This edited collection brings together scholars and practitioners to consider the ways in which policing organisations approach vulnerability and the strategies they develop to reduce victims, offenders and police officers' susceptibility to increased harm. Based on their work with policing services, the public criminologists and critical policing scholars collected together in this edited volume consider vulnerability in terms of people, processes, and institutional practices. While more attention is being paid to some experiences of vulnerability - particularly at the later stages of the criminal justice process - this collection will be the first to focus on the specific issues faced by policing services as the front end of criminal justice. The case studies of vulnerability in each chapter offer the reader new insights into the operational concerns in working with vulnerable people (including vulnerable police officers). This collection is ideally suited for scholars of applied criminal justice studies (including policing studies), police recruits and officers in training, and policing practitioners such as policy and program development officers.
Auflage
Sprache
Verlagsort
Verlagsgruppe
Springer International Publishing
Illustrationen
4
4 s/w Abbildungen
XIII, 273 p. 4 illus.
Dateigröße
ISBN-13
978-3-319-51228-0 (9783319512280)
DOI
10.1007/978-3-319-51228-0
Schlagworte
Schweitzer Klassifikation
Thema Klassifikation
DNB DDC Sachgruppen
Dewey Decimal Classfication (DDC)
BIC 2 Klassifikation
BISAC Klassifikation
Warengruppensystematik 2.0
Nicole L Asquith is the Associate Professor of Policing and Criminal Justice at Western Sydney University, Australia.
Dr Isabelle Bartkowiak-Théron is a Senior Lecturer and Discipline Coordinator of Police Studies in the School of Social Sciences, University of Tasmania, Australia.
Karl Roberts is a forensic psychologist and is Professor and Chair of Policing and Criminal Justice at The University of Western Sydney, Australia.
Chapter 1. Vulnerability as a Contemporary Challenge for Policing.- SECTION ONE: CONCEPUTALISING POLICING ENCOUNTERS WITH VULNERABILITY.- Chapter 2. Problematising and Reconceptualising 'Vulnerability' in the Context of Disablist Violence.- Chapter 3. Embodying Youthful Vulnerabilities and Policing Public Spaces.- Chapter 4. Moral Vulnerability and Police Defensiveness in Accountability Relations.- SECTION TWO: INSTITUTIONAL PRACTICES OF POLICING ENCOUNTERS WITH VULNERABILITY.- Chapter 5. A Federation of Clutter.- Chapter 6. Re-Thinking 'Vulnerability' in the Context of 'Diversity'.- Chapter 7. Police as Public Health Interventionists.- SECTION THREE: EXCEPTIONAL POLICING ENCOUTNERS WITH VULNERABILITY.- Chapter 8. Police Interviews with Survivors of Historic Child Sexual Abuse.- Chapter 9. (Gender) and Vulnerability: The Case of Intimate Partner Violence.- Chapter 10. The Vulnerability of Police in Policing the Vulnerable Community of Macquarie Field.- Chapter 11. Honour- Related Beliefs and Risk of Harm
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.