1,046 research outputs found

    Police memory as a global policing movement

    Full text link

    Would Kitty Genovese have been murdered in Second Life? Researching the "bystander effect" using online technologies

    Full text link
    The increasing use of online technologies, including &lsquo;virtual worlds&rsquo; such as Second Life, provides sociology with a transformed context within which to ply creative research approaches to ongoing social issues, such as the &lsquo;bystander effect&rsquo;. While the &lsquo;bystander effect&rsquo; was coined following a real-life incident, the concept has been researched primarily through laboratory-based experiments. The relationship between &lsquo;virtual&rsquo; and &lsquo;real&rsquo; world environments and human behaviours are, however, unclear and warrant careful attention and research.In this paper we outline existing literature on the applicability of computer-simulated activity to real world contexts. We consider the potential of Second Life as a research environment in which &lsquo;virtual&rsquo; and &lsquo;real&rsquo; human responses are potentially more blurred than in real-life or a laboratory setting. We describe preliminary research in which unsolicited Second Life participants faced a situation in which they could have intervened. Our findings suggest the existence of a common perception that formal regulators were close at hand, and that this contributed to the hesitation of some people to personally intervene in the fraught situation. In addition to providing another angle on the &lsquo;bystander effect&rsquo;, this research contributes to our understanding of how new technologies might enable us to conduct social research in creative ways.<br /

    Good citizens: how student council impacts socialization norms at Dr. Martin Luther King, Jr. School Complex

    Get PDF
    This study sought to learn how peer group behavior patterns among middle school students change for the better with the emergence of a student council. The setting was the Dr. Martin Luther King, Jr. School Complex in Atlantic City, New Jersey. The school had undergone several reconfigurations to the student body in prior years. Since then it has been difficult to maintain a student body culture that was both stable and suitable for substantial academic achievement. This study was organized along the continuum of the academic calendar and interwoven within the customs and routines of the school. It took advantage of the inclinations of students (age 11-14) to belong with influential social groups and to express independence of adult authority by promoting the role of a student council. The study had three phases. Planning and organizational was phase one. Phase two was characterized by implementation, observation and recording. The final phase included culmination and analysis of the project\u27s impact

    Crime risks of three-dimensional virtual environments

    Full text link
    Three-dimensional virtual environments (3dves) are the new generation of digital multi-user social networking platforms. Their immersive character allows users to create a digital humanised representation or avatar, enabling a degree of virtual interaction not possible through conventional text-based internet technologies. As recent international experience demonstrates, in addition to the conventional range of cybercrimes (including economic fraud, the dissemination of child pornography and copyright violations), the \u27virtual-reality\u27 promoted by 3dves is the source of great speculation and concern over a range of specific and emerging forms of crime and harm to users. This paper provides some examples of the types of harm currently emerging in 3dves and suggests internal regulation by user groups, terms of service, or end-user licensing agreements, possibly linked to real-world criminological principles. This paper also provides some directions for future research aimed at understanding the role of Australian criminal law and the justice system more broadly in this emerging field

    Surveillance technology and territorial controls: governance and the ‘lite touch’ of privacy

    Get PDF
    This paper argues that privacy has limited influence on the use of new and untested surveillance technologies in contemporary Australian law enforcement, in part due to the construction of current privacy laws and oversight principles. Abstract: The considerable growth of surveillance technologies, dataveillance and digital information processing has occurred across many domains, including the night-time economy. We explore a particular technology (ID scanners) and the connections between this form of surveillance and associated database construction with the broader use of new forms of territorial governance. In turn, we argue that privacy, at least in the context of Australia, has limited influence on the use of new and untested surveillance technologies in contemporary law enforcement. In part, this is due to the construction of current Australian privacy laws and oversight principles. We argue this in itself does not solely account for the limitations of privacy regimes, as recent Canadian research demonstrates how privacy regulation generates limited control over the expansion of new crime prevention technologies. However, a more telling problem involves the enactment of new laws allowing police and venue operators to exclude the undesirable from venues, streets and entertainment zones. These developments reflect the broader shift to governing through sub-sovereign territorial controls that seek to leverage many current and emerging surveillance technologies and their normalisation in preventing crime without being encumbered by the niceties of privacy law

    Global policing and the case of Kim Dotcom

    Get PDF
    In early 2012, 76 heavily armed police conducted a raid on a house in Auckland, New Zealand. The targets were Kim Dotcom, a German national with a NZ residency visa, and several colleagues affiliated with Megaupload, an online subscription-based peer-to-peer (P2P) file sharing facility. The alleged offences involved facilitating unlawful file sharing and United States federal criminal copyright violations. Following the raid, several court cases provide valuable insights into emerging &lsquo;global policing&rsquo; practices (Bowling and Sheptycki 2012) based on communications between sovereign enforcement agencies. This article uses these cases to explore the growth of &lsquo;extraterritorial&rsquo; police powers that operate &lsquo;across borders&rsquo; (Nadelmann 1993) as part of several broader transformations of global policing in the digital age

    ID scanners in the night time economy

    Full text link
    ID scanners are quickly emerging as a new technological fix to long-standing problems of security and safety within licensed venues. Yet at this point in time detailed research of this rapidly expanding security technology is remarkably limited. To address this analytical deficit we are currently examining the uptake of ID scanners in licensed venues operating in the night-time economy. We have found significant interest in the implementation of ID scanners in other Australian cities. However, the introduction of ID scanners in late-night licensed venues has occurred with little public awareness, no policy consideration and questionable claims concerning their effectiveness in enhancing safety and reducing crime. This article explores the factors shaping the introduction of ID scanners and the underlying beliefs concerning their utility as a crime prevention technology. The article then considers some broader implications to be explored in future analyses

    Surveillance, Governance and Professional Sport

    Full text link
    The surveillance capacities of professional sports clubs and Leagues are directly related to their modes of governance. This paper identifies how private sports clubs enact surveillance through processes of inclusion and exclusion. Using three examples to demonstrate these processes, we argue that the surveillance mechanisms associated with sports governance at times replicate, at other times contradict, and at other times influence those associated with broader law enforcement and security developments. These examples also suggest potential increases in surveillance activities that emerge in club governance often flow from external concerns regarding allegations of crime, national security breaches and corruption. These context-specific case studies (Flyvbjerg 2001) demonstrate how surveillance and identity authentication are closely tied to the complex, multi-tiered governance structures and practices in three distinct sports. We then explore how these patterns can be interpreted as either connected to or distinct from equivalent developments involving the surveillance surge (Murakami Wood 2009) and concepts of inclusion and exclusion under the criminal law. We conclude by discussing how both internal and external regulatory forces can shape interrelated facets of surveillance, governance and exclusion in elite sports

    ID scanning, the media and the politics of urban surveillance in an Australian regional city

    Full text link
    Computerised ID scanning technologies have permeated many urban night-time economies in Australia, the United States, Canada and the United Kingdom. This paper documents how one media organisation&rsquo;s overt and tacit approval of ID scanners helped to normalise this form of surveillance as a precondition of entry into most licensed venues in the Australian city of Geelong. After outlining how processes of governance &ldquo;from above&rdquo; and &ldquo;from below&rdquo; interweave to generate distinct political and media demands for strategies to prevent localised crime problems, a chronological reconstruction of media reports over a three-and-a half year period demonstrates how ID scanning became the centrepiece of a holistic reform strategy to combat alcohol-related violence in this nightclub precinct. Several discursive techniques helped to normalise this &ldquo;technological fix&rdquo;, while suppressing critical discussion of viable concerns over information privacy, data security and system networking. Theseincluded pairing reports of an initial &ldquo;signal crime&rdquo; with examples of &ldquo;virtual victimhood&rdquo; to stress the urgency of a radical surveillance-based response, which was supported by anecdotal statements from key &ldquo;primary definers&rdquo; highlighting the success of this initiative in targeting a wider population of antisocial &ldquo;others&rdquo;. The implications of these reporting practices are discussed in light of the media&rsquo;s central role in reforming the Geelong night-time economy and broader trends in using novel surveillance technologies to combat urban crime problems at the expense of alternative measures that protect individual liberty

    ID scanners and überveillance in the night-time economy: crime prevention or invasion of privacy?

    Full text link
    ID scanners are promoted as an effective solution to the problems of anti-social behavior and violence in many urban nighttime economies. However, the acceptance of this and other forms of computerized surveillance to prevent crime and anti-social behavior is based on several unproven assumptions. After outlining what ID scanners are and how they are becoming a normalized precondition of entry into one Australian nighttime economy, this chapter demonstrates how technology is commonly viewed as the key to preventing crime despite recognition of various problems associated with its adoption. The implications of technological determinism amongst policy makers, police, and crime prevention theories are then critically assessed in light of several issues that key informants talking about the value of ID scanners fail to mention when applauding their success. Notably, the broad, ill-defined, and confused notion of &quot;privacy&quot; is analyzed as a questionable legal remedy for the growing problems of &uuml;berveillance
    • …
    corecore