ORCID Profile
0000-0002-2910-0983
Current Organisation
Deakin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Springer Science and Business Media LLC
Date: 2017
DOI: 10.1057/SJ.2014.20
Publisher: Informa UK Limited
Date: 26-07-2017
Publisher: SAGE Publications
Date: 28-08-2018
Abstract: Intelligence-led policing (ILP) is a managerial law enforcement model that seeks to place crime intelligence at the forefront of decision-making. This model has been widely adopted, at least notionally, in the United States, United Kingdom, Canada, and Australia. Drawing on interviews with intelligence analysts from two Australian state law enforcement agencies, this article contributes to the relatively small body of literature that has examined ILP in practice. The article identifies three relational themes that inhibit the successful implementation of ILP: analysts and data, analysts and tools, and analysts and decision makers. Furthermore, it calls attention to the need to better understand the structure and operations within law enforcement agencies, including the similarities and differences among organizational units, in order to better understand how these nuances shape the practice of ILP.
Publisher: Emerald
Date: 10-06-2018
DOI: 10.1108/PIJPSM-05-2018-0070
Abstract: The purpose of this paper is to adopt an organisational network perspective to examine the structural properties underpinning the design and governance of multi-agency fusion centres and related environments, focussing particularly on how they are formed and internally managed. The authors conducted several focus groups and follow-up interviews with executive and operational members of Australia’s principal fusion centres and related environments. The authors argue that in order to understand the internal dynamics of fusion centres, and the ways in which they form and function, the analysis of interrelationships between partners and potential partners is critical. The authors have demonstrated that a network model can assist in this type of analysis. For ex le, hub-and-spoke network structures appear to be a particularly effective solution to the centralisation-density trade-off for such inter-agency networks. The authors use a novel approach that combines a goal-oriented network framework with the existing literature on fusion centres to synthesise key features of the network structure of fusion centres and associated processes of information sharing.
Publisher: SAGE Publications
Date: 03-2021
DOI: 10.1177/00048658211003925
Abstract: ‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and erse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly erse array of threats. Increasingly, cybercrimes are presented as threats to cybersecurity, which explains why national security institutions are gradually becoming involved in cybercrime control and prevention activities. This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and cross-fertilisation. We draw on concepts of ‘high’ and ‘low’ policing ( Brodeur, 2010 ) to suggest it would be useful to consider ‘crime’ and ‘security’ on the same continuum. This continuum has cybercrime at one end and cybersecurity at the other, with crime being more the domain of ‘low’ policing while security, as conceptualised in the context of specific cybersecurity projects, falls under the responsibility of ‘high’ policing institutions. This unifying approach helps us to explore the fuzzy relationship between cyber- crime and cyber- security and to call for more fruitful alliances between cybercrime and cybersecurity researchers.
Publisher: Informa UK Limited
Date: 12-2006
Publisher: SAGE Publications
Date: 08-09-2019
Abstract: Civilianisation refers to utilising non-sworn personnel to perform certain roles within police organisations. While the civilianisation of policing has been examined in a variety of contexts, it has generally been in relation to attempts to improve police efficiency. The current literature is much less focused on efforts to intentionally seek out civilians to improve police effectiveness, which, we suggest, is likely to apply in the case of police responses to cyber-crime. Using empirical data collected with three specialist cyber-crime units in Australia, we explore the arguments for and against civilianising cyber-crime units as a strategy to improve police capacity, as reported by police and civilian members of these units. We consider these arguments in relation to a broader debate as to whether it is better to improve police capacity by employing civilian experts or attempt to develop greater expertise on cyber-crime among police.
Publisher: Informa UK Limited
Date: 23-01-2019
Publisher: Springer Science and Business Media LLC
Date: 06-06-2020
Publisher: Informa UK Limited
Date: 12-2007
Publisher: Informa UK Limited
Date: 19-03-2017
Publisher: SAGE Publications
Date: 27-07-2016
Abstract: Organisational culture is a complex and heavily contested concept. Not only is it difficult to define what organisational culture is, but it is also very difficult to analyse how it guides and constrains behaviour, and whether and how organisational cultures change. The central argument of this article is that organisational networks can effect cultural change and that the terms ‘structural’ and ‘relational’, which are commonly used to conceptualise the properties of networks, may also provide a useful conceptual framework for understanding cultural change. While there has been some attention directed to the effects of organisational culture for networks, there has been very little attention placed on the potential for networks to shape organisational culture. Based on a detailed qualitative study of networks in the field of ‘high’ policing in Australia, the article draws on interviews with senior members of police and security agencies to explore organisational culture and cultural change. The article puts forward a network perspective on cultural change and aims to advance our knowledge of how security nodes can experience cultural change as they work together in and through networks.
Publisher: Informa UK Limited
Date: 22-05-2017
Publisher: Routledge
Date: 10-07-2023
Publisher: SAGE Publications
Date: 30-05-2019
Publisher: SAGE Publications
Date: 26-09-2023
Publisher: Informa UK Limited
Date: 18-08-2017
Publisher: SAGE Publications
Date: 06-08-2021
DOI: 10.1177/14613557211036565
Abstract: A common observation in the literature on cyber-crime policing is the need for more training. However, there is little detail of who within the police organisation requires training and what type of training may be needed. Based on survey and interview data from three specialist cyber-crime units in Australia, this article identifies that ‘lack of training’ is likely to have distinct meanings for different groups within the police: (a) front-line officers, (b) higher management, (c) generalist investigators, and (d) specialist investigators and civilians in cyber-crime units. Each of these groups is likely to face unique training needs that undermines the overall effectiveness of police organisations to respond to cyber-crime. The article explores the perceived training requirements across each of these groups and some potential ways in which they can be addressed in an effort to stimulate further research in this area focusing on the differentiated internal needs of police organisations.
Publisher: Informa UK Limited
Date: 10-09-2018
Publisher: Emerald
Date: 21-03-2016
DOI: 10.1108/PIJPSM-07-2015-0087
Abstract: – The purpose of this paper is to explore the underlying relational properties of security networks by focusing specifically on the relationship between formal and informal ties, and interpersonal and inter-organisational trust. – The research is based on 20 qualitative interviews with senior members of police and security agencies across the field of counter-terrorism in Australia. – The findings suggest that the underlying relational properties of security networks are highly complex, making it difficult to distinguish between formal and informal ties, interpersonal and inter-organisational trust. The findings also address the importance of informal ties and interpersonal trust for the functioning of organisational security networks. – The research is exploratory in nature and extends to a number of organisational security networks in the field of counter-terrorism in Australia. While it is anticipated that the findings will be relevant in a variety of contexts, further research is required to advance our knowledge of the implications and properties of informal social networks within defined network boundaries. – The findings suggest that the functioning of security networks is likely to be highly dependent on the underlying social relationships between network members. This has practical implications for those responsible for designing and managing security networks. – The paper calls attention to a very understudied topic by focusing on the dynamics of informal ties and interpersonal trust within organisational security networks.
Publisher: Informa UK Limited
Date: 11-02-2015
Publisher: Informa UK Limited
Date: 20-09-2018
Publisher: Informa UK Limited
Date: 02-01-2022
Publisher: Informa UK Limited
Date: 13-07-2015
Publisher: Springer Science and Business Media LLC
Date: 24-05-2017
Publisher: Oxford University Press (OUP)
Date: 12-06-2019
DOI: 10.1093/BJC/AZY014
Publisher: Wiley
Date: 09-2011
No related grants have been discovered for Chad Whelan.