Advertisement

Exploring the ethical, organisational and technological challenges of crime mapping: a critical approach to urban safety technologies

  • Gemma Galdon Clavell
Original Paper

Abstract

Technology is pervasive in current police practices, and has been for a long time. From CCTV to crime mapping, databases, biometrics, predictive analytics, open source intelligence, applications and a myriad of other technological solutions take centre stage in urban safety management. But before efficient use of these applications can be made, it is necessary to confront a series of challenges relating to the organizational structures that will be used to manage them, to their technical capacities and expectations, and to weigh up the positive and negative external factors at play at the intersection between technology, society and urban management. The paper contributes to this discussion by looking into the dynamics that drive technological uptake in the field of urban safety, the different theories underpinning the relationship between crime and space, and the history and technological characteristics of Geographic Information Systems to later present specific case studies and practical examples of crime mapping systems. Finally, addressing matters related to organisational constraints, technological possibilities and societal impact from a critical point of view, the paper lays out guidelines to ensure that using technology to manage urban safety does not result in increased victimisation, inequalities or inefficiency. Taking one of the longest established technology used in police practice, crime mapping, and using a multidisciplinary, critical approach to escape technological solutionism and bridge the gap between the academic literature (STS, urban sociology, environmental criminology) and policy needs and recommendations, this paper sends a cautionary tale to those hoping that technology alone can solve complex urban and social problems.

Keywords

Ethics of technology Policing Policy Mapping 

References

  1. Bhagat, A., & Mogel, L. (Eds.). (2008). An atlas of radical cartography. Los Angeles: Journal of Aesthetics and Portest Press.Google Scholar
  2. Bullen, I. (2008). Priority neighbourhoods and the Vulnerable Localities Index in Wigan—A strategic partnership approach to crime reduction a Chainey, Spencer i. In S. Chasiney, L. Tompson (Eds.), Crime mapping case studies. Practice and research. West Sussex: Wiley.Google Scholar
  3. Byrne, J., & Rebovich, D. (2007). The New technology of Crime, Law and Social Control Monsey. NY: Criminal Justice Press.Google Scholar
  4. Chainey, S. (2004). Using geographic information to support the police response to community cohesion. Paper presented at the Association for Geographic Information Conference, 12–14 October, London.Google Scholar
  5. Chainey, S. (2008). Identifying priority neighbourhoods using the Vulnerable Localities Index. Policing, 2(2), 196–209.CrossRefGoogle Scholar
  6. Chainey, S., & Ratcliffe, J. (2005). Gis and crime mapping. West Sussex: Wiley.CrossRefGoogle Scholar
  7. Chainey, S., & Thompson, L. (Eds.). (2008). Crime mapping case studies. Practice and research. West Sussex: Wiley.Google Scholar
  8. Chan, J. B. L. (2001). The technological game: How information technology is transforming police practice. Criminal Justice, 1(2), 139–159.CrossRefGoogle Scholar
  9. Clarke, R. V., & Felson, M. M. (1993). Introduction: Criminology, routine activity, and rational choice. Advances in Theoretical Criminology: Routine Activity and Rational Choice, 5, 1–14.Google Scholar
  10. Currie, G., & Kerrin, M. (2004). The limits of a technological fix to knowledge management: Epistemological, political and cultural issues in the case of intranet implementation. Management Learning, 35(1), 9–29.CrossRefGoogle Scholar
  11. Eterno, J. A., & Silverman, E. B. (2012). The Crime Numbers Game: Management by Manipulation. Boca Raton, FL: CRC Press/Taylor and Francis Group.CrossRefGoogle Scholar
  12. Gilmour, A., & Barclay, J. (2008). Developing geographical information systems and crime mapping tools in Nez Zealand. In S. Chainey & L. Thompson (Eds.), Crime mapping case studies. Practice and research. West Sussex: Wiley.Google Scholar
  13. Hand, D. (2012). Open data is a force for good, but not without risks. The Guardian, July 10.Google Scholar
  14. Harcourt, B. E. (2001). Illusion of order: The false promise of broken windows policing. Cambridge: Harvard University Press.Google Scholar
  15. Harfield, C., & Harfield, K. (2008). Intelligence: Investigation, community and partnership (1st ed.). Oxford: Oxford University Press.Google Scholar
  16. Harfield, K., & Harfield, C. (2012). Covert investigation (3rd ed.). Oxford: Oxford University Press.Google Scholar
  17. Harries, K. (1999). Mapping crime: Principle and practice. Washington, DC: National Institute of Justice, Crime Mapping Research Center.Google Scholar
  18. Longley, P. A., Goodchild M. F., Maguire, D. J., & Rhind, D. (2001). Geographic information systems and science. Chichester: Wiley.Google Scholar
  19. Lyon, D. (2003). Surveillance after September 11. Cambridge, UK: Polity Press.Google Scholar
  20. Morozov, E. (2014). To save everything, click here: The folly of technological solutionism. New York: PublicAffairs.Google Scholar
  21. Nedovic-Budic, Z. (1999). Evaluating the effects of GIS technology: Review of methods. Journal of Planning Literature, 13(3), 284–295.CrossRefGoogle Scholar
  22. Pleasance, C. (2014). Gang who ‘Stole More than $1 million in Jewellery and Cash’ Caught after Posting Pictures of Themselves Showing off Their Swag on Social Media. https://www.dailymail.co.uk/news/article-2649491/Gangstole-1million-jewelry-cash-caught-posting-pictures-showing-swag-socialmedia.html#ixzz3ctqyubbx. Accessed 8 June 2015.
  23. Pressman, J., & Wildavsky, A. (1984). Implementation: How great expectations in Washington are dashed in Oakland; Or, Why it’s amazing that federal programs work at all, this being a Saga of the Economic Development Administration as told by two sympathetic observers who seek to build morals on a foundation of ruined hopes. Berkeley: University of California Press.Google Scholar
  24. Ratcliffe, J. H. (2005). Detecting spatial movement of intra-region crime patterns over time. Journal of Quantitative Criminology, 21(1), 103–123.CrossRefGoogle Scholar
  25. Ratcliffe, J. H., & McCullagh, M. J. (1999). Hotbeds of crime and the search for spatial accuracy. Journal of Geographical Systems, 1(4), 385–398.CrossRefGoogle Scholar
  26. Ray Jeffery, C. (1999) CPTED: Past, present, and future. Position paper per International CPTED Association at the 4th Annual International CPTED Association Conference, Mississauga, Ontario, Canada.Google Scholar
  27. Rosner, L. (2004). The technological fix: How people use technology to create and solve problems. Great Britain: Routgled.Google Scholar
  28. Sawers, P. (2015). Facebook and Twitter Could Be Hate-Speech ‘Accomplices’ if New French Law Passes’,Venture Beat News. http://venturebeat.com/2015/01/27/facebook-and-twitter-could-be-hate-speech-accomplices-if-new-frenchlawpasses. Accessed 8 June 2015.
  29. Schneier, B. (2003). Beyond Fear, Thinking Sensibly about Security in an Uncertain World. New York: Copernicus Books.Google Scholar
  30. Swierstra, T., & Jelsma, J. (2005). Trapped in the duality of structure: An STS approach to engineering ethics. In H. Harbers (Ed.), Inside the politics of technology: Agency and normativity in the co-production of technology and society. Amsterdam: Amsterdam University Press.Google Scholar
  31. Vann, I. B., & David Garson, G. (2001). Crime mapping and its extension to social science analysis. Social Science Computer Review, 19(4), 471–479.CrossRefGoogle Scholar
  32. Walsh, W. F. (2001). Compstat: An analysis of an emerging police managerial paradigm. Policing: An International Journal of Police Strategies & Management, 24(3), 347–362.CrossRefGoogle Scholar
  33. Wartell, J., & McEwen, J. T. (2001). Privacy in the information age: A guide for sharing crime maps and spatial data. Washington: Crime Mapping Research Center i US Department of Justice.Google Scholar
  34. Wilson, J. Q., & Kelling, G. L. (1982). Broken windows. The police and neighbourhood safety. The Atlantic Monthly, 249(3), 29–38.Google Scholar
  35. Woolgar, S. (Ed.). (2002). Virtual society? Technology, cyberbole, reality. Oxford: Oxford University Press.Google Scholar
  36. Završnik, A. (2013). Blurring the line between law enforcement and intelligence: Sharpening the gaze of surveillance. Journal of Contemporary European Research, 9(1), 182–202.Google Scholar

Copyright information

© Springer Nature B.V. 2018

Authors and Affiliations

  1. 1.Eticas Research and ConsultingBarcelonaSpain

Personalised recommendations