Rules in information sharing for security
Information sharing has become a central concern for security agencies since 9/11. Previous research has identified a number of barriers to information sharing among agencies: a combination of legal or policy constraints, interagency rivalry and mistrust, and technology. Drawing on ideas from the so...
Main Author: | |
---|---|
Contributors: | ; |
Format: | Electronic Article |
Language: | English |
Published: |
2022
|
In: |
Criminology & criminal justice
Year: 2022, Volume: 22, Issue: 2, Pages: 304-322 |
Online Access: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002c 4500 | ||
---|---|---|---|
001 | 1795543361 | ||
003 | DE-627 | ||
005 | 20220321105904.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220315s2022 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1177/1748895820960199 |2 doi | |
035 | |a (DE-627)1795543361 | ||
035 | |a (DE-599)KXP1795543361 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Chan, Janet B. L. |d 1948- |e VerfasserIn |0 (DE-588)130286656 |0 (DE-627)496697315 |0 (DE-576)176518339 |4 aut | |
109 | |a Chan, Janet B. L. 1948- |a Chan, Janet Bick Lai 1948- |a Chan, J. 1948- |a Chan, Janet B. 1948- |a Chan, Janet 1948- |a Chan, J. B. L. 1948- | ||
245 | 1 | 0 | |a Rules in information sharing for security |
264 | 1 | |c 2022 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Information sharing has become a central concern for security agencies since 9/11. Previous research has identified a number of barriers to information sharing among agencies: a combination of legal or policy constraints, interagency rivalry and mistrust, and technology. Drawing on ideas from the sociology of information and trust, this article conceptualises the sharing/withholding of information between agencies as dependent on rules as a system of trust. Adapting Richard Ericson’s framework of the different contexts of rule-following and making use of an Australian case study, the article demonstrates how law, culture and technology are intertwined in constraining or enabling access to information. The implications of this model for legal and policy interventions are discussed. | ||
650 | 4 | |a Trust | |
650 | 4 | |a Security agencies | |
650 | 4 | |a Rules | |
650 | 4 | |a Information sharing | |
700 | 1 | |a Logan, Sarah |e VerfasserIn |0 (DE-588)1180446011 |0 (DE-627)106772818X |0 (DE-576)520177819 |4 aut | |
700 | 1 | |a Moses, Lyria Bennett |e VerfasserIn |0 (DE-588)114496704X |0 (DE-627)1005135134 |0 (DE-576)490137296 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Criminology & criminal justice |d London [u.a.] : Sage, 2006 |g 22(2022), 2, Seite 304-322 |h Online-Ressource |w (DE-627)337806837 |w (DE-600)2063005-0 |w (DE-576)096290994 |x 1748-8966 |7 nnas |
773 | 1 | 8 | |g volume:22 |g year:2022 |g number:2 |g pages:304-322 |
856 | 4 | 0 | |u https://doi.org/10.1177/1748895820960199 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4089006791 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1795543361 | ||
LOK | |0 005 20220315051544 | ||
LOK | |0 008 220315||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2022-03-12#301E094821D141759BF8E106FBD3E02030494474 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
ORI | |a SA-MARC-krimdoka001.raw |