130 resultados para Police oversight agencies
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
Persistent use of safety restraints prevents deaths and reduces the severity and number of injuries resulting from motor vehicle crashes. However, safety-restraint use rates in the United States have been below those of other nations with safety-restraint enforcement laws. With a better understanding of the relationship between safety-restraint law enforcement and safety-restraint use, programs can be implemented to decrease the number of deaths and injuries resulting from motor vehicle crashes. Does safety-restraint use increase as enforcement increases? Do motorists increase their safety-restraint use in response to the general presence of law enforcement or to targeted law enforcement efforts? Does a relationship between enforcement and restraint use exist at the countywide level? A logistic regression model was estimated by using county-level safety-restraint use data and traffic citation statistics collected in 13 counties within the state of Florida in 1997. The model results suggest that safety-restraint use is positively correlated with enforcement intensity, is negatively correlated with safety-restraint enforcement coverage (in lanemiles of enforcement coverage), and is greater in urban than rural areas. The quantification of these relationships may assist Florida and other law enforcement agencies in raising safety-restraint use rates by allocating limited funds more efficiently either by allocating additional time for enforcement activities of the existing force or by increasing enforcement staff. In addition, the research supports a commonsense notion that enforcement activities do result in behavioral response.
Resumo:
As a result of the managerial reforms adopted by government agencies since the 1980s, the stakeholder approach has become more widely accepted as a strategic management tool. However it remains a difficult and demanding task for agencies to determine who their stakeholders are and to optimise interactions with them. This paper examines how government agencies identify, classify and engage with stakeholders who have competing demands, differing access to resources and the ability to exert political pressure. To do this, the stakeholder approaches of nine agencies at three levels of government in Queensland were studied. This resulted in the development of a Stakeholder Classification Model for Public Agencies which could be used to create more focused and relevant stakeholder interventions.
Resumo:
For some time now, research has suggested lesbian, gay, bisexual and transgender (LGBT) young people are ‘at-risk’ of victimisation and legally ‘risky’. Relatively few studies have examined how ‘risk factor’ research influences the everyday lives of LGBT young people. This paper reports how the experiences of police by 35 LGBT young people in Brisbane, Queensland reflected discourses about LGBT riskiness and how danger informed their interactions with police in public spaces. The participants specifically note how looking at-risk or looking risky affected their experiences of policing. The paper will conclude with recommendations for improved future policing practice.
Resumo:
Purpose: The aims of this paper are: to investigate the perceptions held by police (insiders) and community member (outsiders) of the recruitment and retention of culturally and linguistically diverse employees of Victoria Police; and, to develop a model that can assist in future recruitment and retention policy development.---------- Design/methodology/approach: Structured focus group interviews were conducted based on an instrument deduced from existing literature. Police and community members were interviewed separate cohorts. The discussions were thematically coded to themes and sub-themes.---------- Findings: Specific differences were identified in perceptions of the importance of recruiting culturally and linguistically diverse groups, barriers to recruitment, recruitment methods, and retention methods.---------- Research limitations/implications: Based on these perceptions, a propose a model addresses the importance of cultural diversity in policing and barriers to recruitment and retention of culturally and linguistically diverse employees. Further research is necessary to assess the broader applicability of this model.---------- Practical implications: The proposed model is may be used as the basis for future recruitment and retention activities, and human resource management policy development.---------- Originality/value: This is the first study in the Australian context of recruitment and retention of culturally and linguistically diverse police that addresses both community and police perspectives. Aligning the demographic profile of the police service with that of the community is beneficial to effective policing.
Resumo:
In a resource constrained business world, strategic choices must be made on process improvement and service delivery. There are calls for more agile forms of enterprises and much effort is being directed at moving organizations from a complex landscape of disparate application systems to that of an integrated and flexible enterprise accessing complex systems landscapes through service oriented architecture (SOA). This paper describes the analysis of strategies to detect supporting business services. These services can then be delivered in a variety of ways: web-services, new application services or outsourced services. The focus of this paper is on strategy analysis to identify those strategies that are common to lines of business and thus can be supported through shared services. A case study of a state government is used to show the analytical method and the detection of shared strategies.
Resumo:
This chapter reports on a narrative project recording the experiences of LGBT former and current police officers in the Queensland Police Service (QPS), Australia. It begins by examining the historical and research contexts of LGBT police officers, followed by a discussion of the methodology employed for the project. The chapter then examines and analyzes key themes emerging from the data about coming out, macho police culture, and the double life syndrome often experienced by LGBT police officers. Finally, it suggests that further research might uncover a more widespread application of these findings.
Resumo:
This article applies social network analysis techniques to a case study of police corruption in order to produce findings which will assist in corruption prevention and investigation. Police corruption is commonly studied but rarely are sophisticated tools of analyse engaged to add rigour to the field of study. This article analyses the ‘First Joke’ a systemic and long lasting corruption network in the Queensland Police Force, a state police agency in Australia. It uses the data obtained from a commission of inquiry which exposed the network and develops hypotheses as to the nature of the networks structure based on existing literature into dark networks and criminal networks. These hypotheses are tested by entering the data into UCINET and analysing the outcomes through social network analysis measures of average path distance, centrality and density. The conclusions reached show that the network has characteristics not predicted by the literature.
Resumo:
This paper explores how visibly transgressing heteronormativity shapes police interactions with LGBT young people. While research evidences how sexually and gender diverse bodies can be abused in schools, policing is overlooked. Interviews with 35 LGBT young people demonstrate how bodies transgressing heteronormativity (that is, non-heteronormative bodies) mediate their policing experiences in Queensland, Australia. Drawing on Foucault, Butler, and others, the paper suggests police interactions and use of discretion with LGBT young people was informed by non-heteronormative bodies discursively performing queerness in ways read by police. The paper concludes noting tensions produced for youthful LGBT bodies in public spaces.
Resumo:
This paper describes the development of a substantive theory about police racism as the most significant factor, from among a number of competing societal based explanations, in accounting for Aboriginal over-representation in police arrest rates.