1,179
Views
10
CrossRef citations to date
0
Altmetric
Articles

Need to know vs. need to share: information technology and the intersecting work of police, fire and paramedics

Pages 463-475 | Received 10 Sep 2013, Accepted 30 Jan 2014, Published online: 10 Mar 2014

References

  • Agrawal, M. (2003). Impact of mobile computing terminals in police work. Journal of Organizational Computing and Electronic Commerce, 13(2), 73–89. doi: 10.1207/S15327744JOCE1302_1 doi: 10.1207/S15327744JOCE1302_1
  • Bea, Keith. Corp and Library of Congress Washington DC Congressional Research Service. (2005). Emergency management preparedness standards: Overview and options for Congress. Ft. Belfoir Defense Technical Information Centre. Report No: CRS-RL32520.
  • Becker, H. S. (1986). Studying practitioners of vice and crime. In Doing things together. Northwestern University Press.
  • Bijker, W. E. (1995). On bikes, bicycles and bakelite. Cambridge, MA: MIT Press.
  • Campeau, A. (2008). The space-control theory of paramedic scene-management. Symbolic Interaction, 31(3), 285–302. doi: 10.1525/si.2008.31.3.285 doi: 10.1525/si.2008.31.3.285
  • Chan, J. B. L. (2001). The technological game: How information technology is transforming police practice. Criminal Justice, 1, 139–159.
  • Charmaz, K. (2006). Constructing grounded theory: A practical guide through qualitative analysis. Thousand Oaks, CA: Sage.
  • Clarke, A. (1991). Social worlds/arenas theory as organizational theory. In D. Maines (Ed.), Social organization and social process: Essays in honor of Anselm strauss (pp. 119–158). New York, NY: Aldine de Gruyter.
  • Clarke, A. (2003). Situational analyses: Grounded theory mapping after the postmodern turn. Symbolic Interaction, 26(4), 553–576. doi: 10.1525/si.2003.26.4.553 doi: 10.1525/si.2003.26.4.553
  • Clarke, A., & Gerson, E. M. (1990). Symbolic interactionism in social studies of science. In H. Becker & M. McCall (Eds.), Symbolic interaction and cultural studies (pp. 179–214). Chicago: The University of Chicago Press.
  • Clarke, A., & Montini, T. (1993). The many faces of RU486: Tales of situated knowledges and technological contestations. Science, Technology, and Human Values, 18(1), 42–78. doi: 10.1177/016224399301800104 doi: 10.1177/016224399301800104
  • Clarke, A., & Star, S. L. (2007). The social worlds framework: A theory/methods package. In M. Lynch, O. Amsterdamska, & E. Hackett (Eds.), The new handbook of science and technology studies (pp. 203–247). Cambridge, MA: MIT Press.
  • Cowan, R. S. (1987). The consumption junction: A proposal for research strategies in the sociology of technology. In Wiebe E. Bijker, Thomas P. Hughes, & Trevor Pinch (Eds.), The social construction of technological systems: New directions in the sociology and history of technology (pp. 261–280). Cambridge, MA: MIT Press.
  • Drabek, T., & McEntire, D. (2003). Emergent phenomena and the sociology of disaster: Lessons, trends and opportunities from the research literature. Disaster Prevention and Management, 12(2), 977–112. doi: 10.1108/09653560310474214 doi: 10.1108/09653560310474214
  • Dunworth, T. (2000). Criminal justice and the information technology revolution. Criminal Justice, 3, 371–426. Washington, DC: NIJ/Office of Justice Programs.
  • FitzGerald, F. (2001). Replacement of the Computer Dispatch System at CACCS (ARIS II Project).
  • Hoogma, R., & Schot, J. (2001). How innovative are users? A critique of learning-by-doing and -using. In R. Coombs, K. Green, A. Richards, & V. Walsh (Eds.), Tchnology and the market: Demand, users and innovation (pp. 216–233). Cheltenham: Edward Elgar.
  • Intergraph. (2006). Intergraph: Security, government and infrastructure. Retrieved May 23, 2006, from http://www.intergraph.com/icad/
  • Latour, B. (1987). Science in action: How to follow scientists and engineers through society. Cambridge: Harvard University Press.
  • Latour, B. (1991). Technology is society made durable. In J. Law (Ed.), A sociology of monsters: Essays on power, technology and domination (pp. 103–131). London: Routledge.
  • Lehoux, P., Saint-Arnaud, J., & Richard, L. (2004). The use of technology at home: What patient manuals say and sell vs. What Patients Face and Fear. Sociology of Health and Illness, 26(5), 617–644. doi: 10.1111/j.0141-9889.2004.00408.x doi: 10.1111/j.0141-9889.2004.00408.x
  • Loseke, D. (2003). Thinking about social problems. New York: Aldine De Gruyter.
  • Lyon, D. (2003). Surveillance after September 11. Cambridge: Polity Press.
  • Manning, P. (2008). The technology of policing: Crime mapping, information technology, and the rationality of crime control. New York: New York University Press.
  • Manning, P. K. (in press). Information technology and police work. In Bruinsema, G & D. Weisburd (Eds.). Springer encyclopedia of criminology and criminal justice. New York: Springer.
  • Meehan, A. (1998). The impact of mobile data terminal (MDT) information technology on communication and recordkeeping in patrol work. Qualitative Sociology, 21(3), 225–253. doi: 10.1023/A:1022190402726 doi: 10.1023/A:1022190402726
  • National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission report: Final report of the National Commission on Terrorist attacks upon the United States. New York, NY: W.W. Norton.
  • Oudshoorn, N., & Pinch, T. (Eds.). (2003). How users matter: The co-construction of users and technology. Cambridge: MIT Press.
  • Oudshoorn, N., & Pinch, T. (2007). User-technology relationships: Some recent developments. In E. Hacket, O. Amsterdamska, M. Lynch, & J. Wajcman (Eds.), The handbook of science and technology studies (3rd ed., pp. 541–565). Cambridge, MA: MIT Press.
  • Palen, L., Anderson, K., Mark, G., Martin, J., Sicker, D., Palmer, M., & Grunwald, D. (2010). A vision for technology-mediated support for public participation & assistance in mass emergencies & disasters. Proceedings of ACM-BCS Visions of Computer Science, 1–12.
  • Palen, L., Vieweg, S., Liu, S., & Hughes, A. L. (2009). Crisis in a networked world. Features of computer-mediated communication in the April 16, 2007, Virginia Tech Event. Social Science Computer Review, 27(4), 467–480. doi: 10.1177/0894439309332302 doi: 10.1177/0894439309332302
  • Pinch, T., & Bijker, W. E. (1984). The social construction of facts and artifacts: Or how the sociology of science and the sociology of technology might benefit each other. Social Studies of Science, 14, 399–431. Retrieved from http://www.jstor.org/stable/285355 doi: 10.1177/030631284014003004
  • Richards, L. (2005). Handling qualitative data: A practical guide. London: Sage.
  • Richardson, L. (2000). Writing: A method of inquiry. In N. Denzin & Y. Lincoln (Eds.), Handbook of qualitative research (pp. 923–949). Thousand Oaks, CA: Sage.
  • Sanders, C. (2008). Is anyone there? The collapse of information and communication technologies in the social worlds of police, fire and emergency medical services. (Unpublished doctoral dissertation). McMaster University, Hamilton, Canada.
  • Sanders, C., & Henderson, S. (2013). Police ‘empires’ and information technologies: uncovering material and organisational barriers to information sharing in Canadian police services. Policing and Society: An International Journal of Policing and Policy, 23(2), 243–260. doi:10.1080/10439463.2012.703196 doi: 10.1080/10439463.2012.703196
  • Service Ontario. (1990). Freedom of information and protection of privacy act. Ministry of Ontario. Retrieved February 19, 2010, from http://www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_90f31_e.htm
  • Service Ontario. (2004). Personal health information protection act. Ministry of Ontario. Retrieved February 19, 2010, from http://www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_04p03_e.htm
  • Shaffir, W., & Stebbins, R. (Eds.). (1991). Experiencing fieldwork: An inside view of qualitative research. Newbury Park, CA: Sage.
  • Sheptycki, J. W. E. (2004). Organizational pathologies in Police intelligence systems: Some contributions to the Lexicon of intelligence-led policing. European Journal of Criminology, 1(3), 307–332. doi: 10.1177/1477370804044005 doi: 10.1177/1477370804044005
  • Strauss, A. (1978). A social world perspective. In N. Denzin (Ed.), Studies in symbolic interaction: An annual compilation of research (Vol. 1, pp. 119–128). San Francisco, CA: JAI Press.
  • Strauss, A. (1993). Continual permutations of action. New York, CA: Aldine de Gruyter.
  • Strauss, A., Schatzman, L., Bucher, R., Ehrlich, D., & Sabshin, M. (1964). Psychiatric ideologies and institutions. London: The Free Press of Glencoe.
  • Suchman, L. (1987). Plans and situated actions. Cambridge: Cambridge University Press.
  • Tuunainen, J. (2005). When disciplinary worlds collide: The organizational ecology of disciplines in a university department. Symbolic Interaction, 28(2), 205–228. doi: 10.1525/si.2005.28.2.205 doi: 10.1525/si.2005.28.2.205
  • Vaughan, D. (1999). The role of the organization in the production of techno-scientific knowledge. Social Studies of Science, 29(6), 913–943. doi: 10.1177/030631299029006005 doi: 10.1177/030631299029006005
  • Versaterm. (2006). Versaterm. Retrieved from www.versaterm.com
  • Wagner-Pacifici, R., & Schwartz, B. (1991). The Vietnam veterans memorial: Commemorating a difficult past. American Journal of Sociology, 97(2), 376–420.
  • Wyatt, S. (2008). Technological determinism is dead; Long live technological determinism. In E. Hacket, O. Amsterdamska, M. Lynch, & J. Wajcman (Eds.), The handbook of science and technology studies (pp. 165–180). Cambridge: The MIT Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.