846 resultados para Court cases, knowledge management, police complaints, police misconduct, police oversight


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article is concerned with knowledge management in policing police crime. Police crime is defined as crime committed by police officers on duty. There seems to be a tendency to consider police crime as a result of bad practice rather than the acts of criminals. However, examples illustrate that criminal acts are intentionally carried out by police officers on duty. The article looks at the kinds of knowledge which agencies require to investigate police complaints and police crime successfully.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The great majority of police officers are committed to honourable and competent public service and consistently demonstrate integrity and accountability in carrying out the often difficult, complex and sometimes dangerous, activities involved in policing by consent. However, in every police agency there exists an element of dishonesty, lack of professionalism and criminal behaviour. This article is based on archival research of criminal behaviour in the Norwegian police force. A total of 60 police employees were prosecuted in court because of misconduct and crime from 2005 to 2010. Court cases were coded as two potential predictors of court sentence in terms of imprisonment days, ie, type of deviance and level of deviance. Categories of police crime and levels were organised according to a conceptual framework developed for assessing and managing police deviance. Empirical findings support the hypothesis that as the seriousness of police crime increases in breadth and depth so also does the severity of the court sentence as measured by time in prison.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes and classifies different types of knowledge that are a part of police patrol officer's practice. Even though an investigation usually forces a police officer to apply several different knowledge types, this paper discusses different forms of professional knowledge separately to enable categorisation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is a conceptual article on police deviance and its multi-faceted forms. It seeks to address the lack of an adequately formulated framework in the literature of the breadth and depth of police misconduct and corruption. The article argues for the use of a proposed ‘sliding scale’ of police deviance by examining the nature, extent and progression of police deviance and crime using research in Australia and Canada as illustrative case studies. This sliding scale is designed to research, capture and store, and hence extend the knowledge base of what constitutes police deviance at the level of the individual, the group and the organisational contexts of policing. As such, the conceptual framework is a robust yet flexible research tool and its utility as a sliding scale constitutes a step forward in advancing the knowledge on police deviance and criminality through adopting an integrated and holistic approach to managing such knowledge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes the organizational processes of knowledge acquisition, sharing, retention and utilisation as it affected the internal and external communication of knowledge about performance in an English police force. The research was gathered in three workshops for internal personnel, external stakeholders and chief officers, using Journey Making, a computer-assisted method of developing shared understanding. The research concluded that there are multiple audiences for the communication of knowledge about police performance, impeded by the requirement to publish performance data. However, the intelligence-led policing model could lead to a more focused means of communication with various stakeholder groups. Although technology investment was a preferred means of communicating knowledge about performance, without addressing cultural barriers, an investment in technology may not yield the appropriate changes in behaviour. Consequently, technology needs to be integrated with working practices in order to reduce organizational reliance on informal methods of communication.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A stage model for knowledge management systems in policing financial crime is developed in this paper. Stages of growth models enable identification of organizational maturity and direction. Information technology to support knowledge work of police officers is improving. For example, new information systems supporting police investigations are evolving. Police investigation is an information-rich and knowledge-intensive practice. Its success depends on turning information into evidence. This paper presents an organizing framework for knowledge management systems in policing financial crime. Future case studies will empirically have to illustrate and validate the stage hypothesis developed in this paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis explored the current state of knowledge management in policing. A psychometric instrument was created and validated for use within police agencies as a means of facilitating the capture and transferral of critical investigative knowledge. The aim is to ensure that investigative expertise is not lost when detectives retire or leave the service. Improved knowledge management strategies that rely on this psychometric instrument can lead to greater efficiency and effectiveness in criminal investigation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In businesses such as the software industry, which uses knowledge as a resource, activities are knowledge intensive, requiring constant adoption of new technologies and practices. Another feature of this environment is that the industry is particularly susceptible to failure; with this in mind, the objective of this research is to analyze the integration of Knowledge Management techniques into the activity of risk management as it applies to software development projects of micro and small Brazilian incubated technology-based firms. Research methods chosen were the Multiple Case Study. The main risk factor for managers and developers is that scope or goals are often unclear or misinterpreted. For risk management, firms have found that Knowledge Management techniques of conversion combination would be the most applicable for use; however, those most commonly used refer to the conversion mode as internalization.. © 2013 Elsevier Ltd. APM and IPMA.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The suggested model of an ideal public sector corruption commission includes oversight by a parliamentary committee with an attached parliamentary inspector (Prenzler, 2009). However, little research has been conducted on parliamentary oversight of corruption commissions. In Queensland, a role of the Parliamentary Crime and Misconduct Committee, which has the Parliamentary Crime and Misconduct Commissioner attached, is to review the Crime and Misconduct Commission every three years. This paper considers the public written and oral submissions made to the Parliamentary Crime and Misconduct Committee in the four reviews of the Crime and Misconduct Committee conducted to date (2004, 2006, 2009 and 2012). By doing this, the paper will begin to identify the gaps in our understanding of the relationship between parliamentary committees and public sector corruption commissions and the processes used by parliamentary committees to provide oversight of corruption commissions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Knowledge Management (KM) is vital factor to successfully undertake projects. The temporary nature of projects necessitates employing useful KM practices for tackling issues such as knowledge leakiness and rework. The Project Management Office (PMO) is a unit within organizations to facilitate and oversee organizational projects. Project Management Maturity Models (PMMM) shows the development of PMOs from immature to mature levels. The existing PMMMs have focused on discussing Project Management (PM) practices, however, the management of project knowledge is yet to be addressed, at various levels of maturity. This research project was undertaken to investigate the mentioned gap for addressing KM practices at the existing PMMMs. Due to the exploratory and inductive nature of this research, qualitative methods were chosen as the research methodology. In total, three cases selected from different industries: research; mining and government organizations, to provide broad categories for research and research questions were examined using the developed framework. This paper presents the partial findings of undertaken investigation of the research organisation with the lowest level of maturity. The result shows that knowledge creation and capturing are the most important processes, while knowledge transferring and reusing are not as important as the other two processes. In addition, it was revealed that provision of “knowledge about client” and “project management knowledge” are the most important types of knowledge that are required at this level of maturity. In conclusion, the outcomes of this paper shall provide powerful guidance to PMOs at lowest level of maturity from KM point of view.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The past decade had witnessed an unprecedented growth in the amount of available digital content, and its volume is expected to continue to grow the next few years. Unstructured text data generated from web and enterprise sources form a large fraction of such content. Many of these contain large volumes of reusable data such as solutions to frequently occurring problems, and general know-how that may be reused in appropriate contexts. In this work, we address issues around leveraging unstructured text data from sources as diverse as the web and the enterprise within the Case-based Reasoning framework. Case-based Reasoning (CBR) provides a framework and methodology for systematic reuse of historical knowledge that is available in the form of problemsolution
pairs, in solving new problems. Here, we consider possibilities of enhancing Textual CBR systems under three main themes: procurement, maintenance and retrieval. We adapt and build upon the stateof-the-art techniques from data mining and natural language processing in addressing various challenges therein. Under procurement, we investigate the problem of extracting cases (i.e., problem-solution pairs) from data sources such as incident/experience
reports. We develop case-base maintenance methods specifically tuned to text targeted towards retaining solutions such that the utility of the filtered case base in solving new problems is maximized. Further, we address the problem of query suggestions for textual case-bases and show that exploiting the problem-solution partition can enhance retrieval effectiveness by prioritizing more useful query suggestions. Additionally, we illustrate interpretable clustering as a tool to drill-down to domain specific text collections (since CBR systems are usually very domain specific) and develop techniques for improved similarity assessment in social media sources such as microblogs. Through extensive empirical evaluations, we illustrate the improvements that we are able to
achieve over the state-of-the-art methods for the respective tasks.