If You Build It, They Will Come: Consequences of Improved Citizen Complaint Review Procedures

2002 ◽  
Vol 48 (3) ◽  
pp. 355-379 ◽  
Author(s):  
John L. Worrall

This study tests the hypothesis that when law enforcement agencies make improvements in their citizen complaint review procedures, a likely consequence is more complaints. Findings from a survey of 700 law enforcement agencies suggest that improvements in citizen complaint procedures result in a higher incidence of complaints. Additionally, certain combinations of citizen complaint review procedures are highly associated with the incidence of complaints. Two recommendations are made: (a) researchers and policy makers need to be attuned to the fact that more complaints will be filed when complaint procedures are reformed, and (b) law enforcement agencies need to be “careful what they ask for;” a higher complaint rate, although a desirable consequence of improved complaint review procedures, could result in unanticipated consequences.

2019 ◽  
pp. 1159-1175
Author(s):  
Nimisha Singh

Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments to avoid and mitigate cloud fraud and abuse. Taking counter measures at organizational level, will alleviate and up to an extent eliminate security breaches. With current knowledge on policy and standards adopted by developed nations, the policy makers and law enforcement agencies in developing countries can work towards formulating standards and guidelines for awareness on threats, vulnerabilities and effectiveness of security controls to respond to risk.


2018 ◽  
pp. 1334-1350
Author(s):  
Nimisha Singh

Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments to avoid and mitigate cloud fraud and abuse. Taking counter measures at organizational level, will alleviate and up to an extent eliminate security breaches. With current knowledge on policy and standards adopted by developed nations, the policy makers and law enforcement agencies in developing countries can work towards formulating standards and guidelines for awareness on threats, vulnerabilities and effectiveness of security controls to respond to risk.


2021 ◽  
Vol 1 (6) ◽  
pp. 39-47
Author(s):  
Tonui Paul Kiprugut ◽  
Panuel Mwaeke ◽  
Wokabi Mwangi

This paper established prevalence of the characteristics in the shoplifting crimes and determined the supermarket operators’ perception of the effects of shoplifting crimes on society. The study was guided by three objectives: to establish offender characteristics of the shoplifting crimes, to establish prevalence of the characteristics in the shoplifting crimes and to determine the supermarket operators’ perception of the effects of shoplifting crimes on society. The study was guided by Rational Choice and the Routine Activity Theories. The study used a census sampling technique with a sample size of a hundred respondents. These included 90 junior employees of Tuskys, Uchumi and Naivas Supermarkets, 3 branch managers, 3 police officers within the area of the study and 4 officials of the Nairobi Supermarkets Association. Interview schedule was used to collect data. Data collected was organized, summarized and interpreted thematically by use of graphs, frequency tables, and percentages. The findings revealed that the prevalence of shoplifting was 1-2 incidences in a week. The results also revealed that the most commonly used method was concealing of items which were majorly done by women. Further, whereas there are other types of shoplifters, a concern raised by 30% of the respondents is that significant number of criminals has made shoplifting a career. This should inform policy makers, especially in this era of unprecedented unemployment. Additionally, as indicated by 55% of the respondents, staff colluded with criminals to steal from the supermarkets. This should appeal to supermarket operators as this may have an implication on supermarket businesses in the CBD. The study recommends several target hardening strategies to counter shoplifting crimes that included using high Radio-frequency identification (RFID) and Electronic Article Surveillance (EAS) programmed surveillance and records linked to the law enforcement through alarm trigger alerts in case of suspicious activities, with high-quality identifiable traceable images of shoplifters, to local law enforcement agencies.


Crime Science ◽  
2020 ◽  
Vol 9 (1) ◽  
Author(s):  
Abigail C. O’Hara ◽  
Ryan K. L. Ko ◽  
Lorraine Mazerolle ◽  
Jonah R. Rimer

Abstract Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Methods Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. Findings The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and unauthorised access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) unauthorised access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Conclusion Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.


2009 ◽  
Vol 20 (3) ◽  
pp. 261-273 ◽  
Author(s):  
William V. Pelfrey

As an artifact of the war on terror, local law enforcement agencies have been asked to serve as the “eyes and ears” of federal intelligence agencies. The federal Office of Domestic Preparedness (ODP) has assembled a set of guidelines to assist agencies in terrorism prevention and weapons of mass destruction identification. However, there is a dearth of metrics and measurement tools available to assess preparedness. Based on ODP guidelines, a methodology to tap preparedness levels is defined. Additionally, preliminary findings from an assessment of a large law enforcement agency are presented. Application of this methodology will enhance the preparedness of local agencies by identifying areas of strength and those areas which require attention. Once these deficit areas are defined, policy makers can define appropriate training and programmatic changes.


Author(s):  
Nimisha Singh

Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments to avoid and mitigate cloud fraud and abuse. Taking counter measures at organizational level, will alleviate and up to an extent eliminate security breaches. With current knowledge on policy and standards adopted by developed nations, the policy makers and law enforcement agencies in developing countries can work towards formulating standards and guidelines for awareness on threats, vulnerabilities and effectiveness of security controls to respond to risk.


2021 ◽  
Vol 15 (1) ◽  
pp. 102
Author(s):  
Husni Thamrin

This paper aims: 1. To analyze the factors that cause forest and land fires that often occur throughout the year 2. To analyze the impact of forest and land fires using the Socio-Eco-Religio-Culture approach 3. To provide solutions to the impact of forest and land fires using the Socio- Eco-Religio- Culture approach.  The method used is Qualitative Research using Grounded Theory. The results showed: 1. The causes of forest fires also occurred due to several factors, including the existence of investors and communities who cleared land for oil palm, rubber and other plantations by burning forests, extreme weather, peat areas, weak governance from the government, ignorance of local wisdom, indecisive law enforcement agencies. 2. The most severe impact felt by many parties as a result of these fires is smoke haze pollution that disturbs various aspects of life. The disruption of human activities due to forest fires can also affect productivity and income. 3. In making development policies to prevent forest fires, the anthropocentric perspective that exploits many ecological, economic, social, religious and cultural values must be changed to the Socio- Eco-Religio- Culture perspective. It is necessary to reform law enforcement in the management of deep forest fires and create a legal umbrella for preventing and overcoming forest and land outbreaks. It is necessary to socialize the values of the Socio- Eco-Religio- Culture to policy makers, students from an early age to higher education for forest fire prevention. It is necessary to implement a socio-eco-religio-culture approach in making policies to control forest and land fires.


2020 ◽  
Vol 33 (1-2) ◽  
pp. 83-127
Author(s):  
Paul G. Cassell

Recently, major cities across the country have suffered dramatic spikes in homicides. These sudden spikes are remarkably large and widespread. At this rate, 2020 will easily be the deadliest year in America for gun-related homicides since at least 1999, while most other major crime categories are trending stable or slightly downward. This article attempts to explain why so many cities have seen extraordinary increases in murder during the summer of 2020. A close analysis of the emerging crime patterns suggests that American cities may be witnessing significant declines in some forms of policing, which in turn are producing the homicide spikes. Crime rates are increasing only for a few specific categories—namely homicides and shootings. These crime categories are particularly responsive to reductions in proactive policing. The data also pinpoint the timing of the spikes to late May 2020, which corresponds with the death of George Floyd while in police custody in Minneapolis and subsequent antipolice protests—protests that likely led to declines in law enforcement. The thesis of this article is that the recent spikes in homicides have been caused by a “Minneapolis Effect,” similar to the earlier “Ferguson Effect.” Specifically, law enforcement agencies have been forced to divert resources from normal policing to patrolling demonstrations. And even as the antipolice protests have abated, police officers have scaled back on proactive or officer-initiated law enforcement, such as street stops and other forms of policing designed to prevent firearm crimes. If this thesis is correct, it is reasonable to estimate that, as a result of de-policing during June and July 2020, approximately 710 additional victims were murdered and more than 2,800 victims were shot. Of course, this estimate relies on various assumptions, and further research on the issues surrounding the homicide spikes should be an urgent priority. If this article’s thesis about a Minneapolis Effect is correct, an important implication is that policy makers in major cities should proceed cautiously before taking steps to “defund” the police in ways that might reduce the proactive policing that is important in preventing gun violence.


2019 ◽  
Vol 44 (3) ◽  
pp. 257-262 ◽  
Author(s):  
Matthew S. Crow ◽  
John Ortiz Smykla

Police body-worn cameras (BWCs) represent one of the latest innovations to permeate policing, and the rapid speed with which law enforcement agencies throughout the United States and internationally have adopted or considered the technology has been greatly influenced by environmental factors, including high-profile deadly force incidents and national-level politics (President’s Task Force on 21st Century Policing, 2015), and the promises of transparency, accountability, and evidentiary value. The proliferation of BWCs in policing has been met with an explosion of research examining myriad issues related to the technology. As this body of research continues to expand and develop, it will be increasingly important to effectively communicate the findings to scholars, policy makers, and those in the field who are, arguably, most effected by BWCs. This special issue of Criminal Justice Review contributes to that effort.


Sign in / Sign up

Export Citation Format

Share Document