{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T14:33:50Z","timestamp":1772202830857,"version":"3.50.1"},"reference-count":53,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"University of New South Wales Law Faculty Research Grant"},{"name":"Social Science and Humanities Research Councils of Canada"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Big Data &amp; Society"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p> Datafication of social life affects what society regards as knowledge. Jasanoff\u2019s regimes of sight framework provides three ideal-type models of authorised knowing in environmental data practice. This paper applies Jasanoff's framework for analysing intelligence practice through an exploratory empirical study of crime and intelligence practitioners in a selection of police services in Australia, New Zealand, Canada and the United States. The paper argues that the \u2018view from somewhere\u2019 (VFS) captures the essence of existing police intelligence practices in the four countries but the \u2018view from nowhere\u2019 (VFN) is emerging as a possible future for police intelligence \u2013 an approach promoted by technology companies and supported mainly by police leaders and managers. The paper investigates the challenges and limits of a shift by police from VFS to VFN in the production of intelligence; the challenges are primarily political, which threaten the dominance of police contextual knowledge over \u2018scientific\u2019 knowledge. These political challenges also have symbolic and material implications. The paper concludes that, because of these challenges, a complete shift from VFS to VFN is not likely to happen. At best the two models might co-exist with the latter subordinate to the imperatives of the former, resulting in further tension between sworn officers and civilians, organisational inertia, as well as technologies that may be under-utilised or abandoned. <\/jats:p>","DOI":"10.1177\/20539517221089310","type":"journal-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T05:33:21Z","timestamp":1650864801000},"update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":12,"title":["Datafication and the practice  of intelligence production"],"prefix":"10.1177","volume":"9","author":[{"given":"Janet","family":"Chan","sequence":"first","affiliation":[{"name":"Faculty of Law & Justice, The University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8533-0129","authenticated-orcid":false,"given":"Carrie","family":"Sanders","sequence":"additional","affiliation":[{"name":"Department of Criminology, Wilfrid Laurier University, Brantford, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2571-1469","authenticated-orcid":false,"given":"Lyria","family":"Bennett Moses","sequence":"additional","affiliation":[{"name":"Faculty of Law & Justice, The University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0337-8896","authenticated-orcid":false,"given":"Holly","family":"Blackmore","sequence":"additional","affiliation":[{"name":"Faculty of Law & Justice, The University of New South Wales, Sydney, Australia"}]}],"member":"179","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"key":"bibr1-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1177\/0004865815626964"},{"key":"bibr2-20539517221089310","unstructured":"Babuta A (2017) Big data and policing: an assessment of law enforcement requirements, expectations and priorities. RUSI Occasional Paper. Available at: https:\/\/rusi.org\/publication\/occasional-papers\/big-data-and-policing-assessment-law-enforcement-requirements (accessed 15 March 2021)."},{"key":"bibr3-20539517221089310","first-page":"18","volume":"2009","author":"Beck C","year":"2009","journal-title":"The Police Chief"},{"key":"bibr4-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2016.1262364"},{"key":"bibr5-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2016.1253695"},{"key":"bibr6-20539517221089310","volume-title":"Crime Analysis with Crime Mapping","author":"Boba Santos R","year":"2013","edition":"3"},{"key":"bibr7-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1177\/0003122417725865"},{"key":"bibr8-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1093\/socpro\/spaa004"},{"key":"bibr9-20539517221089310","doi-asserted-by":"publisher","DOI":"10.4324\/9781315522579"},{"key":"bibr10-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1007\/s12103-020-09557-x"},{"key":"bibr11-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47771-4"},{"key":"bibr12-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1177\/1098611118796890"},{"key":"bibr13-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350066"},{"key":"bibr14-20539517221089310","first-page":"655","volume-title":"Handbook of Policing","author":"Chan J","year":"2003"},{"key":"bibr15-20539517221089310","first-page":"41","volume-title":"Security and Risk Technologies in Criminal Justice: Critical Perspectives","author":"Chan J","year":"2019"},{"key":"bibr16-20539517221089310","doi-asserted-by":"publisher","DOI":"10.3138\/9781442674783"},{"key":"bibr17-20539517221089310","volume-title":"Constructing Grounded Theory","author":"Charmaz K","year":"2006"},{"key":"bibr18-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/44.2.188"},{"key":"bibr19-20539517221089310","doi-asserted-by":"publisher","DOI":"10.4324\/9781351247375-18"},{"key":"bibr20-20539517221089310","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i1\/2.12920"},{"key":"bibr21-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2019.1611821"},{"key":"bibr22-20539517221089310","doi-asserted-by":"publisher","DOI":"10.3138\/9781442678590"},{"key":"bibr23-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-4724-5_9"},{"key":"bibr24-20539517221089310","first-page":"19","volume-title":"Security Expertise: Practices, Power, Responsibility","author":"Evans R","year":"2015"},{"key":"bibr25-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2011.605130"},{"key":"bibr26-20539517221089310","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9781479854608.001.0001"},{"key":"bibr27-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1177\/1473225414529047"},{"key":"bibr28-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azh053"},{"key":"bibr29-20539517221089310","first-page":"1","volume":"2017","author":"Jasanoff S","year":"2017","journal-title":"Big Data & Society"},{"key":"bibr30-20539517221089310","doi-asserted-by":"publisher","DOI":"10.5749\/j.ctvz0h9s7"},{"key":"bibr31-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1726986"},{"key":"bibr32-20539517221089310","volume-title":"The Technology of Policing: Crime Mapping, Information Technology, and the Rationality of Crime Control","author":"Manning P","year":"2008"},{"key":"bibr33-20539517221089310","volume-title":"Big Data","author":"Mayer-Sch\u00f6nberger V","year":"2013"},{"key":"bibr34-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2020.1810249"},{"key":"bibr35-20539517221089310","volume-title":"A Decadal Survey of the Social and Behavioural Sciences: A Research Agenda for Advancing Intelligence Analysis. Consensus Study Report","author":"NASEM (National Academies of Sciences, Engineering, and Medicine)","year":"2019"},{"key":"bibr36-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/1561426032000113852"},{"key":"bibr37-20539517221089310","doi-asserted-by":"publisher","DOI":"10.7249\/RR233"},{"key":"bibr38-20539517221089310","volume-title":"Structured Analytic Techniques for Intelligence Analysis","author":"Pherson RH","year":"2020"},{"key":"bibr39-20539517221089310","volume-title":"Managing Intelligence: The Art of Influence","author":"Quarmby N","year":"2010"},{"key":"bibr40-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439460290006673"},{"key":"bibr41-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77650-7_2"},{"key":"bibr42-20539517221089310","volume-title":"Intelligence-Led Policing","author":"Ratcliffe J","year":"2011"},{"key":"bibr43-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2019.1577844"},{"key":"bibr44-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-criminol-062217-114209"},{"key":"bibr45-20539517221089310","first-page":"180","volume-title":"Security in the Era of Big Data","author":"Sanders C","year":"2020"},{"key":"bibr46-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2017.1323637"},{"key":"bibr47-20539517221089310","unstructured":"Sanders C, Weston C, Bennet Moses L, et al. (2020) Conceptions of intelligence: studying police intelligence practices and frameworks in Australia, Canada, and New Zealand. Project Report (34 pages)."},{"key":"bibr48-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2020.1803315"},{"key":"bibr49-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1177\/1477370804044005"},{"key":"bibr50-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azw096"},{"key":"bibr51-20539517221089310","first-page":"139","volume":"55","author":"Van Brakel RE","year":"2020","journal-title":"Cahiers Politiestudies"},{"key":"bibr52-20539517221089310","doi-asserted-by":"publisher","DOI":"10.4324\/9780203815939"},{"key":"bibr53-20539517221089310","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2018.1564751"}],"container-title":["Big Data &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517221089310","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/20539517221089310","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517221089310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:43:28Z","timestamp":1740894208000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/20539517221089310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1177\/20539517221089310"],"URL":"https:\/\/doi.org\/10.1177\/20539517221089310","relation":{},"ISSN":["2053-9517","2053-9517"],"issn-type":[{"value":"2053-9517","type":"print"},{"value":"2053-9517","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"article-number":"20539517221089310"}}