69,320 research outputs found

    Multi-community command and control systems in law enforcement: An introductory planning guide

    Get PDF
    A set of planning guidelines for multi-community command and control systems in law enforcement is presented. Essential characteristics and applications of these systems are outlined. Requirements analysis, system concept design, implementation planning, and performance and cost modeling are described and demonstrated with numerous examples. Program management techniques and joint powers agreements for multicommunity programs are discussed in detail. A description of a typical multi-community computer-aided dispatch system is appended

    Enhanced 911 Technology and Privacy Concerns: How Has the Balance Changed Since September 11?

    Get PDF
    E911 technology allows for the location of a cellular phone to be determined by the wireless service provider within several hundred feet. As a consequence, privacy groups have been extremely resistant to the implementation of E911. In the wake of the September 11 tragedies, however, the balance between privacy concerns and national security seems to have changed for many American citizens. This iBrief will explore the nature of the E911 technology, the FCC implementation requirements, the concerns of privacy groups regarding its implementation, and how the environment surrounding E911 has changed since September 11

    Secondary user relations in emerging mobile computing environments

    Get PDF
    Mobile technologies are enabling access to information in diverse environ.ments, and are exposing a wider group of individuals to said technology. Therefore, this paper proposes that a wider view of user relations than is usually considered in information systems research is required. Specifically, we examine the potential effects of emerging mobile technologies on end-­‐user relations with a focus on the ‘secondary user’, those who are not intended to interact directly with the technology but are intended consumers of the technology’s output. For illustration, we draw on a study of a U.K. regional Fire and Rescue Service and deconstruct mobile technology use at Fire Service incidents. Our findings provide insights, which suggest that, because of the nature of mobile technologies and their context of use, secondary user relations in such emerging mobile environments are important and need further exploration

    Responsibility modelling for civil emergency planning

    Get PDF
    This paper presents a new approach to analysing and understanding civil emergency planning based on the notion of responsibility modelling combined with HAZOPS-style analysis of information requirements. Our goal is to represent complex contingency plans so that they can be more readily understood, so that inconsistencies can be highlighted and vulnerabilities discovered. In this paper, we outline the framework for contingency planning in the United Kingdom and introduce the notion of responsibility models as a means of representing the key features of contingency plans. Using a case study of a flooding emergency, we illustrate our approach to responsibility modelling and suggest how it adds value to current textual contingency plans

    Implementation and Development of Vehicle Tracking and Immobilization Technologies

    Get PDF
    Since the mid-1980s, limited use has been made of vehicle tracking using satellite communications to mitigate the security and safety risks created by the highway transportation of certain types of hazardous materials. However, vehicle-tracking technology applied to safety and security is increasingly being researched and piloted, and it has been the subject of several government reports and legislative mandates. At the same time, the motor carrier industry has been investing in and implementing vehicle tracking, for a number of reasons, particularly the increase in efficiency achieved through better management of both personnel (drivers) and assets (trucks or, as they are known, tractors; cargo loads; and trailers). While vehicle tracking and immobilization technologies can play a significant role in preventing truck-borne hazardous materials from being used as weapons against key targets, they are not a & ”silver bullet.” However, the experience of DTTS and the FMCSA and TSA pilot projects indicates that when these technologies are combined with other security measures, and when the information they provide is used in conjunction with information supplied outside of the tracking system, they can provide defensive value to any effort to protect assets from attacks using hazmat as a weapon. This report is a sister publication to MTI Report 09-03, Potential Terrorist Uses of Highway-Borne Hazardous Materials. That publication was created in response to the Department of Homeland Security´s request that the Mineta Transportation Institute´s National Transportation Security Center of Excellence provide research and insights regarding the security risks created by the highway transportation of hazardous materials

    Mobile Mental Health Crisis Intervention in the Western Health Region of Newfoundland and Labrador

    Get PDF
    The impetus for this research is Recommendation #15 of the 2003 Luther Inquiry into the deaths of Norman Reid and Darryl Power: “IT IS FURTHER RECOMMENDED that the Regional Health Boards establish mobile health units to respond to mentally ill persons in crisis where no criminal offence is alleged. Each unit would be developed locally and based on local needs.” Our stakeholder partners in the Western Regional Health Authority asked us to identify a range of mobile crisis intervention service models, some of which may be better suited to lower-density, rural populations and some of which may be better suited to higher-density areas like Corner Brook. Our partners expressed a particular interest in models that can be implemented with minimal additional human resources, but that involve local, face-to-face contact rather than telephone, electronic, or clinic-based models of service delivery. The term “crisis intervention” generally refers to any immediate, short-term therapeutic interventions or assistance provided to an individual or group of individuals who are in acute psychological distress or crisis. The term encompasses a number of after-the-fact interventions – such as rape counseling and critical incident stress debriefing – that would not be relevant to the kinds of situations described in the Luther Report. Given the project parameters specified by our partners at Western Health, we formulated a research question and a literature search strategy that would enable us to focus specifically on forms of crisis intervention that are designed to manage potentially dangerous mental health crises on-site rather than to mediate their impacts after the fact. Our research question is as follows: “What models of mobile– i.e., face-to-face – crisis intervention have proven effective in managing potentially violent mental health crises occurring outside the hospital setting?

    Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement.

    Get PDF
    This exploratory study was conducted to better assess how technology can be used in criminal investigations; it is important to get a better understanding of how technology is currently employed in child sex trafficking as well as the approaches and needs of law enforcement. 144 investigators from Internet Crimes Against Children (ICAC) Task Forces and affiliate agencies responded to an online semi‐structured survey, including 45 investigators with experience conducting investigations of the commercial sexual exploitation of children (CSEC) that involved technology. Participants included investigators working in local, county, and state law enforcement agencies in the United States. The discussion suggested a great deal of variation in perspectives and experiences surrounding the problem of CSEC and technology. Investigators were able to highlight both benefits and obstacles. Benefits included the availability of digital evidence instead of relying on personal accounts, the monitoring capabilities of police, and the ability to conduct extensive undercover operations. Obstacles tended to focus on financial concerns, the continual need for training and technical assistance, and the rapidly changing technological environment. Findings highlight the vast complexity and variability in these crimes. There is still quite a bit of the unknown when it comes to investigating CSEC – technology changes rapidly and avenues for marketing and communicating are vast. Continual education, training and technical assistance are central to investigators’ needs in this area

    Responding to Cross Border Child Trafficking in South Asia: An Analysis of the Feasibility of a Technologically Enabled Missing Child Alert System

    Get PDF
    This report examines the feasibility of a technologically enabled system to help respond to the phenomenon of cross-border child trafficking in South Asia, and makes recommendations on how to proceed with a pilot project in the selected areas of Bangladesh, Nepal and India. The study was commissioned by the Missing Child Alert (MCA) programme which is an initiative led by Plan. MCA is an initiative to address cross-border child trafficking in South Asia, led by Plan. The aim of the programme is to link existing institutions, mechanisms and resources in order to tackle the phenomenon from a regional perspective. To achieve this, Plan propose to implement a technologically equipped, institutionalised system of alert that can assist in the rescue, rehabilitation, repatriation and reintegration of children who are at risk of, or are victims of, cross-border trafficking

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward
    corecore