Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-x24gv Total loading time: 0 Render date: 2024-04-30T18:20:57.949Z Has data issue: false hasContentIssue false

Part VI - Technology

Published online by Cambridge University Press:  14 August 2019

Tamara Rice Lave
Affiliation:
University of Miami School of Law
Eric J. Miller
Affiliation:
Loyola School of Law, Los Angeles
Get access

Summary

Technological advances in law enforcement can serve many goals related to both police accountability and public safety, but these advances also create a new set of issues and unintended consequences that policymakers should consider.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Barley, Stephen R. 1986. “Technology as an Occasion for Structuring: Evidence from Observations of CT Scanners and the Social Order of Radiology Departments.Administrative Science Quarterly 31(1): 78108.Google Scholar
Barley, Stephen R. 1996. “Technicians in the Workplace: Ethnographic Evidence for Bringing Work into Organization Studies.Administrative Science Quarterly 41(3): 404–41.Google Scholar
Barocas, Solon, and Selbst, Andrew. D.. 2016. “Big Data’s Disparate Impact.California Law Review 104: 671732.Google Scholar
Beckett, Katherine, Nyrop, Kris, Pfingst, Lori, and Bowen, Melissa. 2005. “Drug Use, Drug Possession Arrests, and the Question of Race: Lessons from Seattle.Social Problems 52(3): 419–41.Google Scholar
Bonczar, Thomas P. and Herberman, Erinn J.. 2014. Probation and Parole in the United States, 2013. Washington, DC: Bureau of Justice Statistics.Google Scholar
Bowker, Geoffrey C. and Star, Susan Leigh. 2000. Sorting Things Out: Classification and Its Consequences. Cambridge, MA: MIT Press.Google Scholar
boyd, danah and Crawford, Kate. 2012. “Critical Questions for Big Data: Provocations for a Cultural, Technological, and Scholarly Phenomenon.Information, Communication & Society 15(5): 662–79.Google Scholar
Braga, Anthony A. and Weisburd, David L.. 2010. Policing Problem Places: Crime Hot Spots and Effective Prevention. New York: Oxford University Press.Google Scholar
Brayne, Sarah. 2014. “Surveillance and System Avoidance: Criminal Justice Contact and Institutional Attachment.” American Sociological Review 79(3): 367–91, lead article.Google Scholar
Brown v. Plata. 563 U.S. 493 (2011).Google Scholar
Carson, E. Ann. 2015. Prisoners in 2014. Washington, DC: Bureau of Justice Statistics.Google Scholar
Cohen, Stanley. 1985. Visions of Social Control: Crime, Punishment and Classification. Malden, MA: Polity Press.Google Scholar
Duster, Troy. 1997. “Pattern, Purpose and Race in the Drug War.” Pp. 206287 in Crack in America: Demon Drugs and Social Justice, edited by Reinarman, C. and Levine, H. G. Berkeley: University of California Press.Google Scholar
Duster, Troy. 2005. “Race and Reification in Science.Science 307: 1050–51.Google Scholar
Epp, Charles R., Maynard-Moody, Steven, and Haider-Markel, Donald P.. 2014. Pulled Over: How Police Stops Define Race and Citizenship. Chicago: University of Chicago Press.Google Scholar
Espeland, Wendy N. and Vannebo, Berit I.. 2007. “Accountability, Quantification and Law.Annual Review of Law and Society 3: 2143.Google Scholar
Fiske, Susan T. and Taylor, Shelley E.. 1991. Social Cognition, 2nd ed. New York: McGraw-Hill.Google Scholar
Gandy, Oscar H. 2009. Coming to Terms with Chance: Engaging Rational Discrimination and Cumulative Disadvantage. Farnham, UK: Ashgate Publishing.Google Scholar
Garland, David. 2001. The Culture of Control: Crime and Social Order in Contemporary Society. New York: Oxford University Press.Google Scholar
Gitelman, Lisa, ed. 2013. Raw Data Is an Oxymoron. Cambridge, MA: MIT Press.Google Scholar
Gross, Samuel R., Possley, Maurice, and Stephens, Kalara. 2017. “Race and Wrongful Convictions in the United States.” National Registry of Exonerations, Newkirk Center for Science and Society, University of California-Irvine.Google Scholar
Guzik, Keith. 2009. “Discrimination by Design: Predictive Data Mining as Security Practice in the United States’ ‘War on Terrorism.’” Surveillance and Society 7(1): 117.Google Scholar
Hacking, Ian. 1990. The Taming of Chance. Cambridge, UK: Cambridge University Press.Google Scholar
Hindmarsh, Richard and Prainsack, Barbara, eds. 2010. Genetic Suspects: Global Governance of Forensic DNA Profiling and Databasing. Cambridge: Cambridge University Press.Google Scholar
Joh, Elizabeth E. 2016. “The New Surveillance Discretion: Automated Suspicion, Big Data, and Policing.Harvard Law and Policy Review 10(1): 1542.Google Scholar
Kitchin, Rob. 2014. The Data Revolution: Big Data, Open Data, Data Infrastructures & Their Consequences. London: SAGE.Google Scholar
Kling, Rob. 1991. “Computerization and Social Transformations.Science, Technology & Human Values 16(3): 342–67.Google Scholar
Langton, Lynn, Berzofsky, Marcus, Krebs, Christopher, and Smiley-McDonald, Hope. 2012. Victimizations Not Reported to the Police, 2006–2010. Washington, DC: Bureau of Justice Statistics.Google Scholar
Los Angeles Police Department. 2017. “Sworn Personnel by Rank, Gender, and Ethnicity (SPRGE) Report” (www.lapdonline.org/sworn_and_civilian_report).Google Scholar
Lynch, Michael, Cole, Simon A., McNally, Ruth, and Jordan, Kathleen. 2008. Truth Machine: The Contentious History of DNA Fingerprinting. Chicago: University of Chicago Press.Google Scholar
Lyon, David, ed. 2003. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. New York: Routledge.Google Scholar
Marx, Gary T. 2016. Windows into the Soul: Surveillance and Society in an Age of High Technology. Chicago: University of Chicago Press.Google Scholar
Merton, Robert K. 1948. “The Self-Fulfilling Prophecy.The Antioch Review 8(2): 193210.Google Scholar
Mohler, George O., Short, Martin B., Malinowski, Sean, Johnson, Mark, Tita, George E., Bertozzi, Andrea L., and Brantingham, P. Jeffrey. 2015. “Randomized Controlled Field Trials of Predictive Policing.Journal of the American Statistical Association 110: 13991411.Google Scholar
Monahan, Torin and Palmer, Neal A.. 2009. “The Emerging Politics of DHS Fusion Centers.Security Dialogue 40(6): 617–36.Google Scholar
Papachristos, Andrew V., Hureau, David M., and Braga, Anthony A. 2013. “The Corner and the Crew: The Influence of Geography and Social Networks on Gang Violence.American Sociological Review 78(3): 417–47.Google Scholar
Pasquale, Frank. The Black Box Society: The Secret Algorithms that Control Money and Information. Cambridge, MA: Harvard University Press, 2015.Google Scholar
Perry, Walter L., McInnis, Brian, Price, Carter C., Smith, Susan. C., and Hollywood, John S.. 2013. “Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations.” RAND Safety and Justice Program. Santa Monica, CA. Retrieved July 6, 2017 (www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR233/RAND_RR233.pdf).Google Scholar
Porter, Theodore M. 1995. Trust in Numbers: The Pursuit of Objectivity in Science and Public Life. Princeton, NJ: Princeton University Press.Google Scholar
Quillian, Lincoln and Pager, Devah. 2001. “Black Neighbors, Higher Crime? The Role of Racial Stereotypes in Evaluations of Neighborhood Crime.American Journal of Sociology 107(3): 717–67.Google Scholar
Ratcliffe, Jerry. 2008. Intelligence-Led Policing. Cullompton, UK: Willan Publishing.Google Scholar
Reiss, Albert J. 1971. The Police and the Public. New Haven, CT: Yale University Press.Google Scholar
Renan, Daphna. 2016. “The Fourth Amendment as Administrative Governance.Stanford Law Review 68(5): 1039–129.Google Scholar
Roush, Craig R. 2012. “Quis Custodiet Ipsos Custodes? Limits on Widespread Surveillance and Intelligence Gathering by Local Law Enforcement after 9/11.Marquette Law Review 96(1): 315–76.Google Scholar
Rule, James B. 2007. Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience. New York: Oxford University Press.Google Scholar
Sampson, Robert J. and Bartusch, Dawn J.. 1998. “Legal Cynicism and (Subcultural?) Tolerance of Deviance: The Neighborhood Context of Racial Differences.Law and Society Review 32: 777804.Google Scholar
Sherman, Lawrence W. 2013. “The Rise of Evidence-Based Policing: Targeting, Testing, and Tracking, 1975–2025.Crime and Justice 42(1): 377451.Google Scholar
Sherman, Lawrence W., Gartin, Patrick R., and Buerger, Michael E.. 1989. “Hot Spots of Predatory Crime: Routine Activities and the Criminology of Place.Criminology 27(1): 2755.Google Scholar
Terry v. Ohio. 1968. 392 U.S. 1.Google Scholar
Tracy, Paul E. and Morgan, Vincent. 2000. “Big Brother and His Science Kit: DNA Databases for 21st Century Crime Control.Journal of Criminal Law and Criminology 90(2): 635–90.Google Scholar
Travis, Jeremy, Western, Bruce, and Redburn, Steve, eds. 2014. Growth of Incarceration in the United States: Exploring Causes and Consequences. Washington, DC: National Academy of Science.Google Scholar
Uchida, Craig D. and Swatt, Marc L.. 2015. “Operation LASER and the Effectiveness of Hotspot Patrol: A Panel Analysis.Police Quarterly 16(3): 287304.Google Scholar
U.S. Department of Justice. 2001 [2015]. L.A. Consent Decree. Washington, DC: US Department of Justice.Google Scholar
Wakefield, Sara and Uggen, Christopher. 2010. “Incarceration and Stratification.Annual Review of Sociology 36: 387406.Google Scholar
Waxman, Matthew C. 2009. “Police and National Security: American Local Law Enforcement and Counter-Terrorism after 9/11.Journal of National Security Law and Policy 3: 377407.Google Scholar
Weisburd, David, Mastrofski, Stephen D, McNally, Ann Marie, Greenspan, Rosann, and Willis, James J.. 2003. “Reforming to Preserve: COMPSTAT and Strategic Problem-Solving in American Policing.Criminology and Public Policy 2: 421–56.Google Scholar
Western, Bruce. 2006. Punishment and Inequality in America. New York: Russell Sage Foundation.Google Scholar
Whren v. United States, 517 U.S. 806 (1996).Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×