{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T12:48:26Z","timestamp":1748436506161,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10676-018-9477-1","type":"journal-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T02:43:56Z","timestamp":1533091436000},"page":"265-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Exploring the ethical, organisational and technological challenges of crime mapping: a critical approach to urban safety technologies"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6481-0833","authenticated-orcid":false,"given":"Gemma","family":"Galdon Clavell","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,1]]},"reference":[{"volume-title":"An atlas of radical cartography","year":"2008","key":"9477_CR1","unstructured":"Bhagat, A., & Mogel, L. (Eds.). (2008). An atlas of radical cartography. Los Angeles: Journal of Aesthetics and Portest Press."},{"key":"9477_CR2","volume-title":"Crime mapping case studies. Practice and research","author":"I Bullen","year":"2008","unstructured":"Bullen, I. (2008). Priority neighbourhoods and the Vulnerable Localities Index in Wigan\u2014A strategic partnership approach to crime reduction a Chainey, Spencer i. In S. Chasiney, L. Tompson (Eds.), Crime mapping case studies. Practice and research. West Sussex: Wiley."},{"key":"9477_CR31","volume-title":"The New technology of Crime, Law and Social Control Monsey","author":"J Byrne","year":"2007","unstructured":"Byrne, J., & Rebovich, D. (2007). The New technology of Crime, Law and Social Control Monsey. NY: Criminal Justice Press."},{"key":"9477_CR3","unstructured":"Chainey, S. (2004). Using geographic information to support the police response to community cohesion. Paper presented at the Association for Geographic Information Conference, 12\u201314 October, London."},{"issue":"2","key":"9477_CR4","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1093\/police\/pan023","volume":"2","author":"S Chainey","year":"2008","unstructured":"Chainey, S. (2008). Identifying priority neighbourhoods using the Vulnerable Localities Index. Policing, 2(2), 196\u2013209.","journal-title":"Policing"},{"key":"9477_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9781118685181","volume-title":"Gis and crime mapping","author":"S Chainey","year":"2005","unstructured":"Chainey, S., & Ratcliffe, J. (2005). Gis and crime mapping. West Sussex: Wiley."},{"volume-title":"Crime mapping case studies. Practice and research","year":"2008","key":"9477_CR6","unstructured":"Chainey, S., & Thompson, L. (Eds.). (2008). Crime mapping case studies. Practice and research. West Sussex: Wiley."},{"issue":"2","key":"9477_CR30","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1177\/1466802501001002001","volume":"1","author":"JBL Chan","year":"2016","unstructured":"Chan, J. B. L. (2001). The technological game: How information technology is transforming police practice. Criminal Justice, 1(2), 139\u2013159.","journal-title":"Criminal Justice"},{"key":"9477_CR7","first-page":"1","volume":"5","author":"RV Clarke","year":"1993","unstructured":"Clarke, R. V., & Felson, M. M. (1993). Introduction: Criminology, routine activity, and rational choice. Advances in Theoretical Criminology: Routine Activity and Rational Choice, 5, 1\u201314.","journal-title":"Advances in Theoretical Criminology: Routine Activity and Rational Choice"},{"issue":"1","key":"9477_CR8","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1177\/1350507604042281","volume":"35","author":"G Currie","year":"2004","unstructured":"Currie, G., & Kerrin, M. (2004). The limits of a technological fix to knowledge management: Epistemological, political and cultural issues in the case of intranet implementation. Management Learning, 35(1), 9\u201329.","journal-title":"Management Learning"},{"key":"9477_CR39","doi-asserted-by":"publisher","DOI":"10.1201\/b11477","volume-title":"The Crime Numbers Game: Management by Manipulation","author":"John A Eterno","year":"2012","unstructured":"Eterno, J. A., & Silverman, E. B. (2012). The Crime Numbers Game: Management by Manipulation. Boca Raton, FL: CRC Press\/Taylor and Francis Group."},{"key":"9477_CR10","volume-title":"Crime mapping case studies. Practice and research","author":"A Gilmour","year":"2008","unstructured":"Gilmour, A., & Barclay, J. (2008). Developing geographical information systems and crime mapping tools in Nez Zealand. In S. Chainey & L. Thompson (Eds.), Crime mapping case studies. Practice and research. West Sussex: Wiley."},{"key":"9477_CR11","unstructured":"Hand, D. (2012). Open data is a force for good, but not without risks. The Guardian, July 10."},{"key":"9477_CR12","volume-title":"Illusion of order: The false promise of broken windows policing","author":"BE Harcourt","year":"2001","unstructured":"Harcourt, B. E. (2001). Illusion of order: The false promise of broken windows policing. Cambridge: Harvard University Press."},{"key":"9477_CR28","volume-title":"Intelligence: Investigation, community and partnership","author":"C Harfield","year":"2008","unstructured":"Harfield, C., & Harfield, K. (2008). Intelligence: Investigation, community and partnership (1st ed.). Oxford: Oxford University Press.","edition":"1"},{"key":"9477_CR29","volume-title":"Covert investigation","author":"K Harfield","year":"2012","unstructured":"Harfield, K., & Harfield, C. (2012). Covert investigation (3rd ed.). Oxford: Oxford University Press.","edition":"3"},{"key":"9477_CR13","volume-title":"Mapping crime: Principle and practice","author":"K Harries","year":"1999","unstructured":"Harries, K. (1999). Mapping crime: Principle and practice. Washington, DC: National Institute of Justice, Crime Mapping Research Center."},{"key":"9477_CR9","volume-title":"Geographic information systems and science","author":"PA Longley","year":"2001","unstructured":"Longley, P. A., Goodchild M. F., Maguire, D. J., & Rhind, D. (2001). Geographic information systems and science. Chichester: Wiley."},{"key":"9477_CR36","volume-title":"Surveillance after September 11","author":"D Lyon","year":"2003","unstructured":"Lyon, D. (2003). Surveillance after September 11. Cambridge, UK: Polity Press."},{"key":"9477_CR15","volume-title":"To save everything, click here: The folly of technological solutionism","author":"E Morozov","year":"2014","unstructured":"Morozov, E. (2014). To save everything, click here: The folly of technological solutionism. New York: PublicAffairs."},{"issue":"3","key":"9477_CR16","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1177\/08854129922092405","volume":"13","author":"Z Nedovic-Budic","year":"1999","unstructured":"Nedovic-Budic, Z. (1999). Evaluating the effects of GIS technology: Review of methods. Journal of Planning Literature, 13(3), 284\u2013295.","journal-title":"Journal of Planning Literature"},{"key":"9477_CR33","unstructured":"Pleasance, C. (2014). Gang who \u2018Stole More than $1 million in Jewellery and Cash\u2019 Caught after Posting Pictures of Themselves Showing off Their Swag on Social Media. https:\/\/www.dailymail.co.uk\/news\/article-2649491\/Gangstole-1million-jewelry-cash-caught-posting-pictures-showing-swag-socialmedia.html#ixzz3ctqyubbx . Accessed 8 June 2015."},{"key":"9477_CR17","unstructured":"Pressman, J., & Wildavsky, A. (1984). Implementation: How great expectations in Washington are dashed in Oakland; Or, Why it\u2019s amazing that federal programs work at all, this being a Saga of the Economic Development Administration as told by two sympathetic observers who seek to build morals on a foundation of ruined hopes. Berkeley: University of California Press."},{"issue":"1","key":"9477_CR38","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10940-004-1789-0","volume":"21","author":"JH Ratcliffe","year":"2005","unstructured":"Ratcliffe, J. H. (2005). Detecting spatial movement of intra-region crime patterns over time. Journal of Quantitative Criminology, 21(1), 103\u2013123.","journal-title":"Journal ofQuantitative Criminology"},{"issue":"4","key":"9477_CR37","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s101090050020","volume":"1","author":"JH Ratcliffe","year":"1999","unstructured":"Ratcliffe, J. H., & McCullagh, M. J. (1999). Hotbeds of crime and the search for spatial accuracy. Journal of Geographical Systems, 1(4), 385\u2013398.","journal-title":"Journal ofGeographical Systems"},{"key":"9477_CR18","unstructured":"Ray Jeffery, C. (1999) CPTED: Past, present, and future. Position paper per International CPTED Association at the 4th Annual International CPTED Association Conference, Mississauga, Ontario, Canada."},{"key":"9477_CR19","volume-title":"The technological fix: How people use technology to create and solve problems","author":"L Rosner","year":"2004","unstructured":"Rosner, L. (2004). The technological fix: How people use technology to create and solve problems. Great Britain: Routgled."},{"key":"9477_CR34","unstructured":"Sawers, P. (2015). Facebook and Twitter Could Be Hate-Speech \u2018Accomplices\u2019 if New French Law Passes\u2019,Venture Beat News. http:\/\/venturebeat.com\/2015\/01\/27\/facebook-and-twitter-could-be-hate-speech-accomplices-if-new-frenchlawpasses . Accessed 8 June 2015."},{"key":"9477_CR35","volume-title":"Beyond Fear","author":"Bruce Schneier","year":"2003","unstructured":"Schneier, B. (2003). Beyond Fear, Thinking Sensibly about Security in an Uncertain World. New York: Copernicus Books."},{"key":"9477_CR20","volume-title":"Inside the politics of technology: Agency and normativity in the co-production of technology and society","author":"T Swierstra","year":"2005","unstructured":"Swierstra, T., & Jelsma, J. (2005). Trapped in the duality of structure: An STS approach to engineering ethics. In H. Harbers (Ed.), Inside the politics of technology: Agency and normativity in the co-production of technology and society. Amsterdam: Amsterdam University Press."},{"issue":"4","key":"9477_CR21","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1177\/089443930101900406","volume":"19","author":"IB Vann","year":"2001","unstructured":"Vann, I. B., & David Garson, G. (2001). Crime mapping and its extension to social science analysis. Social Science Computer Review, 19(4), 471\u2013479.","journal-title":"Social Science Computer Review"},{"issue":"3","key":"9477_CR24","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1108\/13639510110401717","volume":"24","author":"WF Walsh","year":"2001","unstructured":"Walsh, W. F. (2001). Compstat: An analysis of an emerging police managerial paradigm. Policing: An International Journal of Police Strategies & Management, 24(3), 347\u2013362.","journal-title":"Policing: An International Journal of Police Strategies & Management"},{"key":"9477_CR23","volume-title":"Privacy in the information age: A guide for sharing crime maps and spatial data","author":"J Wartell","year":"2001","unstructured":"Wartell, J., & McEwen, J. T. (2001). Privacy in the information age: A guide for sharing crime maps and spatial data. Washington: Crime Mapping Research Center i US Department of Justice."},{"issue":"3","key":"9477_CR25","first-page":"29","volume":"249","author":"JQ Wilson","year":"1982","unstructured":"Wilson, J. Q., & Kelling, G. L. (1982). Broken windows. The police and neighbourhood safety. The Atlantic Monthly, 249(3), 29\u201338.","journal-title":"The Atlantic Monthly"},{"volume-title":"Virtual society? Technology, cyberbole, reality","year":"2002","key":"9477_CR27","unstructured":"Woolgar, S. (Ed.). (2002). Virtual society? Technology, cyberbole, reality. Oxford: Oxford University Press."},{"issue":"1","key":"9477_CR32","doi-asserted-by":"crossref","first-page":"182","DOI":"10.30950\/jcer.v9i1.452","volume":"9","author":"A Zavr\u0161nik","year":"2013","unstructured":"Zavr\u0161nik, A. (2013). Blurring the line between law enforcement and intelligence: Sharpening the gaze of surveillance. Journal of Contemporary European Research, 9(1), 182\u2013202.","journal-title":"Journal of Contemporary European Research"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9477-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9477-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9477-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T15:00:51Z","timestamp":1661698851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9477-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,1]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9477"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9477-1","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2018,8,1]]},"assertion":[{"value":"1 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}