79 research outputs found

    Developments in the Australian Private Security Industry

    Get PDF
    Police necessarily retain the major role in enforcing the law after crimes have been committed and offenders have been apprehended. However, given that public sector policing draws heavily on equipment and personnel services supplied by private providers, and that public police officers have many offenders handed over to them by the private sector, private security could be considered ā€˜the primary protective resourceā€™ (Pastor 2003, p. 44). Despite this, there is very little information publicly available on the range, size and scope of security industries in Australia and there is no comprehensive study of the growth of these industries, the functions of their different components, how they relate to each other and the effectiveness of different regulatory strategies. This paper reports on current aspects of the security industry in Australia as part of a wider study of these issues more generally

    Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process

    Get PDF
    There have been great strides taken in Australia recently to make our courts safer, principally through an emphasis on risk management. After all, governments have a responsibility to protect those who work in, or who visit, court precincts. A greater understanding of how court safety can be enhanced by managing people, curial processes and the court environment requires assessing the physical mechanisms of risk management alongside a ā€˜needs-focusā€™ of stakeholdersā€™ safety considerations. At the same time there must be a focus on enabling participation and well-being in justice processes. By examining the way in which courts now operate around Australia and the developments in security intelligence, court design and processes, this paper seeks to outline how access to safe justice is possible

    Defining Identity Crimes

    Get PDF
    The objective of this paper is to report on the definitions of the terms used and in use across different regions for identity crime, namely, identity fraud, identity theft, and identity deception. The purpose is to clarify the meaning of the terms used with a view to gaining a consensus amongst the various stakeholders. This consensus is essential to enable further research. Without consensus measurement and comparisons are meaningless. Our study of identity fraud has an industry-driven research agenda. A grounded theory research methodology is used when interviewing government agencies and private organisation participants. Interviews sought to better understand current information and communications technology (ICT) practitionersā€™ security and privacy issues with respect to identity fraud perpetrator attacks. We found there to be consensus among stakeholders for the meaning of identity fraud and identity theft but less agreement for identity deception

    The dock on trial: courtroom design and the presumption of innocence

    Get PDF
    This article examines the place of the criminal dock in courtroom design. Challenges to the use of the dock have been based upon the inability of the defendants to hear effectively, to communicate with counsel, to maintain their dignity, and to benefit from the presumption of innocence. Increasingly courts are incorporating secure docks, where defendants are partially or completely surrounded by glass (or in some countries, metal bars). To what extent do these changes and modifications undermine the right to the presumption of innocence? We present the results of an experimental mock jury study that was designed to test whether the placement of the accused influences jurorsā€™ perceptions. We find that jurors are more likely to convict defendants when they are located in a traditional dock or a secure dock, compared to sitting next to their counsel at the bar table. We conclude by discussing the implications for trial procedures, counsel communications, and courtroom design

    The ā€˜three-pillars model of regulationā€™: a fusion of governance models for private security

    Get PDF
    The growth in size, role and authority of private security has triggered a variety of regulatory reactions. These have stimulated a growing academic debate on preferred regulatory models. This paper summarizes the key existing models of regulation. It then provides a critique of the observations of Loader and White (Regul Gov 11(2):166ā€“184, 2017) on the existing models. It critically examines their proposed model and outlines how we believe that private security regulation can be enhanced by setting out ā€˜three-pillarsā€™ of effective regulation. The literature and research points towards the need for a regulatory pillar that enhances the wider private security sector, a distributive pillar that addresses security inequality and lastly a responsibility pillar designed to align the private security industry with the public interest

    Ten ā€œBig Bangsā€ in Theory and Practice that Have Made a Difference to Australian Policing in the Last Three Decades

    No full text
    This paper discusses what could be considered the top ten innovations that have occurred in policing in the last thirty years. The intent is to focus attention on how practice could be further inspired by additional innovation. The innovations are discussed here as ā€œBig Bangsā€ as a way of drawing attention to the significant impact they have had on policing, in the same way that the cosmological Big Bang was an important watershed event in the universeā€™s existence. These ten policing innovations ushered in, it is argued, a new mindset, pattern or trend, and they affected Australian policing profoundly; although many had their roots in other settings long before Australian policy-makers implemented them
    • ā€¦
    corecore