Search
Search Results
-
Staggered deployment of gunshot detection technology in Chicago, IL: a matched quasi-experiment of gun violence outcomes
ObjectivesWe examine the potential effects of gunshot detection technology longitudinally in Chicago through a synthetic control quasi-experiment.
... -
The use of XR technology in criminological research: a sco** review
ObjectivesCriminology has begun to use virtual reality (VR) as a tool to understand criminal behaviour. There have been many advances in VR that open...
-
Understanding the Intersection Between Technology and Kidnap**: A Typology of Virtual Kidnap**
No longer limited by geographic locations and in-person interactions, criminals leverage information and communication technology to commit virtual...
-
Bots against corruption: Exploring the benefits and limitations of AI-based anti-corruption technology
Countries have been develo** and deploying anti-corruption tools based on artificial intelligence with hopes of them having positive capabilities....
-
The effect of gunshot detection technology on evidence collection and case clearance in Kansas City, Missouri
ObjectivesThis study tests whether (1) shots fired calls for service in the gunshot detection technology (GDT) target area are more likely to be...
-
Technology Issues
The risk of computer crimecomputer crime has become a global issue affecting almost all countries. Fundamentally, the proliferation of information... -
Technology in Policing
Since the turn of the century, we are living in a new technological era where devices are readily available and many communities enjoy ubiquitous... -
Exploring police attitudes on victims’ delayed reporting and victim blame in technology-facilitated IPV
Background settingCyberstalking, now conceptualised as one of the forms of technology-facilitated intimate partner violence (TFIPV), has seen an...
-
The Use of Facial Recognition Technology by Law Enforcement in Europe: a Non-Orwellian Draft Proposal
The European legal framework is not devoid of norms that are directly or indirectly applicable to facial recognition technology for identification...
-
Reentry During A Pandemic: A Pilot Study of Access to Peer Support Through Technology to Reduce Social Isolation
Returning to society after incarceration is a challenging and stressful process, and the COVID-19 pandemic exacerbated this difficult transition....
-
CCTV as a Socio-technology
The authors discuss CCTV, which is now established as a mature and ubiquitous technology. They review existing research on CCTV as backdrop to... -
Technology and Police Legitimacy
Through a consideration of the use of mobile devices by the police and the public, this chapter explores some of the potential issues raised by the... -
The Role of Technology in Stalking and Coercive Control Among Young People
This chapter introduces readers to the role of technology in facilitating and enhancing stalking and coercive and controlling practices. By way of... -
-
“There’s a Tech for That”: Balancing Dignity and Security in Carceral Settings Through Alternative Technology Devices
The issue of illicit drugs in correctional institutions is a complex and growing concern, facing the deployment of renewed and ingenious smuggling... -
The Police Power of Finance, Technology, Housing, and Education
Policing is not primarily what law enforcement does, or what occurs through the operations of the criminal justice system. More fundamentally, it is... -
The impact of mobile technology devices on street checks and crime incidents reported: results of a randomised controlled trial
ObjectivesTest the impact of a mobile technology device, including a street check app, on street checks and crime incidents reported.
... -
Death Camps in the General Government (1942–43) and High-Technology, Labouring-to-Death Camps in Germany (1943–45)
This chapter discusses the three Operation Reinhardt Death Camps, Belzec, Sobibor, and Treblinka, located in the General Government. Within hours of... -
Gender, Violence and Technology: At a Conceptual and Empirical Crossroad
Throughout this handbook, our chapter contributors provide an account of the rapid developments in gendered technology facilitated abuse, the... -
‘Intimate Intrusions’: Technology Facilitated Dating and Intimate Partner Violence
Intimate partner violence is commonly defined as including physical, sexual, psychological, emotional abuse, as well as stalking and controlling...