Rules in information sharing for security

Information sharing has become a central concern for security agencies since 9/11. Previous research has identified a number of barriers to information sharing among agencies: a combination of legal or policy constraints, interagency rivalry and mistrust, and technology. Drawing on ideas from the so...

Full description

Saved in:  
Bibliographic Details
Authors: Chan, Janet B. L. 1948- (Author) ; Logan, Sarah (Author) ; Moses, Lyria Bennett (Author)
Format: Electronic Article
Language:English
Published: 2022
In: Criminology & criminal justice
Year: 2022, Volume: 22, Issue: 2, Pages: 304-322
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1795543361
003 DE-627
005 20220321105904.0
007 cr uuu---uuuuu
008 220315s2022 xx |||||o 00| ||eng c
024 7 |a 10.1177/1748895820960199  |2 doi 
035 |a (DE-627)1795543361 
035 |a (DE-599)KXP1795543361 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Chan, Janet B. L.  |d 1948-  |e VerfasserIn  |0 (DE-588)130286656  |0 (DE-627)496697315  |0 (DE-576)176518339  |4 aut 
109 |a Chan, Janet B. L. 1948-  |a Chan, Janet Bick Lai 1948-  |a Chan, J. 1948-  |a Chan, Janet B. 1948-  |a Chan, Janet 1948-  |a Chan, J. B. L. 1948- 
245 1 0 |a Rules in information sharing for security 
264 1 |c 2022 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Information sharing has become a central concern for security agencies since 9/11. Previous research has identified a number of barriers to information sharing among agencies: a combination of legal or policy constraints, interagency rivalry and mistrust, and technology. Drawing on ideas from the sociology of information and trust, this article conceptualises the sharing/withholding of information between agencies as dependent on rules as a system of trust. Adapting Richard Ericson’s framework of the different contexts of rule-following and making use of an Australian case study, the article demonstrates how law, culture and technology are intertwined in constraining or enabling access to information. The implications of this model for legal and policy interventions are discussed. 
650 4 |a Trust 
650 4 |a Security agencies 
650 4 |a Rules 
650 4 |a Information sharing 
700 1 |a Logan, Sarah  |e VerfasserIn  |0 (DE-588)1180446011  |0 (DE-627)106772818X  |0 (DE-576)520177819  |4 aut 
700 1 |a Moses, Lyria Bennett  |e VerfasserIn  |0 (DE-588)114496704X  |0 (DE-627)1005135134  |0 (DE-576)490137296  |4 aut 
773 0 8 |i Enthalten in  |t Criminology & criminal justice  |d London [u.a.] : Sage, 2006  |g 22(2022), 2, Seite 304-322  |h Online-Ressource  |w (DE-627)337806837  |w (DE-600)2063005-0  |w (DE-576)096290994  |x 1748-8966  |7 nnns 
773 1 8 |g volume:22  |g year:2022  |g number:2  |g pages:304-322 
856 4 0 |u https://doi.org/10.1177/1748895820960199  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
936 u w |d 22  |j 2022  |e 2  |h 304-322 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4089006791 
LOK |0 003 DE-627 
LOK |0 004 1795543361 
LOK |0 005 20220315051544 
LOK |0 008 220315||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2022-03-12#301E094821D141759BF8E106FBD3E02030494474 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw