Search results

1 – 10 of 18
Article
Publication date: 7 March 2024

Lisa Nichols and Kendra N. Bowen

The purpose of this paper was to examine law enforcement officers' perspectives on job stress and barriers to supportive resources when working child sexual abuse cases in a large…

Abstract

Purpose

The purpose of this paper was to examine law enforcement officers' perspectives on job stress and barriers to supportive resources when working child sexual abuse cases in a large southern state. It is well documented in the literature that professionals who work in healthcare, emergency services and law enforcement face tremendous amounts of stress and consequences to their physical and mental health. Little research has been done to examine how child sexual abuse investigations impact law enforcement, and how these specialized officers perceive access to supportive resources.

Design/methodology/approach

This qualitative study was part of a larger quantitative study and included 20 law enforcement officers who participated in anonymous, semi-structured phone interviews.

Findings

Findings included (1) child sexual abuse cases are difficult, specialized and disturbing (2) barriers to supportive resources include law enforcement culture, the stigma of asking for help, awareness and accessibility of resources and leadership as gatekeeper to the resources and (3) officers perceive both formal and informal resources to be helpful and at best should be proactively available to all officers in the state. A model of the findings was developed to illustrate the implications for practitioners and scholars.

Research limitations/implications

This study was not without weaknesses, specifically the small number of participants, volunteer sampling does not represent the general population and the sampling technique means some demographics may have been missed by researchers.

Practical implications

This study adds to the literature on law enforcement mental health, occupational health and mental health resources. It confirms established research in the literature and provides insight into officer perspectives about barriers that prevent access to informal and formal supports that could improve their emotional well-being.

Originality/value

This study is the first of its kind, to our knowledge, that asks detectives and investigators of child abuse cases about mental health resources. These law enforcement officers are at high-risk for traumatic stress, compassion fatigue and burnout due to the specialized cases they investigate.

Details

Policing: An International Journal, vol. 47 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 4 March 2024

Cynthia Lum, Christopher S. Koper, Michael Goodier, William Johnson and James Krause

We present the results of one of the only in-depth studies of a police agency’s internal and external response to the coronavirus pandemic of 2020 (COVID-19). This study…

Abstract

Purpose

We present the results of one of the only in-depth studies of a police agency’s internal and external response to the coronavirus pandemic of 2020 (COVID-19). This study emphasizes the importance of law enforcement agencies conducting comprehensive case studies and after-action assessments to prepare, prevent and respond to prolonged public health crises and showcases the profound (and lingering) effects of COVID-19 on police organizations.

Design/methodology/approach

This multi-method case study combines document analysis, a workforce survey, a community survey, interviews and analysis of administrative data to detail and assess the agency’s internal and operational responses to the pandemic and the reactions of employees and community members to those responses.

Findings

Despite agency strategies to mitigate the pandemic’s effects, employees cited very high stress levels one year after the pandemic and a third of sworn officers considered leaving the policing profession altogether during the first two years of the COVID-19 pandemic. Several policies intended by the agency to protect employee health and maintain staffing needs kept workforce levels steady but may have increased feelings of organizational injustice in both sworn and non-sworn individuals, with variation across racial and gender groups. A jurisdiction-wide community survey indicated general support for the police department’s responses but a preference for in-person rather than telephone-based responses to service calls. Officers, however, preferred continuing remote responses even after the pandemic subsided.

Originality/value

To the best of our knowledge, this is one of the only in-depth case studies that examine a police agency’s internal and external responses to COVID-19 and the sworn, non-sworn and community reactions to those responses.

Details

Policing: An International Journal, vol. 47 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 8 January 2024

Rebecca Phythian, Stuart Kirby and Lauren Swan-Keig

The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can…

Abstract

Purpose

The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can facilitate and enhance this process, barriers to effective agency information exchange are consistently reported. This paper aims to categorise how information sharing takes place in a law enforcement operational setting and whether there is scope to improve the process.

Design/methodology/approach

There were two stages to the method; firstly, a select group of practitioners with intelligence-related experience (n = 28) were interviewed to identify the most common approaches to operational information sharing. This generated a categorisation model, which was tested with a larger group of practitioners (n = 73). A mixed-methods approach was adopted.

Findings

The research found consensus surrounding four different approaches to information sharing, labelled as: (1) inform and request, (2) meet and share, (3) customised database and (4) integrated systems. These are used at various levels of frequency, dependent on the operational context.

Originality/value

This research provides original evidence-based research to show law enforcement practitioners vary in the way they share information. By demystifying and categorising the process, it provides understanding for practitioners, policymakers and researchers, allowing barriers to be more readily tackled in a much more cost-effective manner.

Details

Policing: An International Journal, vol. 47 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 13 September 2023

Prasetyo Adi Wibowo Putro, Dana Indra Sensuse and Wahyu Setiawan Setiawan Wibowo

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks…

Abstract

Purpose

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks such as NIST Cybersecurity Framework and ISO 27001. Smart government is defined as the government administration sector of CII due to its similarity as a core of smart technology.

Design/methodology/approach

To ensure the validity of the data, the research methodology used in this paper follows the predicting malfunctions in socio-technical systems (PreMiSTS) approach, a variation of the socio-technical system (STS) approach specifically designed to predict potential issues in the STS. In this study, PreMiSTS was enriched with observation and systematic literature review as its main data collection method, thematic analysis and validation by experts using fuzzy Delphi method (FDM).

Findings

The proposed CII protection framework comprises several dimensions: objectives, interdependency, functions, risk management, resources and governance. For all those dimensions, there are 20 elements and 41 variables.

Practical implications

This framework can be an alternative guideline for CII protection in smart government, particularly in government administration services.

Originality/value

The author uses PreMiSTS, a socio-technical approach combined with thematic analysis and FDM, to design a security framework for CII protection. This combination was designed as a mixed-method approach to improve the likelihood of success in an IT project.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 23 February 2024

Junseon Jeong, Minji Park, Hyeonah Jo, Chunju Kim and Ji Hoon Song

This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge…

Abstract

Purpose

This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge and skills. Pre-deployment training should be designed systematically and training of trainers approaches should be implemented.

Design/methodology/approach

This study used T-tests, Borich needs assessments, and Locus for Focus model analyses to determine the priorities of needs for pre-deployment training in policing. A survey of 116 experienced experts was conducted, with 87 responding (75%).

Findings

The study identified 26 factors that deployed law enforcement professionals want to learn from pre-deployment training. These factors were categorized into three areas: research, training design and methods and understanding of partner countries and international development cooperation. The nine highest priorities for training needs were related to understanding the status and conditions of police training in the country to which policing experts are deployed.

Research limitations/implications

This study was limited to Korean policing experts. And the study did not evaluate the validity of the training curriculum or indicators.

Practical implications

Technical assistance in international policing development cooperation aims to train future trainers who can train local police. This study found that limited learner information and poor communication skills can lead to ineffective technical assistance.

Originality/value

This study highlights the importance of knowledge transfer and effective pre-deployment training for policing. The findings can be used to improve training programs and police human resource development.

Article
Publication date: 31 January 2024

Kristine Langhoff, Michelle Lefevre and Rachel Larkin

This paper aims to present a mixed methods study of child criminal exploitation (CCE), particularly in the form of “county lines”, in three local authorities in southeast England…

Abstract

Purpose

This paper aims to present a mixed methods study of child criminal exploitation (CCE), particularly in the form of “county lines”, in three local authorities in southeast England. The data is analysed using a framework constructed from two relevant contextual and relational theories to understand experiences of CCE and the safeguarding responses undertaken to protect young people from harm.

Design/methodology/approach

Data were drawn from a survey (n = 118); interviews (n = 5) and focus groups (n = 15) with professionals; interviews with parents (n = 4); and from secondary analysis of eight interviews with young people affected by criminal exploitation. The analytic framework was applied to the data to answer two research questions: what is the role and significance of young people’s interactions with peers, parents and professionals in their CCE trajectories; and how do professionals understand and address risks within contexts in which young people are exposed to CCE? The mixed methods data collected by the authors were coded and analysed using this framework.

Findings

Although professionals were aware of contexts and relational power dynamics, the situated and temporal nature of CCE remained overlooked within safeguarding systems. Professionals required more space, time and support to fully and flexibly engage with young people and their families to increase safety.

Originality/value

There is limited research available that critically examines safeguarding responses to CCE in diverse geographic and cultural contexts. This paper contributes a critical account of how professionals might create connections and opportunities for change with young people, identifying structural constraints within practice systems alongside emerging examples of effective practice.

Details

Journal of Children's Services, vol. 19 no. 1
Type: Research Article
ISSN: 1746-6660

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1077

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 19 October 2023

Tinna Dögg Sigurdardóttir, Lee Rainbow, Adam Gregory, Pippa Gregory and Gisli Hannes Gudjonsson

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

2664

Abstract

Purpose

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

Design/methodology/approach

The 77 BIA reports reviewed were written between 2016 and 2021. They were evaluated using Toulmin’s (1958) strategy for structuring pertinent arguments, current compliance with professional standards, the grounds and backing provided for the claims made and the potential utility of the recommendations provided.

Findings

Consistent with previous research, most of the reports involved murder and sexual offences. The BIA reports met professional standards with extremely high frequency. The 77 reports contained a total of 1,308 claims of which 99% were based on stated grounds. A warrant and/or backing was provided for 73% of the claims. Most of the claims in the BIA reports involved a behavioural evaluation of the crime scene and offender characteristics. The potential utility of the reports was judged to be 95% for informative behavioural crime scene analysis and 40% for potential new lines of enquiry.

Practical implications

The reports should serve as a model for the work of behavioural investigative advisers internationally.

Originality/value

To the best of the authors’ knowledge, this is the first study to systematically evaluate BIA reports commissioned by the NCA; it adds to previous similar studies by evaluating the largest number of BIA reports ever reviewed, and uniquely provides judgement of overall utility.

Open Access
Article
Publication date: 9 November 2023

Gordon Abner, Cullen C. Merritt and Rachel Boggs

This study explores the benefits of accreditation from the Commission on Accreditation for Law Enforcement Agencies (CALEA), according to those who are engaged in the practice.

1601

Abstract

Purpose

This study explores the benefits of accreditation from the Commission on Accreditation for Law Enforcement Agencies (CALEA), according to those who are engaged in the practice.

Design/methodology/approach

The authors collected data through open-ended, semi-structured telephone interviews. The authors analyzed the data using an inductive methodology.

Findings

The authors found that CALEA police accreditation enhances organizational learning through the development of knowledge brokers, the creation of communities of practice, support for knowledge repositories, support for knowledge managers and greater levels of transparency.

Originality/value

This qualitative study, which focuses on the perceptions and experiences of those involved in the CALEA process, provides a valuable complement to the quantitative literature on accreditation by shedding light on the organizational learning resulting from accreditation.

Details

Policing: An International Journal, vol. 47 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Open Access
Article
Publication date: 5 April 2024

Aku Valtakoski and Besma Glaa

The study aims to promote the use of qualitative methods in service research by investigating how these methods are reported in service journals, how the level of reporting has…

Abstract

Purpose

The study aims to promote the use of qualitative methods in service research by investigating how these methods are reported in service journals, how the level of reporting has evolved and whether methodological reporting influences the downloads or citations received by qualitative articles.

Design/methodology/approach

Methodological reporting practices were identified through content analysis of 318 qualitative articles published in three major service research journals and comparison with prior methodological literature. Regression analysis was used to test how the level of methodological reporting influences article downloads and citations.

Findings

The study identifies 29 reporting practices related to 9 key methodological reporting areas. The overall level of methodological reporting in published qualitative articles has increased over time. While differences in the level of reporting between service journals persist, they are narrowing. The level of methodological reporting did not influence downloads or citations of qualitative articles.

Research limitations/implications

Service scholars using qualitative methods should pay attention to methodological reporting as it can improve the chances of being published. Factors such as theoretical contributions are likely to have a greater influence on article impact than methodological reporting.

Originality/value

No prior study has explored methodological reporting practices across different qualitative methodologies or how reporting influences article impact. For authors, reviewers and editors, the study provides an inventory of reporting practices relevant for evaluating qualitative articles, which should lower barriers for qualitative methods in service research by providing practical guidelines on what to focus on when reporting and assessing qualitative research.

Details

Journal of Service Management, vol. 35 no. 6
Type: Research Article
ISSN: 1757-5818

Keywords

Access

Year

Last 3 months (18)

Content type

Article (18)
1 – 10 of 18