 64.

    Goldberg and MacPhail (2006), pp. 286–294.

  65. 65.

    Lockwood and Masters (2021), p 1770 ff.

  66. 66.

    Barone et al. (2021), p. 2 ff.

  67. 67.

    See e.g. the U.S. government’s National Institute of Standards and Technology website: www.nist.gov/news-events/news/2020/03/spotlight-navigating-first-responders-through-unfamiliar-spaces-laser-light.

  68. 68.

    McFadden (2017).

  69. 69.

    The video of the reconstruction is available online at: forensic-architecture.org/investigation/beirut-port-explosion.

  70. 70.

    Frye v. United States, 293 F. 1013 (D.C. Cir. 1923); Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993).

  71. 71.

    Italian Court of Cassation, third section, 19 October 2017, n. 48178, with a comment by La Selva (2018).

  72. 72.

    Nobles (2010), pp. 205–220.

  73. 73.

    Wang (2012), p. 159.

  74. 74.

    Chainey and Ratcliffe (2005), pp. 1–11.

  75. 75.

    Jeffery (1971), p. 498 ff. See supra, fn 2.

  76. 76.

    Supra, fn 15.

  77. 77.

    All cases collected by La Vigne and Wartell (1998), Vol 2.

  78. 78.

    Chaturvedi (2019).

  79. 79.

    Bard (2016), p. 731 ff.

  80. 80.

    Viswanath and Basu (2015), p. 45 ff.

  81. 81.

    Rosner (2017), pp. 25–44.

  82. 82.

    Weisburd et al. (2009), pp. 3–31.

  83. 83.

    The software was available online within the U.S. borders at compstat.nypdonline.org.

  84. 84.

    For the “Million dollar blocks” project by Columbia’s Spatial Information Design lab see: c4sr.columbia.edu/projects/million-dollar-blocks. Kurgan and Cadora (2006).

  85. 85.

    Rodriguez Garzon et al. (2019), pp. 1184–1187.

  86. 86.

    It. Law Decree 341/2000.

  87. 87.

    Amato (2019), pp. 64–65. Recent Italian cases where the use of this new legislative tool was publicly made known can be found in Parma, Venice, Catania.

  88. 88.

    Troshynski (2017), p. 103 ff.

  89. 89.

    The term was coined in Garapon and Lassègue (2018).

  90. 90.

    Heikkilä (2021).

  91. 91.

    As explained in Benjamin (2019).

  92. 92.

    CBS News (2018).

  93. 93.

    The term is taken from Lyon (2018). See also Zuboff (2019), p. 30 ff.

  94. 94.

    Quattrocolo (2020), p. 44 ff.

  95. 95.

    Since Jeffery (1971), on which see supra fn 2.

  96. 96.

    Gless (2020), p. 195 ff.

  97. 97.

    See, for a wide recollection of the issues linked to potential machine biases and algorithmic justice, Završnik (2021), p. 623 ff.

References

  • Albert WS, Reginald GG (1999) The use of spatial cognitive abilities in geographical information systems: the map overlay operation. Trans GIS 3(1):7–21

    Article  Google Scholar 

  • Al-Saif H, Al-Dossari H (2018) Detecting and classifying crimes from Arabic twitter posts using text mining techniques. Int J Adv Comput Sci Appl 10:377–387

    Google Scholar 

  • Al-Zaidy R, Fung BC, Youssef AM, Fortin F (2012) Mining criminal networks from unstructured text documents. Digit Investig 3-4:147–160

    Article  Google Scholar 

  • Amato G (2019) Stalking: su utilizzo braccialetto elettronico l’incognita risorse. Guida al Diritto 4:64–65

    Google Scholar 

  • Anguelov D et al (2010) Google street view: capturing the world at street level. Computer 43(6):32–38

    Article  Google Scholar 

  • Baraka GE, Murimi SK (2019) Stuck in the past with push-pins on paper maps: challenges of transition from manual to computerized crime mapping and analysis in Kenya. Int J Police Sci Manage 21(1):36–47

    Article  Google Scholar 

  • Bard J (2016) Unpacking the Dirtbox: confronting cell phone location tracking with the fourth amendment. Boston Coll Law Rev 57:731

    Google Scholar 

  • Barone PM, Di Maggio RM, Mesturini S (2021) Forensic geoarchaeology in the search for missing persons. Forensic Sci 1

    Google Scholar 

  • Benjamin R (2019) Race after technology: shining light on the new Jim code. How biased are our algorithms?. Institute for Advanced Study. www.ias.edu/ideas/race-after-technology

  • Besson J-L (2005) Les cartes du crime. Presses Universitaires de France, Paris

    Book  Google Scholar 

  • Biron K, Mansoor W, Miniaoui S, Atalla S, Mukhtar H, Bin Hashim KF (2019) Data science tools for crime investigation, archival, and analysis. In: 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, pp 1263–1266

    Google Scholar 

  • Bu-Pasha S, Alén-Savikko A, Mäkinen J, Guinness R, Korpisaari P (2016) EU law perspectives on location data privacy in smartphones and informed consent for transparency. Eur Data Protect Law Rev 2(3):312–323

    Article  Google Scholar 

  • Burrough P (1986) Principles of geographical information systems for land resources assessment. Clarendon Press, Oxford

    Book  Google Scholar 

  • Caplan JM, Kennedy LW (2010) Risk terrain modeling manual: theoretical framework and technical steps of spatial risk assessment for crime analysis. Rutgers Center on Public Security, Newark

    Google Scholar 

  • Cavallaro L, Ficara A, De Meo P, Fiumara G, Catanese S, Bagdasar O et al (2020) Disrupting resilient criminal networks through data analysis: the case of Sicilian mafia. PLoS One 15:8

    Article  Google Scholar 

  • CBS News (2018) China’s behavior monitoring system bars some from travel, purchasing property. www.cbsnews.com

  • Ceruzzi PE (2018) GPS. IEEE, Piscataway

    Google Scholar 

  • Chainey S, Ratcliffe J (2005) GIS and crime mapping. Wiley, Hoboken

    Book  Google Scholar 

  • Chaturvedi A (2019) Role of GIS and emerging technologies in crime detection and prevention. Geospatial world. www.geospatialworld.net

  • Dhingra A (2019) GIS helps in effective analysis of crime patterns. Geospatial world. www.geospatialworld.net

  • Dong P, Chen Q (2017) LiDAR remote sensing and applications. CRC Press, Boca Raton

    Book  Google Scholar 

  • Elmes GA, Roedl G, Conley J (2014) Forensic GIS. The role of geospatial technologies for investigating crime and providing evidence. Springer, Dordrecht

    Google Scholar 

  • Falkner E, Dennis M (2002) Aerial mapping: methods and applications. Lewis, Boca Raton

    Google Scholar 

  • Faqir R (2013) The use of technology of global positioning system (GPS) in Criminal investigation & right to privacy under the constitution and criminal legislations in Jordan: legal analysis study. Revue internationale de droit pénal 84:433–462

    Article  Google Scholar 

  • Ferguson AG (2021) Facial recognition and the fourth amendment. Minn Law Rev 105:1105–1207

    Google Scholar 

  • Garapon A, Lassègue J (2018) Justice digitale: Révolution graphique et rupture anthropologique. Presses universitaires de France, Paris

    Google Scholar 

  • Gless S (2020) AI in the courtroom: a comparative analysis of machine evidence in criminal trials. Georgetown J Int Law 51:195

    Google Scholar 

  • Goldberg P, MacPhail R (2006) Practical and theoretical geoarchaeology. Blackwell Publishing, Malden

    Google Scholar 

  • González-Cabañas J, Cuevas A, Cuevas R, Maier M (2021) Digital contact tracing: large-scale geolocation data as an alternative to bluetooth-based apps failure. Electronics 10(9):1093

    Article  Google Scholar 

  • Griffin T, Miller MK (2008) Child abduction, AMBER alert, and crime control theater. Crim Justice Rev 33(2):159–176

    Article  Google Scholar 

  • Hawelka B, Sitko I, Beinat E, Sobolevsky S, Kazakopoulos P, Ratti C (2014) Geo-located twitter as proxy for global mobility patterns. Cartogr Geogr Inf Sci 41(3):260–271

    Article  Google Scholar 

  • Heikkilä M (2021) European Parliament calls for a ban on facial recognition. Politico. www.politico.eu

  • Holson LM (2018) Is geotagging on Instagram ruining natural wonders? Some Say Yes. The New York Times. https://www.nytimes.com/2018/11/29/travel/instagram-geotagging-environment.html

  • Ignaccolo C (2021) Mapping practices for a cosmopolitan world. In: Schröder J, Carta M, Scaffidi F, Contato A (eds) Cosmopolitan Habitat. De Gruyter, Berlin, pp 246–251

    Chapter  Google Scholar 

  • Jeffery CR (1971) Crime prevention through environmental design. Am Behav Sci 14(4):598

    Article  Google Scholar 

  • Kahlaoui T (2018) Creating the Mediterranean: maps and the Islamic imagination. Brill, Leiden/Boston

    Google Scholar 

  • Kerr OS (2009) The case for the third-party doctrine. Mich Law Rev 107(4):561–602

    Google Scholar 

  • Kerr OS (2012) The mosaic theory of the fourth amendment. Mich Law Rev 111(3):311–354

    Google Scholar 

  • Keyvanpour MR, Javideh M, Ebrahimi MR (2011) Detecting and investigating crime by means of data mining: a general crime matching framework. Proc Comput Sci 3:872–880

    Article  Google Scholar 

  • King M (2019) How mapping technology can help catch killers. ESRI Malaysia. esrimalaysia.com

  • Kumar A, Kumar S, Lal P, Saikia P, Srivastava PK, Petropoulos GP (2021) Introduction to GPS/GNSS technology. GPS and GNSS technology. Geosciences:3–20

    Google Scholar 

  • Kurgan L, Cadora E (2006) Architecture and justice. www.c4sr.columbia.edu

  • La Selva P (2018) I fotogrammi di Google Earth sono prove documentali: dalla Cassazione Penale al T.A.R. Calabria. Ius in itinere. www.iusinitinere.it

  • La Vigne NG, Wartell J (eds) (1998) Crime mapping case studies: successes in the field, 2nd edn 2000. Police Executive Research Forum (PERF), Washington DC

    Google Scholar 

  • LaFave W (2020) Search and seizure: a treatise on the fourth amendment, vol 6, 6th edn. Thomson Reuters/West, Eagan

    Google Scholar 

  • Lemieux AM (2015) Geotagged photos: a useful tool for criminological research? Crime Sci 4:3

    Article  Google Scholar 

  • Levine N (2006) Crime mapping and the CrimeStat program. Geogr Anal 38(1):41–56

    Article  Google Scholar 

  • Lockwood E, Masters P (2021) Application of viewshed analysis and probability mapping for search area determination based on the moors murders on Saddleworth moor, the United Kingdom. J Forensic Sci 66(5):1770–1787

    Article  Google Scholar 

  • Longley PA et al (eds) (2015) Geographic information systems & science, 4th edn. Wiley, Hoboken

    Google Scholar 

  • Lyon D (2018) The culture of surveillance. Polity Press, Cambridge (UK)

    Google Scholar 

  • McFadden C (2017) Building a Solid Case: Forensic Mapping (and Ghost Clouds). Xyht. www.xyht.com

  • McKenna AT, Gaudion AC, Evans JL (2018) The role of satellites and smart devices: data surprises and security, privacy, and regulatory challenges. Penn State Law Rev 123:591

    Google Scholar 

  • Militello E (2020) Criminal investigations on corporate liability: a comparative account on Italy and the United States. Pacini, Pisa

    Google Scholar 

  • Nobles MR (2010) Using geographic information systems to study race, crime, and policing. In: Rice SK, White MD (eds) Race, ethnicity, and policing: new and essential readings. New York University Press, New York, pp 205–220

    Google Scholar 

  • Panneck T (2019) Incognito mode is in the constitution note. Minn Law Rev 104:511–552

    Google Scholar 

  • Quattrocolo S (2020) Artificial intelligence, computational modelling and criminal proceedings. A framework for a European legal discussion. Springer, Cham

    Book  Google Scholar 

  • Reichenbach H (1958) The philosophy of space and time. Dover Publications, New York

    Google Scholar 

  • Robins A, Rountree J, Rountree N (2003) Learning and teaching programming: a review and discussion. Comput Sci Educ 13(2):137–172

    Article  Google Scholar 

  • Rodriguez Garzon S, Pöllabauer T, Zickau S, Küpper A (2019) Interactive design of geofences for proactive location-based services in smart cities. In: 2019 IEEE SmartWorld 1184–1187. ieeexplore.ieee.org

  • Rosner H-J (2017) “CrimeGIS”. Geographische Informationssysteme in der Kriminologie. In: Kerner H-J, Kinzig H, Wulf R (eds) Kriminologie Und Strafvollzug. Institut für Kriminologie der Universität Tübingen, Tübingen

    Google Scholar 

  • Roxin A, Gaber J, Wack M, Nait-Sidi-Moh A (2007) Survey of wireless geolocation techniques. In: 2007 IEEE Globecom workshops. IEEE, Washington, DC, pp 1–9

    Google Scholar 

  • Saviano R, Tondo L (2021) Buried in concrete: how the mafia made a killing from the destruction of Italy’s south. The Guardian. www.theguardian.com

  • Schlesinger SR (1977) Exclusionary injustice: the problem of illegally obtained evidence. Marcel Dekker, New York

    Google Scholar 

  • Taslitz AE (2009) Reconstructing the fourth amendment. A history of search and seizure, 1789–1868. New York University Press, New York

    Google Scholar 

  • Trorey LG (1952) Handbook of aerial mapping and photogrammetry. Cambridge University Press, Cambridge

    Google Scholar 

  • Troshynski EI (2017) “Stalked by the state”: GPS surveillance technology and sex offender parolees. Kriminologisches J 49(2):103–119

    Google Scholar 

  • Turnbull LS, Hendrix EH, Dent BD (2000) Atlas of crime: mapping the criminal landscape. Oryx Press, Phoenix

    Google Scholar 

  • Uttal DH (2000) Seeing the big picture: map use and the development of spatial cognition. Dev Sci 3(3):247–264

    Article  Google Scholar 

  • Vervaele J (2014) Surveillance and criminal investigation: blurring of thresholds and boundaries in the criminal justice system? In: Gutwirth S, Leenes R, De Hert P (eds) Reloading data protection: multidisciplinary insights and contemporary challenges. Springer, Cham, pp 115–128

    Chapter  Google Scholar 

  • Viswanath K, Basu A (2015) SafetiPin: an innovative mobile app to collect data on women’s safety in Indian cities. Gend Dev 23(1):45–60

    Article  Google Scholar 

  • Wang F (2012) Why police and policing need GIS: an overview. Ann GIS 18(3):159–171

    Article  Google Scholar 

  • Weisburd D, Bernasco W, Bruinsma GJN (eds) (2009) Putting crime in its place. Units of analysis in geographic criminology. Springer, New York

    Google Scholar 

  • Wilkins RG (1987) Defining the “reasonable expectation of privacy”: an emerging tripartite analysis. Vanderbilt Law Rev 40:1077–1128

    Google Scholar 

  • Williams S (2020) Data action: using data for public good. MIT Press, Cambridge

    Book  Google Scholar 

  • Wilson TH (2021) The mosaic theory’s two steps: surveying carpenter in the lower courts. Tex Law Rev Online 99:155–182

    Google Scholar 

  • Wolfson SM, Lease M (2011) Look before you leap: legal pitfalls of crowdsourcing. Proc Am Soc Inf Sci Technol 48(1):1–10

    Article  Google Scholar 

  • Yang L, Meng X, Zhang X (2011) SRTM DEM and its application advances. Int J Remote Sens 32(14):3875–3896

    Article  Google Scholar 

  • Završnik A (2021) Algorithmic justice: algorithms and big data in criminal justice settings. EU J Criminol 18(5):623–642

    Article  Google Scholar 

  • Zhang M (2021) You can have your home blurred for privacy in Google Street View photos. PetaPixel. www.petapixel.com

  • Zuboff S (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power. Public Affairs, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Militello .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Militello, E. (2022). Geolocation in Crime Detection and Prevention. In: Bachmaier Winter, L., Ruggeri, S. (eds) Investigating and Preventing Crime in the Digital Era. Legal Studies in International, European and Comparative Criminal Law, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-031-13952-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-13952-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-13951-2

  • Online ISBN: 978-3-031-13952-9

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics