Search results
1 – 10 of 118Cecilia Hansen Löfstrand and Christel Backman
The authors set out to show how key private security industry actors in Sweden establish body-worn cameras (BWCs) as a tool to protect private security officers from the public…
Abstract
Purpose
The authors set out to show how key private security industry actors in Sweden establish body-worn cameras (BWCs) as a tool to protect private security officers from the public the officers police and to improve the work environment of the officers.
Design/methodology/approach
The authors conducted qualitative semi-structured interviews with key personnel involved in the implementation of BWCs. The authors' analysis focused on delineating recurrent moral stories and affirmative environments to show how BWC use was made legitimate as a work environment tool.
Findings
The authors show how BWC use by private security officers patrolling public spaces in Sweden is legitimized by four organizational narratives: (1) the vulnerable security officer and the caring employer, (2) defenders of protective regulation, (3) moral selves and morally dubious others and (4) function creep and moral guardians. The authors explain how such organizational narratives are key to establishing and legitimizing the use of BWCs as a tool to improve the work environment of private security guards, and how certain narrative environments promote such organizational narratives in Sweden to improve the work environment of private security guards.
Originality/value
The authors' findings in this article add to a small but growing literature on BWC use in policing outside of the USA and the UK as well as to the hitherto very limited research from the work environment and managerial perspectives. The authors illustrate the importance of organizational narratives and narrative environments for understanding organizational change involving legitimation of new technologies.
Details
Keywords
Paula M. Di Nota, Bryce E. Stoliker, Adam D. Vaughan, Judith P. Andersen and Gregory S. Anderson
The purpose of this study isto synthesize recent empirical research investigating memory of stressful critical incidents (both simulated and occurring in the field) among law…
Abstract
Purpose
The purpose of this study isto synthesize recent empirical research investigating memory of stressful critical incidents (both simulated and occurring in the field) among law enforcement officers.
Design/methodology/approach
The study used the approach of systematic state-of-the-art review.
Findings
In total, 20 studies of police and military officers show reduced detail and accuracy of high- versus low-stress incidents, especially for peripheral versus target information. Decrements in memory performance were mediated by the extent of physiological stress responses. Delayed recall accuracy was improved among officers that engaged in immediate post-incident rehearsal, including independent debriefing or reviewing body-worn camera footage.
Research limitations/implications
Most studies were not found through systematic database searches, highlighting a need for broader indexing and/or open access publishing to make research more accessible.
Practical implications
By understanding how stress physiology enhances or interferes with memory encoding, consolidation and recall, evidence-based practices surrounding post-incident evidence gathering are recommended.
Social implications
The current review addresses common public misconceptions of enhanced cognitive performance among police relative to the average citizen.
Originality/value
The current work draws from scientific knowledge about the pervasive influence of stress physiology on memory to inform existing practices surrounding post-incident evidence gathering among police.
Details
Keywords
This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…
Abstract
This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.
When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.
As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.
Details
Keywords
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU…
Abstract
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU. This chapter discusses the relevance of data protection in the context of security. It shows that data protection has been of particular relevance in the German context – not only against the backdrop of rapidly evolving information technology, but also of the historical experiences with political regimes collecting information in order to oppress citizens.
Details