Abstract
Criminology has for some time considered the importance of “flows” in the commission of crime. This article argues that the practices of regulatory agents often fail to consider these flows—flows in information, assets, reputation or technology. Despite considering criminological flows as a discrete field of enquiry, scholars have failed to address what regulatory agents might do or impose on the system of flows to achieve their goals and outcomes. We propose an approach (grounded in the domain of cybernetics and systems studies) which fosters a collaborative and normative approach to bridging the gap when it comes to the criminology of flows, particularly in our increasingly interconnected and digitized future.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs10612-022-09680-7/MediaObjects/10612_2022_9680_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs10612-022-09680-7/MediaObjects/10612_2022_9680_Fig2_HTML.png)
Similar content being viewed by others
Notes
Defined here as the “sustained and focussed attempt to alter the behaviour of others according to defined standards or purposes with the intention of producing a broadly defined outcome or outcomes”; (Black, 2002): 26.
References
Arrigo, B., Sellers, B. (eds.), The Pre-Crime Society: Crime, Culture and Control in the Ultramodern Age. Bristol: Bristol University Press.
Ashby, W.R. (1958). Requisite variety and its implication for the control of complex systems. Cybernetica, 1/2, 93-95.
Aliverti, A. (2015). Crimes of Mobility: Criminal Law and the Regulation of Migration. New York: Routledge.
Amicelle, A., Cote-Boucher, K., Dupont, B., Mulone, M., Shearing, C., & Tanner, S. (2017). Criminology in the face of flows: reflections on contemporary policing and security. Global Crime, 18(3), 165-175.
Bauman, Z., Lyon, D. (2013). Liquid Surveillance: A Conversation. Polity Press: New York.
Beer, S. (1994). Heart of the enterprise: reprint edition. John Wiley & Sons: New York.
Beer, S. (1967). Cybernetics and management: second edition. The English Universities Press: London.
Berthod, O., Grothe-Hammer, M., Müller-Seitz, G., Raab, J., & Sydow, J. (2017). From high-reliability organizations to high-reliability networks: the dynamics of network governance in the face of emergency. Journal of Public Administration Research and Theory, 27(2), 352-371.
Black, J. (2002). Critical Reflections on Regulation. Australian Journal of Legal Philosophy, 27(1), 1-27.
Bowden, M. (2019). The security field: Forming and expanding a Bourdieusian criminology. Criminology & Criminal Justice. DOI: https://doi.org/https://doi.org/10.1177/1748895819839734.
Braithwaite, J. (2000). The New Regulatory State and The Transformation of Criminology. British Journal of Criminology, 40, 222.
Brewer, R. (2017). The malleable character of brokerage and crime control: a study of policing, security and network entrepreneurialism on Melbourne's waterfront. Policing and Society, 27(7), 712-731.
Brownsword, R., & Harel, A. (2019). Law, liberty and technology: criminal justice in the context of smart machines. International Journal of Law in Context, 15(2), 107-125.
Burris, S., Drahos, P, & Shearing, C. (2005). Nodal governance. Australian Journal of Legal Philosophy, 30, 30.
Calabrese, M., Iandolo, F., Caputo, F., & Sarno, D. (2018) From Mechanical to Cognitive View: the Changes of Decision Making in Business Environment. In Barile, S., Pellicano, M., Polese, F. (Eds.), Social Dynamics in a Systems Perspective. Cham: Springer.
Castel, R. (1991). From Dangerousness to Risk. In Burchell, G., Gordon, C., Miller, P. (Eds.) The Foucault Effect. Chicago: University of Chicago Press.
Castells, M. (2000). The Rise of the Network Society. Cambridge: Blackwell Publishers.
Côté-Boucher, K. (2016). The Paradox of Discretion: Customs and the Changing Occupational Identity of Canadian Border Officers. British Journal of Criminology, 56(1), 49-67.
Daskal, J.C. (2013). Pre-Crime Restraints: The Explosion of Targeted, Noncustodial Prevention. Cornell Law Review, 99, 327-386.
Dedeurwaerdere, T. (2005). The contribution of network governance to sustainable development. Les Séminaires de L’Iddri, 13, 1-15.
Draca, M., & Machin, S. (2015). Crime and Economic Incentives. Annual Review of Economics, 7, 389-408.
Dur, R., & Vollaard, B. (2019). Salience of Law Enforcement: A Field Experiment. Journal of Environmental Economics and Management, 93, 208-220.
Dwenger, N., Kleven, H., Rasul, I., & Rincke, J. (2016). Extrinsic and intrinsic motivations for tax compliance: Evidence from a field experiment in Germany. American Economic Journal: Economic Policy, 8(3), 203-232.
Ericson, R.V., Doyle, A., Barry, D., & Ericson, D. (2003). Insurance as governance. Toronto: University of Toronto Press.
Fellner, G., Sausgruber, R., & Traxler, C. (2013). Testing Enforcement Strategies in the Field: Threat, Moral Appeal and Social Information. Journal of the European Economic Association, 11, 634-660.
Filtenborg, M.S., Gänzle, S., & Johansson, E., (2002). An Alternative Theoretical Approach to EU Foreign Policy: Network Governance and the Case of the Northern Dimension Initiative. Cooperation and Conflict, 37(4), 387-407.
Fluker, S., Paskey, J., & Balaton, F. (2019). Funding Environmental Projects with Regulatory Prosecutions: Transparency and Accountability in Creative Environmental Sentencing. Journal of Environmental Law and Practice, 32(3), 243-272.
Foucault, M. (1991a). Questions of Method. In Burchell, G., Gordon, C., Miller, P. (Eds.) The Foucault Effect. Chicago: University of Chicago Press.
Foucault, M. (1991b). Governmentality. In Burchell, G., Gordon, C., Miller, P. (Eds.) The Foucault Effect. Chicago: University of Chicago Press.
Foucault, M. (2009). Security, Territory, Population: Lectures at the Collège de France 1977–1978. London: Palgrave McMillan.
Gordon, C. (1991). Governmental rationality: an introduction. In Burchell, G., Gordon, C., & Miller, P. (Eds.) The Foucault Effect. Chicago: University of Chicago Press.
Gundhus, H., & Jansen, P.T. (2020). Pre-crime and policing of migrants: Anticipatory action meets management of concerns. Theoretical Criminology, 24(1), 90-109.
Haggerty, K., & Ericson, R. (2000). The Surveillant Assemblage. British Journal of Sociology, 51(4), 605-622.
Harnden, R., & Leonard, A. (1994). How Many Grapes Went into the Wine: Stafford Beer on the Art and Science of Holistic Management. New York: Wiley.
Hawley, S., King, C., & Lord, N. (2020). Justice for whom? The need for a principled approach to Deferred Prosecution Agreements in England and Wales. In Soreide, T., & Makinwa, A. (Eds.), Negotiated Settlements in Bribery Cases. London: Edward Elgar Publishing.
Hermitte, M.-A. (2003). La traçabilité des personnes et des choses. Précaution, pouvoirs et maitrise. In Pedrot, P. (Ed.) Traçabilité et responsabilité. Paris: Economica.
Hubschle, A. (2017). Fluid interfaces between flows of rhino horn. Global Crime, 18(3), 198-217.
Hufnagel, S. (2017). Regulation of cross-border law enforcement: “locks” and “dams” to regional and international flows of policing. Global Crime, 18(3), 218-236.
Hughes, C.E., Bright, D.A., & Chalmers, J. (2017). Social network analysis of Australian poly-drug trafficking networks: How do drug traffickers manage multiple illicit drugs?. Social Networks, 51, 135-147.
Ison, R., Alexandra, J., & Wallis, P. (2018). Governing in the Anthropocene: are there cyber-systemic antidotes to the malaise of modern governance? Sustainability Science, 13(5), 1209-1223.
James, A. (2018). Intelligence-led policing: comparing national approaches to its regulation and control. In den Boer, M. (Ed.), Comparative Policing from a Legal Perspective. London: Edward Elgar Publishing.
Keating, C., & Katina, P.F. (2019). Complex system governance: Concept, utility, and challenges. Systems Research and Behavioural Science, 36, 687-705.
Kerr, I. (2010). Digital Locks and the Automation of Virtue. In Geist, M. (Ed.), From “Radical Extremism” to “Balanced Copyright”: Canadian Copyright and the Digital Agenda. Toronto: Irwin Law.
Kruisbergen, E., Kleemans, E., & Kouwenberg, R. (2016). Explaining attrition: Investigating and confiscating the profits of organized crime. European Journal of Criminology, 13(6), 677-695.
Kurkovsky West, D. (2013). CyberSovietica: Planning, Design, and the Cybernetics of Soviet Space, 1954–1986. PhD thesis, Princeton University.
Lessig, L. (1996). The Zones of Cyberspace. Stanford Law Review, 48, 1403-1408.
Loader, I. (1997). Thinking Normatively about Private Security. Journal of Law and Society, 24(3), 377-394.
Lyon, D. (2010). Liquid Surveillance: The Contribution of Zygmunt Bauman to Surveillance Studies, International Political Sociology, 4, 325-338.
Manning, P.K. (2010). Democratic Policing in a Changing World. New York: Routledge.
Manokha, I. (2018). Surveillance, panopticism, and self-discipline in the digital age. Surveillance & Society, 16(2), 219-237.
Mantello, P. (2016). The Machine that Ate Bad People: The Ontopolitics of the Precrime Assemblage. Big Data & Society, 3(2), 1-11.
Medina, E. (2011). The Success of Cybernetic revolutionaries. Technology and Politics in Allende’s Chile. Massachusetts: MIT Press.
Meijer, A., & Grimmelikhuijsen, S. (2021). Responsible and accountable algorithmization: How to generate citizen trust in governmental use of algorithms. In Schuilenberg, M., & Peeters, R. (Eds.) The Algorithmic Society: Technology Power and Knowledge. London: Routledge.
Molnar, A., & Warren, I. (2020). Governing Liberty through Accountability: Surveillance Reporting as Technologies of Governmentality. Critical Criminology, 28, 13-26.
Montague, D. (2002). Stolen goods: Coltan and conflict in the Democratic Republic of Congo. Sais Review, 22(1), 103-118.
Morselli, C. (2009). Inside Criminal Networks. New York: Springer.
Murray, A., & Scott, C. (2002). Controlling the New Media: Hybrid Responses to New Forms of Power. The Modern Law Review, 65(4), 491-516.
Newton, L. H. (2006). Permission to Steal: Revealing the Roots of Corporate Scandal. Cambridge: Blackwell Publishing.
Pallister-Wilkins, P. (2016). How Walls Do Work: Security Barriers as Devices of Interruption and Data Capture. Security Dialogue, 47(2), 151-164.
Pickering, A. (2004). The science of the unknowable: Stafford Beer’s cybernetic informatics. Kybernetes, 33(4), 499-521.
Pickering, A. (2010). The Cybernetic Brain. Chicago: University of Chicago Press.
Reynaers, A.-M., & Parrado, S. (2017). Responsive regulation in public‐private partnerships: Between deterrence and persuasion. Regulation & Governance, 11(3), 269-281.
Richards, N.M. (2012). The dangers of surveillance. Harvard Law Review, 126, 1934-1965.
Rock, P. (1994). History of criminology. Aldershot: Dartmouth Publishing.
Ruth, T., Matusitz, J., & Wan, T.T. (2015). Understanding Predatory Organised Crime through Network Governance Theory. Social Change, 45(4), 587-604.
Ryan, A. (2014). A Framework for Systemic Design. FORMakademisk, 7(4), 1-14.
Sanders, C., & Condon, C. (2017). Crime Analysis and Cognitive Effects: the Practice of Policing Through Flows of Data. Global Crime, 18(3), 237-255.
Schlindwein, S.L., & Ison, R. (2019). Confronting total systemic failure? The May 2018 truckers’ strike in Brazil. Systems Research and Behavioural Science, 37, DOI: https://doi.org/10.1002/sres.2603.
Schuelenberg, M. The Security Society: On Power, Surveillance and Punishments. In Arrigo, B., & Sellers, B. (Eds.), The Pre-Crime Society: Crime, Culture and Control in the Ultramodern Age. Bristol: Bristol University Press.
Seddon, T., Ralphs, R., & Williams, L. (2008). Risk, Security and the “Criminalization” of British Drug Policy. British Journal of Criminology, 48, 818-834.
Seddon, T. (2016). Inventing Drugs: A Genealogy of a Regulatory Concept. Journal of Law and Society, 43(3), 393-415.
Shearing, C., & Wood, J. (2003). Nodal Governance, Democracy, and the New “Denizens”. Journal of Law and Society, 30(3), 400-419.
Slemrod, J., Ur Rehman, O., & Waseem, M. (2019). Pecuniary and Non-Pecuniary Motivations for Tax Compliance: Evidence from Pakistan. Oxford: Said Business School.
Sparrow, M. (2000). The Regulatory Craft. Washington, D.C.: Brookings Institution Press.
Sutton, M. (2010). Stolen goods markets. Washington, D.C.: US Department of Justice.
Swann, T. (2018). Towards an anarchist cybernetics: Stafford Beer, self-organisation and radical social movements. Ephemera: Theory & Politics in Organization, 18(3), 427–456.
Sydelko, P., Midgley, G., & Espinosa, A. (2017). A systemic integration approach to designing interagency responses to wicked problems. Proceedings of the 61st Annual Meeting of the ISSS (Vienna, Austria).
Taylor, I., Walton, P., & Young, J. (1973). The new criminology: For a social theory of deviance. Boston: Routledge & Kegan Paul.
Therrien, M.-C., Valiquette-L’Heureux, A., Normandin, J.-M., & Smits, P. (2016). Tightly coupled governance for loosely coupled wicked problems: the train explosion in Lac-Mégantic case. International Journal of Risk Assessment and Management, 19(4), 260-277.
Tombs, S. (2015). Crisis, What Crisis? Regulation and the Academic Orthodoxy. The Howard Journal of Crime and Justice, 54, 57–72.
Trottier, D. (2012), Social Media as Surveillance. London: Routledge.
Truong, V.D., Dang, N.V.H., & Hall, C.M. (2016). The marketplace management of illegal elixirs: illicit consumption of rhino horn. Consumption Markets & Culture, 19(4), 353-369.
Turnbull, S., (2003). Network governance. Corporate Governance International, 6(3), 4-14.
Van Brakel, R., & de Hert, P. (2011). Policing, Surveillance and Law in a Pre-Crime Society: Understanding the Consequences of Technology Based Strategies. Technology-led Policing, 20, 165-192.
Walker-Munro, B. (2019). A case for systemic design in criminal law techno-regulation. Criminal Law Journal, 43(5), 306–324
Walker-Munro, B. (2020). A case for the use of cyber-systemics to combat financial crime in Australia. Kybernetes, 50(11), 3082–3105. https://doi.org/10.1108/K-09-2020-0581
Whelan, C., & Molnar, A. (2017). Managing flows during mega-events: taking account of internal and external flows in public order policing operations. Global Crime, 18(3), 176-197.
Wilson, J.R. (2015). The Word Criminology: A Philology and a Definition. Criminology, Criminal Justice Law, & Society, 16(3), 61-82.
Wood, J., & Shearing, C. (2007). Imagining Security. Devon (UK): Willan.
Yadin, S. (2018). Saving Lives Through Shaming. Harvard Business Law Review Online, 9, 1-14.
Zedner, L. (2007). Pre-crime and post-criminology? Theoretical Criminology, 11(2), 261-281.
Zhao, Q., Brine, J., Dimitar P., & Filev, D.P. (2015). Defining Cybernetics: Reflections on the Science of Governance. IEEE Systems, Man, and Cybernetics Magazine, 1(2), 18-26.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Walker-Munro, B. An Examination of Cyber-Systemic Regulation in Criminology Through the Lens of “Flows”. Crit Crim 31, 507–524 (2023). https://doi.org/10.1007/s10612-022-09680-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10612-022-09680-7