Skip to main content

Part of the book series: Crime Prevention and Security Management ((CPSM))

  • 261 Accesses

Abstract

This chapter concludes the work by reflecting on the results discussed in the different chapters and adding an in-depth analysis of some of the more striking conclusions. The main themes emerging from the work—(semi-)autonomy, forum shopping activities, flexibility, (non-contractual) moral activity within the commercial sphere and public-private coexistence—are discussed and brought together in this conclusion. In this way, a novel conceptual framework emerges, which allows us to examine the field of corporate investigations without having to refer back to the state-centric approaches which do not provide a right fit with the social realities of corporate investigations into internal norm violations, their corporate settlements and the public-private relationships that develop in these contexts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This is not necessarily a case of ‘deceit’ by the organisation. Coming back to the quote of respondent 43 presented in Chapter 4: the information which has been asked for is provided, but that may not necessarily be the full story. Access to an employee’s laptop for example does not mean access to the internal system of the organisation. The criminal investigations of the laptop will then thus be limited to the hardware of the laptop.

  2. 2.

    They still are present in police investigations as well—however there the control and procedural guarantees are more strictly regulated.

  3. 3.

    However, in recent years, the position of the victim has been strengthened, for example by the formal right to speak in court (see, e.g., Pemberton & Reynaers, 2011).

  4. 4.

    Although individual law enforcement professionals may take private interests into account as well.

  5. 5.

    An important side note here is that although the activities are largely similar, they are not interchangeable. The fact that corporate investigators do not have powers of investigation means that they cannot perform all the activities law enforcement professionals could in the same situation. Similarly, corporate investigators can provide their clients with services law enforcement agencies do not provide (such as asset recovery and the improvement of compliance systems).

  6. 6.

    However, because it might boost the reputation of the involved corporate investigators, it might be a commercially smart move in the long run.

  7. 7.

    The authors refer for example to problems of poor quality of staff, ‘cowboy traders’ and a connection to (organised) crime. These issues are less pronounced in the corporate investigation sector: the quality of staff for example is regarded as higher than in the public sector (although, as Chapter 2 shows, there is no uniform system of education or quality markers available).

  8. 8.

    This cooperation is formed by the advice the Data Protection Authority provides to the Minister of Justice and Security when a request for a permit is being assessed.

  9. 9.

    The CBP is the former name of the Data Protection Authority, which is currently called the AP [Autoriteit Persoonsgegevens].

  10. 10.

    Too much familiarity is not to be aspired to either, since that may lead to collusion and informal (illegitimate) information sharing. As of yet, this does not seem to be a major concern in corporate investigator-police relations. However, it would be wise remain wary of the possibility.

References

  • Abrahamsen, R., & Williams, M. C. (2011). Security beyond the state: Private security in international politics. Cambridge: Cambridge University Press.

    Google Scholar 

  • Berndtsson, J. (2012). Security professionals for hire: Exploring the many faces of private security expertise. Millennium—Journal of International Studies, 40(2), 303–320.

    Article  Google Scholar 

  • Black, J. (2011). The rise, fall and fate of principles-based regulation. In K. Alexander & N. Moloney (Eds.), Law reform and financial markets (pp. 3–34). Cheltenham: Edward Elgar.

    Google Scholar 

  • CBP. (2007). Advies over het kabinetsstandpunt inzake het rapport “Publieke bemoeienis met particuliere beveiliging en recherche”. Den Haag: College Bescherming Persoonsgegevens.

    Google Scholar 

  • Hoogenboom, A. B. (1994). Het politiecomplex. Over de samenwerking tussen politie, bijzondere opsporingsdiensten en particuliere recherche. Arnhem: Gouda Quint.

    Google Scholar 

  • Hoogenboom, A. B. (2007). Grijs gebied tussen publiek en privaat bedreigt veiligheid. Christen Democratische Verkenningen (Winter), 58–65.

    Google Scholar 

  • Johnston, L. (1992). The rebirth of private policing. London: Routledge.

    Google Scholar 

  • Loader, I., & White, A. (2017). How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance, 11(2), 166–174.

    Article  Google Scholar 

  • Meershoek, A. J. J., & Hoogenboom, A. B. (2012). Drieënvijftig tinten grijs. Afnemende verantwoording van en controle op hybride politiewerk. Justitiële Verkenningen, 38(5), 10–23.

    Google Scholar 

  • Pemberton, A., & Reynaers, S. (2011). The controversial nature of victim participation: Therapeutic benefits in victim impact statements. In E. Erez, M. Kilchlinh, & J. J. M. Wemmers (Eds.), Therapeutic jurisprudence and victim participation in justice: International perspectives (pp. 229–248). Durham, NC: Carolina Academic Publishing.

    Google Scholar 

  • Piret, J. M. (2005). Privatisering van veiligheid: ideologische en rechtsstatelijke aspecten. In L. C. Winkel, J. J. M. Jansen, H. O. Kerkmeester, R. J. P. Kottenhagen, & V. Mul (Eds.), Privatisering van veiligheid (pp. 39–54). Den Haag: Boom Juridische Uitgevers.

    Google Scholar 

  • PwC. (2014). Economic crime survey Nederland 2014. Amsterdam: PricewaterhouseCoopers.

    Google Scholar 

  • State Secretary of Justice & Minister of the Interior. (2009). Brief van de staatssecretaris van justitie en de minister van binnenlandse zaken en koninkrijksrelaties. Kamerstukken II, 2008–2009, 29 279, nr. 93.

    Google Scholar 

  • Stenning, P. (2000). Powers and accountability of private police. European Journal on Criminal Policy and Research, 8(3), 325–352.

    Article  Google Scholar 

  • Thumala, A., Goold, B., & Loader, I. (2011). A tainted trade? Moral ambivalence and legitimation work in the private security industry. The British Journal of Sociology, 62(2), 284–303.

    Article  Google Scholar 

  • van der Lugt, B. W. M. (2001). Waarborgen Voor Private Opsporing. Justitiële Verkenningen, 27(4), 65–76.

    Google Scholar 

  • White, A. (2014). Beyond the regulatory gaze? Corporate security, (in)visibility, and the modern state. In K. Walby & R. Lippert (Eds.), Corporate security in the 21st century: Theory and practice in international perspective (pp. 39–55). Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • Williams, J. W. (2005). Reflections on the private versus public policing of economic crime. British Journal of Criminology, 45(3), 316–339.

    Article  Google Scholar 

  • Williams, J. W. (2006a). Governability matters: The private policing of economic crime and the challenge of democratic governance. Policing and Society, 15(2), 187–211.

    Article  Google Scholar 

  • Williams, J. W. (2006b). Private legal orders: Professional markets and the commodification of financial governance. Social & Legal Studies, 15(2), 209–235.

    Article  Google Scholar 

  • Wood, J., & Shearing, C. (2007). Imagining security. Devon: Willan Publishing.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Clarissa A. Meerts .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Meerts, C.A. (2019). Discussion. In: Corporate Investigations, Corporate Justice and Public-Private Relations. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26516-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26516-8_6

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-26515-1

  • Online ISBN: 978-3-030-26516-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics