38 results on '"COMPUTERS in law enforcement"'
Search Results
2. On Warrants & Waiting Electronic Warrants & The Fourth Amendment.
- Author
-
PEARL, TRACY HRESKO
- Subjects
- *
WARRANTS (Law) , *COMPUTERS in law enforcement , *CRIMINAL justice system , *POLICE , *MAGISTRATES & magistrates' courts , *JURISPRUDENCE - Abstract
Police use of electronic warrant ("e-warrant") technology has increased significantly in recent years. E-warrant technology allows law enforcement to submit, and magistrate judges to review and approve, warrant applications on computers, smartphones, and tablets, often without any direct communication. Police officers report that they favor e-warrants over their traditional, paper counterparts because they save officers a significant amount of time in applying for warrants by eliminating the need to appear in-person before a magistrate. Legal scholars have almost uniformly praised e-warrant technology as well, arguing that use of these systems will increase the number of warrants issued throughout the United States and decrease police reliance on warrant exceptions, a seemingly ideal outcome given the strong constitutional preference for warrants. However, nearly all of this favorable commentary is premised on the assumptions that (1) convenience is a worthy goal of the criminal justice system, and (2) more warrants necessarily mean better police work and greater fidelity to the Fourth Amendment, assumptions that quickly wither under careful scrutiny. Indeed, research shows that the inconvenience of the traditional warrant system incentivizes careful police work and disincentivizes the submission of constitutionally dubious warrant applications. Ewarrants, however, by prioritizing convenience, upend this system and increase the likelihood that police will submit deficient warrant applications and that magistrates will not carefully review them. Worse, the Fourth Amendment jurisprudence that has arisen around warrants over the last fifty years makes it extremely unlikely that, once issued, these hastily issued e-warrants will be deemed invalid or any resulting evidence suppressed. In short, e-warrants amplify all of the existing problems with the warrant system and exacerbate the imbalance of power between police and citizens. Jurisdictions should sharply curtail police use of e-warrant technology by imposing new restrictions on how and when e-warrant systems can be used, and by creating real-time conversation and transparency requirements in situations in which e-warrants are deemed preferable over their traditional counterparts. [ABSTRACT FROM AUTHOR]
- Published
- 2023
3. The Unexpected Consequences of Automation in Policing.
- Author
-
Joh, Elizabeth E.
- Subjects
COMPUTERS in law enforcement ,GUNFIRE detection systems ,POLICE - Abstract
This Article has two aims. First, it explains how automated decisionmaking can produce unexpected results. This is a problem long understood in the field of industrial organization, but identifying its effects in policing is no easy task. The police are a notoriously difficult institution to study. They are insular, dislike outsiders, and especially dislike critical outsiders. Fortunately, we have the benefit of a decade’s worth of experimentation in police use of automated decision-making and the resulting political backlash against some of these uses. As a result, some large urban police departments have undergone external investigations to see whether tools like predictive policing or individual criminal risk assessments are biased, ineffective, or simply too costly despite their benefits. One of these recent reports, studying the use of acoustic gunshot detection software in Chicago, provides a window into one type of police automation. This leads to the Article’s second observation. Automation is not just a set of tools that the police use; it changes the environment of policing in unexpected ways. The increasing use of automated tools in policing has generated some widely shared criticisms, but they focus primarily on the flaws of the technologies used. The training data in facial recognition algorithms may be biased along lines of race, gender, and ethnicity. Risk assessments for gun violence may, in truth, be poor guides for police intervention. These claims are singularly technology-focused. Accordingly, errors and inefficiencies merit technological improvements. Even calls for bans on technologies like facial recognition are responses to the technology itself. As Chicago’s experience with acoustic gunshot detection technology demonstrates, however, automation serves not just as a tool for the police, but also leads to changes in police behavior. These changes in police conduct are documented in a 2021 report from the Chicago Office of Inspector General, and they are noteworthy. If automation unexpectedly changes police behaviors, these changes have implications for how we understand policing through the lens of inequality and unaccountability. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. PROGRAMMED TO PROTECT AND SERVE: THE DAWN OF DRONES AND ROBOTS IN LAW ENFORCEMENT.
- Author
-
CARR, NANCI K.
- Subjects
DRONE aircraft ,COMPUTERS in law enforcement ,MILITARY strategy ,ROBOTS ,CONSTITUTIONAL law - Abstract
No longer does the field of law enforcement rely solely on human cognition and capability as drones have become first responders, responding to emergency calls with a drone rather than a human officer. Drone technology can transform police work, just as it has package delivery and military strategy. These drone officers allow for higher law enforcement efficiency, safer communities, and even saved lives. However, they also raise civil liberty concerns given that the drones have the power to track vehicles and people without consent, and they can collect and store video records of everyday life, reducing expectations of privacy. This article will discuss the use of autonomous drones and robotic law enforcement officers in the United States and the safety, liability, and constitutional implications thereof. [ABSTRACT FROM AUTHOR]
- Published
- 2021
5. Agent Algorithm: Crime-solving computer plays by its own rules.
- Author
-
Clegg, Brian
- Subjects
- *
COMPUTERS in law enforcement , *ARTIFICIAL intelligence - Published
- 2021
- Full Text
- View/download PDF
6. The Surveillance Dimensions of the Use of Social Media by UK Police Forces.
- Author
-
Egawhary, Elena M.
- Subjects
SOCIAL media ,ELECTRONIC surveillance ,CRIMINAL investigation policy ,FREEDOM of information ,COMPUTERS in law enforcement ,LAW enforcement digital resources - Abstract
This paper explores the various surveillance practices involved in the use of social media for communication and investigation purposes by UK police forces. In doing so, it analyses internal policy documents and official guidance obtained through freedom of information (FOI) requests sent to 46 police forces in the United Kingdom. This analysis finds that UK police forces advise their staff to simultaneously engage in both surveillance and counter-surveillance strategies in their use of social media as a policing tool. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
7. Predictive Policing and the Platformization of Police Work.
- Author
-
Egbert, Simon
- Subjects
PREDICTIVE policing ,COMPUTERS in law enforcement ,COMPUTING platforms ,ELECTRONIC surveillance ,DATA analysis ,CRIME analysis - Abstract
Although the revolutionary potential of predictive policing has often been exaggerated, this novel policing strategy nonetheless implies something substantially new: the underlying methods of (crime) data analysis. Moreover, these police prediction tools matter not only because of their capacity to generate near-term crime predictions but also because they have the potential to generally enhance police-related data crunching, ultimately giving rise to the comprehensive datafication of police work, creating an ongoing drive for extensive data collection and, hence, surveillance. This paper argues that because of its enablement of crime data analysis in general, predictive policing software will be an important incubator for datafied police work, especially when executed via data mining platforms, because it has made police authorities aware that the massive amounts of crime data they possess are quite valuable and can now be easily analyzed. These data are perceived to be even more useful when combined with external data sets and when processed on the largest possible scale. Ultimately, significant transformative effects are to be expected for policing, especially in relation to data collection practices and surveillance imperatives. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
8. Surveillance Capitalism and Platform Policing: The Surveillant Assemblage-as-a-Service.
- Author
-
Linder, Thomas
- Subjects
ELECTRONIC surveillance ,COMPUTING platforms ,COMPUTERS in law enforcement ,EMPIRICAL research ,CLOUD computing ,PREDICTIVE policing - Abstract
Based on empirical research on training webinars, interviews, and promotional material from Vigilant Solutions, this paper investigates the surveillance regime enabled by platform policing: the implementation of cloud-based platforms, designed and run by private corporations, that provide mass surveillance-driven simulations for a range of police operations, including predictive policing, targeted surveillance, and tactical and strategic governance. Building on Amoore's (2016) work on "cloud geographies," this paper argues that the platform model embodied by Vigilant Solutions involves multivalent processes of de- and reterritorialization in which new technological and datalogical spaces are formed and these erode older societal boundaries of private, public, and state. Specifically, Vigilant Solutions leverages its multi-sided platform business model through the deterritorializing, cloud-based concatenations of surveillant technologies. It then argues that the resultant reterritorialized cloud space, which is accessible through its Vigilant Investigative Centre (VIC) platform, fuses mass surveillance data from diverse private, public, and state sources in a simulated geography. Further, the VIC furnishes to law enforcement an array of data analytics that exploits this cloud geography to enable a boundary-crossing surveillance regime of association analysis and proximal suspicion. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
9. Platform Policing and the Real-Time Cop.
- Author
-
Wilson, Dean
- Subjects
COMPUTING platforms ,COMPUTERS in law enforcement ,REAL-time computing ,ELECTRONIC surveillance ,PREDICTIVE policing ,CLOUD computing - Abstract
Policing, particularly in the United States, is being progressively datafied. This process has a historical trajectory that is crucial to the analysis and critique of new platform-based security architectures. Predictive policing has already attracted considerable attention, partially due to its seemingly novel fusion of predictive analytics and police work. Hyperbolic early claims--often mobilizing science fiction imagery--that the future could, in fact, be predicted, pointed towards utopic/dystopic imaginaries of seamlessly integrated control. Predictive policing is, however, increasingly only one component of cloud-based data systems that are coursing through police activity. The imaginary of these transformations can be analysed through the security imaginary of policing as a process of real-time data transmission, perpetually self-adjusting and self-augmenting through machine calculation. The historical contextualization of this imaginary suggests useful vectors of inquiry that position platform policing squarely within the mechanisms of contemporary capitalism. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
10. Keys Under Doormats.
- Author
-
Abelson, Harold “Hal”, Anderson, Ross, Bellovin, Steven M., Benaloh, Josh, Blaze, Matt, Diffie, Whitfield “Whit”, Gilmore, John, Green, Matthew, Landau, Susan, Neumann, Peter G., Rivest, Ronald L., Schiller, Jeffrey I., Schneier, Bruce, Specter, Michael A., and Weitzner, Daniel J.
- Subjects
- *
LAW enforcement , *COMPUTER security vulnerabilities , *COMPUTERS in law enforcement , *COMPUTERS , *COMPUTER security , *CRIMINAL investigation , *WIRETAPPING - Abstract
The article presents the opinions of a number of computer scientists and computer security experts concerning law enforcement access to electronic devices and computer systems. The authors mention a debate that took place in the 1990s concerning a proposed Clipper Chip, which would have allowed law enforcement agencies to have "back door" access to computers and computer devices. The authors argue that the idea of building systems with an approved method to access computers presents unacceptable security risks.
- Published
- 2015
- Full Text
- View/download PDF
11. The Organizational and Practical Considerations of Starting a Crime Analysis Unit: A Case Study of a Midwestern Police Department.
- Subjects
- *
CRIME analysis , *EVIDENCE-based law enforcement , *LAW enforcement agencies , *LAW enforcement databases , *COMPUTERS in law enforcement - Abstract
In recent years, the concept of evidence-based policing has become commonplace in academic and practitioner-minded literature. The law enforcement community acknowledges the benefits of using data to guide policing strategy, yet still takes the acceptance of data analysis for granted when integrating it into the daily operations of police departments. How can data analysis be implemented in a way that provides value to police department managers and patrol officers delivering service? This article examines the start-up of a crime analysis unit in a large, Midwest police department in 2015. Using a case study analysis, the article examines some of the early successes and the potential pitfalls of a new crime analysis unit. Specifically, the article will examine the importance of culture change, the recruitment and selection of crime analysts, and the ongoing effort to provide value to department customers, as well as the community. The case study will focus academically on how change occurs within police organizations, but moreover on practical considerations that will be of great benefit to practitioners wishing to start a crime analysis unit or to improve an existing one. The article will add to the field of crime analysis by combining the insights of practitioners and the perspective of academics. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
12. WAY TO GO: Here are some clear choices in graphics for your courthouse from indoor to outdoor, tabletop to wall mounted.
- Author
-
ROGERS, DONNA
- Subjects
VIDEO walls ,COMPUTERS in law enforcement ,DIGITAL signage ,INTERACTIVE kiosks - Published
- 2019
13. The Computer Moves In.
- Author
-
Friedrich, Otto, Stoler, Peter, Moritz, Michael, and NASH, J. MADELEINE
- Subjects
COMPUTERS ,PERSONAL computer performance ,COMPUTERS in education ,COMPUTERS in law enforcement - Published
- 1983
14. ACCOUNTABILITY IN ALGORITHMIC COPYRIGHT ENFORCEMENT.
- Author
-
Perel, Maayan and Elkin-Koren, Niva
- Subjects
- *
COPYRIGHT policy , *COMPUTERS in law enforcement , *ALGORITHMS - Abstract
Recent years demonstrate a growing use of algorithmic law enforcement by online intermediaries. Facilitating the distribution of online content, online intermediaries offer a natural point of control for monitoring access to illegitimate content, which makes them ideal partners for performing civil and criminal enforcement. Copyright law has been at the forefront of algorithmic law enforcement since the early 1990s when it conferred safe harbor protection to online intermediaries who remove allegedly infringing content upon notice under the Digital Millennium Copyright Act (DMCA). Over the past two decades, the Notice and Takedown (N&TD) regime has become ubiquitous and embedded in the system design of all major intermediaries: major copyright owners increasingly exploit robots to send immense volumes of takedown requests and major online intermediaries, in response, use algorithms to filter, block, and disable access to allegedly infringing content automatically, with little or no human intervention. Algorithmic enforcement by online intermediaries reflects a fundamental shift in our traditional system of governance. It effectively converges law enforcement and adjudication powers in the hands of a small number of mega platforms, which are profitmaximizing, and possibly biased, private entities. Yet notwithstanding their critical role in shaping access to online content and facilitating public discourse, intermediaries are hardly held accountable for algorithmic enforcement. We simply do not know which allegedly infringing material triggers the algorithms, how decisions regarding content restrictions are made, who is making such decisions, and how target users might affect these decisions. Lessons drawn from algorithmic copyright enforcement by online intermediaries could offer a valuable case study for addressing these concerns. As we demonstrate, algorithmic copyright enforcement by online intermediaries lacks sufficient measures to assure accountability, namely, the extent to which decision makers are expected to justify their choices, are answerable for their actions, and are held responsible for their failures and wrongdoings. This Article proposes a novel framework for analyzing accountability in algorithmic enforcement that is based on three factors: transparency, due process and public oversight. It identifies the accountability deficiencies in algorithmic copyright enforcement and further maps the barriers for enhancing accountability, including technical barriers of non-transparency and machine learning, legal barriers that disrupt the development of algorithmic literacy, and practical barriers. Finally, the Article explores current and possible strategies for enhancing accountability by increasing public scrutiny and promoting transparency in algorithmic copyright enforcement. [ABSTRACT FROM AUTHOR]
- Published
- 2017
15. Using Social Media for Crisis Response: The ATHENA System.
- Author
-
Gibson, Helen, Akhgar, Babak, and Domdouzis, Konstantinos
- Subjects
SOCIAL media & society ,CRISIS management ,INFORMATION resources management ,RESCUE work ,COMPUTERS in law enforcement ,USER interfaces ,SOCIAL interaction - Abstract
Social media is now prevalent in all aspects of society. Any major news event is now accompanied by a stream of real-time social media posts. The ATHENA system turns this stream of information into a vital resource in crisis and disaster response for Law Enforcement Agencies (LEAs). The ATHENA system scans the social media environment during a crisis, recognises and collects information relevant to the crisis, and synthesises that information into credible and actionable reports. Via an automated process of classification, these reports are delivered by ATHENA to the stakeholders that most need the information: from the LEA Command and Control Centre managing the crisis, to the first responders on the ground, and to the citizens themselves via a mobile application. The automatic extraction of location data from social media posts allows ATHENA to pin-point crisis activity and resources on a map-based user interface. The citizen, via a mobile device, is provided with fast and reliable alerts of danger, the location of medical help and vital supplies, and direct communication with emergency services. The first responder is given the same intelligence along with additional information pertinent to their search and rescue actions. Command and Control have the ultimate access to all information being processed by the system, where their decision making is supported by computer generated estimates of priority and credibility. Command and Control have the responsibility of validating crisis information before it is disseminated to the public. Social media are also key to the dissemination of crisis information. Dedicated social media entities on the most popular sites are maintained by Command and Control to provide a focal information, advice and instruction broadcasting presence as a trusted source. These social media presences are designed to encourage collaboration between the public and first responders and to provide a channel for communication between all the crisis stakeholders. Thus ATHENA empowers the LEA and the public with a collective intelligence, enabling both to safeguard themselves and others during a crisis. [ABSTRACT FROM AUTHOR]
- Published
- 2015
16. Social Media and Trust in North American Local Government law Enforcement.
- Author
-
Franks, Patricia and Evans, Lois
- Subjects
COMPUTERS in law enforcement ,SOCIAL media & society ,SOCIAL aspects of trust ,POLICE communication systems ,COMPUTERS in public welfare ,COMPUTERS in public relations ,LOCAL government - Abstract
This paper examines the continuing use of social media by local law enforcement agencies in the United States and Canada as a vehicle to ensure public trust and to establish a system of transparency, public participation, and collaboration. It describes the social media response employed by law enforcement agencies in two U.S. and two Canadian cities to significant police incidents, including a terrorist act, an officer death, a sports riot, and a natural disaster. Information was gathered from publicly available sources to develop a social media profile for each police department. Then at least one major event impacting each city was identified by scanning traditional news media and by studying the comments posted to the official police department Facebook page related to that incident. Tweets from the official police department Twitter accounts were captured and a sentiment analysis was performed to determine whether the sentiment expressed was positive or negative during the same timeframe. The content of the messages posted by law enforcement, whether sharing good news or informing citizens of potential or real threats, the content of the tweets by the visitors to the official police department Twitter accounts, and specific community events surrounding noticeable spikes in participation were analyzed. The incidents investigated include the Boston Marathon bombing in April 2013 and the flooding that devastated the City of Calgary in June 2013. The contention that the use of social media can increase the level of trust citizens have in local law enforcement is not definitive but is supported by evidence in the form of increased participation on the social media sites reviewed and the positive comments of participants. Public administrators can use lessons learned from these examples to refine their own social media strategies in order to engage and support the public in the event of similar occurrences. [ABSTRACT FROM AUTHOR]
- Published
- 2015
17. FROM 'SECURITY BORDER' TO 'SERVICE BORDER' - FUTURE AUTOMATED BORDER CONTROL.
- Author
-
Heiskanen, Markus
- Subjects
BORDER security ,NATIONAL security software ,FRONTIER workers ,BORDER crossing ,COMPUTERS in law enforcement ,SELF-service (Economics) - Abstract
Since 9/11, borders have been seen as one of the main security filters for our security. Borders have been securitized. At the very same time states have striven to facilitate fluent border crossing for travel and business purposes. Many countries have implemented automated border control (ABC) systems to respond to these challenges. Modern ABC-systems are based on e-gate solutions. This paper proposes to implement 'next practices' for border checks. The border should be seen through a 'virtual gate' and 'service border' concepts. Security at the border can be met by widening the ABC-systems (from e-gates) both spatially and temporally. More intense participation of travelers by using self-service technologies (SSTs) for border checks may provide better traveler experience and help economic and law enforcement burden to manage border traffic. It may lessen tension at the border, and promote trust for security (authority) and society, too. [ABSTRACT FROM AUTHOR]
- Published
- 2014
18. Lie-Detector AI.
- Author
-
Mega, Emiliano Rodríguez
- Subjects
- *
ARTIFICIAL intelligence , *COMPUTERS in law enforcement , *CITIZEN crime reporting - Abstract
The article discusses research by Miguel Camacho Collados and colleagues, reported in the journal "Knowledge-Based Systems," on the development of an artificial-intelligence program designed to distinguish between fake and genuine reports of robberies made to police.
- Published
- 2019
- Full Text
- View/download PDF
19. EDUCATING THE TECHNOLOGY OFFICER OF THE FUTURE: A NEEDS ANALYSIS.
- Author
-
Wydra, Christopher and Hartle III, Frank
- Subjects
INTERDISCIPLINARY education ,POLICE training ,CRIMINAL justice education ,INFORMATION technology education ,COMPUTERS in law enforcement - Abstract
This quantitative, case study explores the importance of IT, CIS, Computer Science, and Communications as interdisciplinary degree programs with criminal justice curriculum. The researchers examined the future technology skills needed by police agencies, the current recruiting trends by police departments and compared these needs with current four year, accredited criminal justice programs. The researchers then examined the perceptions of criminal justice major students and their assessment of the importance and impact of technology in law enforcement today and in the near future. The data demonstrates how criminal justice students' perceptions allude to the importance and relevancy of technology in law enforcement and how CJ programs are not adequately preparing them for future policing needs. In addition, police agencies are not effectively recruiting technology officers to meet current and future technological needs for law enforcement. [ABSTRACT FROM AUTHOR]
- Published
- 2015
20. TECHNOLOGY AND INDIVIDUAL PRIVACY RIGHTS: THE FOURTH AMENDMENT IMPLICATIONS OF EXPLOITING ZERO-DAY VULNERABILITIES FOR DOMESTIC INVESTIGATIONS.
- Author
-
Lebowitz, Jason
- Subjects
RIGHT of privacy ,COMPUTER security vulnerabilities ,COMPUTER system failures ,COMPUTERS in law enforcement ,INVESTIGATIONS ,PREVENTION of computer hacking - Abstract
The article focuses on the fourth amendment of Technology and Individuals Privacy Rights related to the implications of zero-day vulnerabilities for domestic investigations. Topics discussed include exploitation of a zero-day vulnerability, increase in the cyber and computer crimes; increase in the risk of hacking victims, role of the law enforcement for reducing risk of computer crime, usage of zero-day vulnerabilities against international targets; and examining the technical background.
- Published
- 2015
21. Promising policing technologies: Experiences, obstacles and police needs regarding law enforcement technologies.
- Author
-
Custers, Bart and Vergouw, Bas
- Subjects
- *
LAW enforcement , *LEGISLATION , *POLICE , *CRIMINAL justice system , *COMPUTERS in law enforcement , *TECHNOLOGICAL innovations - Abstract
Police forces and law enforcement agencies in many countries are continuously trying to optimize the use of technologies in policing and law enforcement. Efforts are being made to remove existing technological, legal and organizational obstacles to create more opportunities of promising technologies, both existing and new. This contribution describes the results of a survey among 46 police forces and other law enforcement agencies in 11 countries. Their experiences with policing technologies and their needs and preferences in this regard are described. The prevalence and satisfaction of existing technologies, including wiretapping, fingerprints, DNA research, database coupling, data mining and profiling, camera surveillance and network analyses were investigated. Legal, technological and organizational obstacles for the use of technology in policing were mapped and the extent to which policing technologies are evaluated and yield success stories was investigated. The main obstacles, according to the respondents, are insufficient financial resources and insufficient availability of technology. One in four organizations is lacking any clear, appealing success stories and half of the respondents indicated they were not performing any evaluations on the effectiveness of using particular technologies in policing. As a result, the information available on whether technologies in policing are actually working is very limited. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
22. On Demand: Stacy Butler channels passion for legal innovation into i4J incubator.
- Author
-
REYNOLDS, MATT
- Subjects
- *
COMPUTERS in law enforcement , *SOCIAL justice , *LEGAL databases , *LAW students - Abstract
The article profiles Stacy Butler, the director of the Innovation for Justice Program (i4J), a social justice innovation lab that focuses on creating platforms and services to build legal technologies. Topics include the fifth anniversary of i4J program in February 2023, housed at the University of Arizona law school and the University of Utah David Eccles School of Business; teams of law school students and professors; and improving the lives of people navigating the justice system.
- Published
- 2023
23. A FUNDAMENTAL RIGHT TO THE PROTECTION OF YOUR PERSONAL INFORMATION THAT IS COLLECTED BY GOVERNMENTS: REVIEW OF THE NEW INFORMATION PRIVACY ACT 2014 (ACT).
- Author
-
CHAPMAN, BELINDA
- Subjects
- *
RIGHT of privacy , *DATA privacy , *DATA protection laws , *DATA security laws , *COMPUTERS in law enforcement , *LEGISLATIVE bills , *LAW - Abstract
Privacy is an emerging and important area of law. Never has it been as important as it is now for the Australian community to have confidence that the information their governments collect is being adequately used and protected. This is largely due to the advanced ability for people to access information, which has resulted in a heightened risk for information to spread widely, and at a speed not envisaged even five years ago. With recent privacy breaches, such as the inadvertent release of the personal information of approximately 10,000 detainees on the Commonwealth's Department of Immigration and Border Protection's website1 the protection and use of personal information is a critical consideration for all governments. This article will examine the recently passed Information Privacy Act 2014 (ACT) by the ACT Legislative Assembly and will compare the Information Privacy Act 2014 (ACT) with the Privacy and Data Protection Bill 2014 (Vic)2 recently tabled in Victoria which brings together privacy and law enforcement data security legislation. This article will compare governmental reports handed down in Victoria and the ACT, which addressed similar issues of data security and protection and made similar recommendations. [ABSTRACT FROM AUTHOR]
- Published
- 2014
24. Beep-boop, you're under arrest.
- Author
-
ABEL, ALLEN
- Subjects
- *
ROBOTS & society , *AIRPORT security measures , *ARTIFICIAL intelligence & ethics , *COMPUTERS in law enforcement , *AUTONOMOUS robots - Abstract
The article discusses the use of a Knightscope K5 robot police officer to patrol LaGuardia airport in New York. Topics include use of the robots to upload license plates of automobiles violating airport rules and facially recognize criminals from police databases, concerns of the public regarding how the robots will be used, and the ethical implications of using artificial intelligence in law enforcement.
- Published
- 2018
25. As Technology Evolves, So Does the Practice of Law, and So Must Attorneys.
- Author
-
Freeman, Thomas J. and McKain, Aaron
- Subjects
PRACTICE of law ,COMPUTERS in law enforcement ,ELECTRONIC records management - Published
- 2019
26. USA: Predictive Coding and the Changing Legal Marketplace.
- Author
-
Cooper, Benjamin P.
- Subjects
- *
LINEAR predictive coding , *SPEECH processing systems , *LEGAL professions , *COST effectiveness , *COMPUTERS in law enforcement - Abstract
The article offers information on the development, merits and application of predictive coding in judicial opinions in the U.S. Topics discussed include the merits of linear predictive coding against human review, significance of computer-assisted technology that lower cost of predictive coding, and impact of predictive coding on legal market.
- Published
- 2013
- Full Text
- View/download PDF
27. Information ethics in the context of smart devices.
- Author
-
Roux, Brian and Falgoust, Michael
- Subjects
INFORMATION ethics ,INFORMATION technology equipment ,LAPTOP computer security measures ,SMARTPHONES ,COMPUTERS in law enforcement ,SECURITY systems - Abstract
In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions of users' cognitive capability. In Philosophy of Mind, Extended Cognition is a metaphysical theory about the relationship between consciousness or cognitive activity and various external tools or aids that agents employ in the service of cognition. Supporters of Extended Cognition argue that mental activity must be understood as taking place both within the brain and by way of tools such as a logician's pen and paper, a mathematician's calculator, or a writer's word processing program. While Extended Cognition does not have universal support among philosophers of mind, the theory nevertheless describes how agents interact with their 'smart devices.' We explore the the implications of taking Extended Cognition seriously with regard to privacy concerns by way of a series of thought experiments. By comparing the differences in expectations of privacy between a citizen and the government, between an employee of a corporate firm, and between citizens alone, we show that expectations of privacy and injury are significantly affected by taking the cognitive role of smart devices into account. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
28. THE COLLISION OF THE COURTS AND PREDICTIVE CODING: DEFINING BEST PRACTICES AND GUIDELINES IN PREDICTIVE CODING FOR ELECTRONIC DISCOVERY.
- Author
-
Byram, Elle
- Subjects
COMPUTERS in law enforcement ,STANDARDS ,ACTIONS & defenses (Law) - Abstract
The article offers information on the use of Technology Assisted Review (TAR) in relevance to three court cases including Moore v. Publicis Groupe, Global Aerospace v. Landow Aviation, and Kleen Products v. Packaging Corporation of America. It analyzes the benefits for legal community from the use of TAR and describes the standards that are set to use the TAR.
- Published
- 2013
29. The judge is a robot.
- Author
-
Rutkin, Aviva
- Subjects
- *
COMPUTERS in law enforcement ,COMPUTERS in justice administration - Abstract
The article discusses proposals to allow computer algorithms to determine certain legal rulings, such as the amount of time police can investigate a suspect without a warrant before it is considered a breach of privacy or to issue speeding tickets.
- Published
- 2014
- Full Text
- View/download PDF
30. Tablets Get To Work.
- Author
-
Endler, Michael
- Subjects
- *
TABLET computers , *COMPUTERS in business , *COMPUTERS in law enforcement ,COMPUTERS in business logistics - Abstract
The article discusses the use of tablet computers in business operations. It states that in the Stacked restaurant in San Diego, California, tablet computers are used for ordering and payments. It mentions that the Drug Enforcement Agency (DEA) used Dell Latitude tablets in their surveillance operation. It adds that General Electric (GE) Energy Storage general manager Randy Rausch uses tablets to help workers in their decisions in the factory.
- Published
- 2013
31. Big data is nothing new in the investigative environment.
- Author
-
AKPATA, MICHAEL
- Subjects
BIG data ,COMPUTERS in law enforcement ,POLICE - Published
- 2017
32. MAKING SENSE OF NOISE.
- Subjects
- *
ELECTRONIC noise , *DETECTORS , *COMPUTERS in law enforcement - Abstract
The article presents information on an award won by the European Union's (EU's) Joint Research Center (JRC) for a research paper on identifying the camera used to make a photography through the use of sensor pattern noise as of March 2014, with a focus on its use by law enforcement.
- Published
- 2014
33. Will Tech Protect My Kids?
- Author
-
Williams, Bärí A.
- Subjects
- *
TECHNOLOGY & children , *COMPUTERS in law enforcement - Abstract
The author presents a personal narrative of her experiences about the potential impact of technology and her children, along with the use of technology in law enforcement.
- Published
- 2017
34. Don't Miss Out On Law Enforcement Sales.
- Author
-
Monocello, Mike
- Subjects
MANAGEMENT service providers (Contractors) ,COMPUTERS in law enforcement ,INFORMATION technology management - Abstract
The article focuses on the need for bar coding/data collection-focused solutions provider to boost their business opportunities in law enforcement by providing their information technology (IT) needs.
- Published
- 2015
35. SC to states: Upload FIRs within 24 hours.
- Author
-
Balaji, R.
- Subjects
COMPUTERS in law enforcement ,PREVENTION of harassment ,LAW enforcement agencies ,POLICE stations - Abstract
The article reports on the move by the Indian Supreme Court to ask all states and union territories to upload a copy of first information reports within 24 hours of registration. The move aims at removing a source of harassment. Law-enforcement agencies are expected to experience a digital challenge because of the rule. According to the union home ministry, a project will be launched to make 15,000 police stations in the country computerized.
- Published
- 2016
36. Advancements made in crime reconstruction.
- Author
-
MEYER, DANIEL
- Subjects
CRIME scene reconstruction ,COMPUTERS in law enforcement ,TECHNOLOGICAL innovations ,FORENSIC sciences ,CRIMINAL investigation ,TRAFFIC accidents ,COMPUTER-generated imagery - Abstract
The article discusses the technological advancements made in crime scene reconstruction, which continues to play an instrumental role in the criminal investigative process. Topics discussed include improvements to forensic mapping and diagramming of incidents such as motor vehicle accidents, and how advances in computer animation and blood sputter analysis are aiding crime scene engineers. Also mentioned are video images, social media and cell phone data as part of digital forensics.
- Published
- 2014
37. More police departments headed to the cloud.
- Author
-
Keating, Michael
- Subjects
- *
CLOUD computing , *CLOUD storage , *COMPUTERS in law enforcement , *LAW enforcement databases , *POLICE records & correspondence - Abstract
The article discusses the increase in the number of U.S. police departments that are using cloud computing to move and store data. Topics covered include the findings of a survey by the International Association of Chiefs of Police (IACP), the use of cloud applications for tasks such as crime reporting and analysis and records management, and the importance of situational awareness video (SAV) in the cloud for police or emergency responses.
- Published
- 2015
38. In our century.
- Subjects
- *
SECURITY systems , *COMPUTERS in law enforcement , *LAW enforcement -- Safety measures , *CITIZEN crime reporting , *CRIME prevention , *CITIES & towns - Abstract
The article looks back on U.S. cities' investments in security improvements. Kansas City, Missouri Chief of Police Clarence M. Kelly explained that the police department's IBM/360 model 40 reduced wait times for cross-referencing criminal activity and make the work of the patrolman more effective. Charlotte, North Carolina police's Operation Warn involved setting up of a hotline system in 1968 to enable merchants to report a crime.
- Published
- 2013
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.