Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-8kt4b Total loading time: 0 Render date: 2024-06-15T06:30:59.845Z Has data issue: false hasContentIssue false

8 - Invisible harms

from Part II - Special categories of harms

Published online by Cambridge University Press:  06 July 2010

Malcolm K. Sparrow
Affiliation:
Kennedy School of Government, Harvard University
Get access

Summary

Some risks do not fully reveal themselves. What I mean is that while the harm may be visible in some instances and invisible in others, the bulk of the problem is hidden and therefore the underlying scope of the problem may not be fully understood.

Harms are invisible for several different reasons. Some are invisible by design, as is often the case with sophisticated white-collar crimes such as fraud, embezzlement, and corruption. Perpetrators take steps to understand and then deliberately circumnavigate detection systems. From the perpetrator's point of view, the best schemes of this type are those that are not only invisible to authorities at the time of commission, but remain invisible in perpetuity.

Some harms — such as within-the-family crimes like sexual abuse, incest, and domestic violence — are invisible because victims and witnesses are reluctant, unable, or otherwise unlikely to report what they know. Similarly with rape, and date-rape in particular, which tend to have very low reporting rates. Blackmail is often not reported because victims fear the consequences for their own reputations. Crimes involving intimidation, such as extortion, go largely unreported. Another set of crimes, termed consensual crimes, are generally not reported because all the participants take part by choice, at least to some extent. These include drug-dealing, conspiracies, gambling, prostitution, and some forms of cooperative corruption such as bribery and nepotism.

Type
Chapter
Information
The Character of Harms
Operational Challenges in Control
, pp. 181 - 198
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×