LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Hilton, Kevin (2013)
Publisher: European Academy of Design
Languages: English
Types: Unknown
Subjects: W200
This paper proposes benefits of using service design against organised crime. As a vehicle to this discussion, the focus is an anti-child-trafficking project at Northumbria University in the UK, involving its multidisciplinary Northumbria Crime Prevention Network.\ud The last 10 years have shown increasing evidence of people trafficking, internationally (DoS, 2010), generally for the purposes of illegal labour and/or sex. A significant fraction of those who are trafficked are children. The majority of these children are in their mid-teens, but some are as young as five years old.\ud The C4 persona-based critical design process, (Hilton, 2008), is proposed to strategically enable a service design approach to counter organised crime, by first developing the required criminal personas in order to use their competitive perspectives in critical review of the preventative initiatives. Opportunities from such a service design approach, to child trafficking for example would include new means of: interruption or redirection of child trafficking services so that these children end up in legitimate care; also the proposition of considering new opportunities and improvements in child trafficking service routes and processes as a means of second guessing how and where Recruiters, Transporters, and Exploiters, (Van Dijck, 2005), might next be found operating, and then through border and security agencies successfully countered.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Altshuller, G. S. (1984) Creativity as an Exact Science. The Theory of the Solution of Inventive problems. (A. Williams, Trans.) Amsterdam: Gordon and Breach publishers.
    • Bitner, Mary Jo, Amy L. Ostrom and Felicia N. Morgan, “Service Blueprinting: A Practical Technique for Service Innovation,” California Management Review, Spring 2008, 66-94.
    • CEOP (2009). Strategic Threat Assessment Child Trafficking in the UK. Child Exploitation and Online Protection centre: London.
    • Cropley, D. H., Kaufmann, J., and Cropley, A. J. (2008). Malevolent Creativity: A functional model of creativity in crime and terrorism. Creativity Research Journal, 20, 105-115.
    • DoS (2010). Trafficking in Persons Report. 10th Edition. Department of State, United States of America, http://www.state.gov/g/tip/rls/tiprpt/2010/
    • Candappa, M. (2007) Child Trafficking in Newcastle. A report on the evidence and agency responses to child trafficking. ECPAT UK.
    • Evenson, S. (2008) A Designer's View of SSME. In B. Hefley and W. Murphy (Eds.) Service Science, Management and Engineering. Education for the 21st Century. Service Science: Research and innovations in the Service Economy. Vienna: Springer. pp. 25-30.
    • Felson, M. (1998) Crime and Everyday Life. 2nd Ed. Thousand Oaks; Pine Forge Press.
    • Goldstein, S. M., Johnston, R., Duffy, J., and Rao, J. (2002) The Service Concept: The missing link in service design research? Journal of Operations Management, 20, 121-134.
    • Gordon, W. J. J. (1961) Synectics, the Development of Creative Capacity. New York: Harper.
    • Hanington, B. (2003) Methods in the Making: A Perspective on the State of Human Research in Design. Design Issues. Vol.19, No.4. Boston, MA: MIT Press.
    • Hari, A., and Weiss, M. P. (1996) ICDM - An Inclusive Method for Customer Driven Conceptual Design. Proceeding of the 2nd ASI Annual Total Product Development Symposium, Pomona, CA, pp 721-747.
    • Hari, A., Cropley, D.H., Zonnenshain, A. (2005), 'Agile System Engineering for Creative AntiTerror Solutions', in Proceedings of the Systems Engineering , Test & Evaluation Conference, SETE 2005 - A Decade of Growth and Beyond, Brisbane, Queensland, 7 to 9 November 2005, CD, Digital Paper.
    • Hilton, K. H. (2002). Stimulating the Practice of Opportunity Identification. Shared Visions conference, Brighton.
    • Hilton, K. H. and Henderson, K. (2008) Developing Criminal Personas for Designers. British Society of Criminology Journal, Vol.8 At http://www.britsoccrim.org/v8.htm
    • Hilton, K. H. (2010) Boundless Creativity. In D. Cropley, J. Kaufman, A. Cropley, and M.
    • Humantrafficking (2009) Human Trafficking & Modern-day Slavery.
    • IAS (2007) Anti-Trafficking Toolkit. Research and Information Unit, Immigration Advisory Service. www.iasuk.org
    • LCPC (2006) London Procedure for Safeguarding Trafficked and Exploited Children.
    • Mager, B. (2008) Service Design definition in the design dictionary. In M. Erlhoff, and T.
    • Miettinen, S., and Koivisto, M. (Eds) (2009) Designing Services With Innovative Methods.
    • Osborn, A. F. (1957) Applied Imagination - Principles and procedures of Creative Thinking.
    • Parker, S. And Heapy, J. (2006) The Journey to the Interface. How public service design can connect users to reform. London: Demos.
    • Schieffer, R. (2005) Ten Key Customer Insights. Unlocking the mind of the market. Mason, OH: South-Western Cengage Learning.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article