<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10110866> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/AcademicArticle> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/title> "Are Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/ontology/bibo/abstract> "Objectives:\r\nResearch consistently shows that crime concentrates on a few repeatedly victimized places and targets. In this paper we examine whether the same is true for extortion against businesses. We then test whether the factors that explain the likelihood of becoming a victim of extortion also explain the number of incidents suffered by victimized businesses. The alternative is that extortion concentration is a function of event dependence.\r\n\r\nMethods:\r\nDrawing on Mexico’s commercial victimization survey, we determine whether repeat victimization occurs by chance by comparing the observed distribution to that expected under a Poisson process. Next, we utilize a multilevel negative binomial-logit hurdle model to examine whether area- and business-level predictors of victimization are also associated with the number of repeat extortions suffered by businesses.\r\n\r\nResults:\r\nFindings suggest that extortion is highly concentrated, and that the predictors of repeated extortion differ from those that predict the likelihood of becoming a victim of extortion. While area-level variables showed a modest association with the likelihood of extortion victimization, they were not significant predictors of repeat incidents. Similarly, most business-level variables significantly associated with victimization risk showed insignificant (and sometimes contrary) associations with victimization concentration. Overall, unexplained differences in extortion concentration at the business-level were unaffected by predictors of extortion prevalence.\r\n\r\nConclusions:\r\nThe inconsistent associations of predictors across the hurdle components suggest that extortion prevalence and concentration are fueled by two distinct processes, an interpretation congruent with theoretical expectations regarding extortion that considers that repeats are likely fueled by a process of event dependence."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/date> "2021" .
<https://discovery.ucl.ac.uk/id/document/1267238> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/org/ext-0edd8791b6b9cdbf07ab4d5a2b318215> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-0edd8791b6b9cdbf07ab4d5a2b318215> <http://xmlns.com/foaf/0.1/name> "Springer Verlag"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-0edd8791b6b9cdbf07ab4d5a2b318215> .
<https://discovery.ucl.ac.uk/id/publication/ext-07484518> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> .
<https://discovery.ucl.ac.uk/id/publication/ext-07484518> <http://xmlns.com/foaf/0.1/name> "Journal of Quantitative Criminology"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-07484518> .
<https://discovery.ucl.ac.uk/id/publication/ext-07484518> <http://www.w3.org/2002/07/owl#sameAs> <urn:issn:07484518> .
<https://discovery.ucl.ac.uk/id/publication/ext-07484518> <http://purl.org/ontology/bibo/issn> "07484518" .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/forthcoming> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-3e603fecda4897d50ae2a78471c29a76> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10110866#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10110866#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-3e603fecda4897d50ae2a78471c29a76> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-ffd3c0c54654c7dbc20a01d55e68454d> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10110866#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10110866#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-ffd3c0c54654c7dbc20a01d55e68454d> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-0f4dd3c740011bf205e74f4940732c77> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10110866#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10110866#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-0f4dd3c740011bf205e74f4940732c77> .
<https://discovery.ucl.ac.uk/id/person/ext-ffd3c0c54654c7dbc20a01d55e68454d> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-ffd3c0c54654c7dbc20a01d55e68454d> <http://xmlns.com/foaf/0.1/givenName> "S"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-ffd3c0c54654c7dbc20a01d55e68454d> <http://xmlns.com/foaf/0.1/familyName> "Johnson"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-ffd3c0c54654c7dbc20a01d55e68454d> <http://xmlns.com/foaf/0.1/name> "S Johnson"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-0f4dd3c740011bf205e74f4940732c77> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-0f4dd3c740011bf205e74f4940732c77> <http://xmlns.com/foaf/0.1/givenName> "N"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-0f4dd3c740011bf205e74f4940732c77> <http://xmlns.com/foaf/0.1/familyName> "Tilley"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-0f4dd3c740011bf205e74f4940732c77> <http://xmlns.com/foaf/0.1/name> "N Tilley"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3e603fecda4897d50ae2a78471c29a76> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-3e603fecda4897d50ae2a78471c29a76> <http://xmlns.com/foaf/0.1/givenName> "P"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3e603fecda4897d50ae2a78471c29a76> <http://xmlns.com/foaf/0.1/familyName> "Estevez-Soto"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3e603fecda4897d50ae2a78471c29a76> <http://xmlns.com/foaf/0.1/name> "P Estevez-Soto"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ArticleEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267238> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1267238> <http://www.w3.org/2000/01/rdf-schema#label> "Are Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://eprints.org/ontology/hasPublished> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267238> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10110866/1/Estevez-Soto_Est%C3%A9vez-Soto2020_Article_AreRepeatedlyExtortedBusinesse.pdf> .
<https://discovery.ucl.ac.uk/id/document/1267238> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10110866/1/Estevez-Soto_Est%C3%A9vez-Soto2020_Article_AreRepeatedlyExtortedBusinesse.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/10110866/1/Estevez-Soto_Est%C3%A9vez-Soto2020_Article_AreRepeatedlyExtortedBusinesse.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "Estevez-Soto_Estévez-Soto2020_Article_AreRepeatedlyExtortedBusinesse.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1267239> .
<https://discovery.ucl.ac.uk/id/document/1267239> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1267239> <http://www.w3.org/2000/01/rdf-schema#label> "Are Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1267239> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267239> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267239> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267239> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10110866/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/document/1267239> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10110866/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10110866/2/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1267240> .
<https://discovery.ucl.ac.uk/id/document/1267240> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1267240> <http://www.w3.org/2000/01/rdf-schema#label> "Are Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1267240> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267240> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267240> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267240> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10110866/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/document/1267240> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10110866/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10110866/3/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1267241> .
<https://discovery.ucl.ac.uk/id/document/1267241> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1267241> <http://www.w3.org/2000/01/rdf-schema#label> "Are Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1267241> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267241> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267241> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267241> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10110866/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/document/1267241> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10110866/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10110866/4/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1267242> .
<https://discovery.ucl.ac.uk/id/document/1267242> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1267242> <http://www.w3.org/2000/01/rdf-schema#label> "Are Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1267242> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267242> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267242> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267242> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10110866/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/document/1267242> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10110866/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10110866/5/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1267249> .
<https://discovery.ucl.ac.uk/id/document/1267249> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1267249> <http://www.w3.org/2000/01/rdf-schema#label> "Are Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1267249> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267249> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267249> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/1267238> .
<https://discovery.ucl.ac.uk/id/document/1267249> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10110866/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/document/1267249> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10110866/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/eprint/10110866/6/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10110866> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10110866/> .
<https://discovery.ucl.ac.uk/id/eprint/10110866/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10110866 \n\nAre Repeatedly Extorted Businesses Different? A Multilevel Hurdle Model of Extortion Victimization\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/10110866/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/10110866/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10110866> .