Skip to main content
Log in

Mobile Technology and Action Teams: Assessing BlackBerry Use in Law Enforcement Units

  • Published:
Computer Supported Cooperative Work (CSCW) Aims and scope Submit manuscript

Abstract

This research explores the effectiveness of mobile wireless information and communication technologies (ICTs) for law enforcement teams. Law enforcement teams require real-time information access and rapid communication to diagnose potential threats, analyze problems, and coordinate actions. To meet these needs, two U.S. law enforcement organizations implemented pilot trials of RIM BlackBerries for approximately 650 squad members. These trials provided an opportunity to assess acceptance, use, and perceived performance benefits of the technology as well as factors influencing these outcomes. Data were collected from semi-structured interviews, user surveys, and system logs. Although the work teams and tasks were similar in the two organizations, the outcomes, while generally positive, differed markedly, with much greater acceptance and use in one organization versus the other. Results show how technical factors, functionality, and implementation processes account for these differences and illustrate how mobile wireless ICT can meet the unique needs for information access and communication in investigative action teams. We expect that these findings will generalize beyond action teams as more mobile workers in a variety of domains adopt wireless handheld technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Jones and Hinds also define extreme work teams as those that meet for a single event. In contrast, the action teams described by Sundstrom (1999) as well as those examined here generally are not temporary.

  2. Some exceptions include flight crews (Benson et al. 1990), firefighters (Stasz et al. 1991), and SWAT teams (Jones and Hinds 2002).

  3. NCIC is a database of criminal justice information (i.e.- criminal record history information, fugitives, stolen properties, missing persons) available to Federal, state, and local law enforcement and other criminal justice agencies. ChoicePoint is a company that provides data about individuals and organizations to industry and government. For example, Choicepoint database users can obtain personal information about individuals such as names, addresses, Social Security numbers, and credit reports.

  4. There were no early adopters in Site Y, as the pilot was initiated in Site X.

  5. Most of the nonusers appeared as having sent zero messages. Participants who did not retain or use their devices still had valid user IDs, so they appeared in the usage logs even if they did not use the device to send a message.

  6. For withstanding physical stress of the job, M = 3.0 (SD = 1.0) in Site X and M = 3.28 (SD = . 94) in Site Y. For concerns about security of information, M = 3.54 (SD = .91) in Site X and M = 3.28 (SD = .78) in Site Y.

  7. Paradoxically, the lack of internal system integration made it easier for BlackBerry users to communicate via email in the field with people outside of their organizations than with others in their own organizations who did not have BlackBerries.

  8. Assuming a 5-day work week, users in Site X sent 2.41 messages and received 4.41 messages, on average, and users in Site Y sent 1.88 messages and received 3.98 messages per day, on average. In contrast, in a study of email use at work among a diverse sample of respondents (n = 484), Dabbish and Kraut (2006) found that respondents sent 21 messages and received 41 messages per day, on average.

  9. Department of Motor Vehicles (DMV) records typically include information such as the names and addresses of vehicle owners based on license plate numbers or vehicle identification numbers and driving records (e.g., license suspensions, accident records, moving violation convictions) based on driver license numbers. DMVs are generally state-operated government agencies; therefore, functions of these agencies vary from state to state. DMV is a generic term; other titles are used in different states.

  10. Examples of other requested applications included GPS and the ability to take and transmit photographs.

  11. In fact, these sites subsequently segmented password protection for voice and text, such that users no longer needed to re-authenticate every 30 min to use the phone. The 30-minute lockout applied to text-based functions, such as email and access to internal databases and the Internet.

  12. BlackBerries were subsequently deployed to all squad members throughout the organization.

References

  • Bellotti, V., & Bly, S. (1996). Walking away from the desktop computer: Distributed collaboration and mobility in a product design team. Proc. CSCW 1996 (pp. 209–218). ACM.

  • Benson, I., Ciborra, C., & Proffitt, S. (1990). Some social and economic consequences of groupware for flight crews. Proc. CSCW 1990 (pp. 119–130). ACM.

  • Bikson, T. K., & Eveland, J. D. (1998). Sociotechnical reinvention: implementation dynamics and collaboration tools. Information Communication & Society (iCS), 1(3), 269–289.

    Google Scholar 

  • Bikson, T. K., Cohen, S. G., & Mankin, D. D. (1999). Teams and Information Technology: Creating Value Through Knowledge. In E. Sundstrom (Ed.), Supporting work team effectiveness (pp. 215–245). San Francisco: Bass.

    Google Scholar 

  • Brailer, D. J. (2005). Interoperability: A key to the future health care system. Health affairs. Available at: http://content.healthaffairs.org/cgi/content/abstract/hlthaff.w5.19v1.

  • Brown, M. M. (2001). The benefits and costs of information technology innovations: an empirical assessment of a local government agency. Public Performance and Management Review, 24(4), 351–366.

    Article  Google Scholar 

  • Brynin, M., & Kraut, R. (2006). Social studies of domestic information and communication technologies. In R. Kraut, M. Brynin & S. Kiesler (Eds.), Domesticating information technologies (pp. 3–20). New York: Oxford University Press.

    Google Scholar 

  • Chan, J. B. L. (2001). The technological game: how information technology is transforming police practice. Criminal Justice: International Journal of Policy and Practice, 1(2), 139–159.

    Google Scholar 

  • Churchill, E. F., & Wakeford, N. (2001). Framing mobile collaboration and mobile technologies. In B. Brown, N. Green & R. Harper (Eds.), Wireless world: Social and interactional implications of wireless technology (pp. 154–179). New York: Springer-Verlag.

    Google Scholar 

  • Dabbish, L. A, & Kraut, R. E. (2006). Email overload at work: An analysis of factors associated with email strain. Proc. CSCW 2006 (pp. 431–440). ACM.

  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–339.

    Article  Google Scholar 

  • Davis, J. D., & Tang, N. (2006). Efficacy of a federal law enforcement tactical medicine program following a catastrophic natural disaster: the DHS ICE SRT response to Hurricane Katrina. Prehospital Emergency Care, 10(2), 173–179.

    Article  Google Scholar 

  • Dearman, K., Hawkey, K., & Inkpen, K. (2005). Effect of location-awareness on rendezvous behaviour. Proc. CHI 2005 (pp. 1929–1932). ACM.

  • De Groote, S., & Doranski, M. (2004). The use of personal digital assistants in the health sciences: results of a survey. Journal of the Medical Library Association, 92(3), 341–348.

    Google Scholar 

  • Grant, D., & Kiesler, S. (2001). Blurring the boundaries: Cell phones, mobility and the line between work and personal life. In B. Brown, R. Harper & N. Green (Eds.), Wireless world: Social and interactional aspects of the mobile age (pp. 121–131). New York: Springer.

    Google Scholar 

  • Green, N. (2002). On the move: technology, mobility, and the mediation of social time and space. The Information Society, 18, 281–292.

    Article  Google Scholar 

  • Hoey, A. (1998). Techno-cops: information technology and law enforcement. International Journal of Law and Information Technology, 6(1), 69–90.

    Article  Google Scholar 

  • Ito, M., Okabe, D., & Matsuda, M. (2005). Personal, portable, pedestrian: Mobile phones in Japanese life. Cambridge: MIT.

    Google Scholar 

  • Jiang, X., Hong, J. I., et al. (2004). Ubiquitous computing for firefighters: Field studies and prototypes of large displays for incident command. 2004 conference on Human factors in computing systems, Vienna, Austria. New York: ACM.

    Google Scholar 

  • Jones, H., & Hinds, P. (2002). Extreme work teams: Using SWAT teams as a model for coordinating distributed robots. Proc. CSCW 2002 (pp. 372–381). ACM.

  • Killeen, J. P., Chan, T. C., Buono, C., Griswold, W. G., & Lenert, L. A. (2006). A wireless first responder handheld device for rapid triage, patient assessment and documentation during mass casualty incidents. American Medical Informatics Association Annual Symposium Proceedings, 429–433.

  • Kraut, R. E., Rice, R. E., Cool, C., & Fish, R. S. (1998). Varieties of social influence: the role of utility and norms in the success of a new communication medium. Organization Science, 9(4), 437–453.

    Article  Google Scholar 

  • Kyng, M., Nielsen, E. T., & Kristensen, M. (2006). Challenges in designing interactive systems for emergency response. 6th ACM conference on Designing Interactive systems, University Park, PA, USA. New York: ACM.

    Google Scholar 

  • Landgren, J. (2006). Making action visible in time-critical work. Conference on human factors in computing systems. Montréal: ACM.

    Google Scholar 

  • Landgren, J., & Nulden, U. (2007). A study of emergency response work: Patterns of mobile phone interaction, CHI2007. San Jose.

  • Leonard-Barton, D., & Deschamps, I. (1998). Managerial influence in the implementation of new technology. Management Science, 34(10), 1252–1265.

    Article  Google Scholar 

  • Lin, C., Hu, P. J.-H., & Chen, H. (2004). Technology implementation management in law enforcement: COPLINK system usability and user acceptance evaluations. Social Science Computer Review, 22(1), 24–36.

    Article  Google Scholar 

  • Manning, P. K. (1996). Information technology in the police context: the ‘sailor’ phone. Information Systems Research, 7(1), 52–62.

    Article  Google Scholar 

  • Markus, M. L. (1987). Toward a ‘critical mass’ theory of interactive media: universal access, interdependence and diffusion. Communication Research, 14(5), 491–511.

    Article  Google Scholar 

  • Markus, M. L., Bikson, T. K., El-Shinnaway, M., & Soe, L. L. (1992). Fragments of your communication: email, vmail, and fax. The Information Society, 8, 207–226.

    Article  Google Scholar 

  • Mazmanian, M., Orlikowski, W. J., & Yates, J. (2006). CrackBerrys: Exploring the social implications of ubiquitous wireless email devices. Bergen: Paper presented at the 22nd European Group for Organizational Studies conference, July 6–8.

  • McLeod, T., Ebbert, J., & Lymp, J. (2003). Survey assessment of personal digital assistant use among trainees and attending physicians. Journal of the American Medical Informatics Association, 10(6), 605–607.

    Article  Google Scholar 

  • Moore, G. C., & Benbasat, I. (1996). Integrating diffusion of innovations and theory of reasoned action models to predict utilization of information technology by end-users. In K. Kautz & J. Pries-Hege (Eds.), Diffusion and adoption of information technology (pp. 132–146). London: Chapman and Hall.

    Google Scholar 

  • Nadler, D., & Tushman, M. (1990). Beyond the charismatic leader: leadership and organizational change. California Management Review, 32(2), 77–97.

    Google Scholar 

  • Nardi, B., Whittaker, S., & Bradner, E. (2000). Interaction and outeraction: Instant messaging in action. In Proc. CSCW 2000 (pp. 79–88). ACM.

  • National Institute of Justice. (2004). Improving law enforcement, Annual Report. Available at http://www.ncjrs.gov/pdffiles1/nij/209274d.pdf.

  • Olson, J. S., & Teasley, S. (1996). Groupware in the wild: Lessons learned from a year of virtual collocation. Proc. CSCW 1996 (pp. 419–427). ACM.

  • Pinelle, D., & Gutwin, C. (2005). A groupware design framework for loosely coupled workgroups. In Proc. ECSCW 2005 (pp. 65–82). New York: Springer.

  • Rheingold, H. (2002). Smart mobs: The next social revolution. Cambridge: Perseus.

    Google Scholar 

  • Rogers, E. M. (1991). The ‘critical mass’ in the diffusion of interactive technologies in organizations. In K. L. Kraemer, J. I. Cash & J. F. Nunamaker (Eds.), The information systems research challenge: Survey research methods (Vol. 3). Boston: Harvard Business School Research Colloquium.

    Google Scholar 

  • Rogers, E. (1995). Diffusion of innovations. New York: Free.

    Google Scholar 

  • Salmanian, M., & Kellett, M. (2004). CAN-US security-enhanced blackberry trial: Concept document. Ottawa: DRDC Ottawa TM 2004-181, Defence R&D.

    Google Scholar 

  • Schlosser, F. K. (2002). So, how do people really use their handheld devices? An interactive study of wireless technology use. Journal of Organizational Behavior, 23(SpecIssue), 401–423.

    Article  Google Scholar 

  • Scholl, J., McCarthy, J., & Harr, R. (2006). A comparison of chat and audio in media rich environments, Proceedings of the ACM conference on computer supported cooperative work (CSCW ‘06) (pp. 323–332). New York: ACM.

    Google Scholar 

  • Stasz, C., Bikson, T. K., Eveland, J. D., & Adams, J. (1991). Assessing benefits of the U.S. forest service’s geographic information system: Research design. Santa Monica: RAND, N-3245-USDAFS.

    Google Scholar 

  • Streefkerk, J. W., van Esch-Bussemakers, M. P., & Neerincx, M. A. (2006). Designing personal attentive user interfaces in the mobile public safety domain. Computers in Human Behavior, 22(4), 749–770.

    Article  Google Scholar 

  • Sun, H., & Zhang, P. (2006). The role of moderating factors in user technology acceptance. International Journal of Human-Computer Studies, 64, 53–78.

    Article  Google Scholar 

  • Sundstrom, E. (1999). The challenges of supporting work team effectiveness. In E. Sundstrom (Ed.), Supporting work team effectiveness (pp. 3–23). San Francisco: Bass.

    Google Scholar 

  • Tamaru, E., Hasuike, K., & Tozaki, M. (2005). Cellular phone as a collaboration tool that empowers and changes the way of mobile work: Focus on three fields of work. Proc. ECSCW 2005 (pp. 247–264). New York: Springer.

    Google Scholar 

  • Tapia, A., & Sawyer, S. (2005). The sociotechnical nature of mobile computing work: evidence from a study of policing in the United States. International Journal of Technology & Human Interaction, 1(3), 1–14.

    Google Scholar 

  • Thompson, J. D. (1967). Organizations in action. New York: McGraw-Hill.

    Google Scholar 

  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425–478.

    Google Scholar 

  • Williams, W. R., & Aasheim, C. (2005). Information technology in the practice of law enforcement. Journal of Cases on Information Technology, 71(1), 71–91.

    Google Scholar 

  • Yin, R. K. (1989). Case study research: Design and methods (Vol. 5)). Thousand Oaks: Sage.

    Google Scholar 

  • Zuboff, S. (1988). In the age of the smart machine: The future of work and power. New York: Basic Books.

    Google Scholar 

Download references

Acknowledgments

We are indebted to the squad members and managers in each study site who shared their time, knowledge, and experience. Our thanks to Joy Moini, Jennifer Kavanagh, Amelia Haviland, Scott Ashwood, Chris Beighley, and Chris Corey for their contributions to this study and to three anonymous reviewers for their helpful comments on this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susan G. Straus.

Appendix: Examples of scale items

Appendix: Examples of scale items

Table 6

Rights and permissions

Reprints and permissions

About this article

Cite this article

Straus, S.G., Bikson, T.K., Balkovich, E. et al. Mobile Technology and Action Teams: Assessing BlackBerry Use in Law Enforcement Units. Comput Supported Coop Work 19, 45–71 (2010). https://doi.org/10.1007/s10606-009-9102-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10606-009-9102-2

Key words

Navigation