ORCID Profile
0000-0001-6346-6965
Current Organisation
Deakin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Queensland University of Technology
Date: 03-2022
DOI: 10.5204/IJCJSD.2215
Abstract: This special issue comprises 10 journal articles and one book review. Collectively, the contributions broaden our theoretical and conceptual understandings of the technology–harm nexus and provide criminologists with new ways of moving beyond cybercrime. The issue consists of two parts. The first part of the issue, entitled ‘Digital (in)Justices’, contains five manuscripts, each examining a particular intersection between digital technology and criminal justice agencies. The second part of the special issue—‘Rethinking the Technology–Harm Nexus’—includes five manuscripts that engage with a range of techno-social harms. The authors provide novel theoretical contributions that explore how the intersection of technology and harm can be problematised and reconceptualised.
Publisher: SAGE Publications
Date: 09-09-2020
Abstract: Recently, numerous police organisations have made a strategic decision to employ humour on social media, via memes and other comical posts, to increase community engagement with their content and manage their public image. One key ex le of this practice comes from New South Wales Police, a state-based Australian police force whose self-described ‘meme strategy’ led to considerable increases in the organisation’s social media following. Through analysing the content of NSW Police’s memetic copaganda, in this article we unpack this approach to police public relations, detailing its rationale and implications. Police on social media, we argue, must address two very different regimes of visibility: ‘policing’s new visibility’, characterised by the increased visibility of police indiscretion as a result of citizen-produced content, and a ‘threat of invisibility’, in which the visibility of police-produced content on social media is always provisional, never assured. We consequently argue that the humorous turn in police image work represents a countermeasure to not only policing’s new visibility but also the ‘threat of invisibility’ facing police-produced content on social media.
Publisher: SAGE Publications
Date: 22-01-2021
Abstract: In the last decade, an array of smartphone apps have been designed to prevent crime, violence, and abuse. The evidence base of these apps has, however, yet to analyzed systematically. To rectify this, the aims of this review were (1) to establish the extent, range, and nature of research into smartphone apps with a primary crime prevention function (2) to locate gaps in the primary crime prevention app literature and (3) to develop a typology of primary crime prevention apps. Employing a scoping review methodology and following Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines, studies were identified via Web of Science, EBSCOhost, and Google Scholar. We included English-language research published between 2008 and 2020 that examined smartphone applications designed explicitly for primary crime prevention. Sixty-one publications met our criteria for review, out of an initial s le of 151 identified. Our review identified six types of crime prevention app examined in these publications: self-surveillance apps, decision aid apps, child-tracking apps, educational apps, crime-mapping/alert apps, and crime reporting apps. The findings of our review indicate that most of these forms of primary crime prevention apps have yet to be rigorously evaluated and many are not evidence-based in their design. Consequently, our review indicates that recent enthusiasm over primary crime prevention apps is not supported by an adequate evidence base.
Publisher: Oxford University Press (OUP)
Date: 09-2023
DOI: 10.1093/BJC/AZAD045
Publisher: Queensland University of Technology
Date: 17-01-2022
DOI: 10.5204/IJCJSD.2140
Abstract: This article develops a framework for analysing the harms of doxxing: the practice of publishing personal identifying information about someone on the internet, usually with malicious intent. Doxxing is not just a breach of privacy, nor are its effects limited to first‑order harms to an in idual’s bodily integrity. Rather, doxxing increases the spectre of second-order harms to an in idual’s security interests. To better understand these harms—and the relationships between them—we draw together the theories of Bhaskar, Deleuze and Levi to develop two concepts: the virtualisation of violence and harm imbrication. The virtualisation of violence captures how, when concretised into structures, the potential for harm can be virtualised through language, writing and digitisation. We show that doxxed information virtualises violence through constituting harm-generating structures and we analyse how the virtual harm-generating potential of these structures is actualised through first- and second-order harms against a doxxing victim. The concept of harm imbrication, by contrast, helps us to analyse the often-imbricated and supervenient relationship between harms. In doing so, it helps us explain the emergent – and supervenient – relationship between doxxing’s first- and second-order harms.
Publisher: Informa UK Limited
Date: 13-01-2023
Publisher: SAGE Publications
Date: 22-06-2022
DOI: 10.1177/0306624X221106323
Abstract: Justice services have begun to integrate the use of mobile applications into treatment, support, and rehabilitative programs for forensic clients. One such application that been adopted to support forensic clients is “eRecovery”: a smartphone application that provides clients recovering from a substance addiction with support for managing relapse. In this article, we report on evaluation findings from a trial of eRecovery in an Australian Community Justice Centre, and reflect on several issues relating to fostering and sustaining client engagement with similar applications within forensic and justice settings. We propose the Service Design Engagement Model to organize, visualize, and describe the stages and factors important to adoption, appropriation, and on-going routine use of the software by forensic clients. The model recognizes the role of contextual and environmental factors in supporting users through the early stages of engagement, and the importance of user agency in longer-term engagement with therapeutic apps.
Publisher: SAGE Publications
Date: 17-08-2021
DOI: 10.1177/17416590211037384
Abstract: This article develops a new approach to analysing the technology-harm nexus. The approach distinguishes between different technology-harm relations: relations with technology that are harmful by virtue of what they contribute to bringing about. In this article, I focus on categorizing generative harm relations: relations with technology that are harmful by virtue of what they do to actors. Drawing together insights from zemiology, moral philosophy, postphenomenology, Stiegler’s technophenomenology, and Latour’s actor-network theory, I distinguish six generative harm relations: ambient harms, alterity harms, exclusion harms, interface harms, harm translation and zemiosis. Distinguishing between these generative harm relations helps us delineate the techno-sociality of a range of social harms, from gun violence and digital coercive control, to forms of oppression, inequality and immiseration (re)produced by algorithms.
No related grants have been discovered for Mark Wood.