<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-1079</journal-id>
<journal-title><![CDATA[Gestión y política pública]]></journal-title>
<abbrev-journal-title><![CDATA[Gest. polít. pública]]></abbrev-journal-title>
<issn>1405-1079</issn>
<publisher>
<publisher-name><![CDATA[Centro de Investigación y Docencia Económicas A.C., División de Administración Pública]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-10792018000200501</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[La victimización de las empresas en México Conceptos, teorías y mediciones]]></article-title>
<article-title xml:lang="en"><![CDATA[The Victimization of Private Companies in Mexico: Concepts, Theories and Measurements]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vilalta Perdomo]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Fondevila]]></surname>
<given-names><![CDATA[Gustavo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Centro de Investigación en Ciencias de Información Geoespacial  ]]></institution>
<addr-line><![CDATA[Ciudad de México ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Centro de Investigación y Docencia Económicas  ]]></institution>
<addr-line><![CDATA[Ciudad de México ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<volume>27</volume>
<numero>2</numero>
<fpage>501</fpage>
<lpage>540</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-10792018000200501&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-10792018000200501&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-10792018000200501&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Este estudio presenta las bases conceptuales, teóricas y de análisis empírico para el estudio ordenado de la victimización delictiva de las empresas. Contiene una revisión teórica contemporánea y una discusión de las mediciones actuales en esta materia. Además, presenta estadísticos descriptivos que muestran la magnitud del problema de la victimización empresarial. Se demuestra que el segundo delito más frecuente contra las empresas en el país es alguno relacionado con la corrupción, es decir, alguno cometido por el servidor público. Igualmente se muestra una elevada variación interanual en la incidencia de estos delitos, lo que lleva a la necesidad de proseguir en el país con la discusión metodológica en esta materia.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This study presents the conceptual, theoretical and empirical bases for the study of criminal victimization of the private sector. It contains a review of contemporary theories and a discussion of current measures. It also presents a set of descriptive statistics showing the extent of the problem of corporate victimization. It is shown that the second most common crime against businesses is any corruption-related crime, that is, any crime committed by a public official. Also, the high inter-annual variation in the crime incidence rate shows the need to develop more methodological discussions on this matter.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[delincuencia]]></kwd>
<kwd lng="es"><![CDATA[víctimas]]></kwd>
<kwd lng="es"><![CDATA[prevención del delito]]></kwd>
<kwd lng="es"><![CDATA[empresas]]></kwd>
<kwd lng="es"><![CDATA[encuestas]]></kwd>
<kwd lng="en"><![CDATA[delinquency]]></kwd>
<kwd lng="en"><![CDATA[victims]]></kwd>
<kwd lng="en"><![CDATA[crime prevention]]></kwd>
<kwd lng="en"><![CDATA[private companies]]></kwd>
<kwd lng="en"><![CDATA[surveys]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<collab>Australian Institute of Criminology</collab>
<source><![CDATA[Crimes Against Business: A Review of Victimisation, Predictors and Prevention]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Canberra ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burrows]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bamfield]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hopkins]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ingram]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime Against Business in Scotland]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Edinburgo ]]></publisher-loc>
<publisher-name><![CDATA[The Scottish Executive Central Research Unit]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chenery]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ellingworth]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Tseloni]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pease]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crimes which Repeat: Undigested Evidence from the British Crime Survey 1992]]></article-title>
<source><![CDATA[International Journal of Risk, Security and Crime Prevention]]></source>
<year>1996</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>207-16</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[M.]]></surname>
<given-names><![CDATA[Clinard]]></given-names>
</name>
<name>
<surname><![CDATA[Quinney]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Criminal Behavior Systems]]></source>
<year>1973</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Holt, Rinehart and Winston]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Clinard]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yeager]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Corporate Crime: The First Comprehensive Account of Illegal Practices among America&#8217;s Top Corporations]]></source>
<year>1980</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Free Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>Código Penal Federal de México</collab>
<source><![CDATA[Texto vigente]]></source>
<year>1931</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Felson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social Change and Crime Rate Trends: A Routine Activities Approach]]></article-title>
<source><![CDATA[American Sociological Review]]></source>
<year>1979</year>
<volume>44</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>88-100</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Kleugel]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Land]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory]]></article-title>
<source><![CDATA[American Sociological Review]]></source>
<year>1981</year>
<volume>46</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>505-24</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Croall]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding White Collar Crime]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Filadelfia ]]></publisher-loc>
<publisher-name><![CDATA[Open University Press Buckingham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Del Frate]]></surname>
<given-names><![CDATA[A.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The International Crime Business Survey: Findings from Nine Central- Eastern European Cities]]></article-title>
<source><![CDATA[European Journal on Criminal Policy and Research]]></source>
<year>2004</year>
<volume>10</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>137-61</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dugato]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing Bank Robbery in Italy. In Organized Crime, Corruption and Crime Prevention]]></source>
<year>2014</year>
<page-range>115-25</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ekblom]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Prevention of Shop Theft: An Approach through Crime Analysi]]></source>
<year>1986</year>
<publisher-name><![CDATA[Home Office London]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ekblom]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[F.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Birdi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime and Racial Harassment in Asian-Run Small Shops: The Scope for Prevention]]></source>
<year>1988</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>European Commission</collab>
<source><![CDATA[European Business Crime Survey (EU BCS)]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Clarke]]></surname>
<given-names><![CDATA[R.V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Opportunity Makes the Thief]]></article-title>
<source><![CDATA[Police Research Series]]></source>
<year>1998</year>
<volume>98</volume>
<publisher-name><![CDATA[Paper]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Looye]]></surname>
<given-names><![CDATA[J.W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime and Small Businesses in the Midwest: An Examination of Overlooked Issues in the United States]]></article-title>
<source><![CDATA[Security Journal]]></source>
<year>2000</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>45-72</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hopkins]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crimes Against Businesses: The Way Forward for Future Research]]></article-title>
<source><![CDATA[British Journal of Criminology]]></source>
<year>2002</year>
<volume>42</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>782-97</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<collab>INEGI</collab>
<source><![CDATA[Encuesta Nacional de Victimización de Empresas, 2012]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Ciudad de México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<collab>INEGI</collab>
<source><![CDATA[Encuesta Nacional de Victimización y Percepción sobre Seguridad Pública, 2012]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Ciudad de México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<collab>INEGI</collab>
<source><![CDATA[Encuesta Nacional de Victimización de Empresas, 2014]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Ciudad de México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<collab>INEGI</collab>
<source><![CDATA[Encuesta Nacional de Victimización y Percepción sobre Seguridad Pública]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Ciudad de México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Preventing Retail Theft: An Application of Environmental Criminology]]></article-title>
<source><![CDATA[Security Journal]]></source>
<year>1996</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>71-5</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime and Everyday Life]]></source>
<year>1998</year>
<publisher-loc><![CDATA[Thousand Oaks ]]></publisher-loc>
<publisher-name><![CDATA[Pine Forge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Friedrichs]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Occupational Crime, Occupational Deviance, and Workplace Crime: Sorting out the Difference]]></article-title>
<source><![CDATA[Criminal Justice]]></source>
<year>2002</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>243-56</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime at Work: Increasing the Risk for Offenders]]></source>
<year>1998</year>
<volume>II</volume>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Graycar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Prenzler]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding and Preventing Corruption]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hagan]]></surname>
<given-names><![CDATA[F.E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime Types and Criminals]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Thousand Oaks ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hindelang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gottfredson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Garofalo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization]]></source>
<year>1978</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Ballinger]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maxfield]]></surname>
<given-names><![CDATA[M.G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lifestyle and Routine Activity Theories of Crime: Empirical Studies of Victimization, Delinquency, and Offender Decision-Making]]></article-title>
<source><![CDATA[Journal of Quantitative Criminology]]></source>
<year>1987</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>275-82</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mawby]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime and the Business Community: Experiences of Businesses in Cornwall, England]]></article-title>
<source><![CDATA[Security Journal]]></source>
<year>2003</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>45-61</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maxfield]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Explaining the Fear of Crime: Evidence from the 1984 British Crime Survey]]></article-title>
<source><![CDATA[Home Office Research Paper 41]]></source>
<year>1987</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Home Office]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Messner]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risks of Criminal Victimization in Contemporary Urban China: An Application of Lifestyle-Routine theories]]></article-title>
<source><![CDATA[Justice Quarterly]]></source>
<year>2007</year>
<volume>24</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>496-522</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miethe]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Stafford]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Long]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social Differentiation in Criminal Victimization: A Test of Routine Activities-Lifestyle Theories]]></article-title>
<source><![CDATA[American Sociological Review]]></source>
<year>1987</year>
<volume>52</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>184-94</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miethe]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims and Situations]]></source>
<year>1994</year>
<publisher-loc><![CDATA[Albany ]]></publisher-loc>
<publisher-name><![CDATA[suny Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morgan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Boxall]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lindeman]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Effective Crime Prevention Interventions for Implementation by Local Government]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Canberra ]]></publisher-loc>
<publisher-name><![CDATA[Australian Institute of Criminology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mugellini]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Measuring and Analyzing Crime against the Private Sector: International Experiences and the Mexican Practice]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Ciudad de México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perrone]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crimes against Small Business in Australia: A Preliminary Analysis]]></article-title>
<collab>Australian Institute of Criminology</collab>
<source><![CDATA[Trends and issues in Crime andCriminal Justice]]></source>
<year>2000</year>
<publisher-loc><![CDATA[Canberra ]]></publisher-loc>
<publisher-name><![CDATA[AIC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pontell]]></surname>
<given-names><![CDATA[H.N.]]></given-names>
</name>
<name>
<surname><![CDATA[Geis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Handbook of White-Collar and Corporate Crime]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salinger]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Encyclopedia of White Collar &amp; Corporate Crime, vol. 1]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Thousand Oaks ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sampson]]></surname>
<given-names><![CDATA[R.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wooldredge]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Linking the Micro- and Macro-level Dimensions of Lifestyle Routine Activity and Opportunity Models of Predatory Victimization]]></article-title>
<source><![CDATA[Journal of Quantitative Criminology]]></source>
<year>1987</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>371-93</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Savolainen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Public Disorder and Business Victimization: Findings from a Survey of Female Entrepreneurs]]></article-title>
<source><![CDATA[Crime Prevention and Community Safety]]></source>
<year>2007</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-20</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Siegel]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Criminology: The Core]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Independence ]]></publisher-loc>
<publisher-name><![CDATA[Thomson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Slapper]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Tombs]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Corporate Crime]]></source>
<year>1999</year>
<publisher-loc><![CDATA[Essex ]]></publisher-loc>
<publisher-name><![CDATA[Pearson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stark]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deviant Places: A Theory of the Ecology of Crime]]></article-title>
<source><![CDATA[Criminology]]></source>
<year>1987</year>
<volume>25</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>893-909</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sutherland]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[White-Collar Criminality]]></article-title>
<source><![CDATA[American Sociological Review]]></source>
<year>1940</year>
<volume>58</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taylor]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime Against Businesses in Two Ethnically Diverse Communities]]></article-title>
<source><![CDATA[Trends &amp; Issues in Crime andCriminal Justice]]></source>
<year>2002</year>
<volume>321</volume>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taylor]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reporting of Crime Against Small Retail Businesses]]></article-title>
<source><![CDATA[Australian Institute of Criminology , Trends &amp; Issues in Crime and Criminal Justice]]></source>
<year>2006</year>
<volume>242</volume>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tilley]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Prevention of Crime against Small Businesses: The Safer Cities Experience]]></source>
<year>1993</year>
<publisher-name><![CDATA[Citeseer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Trickett]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Osborn]]></surname>
<given-names><![CDATA[D.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Seymour]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pease]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What is Different About High Crime Areas?]]></article-title>
<source><![CDATA[The British Journal of Criminology]]></source>
<year>1992</year>
<volume>32</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>81-9</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tulyakov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tulyakov]]></surname>
<given-names><![CDATA[V.A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Business Victimization and Organized Crime]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[First Australian National Survey of Crimes against Businesses]]></source>
<year>1994</year>
<publisher-loc><![CDATA[Canberra ]]></publisher-loc>
<publisher-name><![CDATA[Australian Institute of Criminology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilcox]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Theories of Victimization]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Lab]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Encyclopedia of Victimology and Crime Prevention]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Thousand Oaks ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wittebrood]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Nieuwbeerta]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Criminal Victimization during One&#8217; Life Course: The Effects of Previous Victimization and Patterns of Routine Activities]]></article-title>
<source><![CDATA[Journal of Research in Crime and Delinquency]]></source>
<year>2000</year>
<volume>37</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>91-122</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
