TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010
-
Upload
jacqueline-simon -
Category
Documents
-
view
20 -
download
0
description
Transcript of TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010
![Page 1: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/1.jpg)
TECHNOLOGY TECHNOLOGY ACCEPTANCE AND ACCEPTANCE AND
SOCIAL CRIME SOCIAL CRIME PREVENTIONPREVENTION
ESCI, Zugspitze ESCI, Zugspitze March 4th, 2010March 4th, 2010
Mag. Maximilian EdelbacherMag. Maximilian EdelbacherSpecial investigator, lecturerSpecial investigator, lecturer
Dr. Michael PlatzerDr. Michael PlatzerProfessor, Chair of NGO`s in ViennaProfessor, Chair of NGO`s in Vienna
![Page 2: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/2.jpg)
22
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
1. CHANGING CONDITIONS 1. CHANGING CONDITIONS OF SECURITY OF SECURITY
2. TRADITIONAL METHODS 2. TRADITIONAL METHODS OF INVESTIGATIONOF INVESTIGATION
3. TECHNOLOGY CHANGES3. TECHNOLOGY CHANGES4. FEAR OF TECHNOLOGIES4. FEAR OF TECHNOLOGIES5. EIGHT PRINCIPLES OF CP.5. EIGHT PRINCIPLES OF CP.6. WHICH SOLUTIONS WORKS?6. WHICH SOLUTIONS WORKS?
![Page 3: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/3.jpg)
33
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
1. CHANGING CONDITIONS1. CHANGING CONDITIONSHistorically seen over centuries Historically seen over centuries the state claimed to maintain the state claimed to maintain public law and order.public law and order.This changed to a balance of law This changed to a balance of law and order and fundamental rights and order and fundamental rights if individual personal freedom if individual personal freedomFears of terrorism and organized Fears of terrorism and organized crime, worldwide movements and crime, worldwide movements and change of moral concepts are new change of moral concepts are new frame conditions of police workframe conditions of police work
![Page 4: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/4.jpg)
44
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
Fears of people – Fears of people – exogene factors:exogene factors:Worldwide movementsWorldwide movementsDevelopment of crimeDevelopment of crimeTendency to violenceTendency to violenceTerrorism, extremismTerrorism, extremismTrafficking of drugsTrafficking of drugsCorruption, police brutalityCorruption, police brutalityViolation of human rightsViolation of human rights
![Page 5: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/5.jpg)
55
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
2. TRADITIONAL METHODS 2. TRADITIONAL METHODS
OF INVESTIGATIONOF INVESTIGATIONTraditional methods of investigation Traditional methods of investigation are based on criminology knowledge are based on criminology knowledge
The seven „Golden W“ investigationsThe seven „Golden W“ investigations
Methods of personal informations Methods of personal informations by interviewing suspects, wittnesses by interviewing suspects, wittnesses
Classical investigation methods Classical investigation methods like crime scene investigations like crime scene investigations
![Page 6: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/6.jpg)
66
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME CONTROLSOCIAL CRIME CONTROL
3. TECHNOLOGY CHANGES 3. TECHNOLOGY CHANGES New Concepts of investigations (1):New Concepts of investigations (1):
The present state of electronic technology The present state of electronic technology makes it possible to control citizens at makes it possible to control citizens at every momentevery moment
Biometric TechnologiesBiometric Technologies
Audio- and visual surveillanceAudio- and visual surveillance
Internet and E-commerce checkingInternet and E-commerce checking
Checking of wireless communicationChecking of wireless communication
![Page 7: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/7.jpg)
77
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME CONTROLSOCIAL CRIME CONTROL
New concepts of investigations (2):New concepts of investigations (2):Computer based wire tappingComputer based wire tappingEaves droppingEaves droppingCell phone surveillanceCell phone surveillanceMethods of strategic- and Methods of strategic- and operational analyzingoperational analyzingData-Profiling – Behavioral TargetingData-Profiling – Behavioral TargetingPro-active actionsPro-active actionsCrime mapping, hot spots analyzingCrime mapping, hot spots analyzingData warehousingData warehousing
![Page 8: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/8.jpg)
88
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CONTROL PREVENTIONSOCIAL CONTROL PREVENTION
4. FEAR OF TECHNOLOGY:4. FEAR OF TECHNOLOGY:Art. 8 EHRC defines privacy; there is a Art. 8 EHRC defines privacy; there is a tremendous fear of violation of human tremendous fear of violation of human rights by technical devisesrights by technical devises
Welsh/Farrington 2002: CCP reduction of crime Welsh/Farrington 2002: CCP reduction of crime only 4%; no effect on violent crimesonly 4%; no effect on violent crimes
Gill/Spriggs 2005: „Videotapping brings Gill/Spriggs 2005: „Videotapping brings little overall effect on crime levels“little overall effect on crime levels“
Bornewasser 2007: Videotapping only Bornewasser 2007: Videotapping only relatively successfulrelatively successful
![Page 9: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/9.jpg)
99
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
Technology and fear of human rights Technology and fear of human rights violation – criticism examples:violation – criticism examples:Biometric Technologies: fatal errorsBiometric Technologies: fatal errorsVideo-surveillance: human rights violationsVideo-surveillance: human rights violationsInternet Privacy: investigations without informing Internet Privacy: investigations without informing data owners – cloud computering, open for data owners – cloud computering, open for hackers, thefts, illegal activitieshackers, thefts, illegal activitiesWireless Communications and local tracking Wireless Communications and local tracking intimate details of personal life – few legal intimate details of personal life – few legal standards for monitoringstandards for monitoringWiretapping: no checks and balancesWiretapping: no checks and balancesData Profiling – Behavioral Targeting: contain Data Profiling – Behavioral Targeting: contain errors, wrong conclusionserrors, wrong conclusions
![Page 10: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/10.jpg)
1010
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
5. EIGHT PRINCIPLES OF CRIME5. EIGHT PRINCIPLES OF CRIME1. Government leadership is required at all1. Government leadership is required at all
levels to create and maintain an institu-levels to create and maintain an institu- tional framework for crime prevention tional framework for crime prevention
2. The integration of crime prevention2. The integration of crime prevention strategies into development plans (jobs,strategies into development plans (jobs, education, family support, urban planningeducation, family support, urban planning youth projects)youth projects)
3. Cooperation between government organi-3. Cooperation between government organi- sations, civil society and business sectorsations, civil society and business sector
4. Adequate funding for establishing4. Adequate funding for establishing sustainable programmessustainable programmes
![Page 11: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/11.jpg)
1111
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
5. Actions should be based on expert 5. Actions should be based on expert knowledge (multidisciplinary under-knowledge (multidisciplinary under- standing of crime problems, causes standing of crime problems, causes and proven effective strategies)and proven effective strategies)
6. Respect for human rights, the rule of6. Respect for human rights, the rule of law and promotion of a culture of law and promotion of a culture of lawfulnesslawfulness
7. Consideration of local offending to 7. Consideration of local offending to exogenous factors – organized crimeexogenous factors – organized crime
8. Differentiated strategies for special 8. Differentiated strategies for special groups (boys, adult males, vulnerable groups (boys, adult males, vulnerable members of society) re-integration members of society) re-integration strategies for ex-offendersstrategies for ex-offenders
![Page 12: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/12.jpg)
1212
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CONTROL PREVENTIONSOCIAL CONTROL PREVENTION
6. WHICH SOLUTIONS WORK?6. WHICH SOLUTIONS WORK?Reduction of crime is possible by:Reduction of crime is possible by:
Law & Order:Law & Order:
The New York model of „No Toller- ance“ The New York model of „No Toller- ance“ was an answer to crimewas an answer to crime
Technology:Technology:Video taping, crime mapping, Video taping, crime mapping,
Social Crime PreventionSocial Crime Prevention
Implementing care programs Implementing care programs
![Page 13: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/13.jpg)
1313
TECHNOLOGY ACCEPTANCE AND TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTIONSOCIAL CRIME PREVENTION
Situational Crime Prevention Methodes:Situational Crime Prevention Methodes:A Model of Crime Prevention shows A Model of Crime Prevention shows a triangle: Offender – Place – Target; Situational a triangle: Offender – Place – Target; Situational Crime Prevention Stategies try to reduce Crime Prevention Stategies try to reduce possibities for committing crimespossibities for committing crimes
By a so called second triangle: By a so called second triangle: Hendler – Manager – Guardian dangerous Hendler – Manager – Guardian dangerous situations shall be reducedsituations shall be reduced
![Page 14: TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010](https://reader035.fdocuments.in/reader035/viewer/2022072013/56812a9c550346895d8e57d9/html5/thumbnails/14.jpg)
1414
TECHNOLOGY ACCEPTANCE TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME AND SOCIAL CRIME
PREVENTIONPREVENTION
Questions?Questions?
Discussion?Discussion?