首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Martin Innes (2006) has called attention to a recent revitalization of community policing in the Anglo-American policing sphere, albeit in new forms and variations. The discursive and concomitant policy shift in Britain away from ‘community policing’ towards notions of ‘reassurance’ and ‘neighbourhood’ policing has not gone unnoticed in Sweden. Good ideas appear to travel readily eastwards from their British contexts to find translations in the Swedish context. Subsequently, in 2006 the regional police commander in the Stockholm metropolitan area initiated a new community policing programme with the establishment of 10–15 so-called local police offices in targeted depressed areas of the region, and by the end of 2009 there will be a total of 27. The overall goal of the programme is to create a sense of security among residents in these areas and to build upon and sustain the residents' trust and confidence in the police, while at the same time working towards achieving a reduction in crime and maintaining respect for law and order. In this paper I interrogate the translation processes whereby the notions of ‘reassurance’ and ‘neighbourhood’ policing have been partially adopted, adapted, and implemented in a Swedish policing context—collective translation processes that have been wrought with points of friction, i.e. both creative and unproductive resistance.  相似文献   

2.
This article examines the policing of a major international political event (the G20 Meetings in Brisbane, Australia in 2014) from the perspective of the police and representatives of demonstrator groups who participated in the event. The article locates the policing of the 2014 G20 meetings within the history of the policing of major international political meetings in other countries. It analyses the legal framework within which the policing of the Brisbane G20 meeting was undertaken, comparing and contrasting these with legal frameworks developed for similar meetings and associated demonstrations in other jurisdictions. In the case of the Australian G20 Act, the legislation prioritized security over human rights, including the freedoms of expression and peaceful assembly. The strategies and planning processes applied by police in the lead up to the G20 are discussed, including the efforts made to ensure policing responses were respectful of the democratic rights of protesters. Drawing on interview and other data, the article reveals a diversity of perspectives on the ‘human rights’ policing and dialogue models, and provides an assessment of ‘Operation Southern Cross’ based on the post-event review of the G20 legislation undertaken by the Queensland Crime and Corruption Commission. The authors conclude that the policing of G20, based on extensive dialogue and minimization of coercive public order strategies, fostered a peaceful G20 event. The article concludes with observations about the perceived success of G20 policing in Australia, and indicates some lessons learned for best practice policing for future global events.  相似文献   

3.
Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security – one of the three pillars of the EU cyber security policy – the question is whether the legal ‘patchwork’ is helping to ‘patch’ the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity.  相似文献   

4.
Previous researchers have contended that private policing has increased substantially in recent years, particularly in the area of private security. This article reexamines that increase and compares it to growth in a variety of public policing agencies. In contrast to previous research, the present findings suggest that the growth of public policing agencies has been as great or greater than that of policing organizations in the private sector. The findings raise important questions regarding the definition and image of policing. These issues are discussed in light of debates concerning ideology and surveillance in late capitalist society.  相似文献   

5.
This study examines policing in Macau and identifies major forces that have shaped its transformation over past decades. Prior to 1999, Macau was a Portuguese colony. Its criminal justice system inherited key features of the Continental system, including two independent law enforcement agencies: the Judiciary Police and the Public Security Police. In the colonial era, expatriate commanders drawn from the military or legal professions headed both departments, while the rank-and-file was composed mainly of local Chinese. This policing mechanism, together with the ‘laissez-faire’ policing philosophy adopted by colonial leaders, created segregation between policing agencies and the community. Citizens preferred minimal interaction with police, since they were skeptical about their professionalism, capability, and reliability. Macau became part of the Peoples’ Republic of China in 1999. The de-monopolization of the gaming industries in 2002 brought huge GDP growth, but generated internal social conflict. Growing public demand for accountable governance motivated a series of governmental reforms, some of which have extended to policing. These reforms have improved the transparency of policing, but it remains to be seen if they will ultimately succeed in generating public trust in the police forces.  相似文献   

6.
ABSTRACT

Evidence-based policing is rapidly becoming adopted by policing agencies among policing jurisdictions. Many academic programmes have been established in higher education to train police managers in applied criminology. However, there is a lack of literature for police officer practitioner researchers (POPR) who might undertake qualitative research, especially research projects that examine police behaviour. This paper reflects on the changing role of the practitioner-researcher and suggests that police officers undertaking qualitative research need to learn to ‘switch off their police role’ and ‘switch on their researcher role’. The author’s insights are drawn from his own experience of qualitative fieldwork working with police officers from New Zealand Police and South Australian Police.  相似文献   

7.
ABSTRACT

Racial bias afflicts police practices across the globe. Police discrimination against and mistreatment of racial and ethnic minorities is indeed difficult to underestimate. While much attention has been thus paid to racially biased policing, fewer studies examine the question from the reverse angle, namely how the police themselves combat racist offences. This article offers empirical insights into the policing of racial hatred in Sweden, a relevant yet relatively understudied case. Drawing on interviews with police officers and crime investigators, I discuss law enforcement perspectives, e.g. perceptions and reasoning in relation to the investigation of racist offences. Findings evince a rather narrow approach as regards the constructions of racist motive that involves a relatively restricted use of bias labelling in identifying hate incidents, especially when the boundaries of racial hostility are perceived as blurred. I argue that while such an approach may reflect a legitimate effort to demonstrate the existence of a motive behind an offence, it may also lead to an underestimation of more mundane forms of racism and their harms inflicted upon racialized individuals and communities. The results have implications for ‘recognition’ and ‘belonging’ as benchmarks of democratic policing, and ‘the promise of inclusion’ associated with combatting hate crimes.  相似文献   

8.
ABSTRACT

Federal funding streams, the International Association of Chiefs of Police, and policing executives and scholars alike have advocated for more researcher-practitioner partnerships in American law enforcement. While a few studies have explored the growth and prevalence of research partnerships in policing, less attention has been placed on the organizational correlates of such collaborative relationships. Using a nationally representative sample of US law enforcement agencies, the current study investigated participation in what we term ‘rigorous partnerships’ – more formal, long-term relationships between researchers and practitioners with increased opportunity for interactive knowledge exchange. Policy implications and directions for future research are discussed, with a specific focus on the barriers and impediments that both parties face for successful collaborative efforts and research translation.  相似文献   

9.
王智军 《河北法学》2004,22(12):103-108
治理理论对国家与市民社会关系的认识思路是国家和市民社会相互"型塑"达致社会公共事务管理的"善治"。在国内外警务战略模式变革中成为潮流的"国家警事社会化"战略,是指在警察机关专业警务活动的同时,动员社会组织和社区公众共同参与防控违法犯罪、维护社会治安秩序活动的过程。显然,"国家警事社会化"寻求警察与社会组织及社区公众的互动合作基础上公共安全管理的改善。因为警察与国家的对应、社会组织及公众正是市民社会的具象,所以可以用治理理论作为分析"国家警事社会化"的框架,并将其定义为"警事治理"。  相似文献   

10.
How does a configuration of policing work regardless of the differences among its constituent members, who may relate to various social fields and range from for-profit organizations to law-enforcement and other state agencies? The article aims at providing some of the answers to this critical question in the light of financial policing, at the interface between the fields of finance and security. With the emphasis on money laundering and terrorist financing, financial policing resonates with other policing configurations that are ‘partly detached from the institutions of the police and start referring to a more general associative practice of assembling risk knowledge, technologies and agencies into networks that govern through rendering and distributing risks’ (Huysmans 2014). The paper argues that everyday financial policing is based on a misunderstanding, as both its current condition of possibility and the fundamental structure of communication between the involved parties. This focus on misunderstanding contributes to question traditional interpretations of (national and/or international) partnership against policing-related public problems. To help understand the paradoxical and controversial productivity of misunderstanding as a sine qua non condition of policing, the article draws on a transatlantic perspective with empirical research in the European Union Institutions, the United Kingdom and Canada.  相似文献   

11.
ABSTRACT

Security services regulations in the United States began formally in the second half of the twentieth century. Many states – never the federal government – first set and then increased, and sometimes decreased, standards over the years. With the shock from the events of 11 September 2001 (9/11) and the subsequent war on terrorism, the pace of regulatory growth increased. Even so, regulations for security personnel – especially security guards – remain at an indefensibly low level with 12 states having no requirements at all for unarmed security personnel and 14 having none for armed. Yet along the way, regulatory pre-employment screening requirements have incrementally improved, training demands, less so. Expecting a security officer with zero-to-a-few hours preassignment training to be a competent first responder, a skilled communicator with the public, a knowledgeable person about applicable law, an informed user of security technology, and a worker educated on the mission and operations of the workplace is not a convincing point of view. The security industry espouses higher standards, including through regulation, but then does not act upon its aspirations. For other security services – alarm installation and monitory personnel, investigators/private detectives, and locksmiths – regulations vary widely according to state. They don’t exist at all for security consultants. This article comments on and reviews regulations for all these security services.  相似文献   

12.
What is the relationship between security policies and democratic debate, oversight and rights? Does coping with security threats require exceptions to the rule of law and reductions of liberties? The inquiry that follows tries to answer such questions in the context of the European Union and takes the case of biometric identification, an area were security considerations and the possible impact on fundamental rights and the rule of law are at stake. Some hypotheses are explored through the case study: “securitisation” and “democratisation” are in tension but some hybrid strategies can emerge; the plurality of “authoritative actors” influences policy frames and outcomes; and knowledge is a key asset in defining these authoritative actors. A counter-intuitive conclusion is presented, namely that biometrics, which seems prima facie an excellent candidate for technocratic decision-making, sheltered from democratic debate and accountability – is characterised by debate by a plurality of actors. Such pluralism is limited to those actors who have the resources – including knowledge – that allow for inclusion in policy making at EU level, but is nevertheless significant in shaping policy; it explains the central role of the metaphor of balancing security and democracy, as well as the “competitive cooperation” between new and more consolidated policy areas. The EU is facing another difficult challenge in the attempt at establishing itself as a new security actor and as a supranational democratic polity: important choices are at stake to assure that citizens’ security is pursued on the basis of the rule of law, respect of fundamental rights and democratic accountability.  相似文献   

13.
Contemporary public health advocacy promotes a ‘fifth wave of public health’: a ‘cultural’ shift wherein the public's health becomes recognized as a common good, to be realized through concerted developments in the institutional, social, and physical environments. With reference to examples from anti-tobacco policy, in this article I critically examine the fifth-wave agenda in England. I explore it as an approach that, in the face of liberal individualism, works through a ‘long-game’ method of progressive social change. Given the political context, and a predominant concern with narrow understandings of legal coercion, I explain how efforts are made to apply what are presented as less ethically contentious framings of regulatory methods, such as are provided by ‘libertarian paternalism’ (‘nudge theory’). I argue that these fail as measures of legitimacy for long-game regulation: the philosophical foundations of public health laws require a greater – and more obviously contestable, but also more ambitious – critical depth.  相似文献   

14.
Especially given the invasion of Iraq, a growing number of criminologists have been attending to the transformation of state power and security within a neo-liberal political context. Although the capacity and influence of the state is not disappearing altogether there is a discernible erosion of authority within the sovereign state. In the realm of policing, we witness continued fragmentation of authority in which state power is relinquished to expanding commercial markets. The de-coupling of policing and government raises serious questions about the changing architecture of liberal democratic societies, prompting concerns over the waning monopoly of legitimate coercion. The project here explores the controversy over the use of private military firms in occupied Iraq, particularly the recent killings of civilians by Blackwater personnel. While offering specific details of those incidents, the analysis elaborates on state–corporate crime by revealing how state power is dispersed to the private sector; by doing so, the article examines how private military personnel evade prosecution for war crimes and other human rights abuses.  相似文献   

15.
The aim of this article is to explore cultural and practical aspects of the growing use of information and communication technology (ICT) in policing. By using empirical research on policing in Norway, the focus will be on how ICT is used as a crime prevention instrument in everyday police work and culture. The transition, which the new technologies mediate, will be explored by focusing on concepts of risk and materialization of risk‐based policing at the practice level in two cases: 1) a special unit fighting serious and organized crime utilizing proactive policing methods, police informers, crime profiling and databases, and 2) a police station focusing on low‐level crime by using a problem‐oriented policing model, transmitting responsibility for personal security onto identified ‘problem‐owners’.1 ‘Problem‐owner’ is a notion used by the police in the two cases. It is referring to the POP‐model, and whom they identify as important to participate in the risk‐management. According to Wright (: 121): “Partnership refers to a purposeful relationship between the police and the public or between the police and other agencies in the field.” Based on an examination of risk phenomena as contextual, embedded in practice and cultural settings, various stories about risk management will be told. The stories reflect different control strategies in the crime control discourses, and point to how risk‐based technologies are shaped and adapted in occupational culture and practice. The article illuminates the importance of studying the empirical complexity ICT is used in, and looks towards, to paraphrase O'Malley and Palmer (), ‘firewalls of resistance’ in the local occupational culture, that are preventing full integration of risk tools.  相似文献   

16.
Literature defining ‘police legitimacy’ lacks qualitative research on those populations most often targeted by law enforcement agencies, including people of color in urban areas. This same literature defines police legitimacy as something unquestionable and automatic. Exploration of this concept is limited to strategies to increase public ‘trust’ in police, and public compliance to their authority. We address these limitations in the available scholarship through an analysis of interviews with a diverse sample of Oakland (CA) residents on their experiences with the Oakland Police Department (OPD). Their narratives are presented in the historical context of controversy, budget problems, federal investigations, and racialized violence that help to define the relationship between OPD and Oakland communities. Those interviewed, universally observed OPD’s failure to address the most common crime problems in the city, while others, particularly people of color, found them to be a personal or public threat to safety. Their narratives fly in the face of the manifest functions of municipal police forces, are fully supported by the contemporary empirical history of the OPD, and suggest the illegitimate authority – including the monopoly on the use of force – of organizations like OPD in a democratic society.  相似文献   

17.
A convergence of post-9/11 security governance practices and a dependence on extractive economies has resulted in changes to the way Canadian policing agencies classify environmental movements. We detail how the category of ‘critical infrastructure protection’ (CIP) now enables surveillance of environmentalists under the banner of national security. We examine the growth of CIP as a security category, its changing character from the Cold War to the present, and the role of threat entrepreneurs. We demonstrate that CIP networks have institutionalized collaborations between national security agencies and energy corporations, creating a petro-security apparatus that aims to suppress dissent. We conclude with reflections on what surveillance regimes driven by the petro-security apparatus mean for debates about national security and social movements.  相似文献   

18.
This paper presents work conducted as part the ‘Shades of Grey’ (EP/H02302X/1) research project that aims to develop scientific interventions for the detection of suspicious behaviors in public spaces. To provide an understanding of security and counter-terrorism work in different contexts the project adopted a human factors approach as part of a program of user requirements gathering exercises. These activities focussed on the needs of different end-users and stakeholders, ranging from frontline security personnel, managers and strategic security policy makers. By taking a user-centred approach, the discipline of human factors can be integrated into the security/counter-terrorism domain to support the design of practical security solutions. This paper presents a case study investigation using data collected from three security agencies. Common themes are explored, ranging from ‘the importance of temporal measures’ to ‘enhancing positive user experiences’. These factors are discussed in relation to the practical application of human factors methods within security research.  相似文献   

19.
In October 2016, the Home Secretary ruled out a public inquiry into the ‘Battle of Orgreave', arguing that ‘very few lessons’ could be learned from a review of practices of three decades ago. It was suggested that policing has undergone a progressive transformation since the 1984–5 miners’ strike, at political, legal, and operational levels. This article, in contrast, charts a significant expansion of state control over public protest since the strike, including a proliferation of public order offences and an extension of pre‐emptive policing powers. Whilst concerns have been raised about the impact of these developments on protest rights, there is an absence of socio‐legal research into the operation of public order powers in practice. In this article, I begin to fill this lacuna. Drawing on three empirical case‐studies of protesters’ experiences of arrest and the criminal justice process, I highlight the relevance of Orgreave for contemporary policing practice.  相似文献   

20.
This paper engages with contemporary discussions in relation to the commodification of policing and security. It suggests that the existing literature regarding these trends has been geared primarily towards commercial security providers and has failed to address the processes by which public policing models are commodified and marketed both within, and through, the transnational policing community. Drawing upon evidence from the police change process in Northern Ireland, we argue that a Northern Irish Policing Model (NIPM) has emerged in the aftermath of the Independent Commission on Policing (ICP) reforms. This is increasingly branded and promoted on the global stage. Furthermore, we suggest that the NIPM is not monolithic, but segmented, and targeted towards a number of different ‘consumers’ both domestically and transnationally. Reflecting these diverse markets, the NIPM draws upon two seemingly incongruous constituent elements: the ‘best practice’ lessons of policing transition, as embodied in the ICP reforms; and, the legacy of counter-terrorism expertise drawn from the preceding decades of conflict. The discussion concludes by querying as to which of these components of the NIPM is in the ascendancy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号