39 research outputs found

    AN OPEN DOOR MAY TEMPT A SAINT ā€“ DATA ANALYTICS FOR SPATIAL CRIMINOLOGY

    Get PDF
    The vast amounts of data that are generated and collected in todayā€™s world bear immense potential for businesses and authorities. Innovative companies already adopt novel analytics methods driven by competition and the urge of constantly gaining new insights into business operations, customer preferences, and strategic decision making. Nonetheless, local authorities have been slow to embrace the opportunities enabled by data analytics. In this paper, we demonstrate and discuss how latent structures unveil valuable information on an aspect of public life and communities we all face: criminal activity. On city-scale, we analyze the spatial correspondence of recorded crime to its physical environment, the public presence, and the demographical structure in its vicinity. Our results show that Big Data in fact is able to identify and quantify the main spatial drivers of criminal activity. At the same time, we are able to maintain interpretability by design, which ultimately allows deep informational insights

    Macrocriminology and Freedom

    Get PDF
    How can power over others be transformed to 'power with'? It is possible to transform many institutions to build societies with less predation and more freedom. These stretch from families and institutions of gender to the United Nations. Some societies, times and places have crime rates a hundred times higher than others. Some police forces kill at a hundred times the rate of others. Some criminal corporations kill thousands more than others. Micro variables fail to explain these patterns. Prevention principles for that challenge are macrocriminological. Freedom is conceived in a republican way as non-domination. Tempering domination prevents crime; crime prevention reduces domination. Many believe a high crime rate is a price of freedom. Not Braithwaite. His principles of crime control are to build freedom, temper power, lift people from poverty and reduce all forms of domination. Freedom requires a more just normative order. It requires cascading of peace by social movements for non-violence and non-domination. Periods of war, domination and anomie cascade with long lags to elevated crime, violence, inter-generational self-violence and ecocide. Cybercrime today poses risks of anomic nuclear wars. Braithwaiteā€™s proposals refine some of criminologyā€™s central theories and sharpen their relevance to all varieties of freedom. They can be reduced to one sentence. Strengthen freedom to prevent crime, prevent crime to strengthen freedom

    Macrocriminology and Freedom

    Get PDF
    How can power over others be transformed to 'power with'? It is possible to transform many institutions to build societies with less predation and more freedom. These stretch from families and institutions of gender to the United Nations. Some societies, times and places have crime rates a hundred times higher than others. Some police forces kill at a hundred times the rate of others. Some criminal corporations kill thousands more than others. Micro variables fail to explain these patterns. Prevention principles for that challenge are macrocriminological. Freedom is conceived in a republican way as non-domination. Tempering domination prevents crime; crime prevention reduces domination. Many believe a high crime rate is a price of freedom. Not Braithwaite. His principles of crime control are to build freedom, temper power, lift people from poverty and reduce all forms of domination. Freedom requires a more just normative order. It requires cascading of peace by social movements for non-violence and non-domination. Periods of war, domination and anomie cascade with long lags to elevated crime, violence, inter-generational self-violence and ecocide. Cybercrime today poses risks of anomic nuclear wars. Braithwaiteā€™s proposals refine some of criminologyā€™s central theories and sharpen their relevance to all varieties of freedom. They can be reduced to one sentence. Strengthen freedom to prevent crime, prevent crime to strengthen freedom

    QUEER APPALACHIA: TOWARD GEOGRAPHIES OF POSSIBILITY

    Get PDF
    Stereotypes about Appalachia abound through dubious and reductive representations of the ā€˜hillbillyā€™ icon. Sexuality and how it functions in Appalachia is usually cast from the outside as wild, violent, bestial, incestuous and generally base. Movies such as Deliverance and television shows such as The Beverly Hillbillies and The Dukes of Hazard render images of Appalachian sexuality as hyper-sexual, both naive and violent. These images of Appalachian sexual ignorance and violence that permeate popular culture have had problematic and reductive implications for rural gay/trans Appalachian folk. Mainstream gay culture has often used the perceived meanings of these images to circumscribe and foreclose upon the possibility of rural queer life, rendering the rural as monolithically homophobic and impenetrable. This research attempts to destabilize this perspective and critique the impulse for mainstream gay culture to further marginalize rural gay/trans folk in Appalachia. The project reveals the possibility for rural queer life to exist in Appalachia to show not only its presence, but also its varying forms of visibility. To do this, experimental methodologies are employed, drawing on autoethnography that have located my body as an active participant and research object in one particular Appalachian queer geography. By actively participating in a rural queer network, the possibility for Appalachian queer geographies to exist in ways that surpass popular representations emerge in a way that force us to renegotiate our understandings of homophobia and what sets its conditions. This project begins to uncover and theorize the ways in which kinship as a ā€˜social technologyā€™ mitigates social strangeness and operates as a means for social protection and intimacy within rural queer populations. This research is presented in a way that neither dismisses nor emphasizes homophobic violence, but rather argues the imperative for strong political advocacy that recognizes both the struggles and accomplishments of rural gay/trans folk. Three interlinked approaches are used to highlight these possibilities and foreclosures: the exterior representation of Appalachian sexuality in American metropolitan gay cultures and its politico-cultural effects on rural gay/trans folk, a more nuanced interpretation of homophobia in Appalachia, and how ā€˜placeā€™ is made through the operation of rural queer networks

    What People Leave Behind

    Get PDF
    This open access book focuses on a particular but significant topic in the social sciences: the concepts of ā€œfootprintā€ and ā€œtraceā€. It associates these concepts with hotly debated topics such as surveillance capitalism and knowledge society. The editors and authors discuss the concept footprints and traces as unintended by-products of other (differently focused and oriented) actions that remain empirically imprinted in virtual and real spaces. The volume therefore opens new scenarios for social theory and applied social research in asking what the stakes, risks and potential of this approach are. It systematically raises and addresses these questions within a consistent framework, bringing together a heterogeneous group of international social scientists. Given the multifaceted objectives involved in exploring footprints and traces, the volume discusses heuristic aspects and ethical dimensions, scientific analyses and political considerations, empirical perspectives and theoretical foundations. At the same time, it brings together perspectives from cultural analysis and social theory, communication and Internet studies, big-data informed research and computational social science. This innovative volume is of interest to a broad interdisciplinary readership: sociologists, communication researchers, Internet scholars, anthropologists, cognitive and behavioral scientists, historians, and epistemologists, among others

    What People Leave Behind

    Get PDF
    This open access book focuses on a particular but significant topic in the social sciences: the concepts of ā€œfootprintā€ and ā€œtraceā€. It associates these concepts with hotly debated topics such as surveillance capitalism and knowledge society. The editors and authors discuss the concept footprints and traces as unintended by-products of other (differently focused and oriented) actions that remain empirically imprinted in virtual and real spaces. The volume therefore opens new scenarios for social theory and applied social research in asking what the stakes, risks and potential of this approach are. It systematically raises and addresses these questions within a consistent framework, bringing together a heterogeneous group of international social scientists. Given the multifaceted objectives involved in exploring footprints and traces, the volume discusses heuristic aspects and ethical dimensions, scientific analyses and political considerations, empirical perspectives and theoretical foundations. At the same time, it brings together perspectives from cultural analysis and social theory, communication and Internet studies, big-data informed research and computational social science. This innovative volume is of interest to a broad interdisciplinary readership: sociologists, communication researchers, Internet scholars, anthropologists, cognitive and behavioral scientists, historians, and epistemologists, among others

    Cascades of Violence

    Get PDF
    War and crime are cascade phenomena. War cascades across space and time to more war; crime to more crime; crime cascades to war; and war to crime. As a result, war and crime become complex phenomena. That does not mean we cannot understand how to prevent crime and war simultaneously. This book shows, for example, how a cascade analysis leads to an understanding of how refugee camps are nodes of both targeted attack and targeted recruitment into violence. Hence, humanitarian prevention also must target such nodes of risk. This book shows how nonviolence and nondomination can also be made to cascade, shunting cascades of violence into reverse. Complexity theory implies a conclusion that the pursuit of strategies for preventing crime and war is less important than understanding meta strategies. These are meta strategies for how to sequence and escalate many redundant prevention strategies. These themes were explored across seven South Asian societies during eight years of fieldwork

    Michel Foucault, Social Policy and 'Limit-Experience'

    No full text
    This thesis considers whether the discipline of social policy can validly use the patterns and intentions implicit in Foucault's critique of modernity to develop a new qualitative approach to social theory. He examined the conditions under which various regimes of social and political practice came into being; how they are maintained and the particular manner of their transformation. There are two specific emphases that establish the pattern of my overall inquiry. The first involves a reflection on the troubled and ineffectual place of normative social theory within contemporary social policy discourse. The second is a reconsideration of Foucault's oeuvre in relation to new social theory building within social policy. Both of these concerns offer an opportunity to reflect on the place of social theory within a discursive world that 'appears' cosmopolitan and diverse. Foucault famously declared that the point of philosophical activity involved the endeavour to know how and to what extent it might be possible to think differently - to examine the functioning of our ideas as 'limit-experiences'. He coined this phrase 'limit-experience' to outline his critique of the 'forms of rationalizations' that comprise the present practice of politics within modernity. He thought the decisive question was how apparently 'universal, necessary, and obligatory discourses about political and social knowledge shapes that which ought more properly to be regarded as 'singular, contingent, and the product of arbitrary constraints'. The former injunctive and 'magisterial' arguments that supported initial patterns of welfare state rhetoric are no longer persuasive. There has been a 'sea-change' in contemporary social ideas - from a welfare state to a welfare society - one that is breath-taking in its hegemonic compass. That world is increasingly depicted as a postmodern social world where there is little apparent respect for, let alone reliance on, the grand metaphors and social themes of classic social policy. This reconsideration of Foucault's ideas from a social policy perspective will not necessarily yield a new compelling normative rhetoric but it will provide an opportunity to think differently about the taken-for-granted nature of so much social policy theorizing. His portrayal of how we might 'think differently' about the multitude of practices involved in the rationalizations and subjectifications of 'limit-experiences' provides an opportunity to reflect on the patterning and practices that construct the current discourses of welfare and social policy. We do need to think differently or at least to see if it is possible to do so. Imagining difference, strategizing for it, and welcoming it, mark us out as constantly restless - a personal style that Foucault embraced with some gusto

    Geo-Politics in Northeast Asia

    Get PDF
    Geo-Politics in Northeast Asia focuses on the dynamics of Northeast Asia as a region. The chapters in this book offer a nuanced approach for understanding the geo-politics of this strategically critical area of the world. Focusing on China, Japan, Russia, and the Koreas, as well as the involvement of the United States, the contributors to the volume offer a timely and critical analysis of Northeast Asia. They collectively emphasize the different scales at which the region holds significance, and particularly note how the region is often granted significance by local political forces as well as national interests. Borderlands and sub-regions are especially important in this perspective, and the contributors show both how regionalism influences the people living in these areas and how they in turn shape the political priorities of states. At the same time, the worsening of relations between Japan and the Koreas and the increasing assertiveness of both China and Russia make it essential to understand the dynamics of the region, as well as how they have changed during and following the Trump era. Geo-Politics in Northeast Asia is essential reading for students and scholars of Political Geography, International Relations and Strategic Studies, as well as for those with a research focus on Northeast Asia, or the wider Asia-Pacific and Indo-Pacific regions

    Contemporary security studies : an introduction to methodological, research and theoretical foundations of security

    Get PDF
    The monograph Contemporary Security Studies: An Introduction to methodological, research and theoretical foundations of security is the result of many years of comprehensive research of the phenomenon of security and the endangering of security and it is the outcome of the research effort aimed to prove the scientific character of the security field. The fact is that security in the Republic of Serbia is still not in the national nomenclature of scientific fields. Instead, it is claimed, with some reason, but far from having absolute right to it, by political scientists, jurists, soldiers, ecologists, and similar scientific and educational, and professional profiles. In spite of everything, the theory and practice of security have developed to the point of growing into an independent scientific field within the social and humanity sciences, and to a great extent within the natural and technical and technological sciences. Therefore, we expect security to be declared an independent scientific field within the social and humanity sciences, and this monograph to be one of the numerous and firm arguments in accomplishing that aim. Respecting the postulates of the methodology of scientific research, professional ethics in higher education and scientific and research activities, but also the standards of the Code of Ethics of Scientific and Research Work of the Academy of Criminalistic and Police Studies, it is our duty to briefly elaborate the history of this book. Specifically, the ideas for the texts on security, endangering of security, and the methodology of exploring security phenomena, have been taken from the traditional Belgrade Security School that has been developed for years in the Education and Research Centre of the Security Institute, the former (Service, Department of) State Security, in the Security Information Agency, at the Faculty of Security Studies, University of Belgrade (former Faculty of Civil Defence, before that, Faculty of National Defence), and in police education (the Secondary School of Interior Affairs in Sremska Kamenica, the College of Interior Affairs in Zemun, Police Academy in Belgrade, and the Academy of Criminalistics and Police Studies in Zemun). The presented scientific findings obtained scientific verification, to a smaller extent, by being published in the first and second edition of the course book National Security by the author SaÅ”a Mijaković PhD (Academy of Criminalistic and Police Studies, 2009, 2011). It was in the first three chapters of the course book (Methodological basis of national security, Security, and Endangering security), on around 100 pages. The development of scientific thought has led, over time, to the justified need for distancing the matter of the security basis/introduction to contemporary security studies from the matter of national security, and to intensive abstraction of the matter of the security basis in relation to the operationalized matter of the national security. The results of the distinction that refer to the basic categories of security are incorporated in this monograph. The scientific findings taken from the course book National Security (2009, 2011) constitute up to 30% of this monograph. Therefore, we strived to accomplish that Contemporary Security Studies: An Introduction to methodological, research and theoretical foundations of security meets all normative and ethic criteria of a new scientific publication, which was confirmed by the reviewers. Meanwhile, in the course book National Security (third edition, Academy of Criminalistic and Police Studies, Belgrade, 2015), these contents were, to a great extent, excluded and replaced by a new text. Finally, we were again honoured to have the publishing and copyrights remain in the hands of the Academy, to which we devoted our careers
    corecore