488
Views
7
CrossRef citations to date
0
Altmetric
Reflections

Reflections on the nature of policing and its developmentFootnote

References

  • Abrahamsen, R., & Williams, M. C. (2009). Security beyond the state: Global security assemblages in international politics. International Political Sociology, 3, 1–17. doi:10.1111/j.1749-5687.2008.00060.x10.1111/ips.2009.3.issue-1
  • Abrahamsen, R., & Williams, M. C. (2011). Security beyond the state: Private security in international politics. Cambridge, MA: Cambridge University Press.
  • Ayling, J., Grabosky, P., & Shearing, C. (2009). Lengthening the arm of the law: Enhancing police resources in the twenty-first century. Cambridge, MA: Cambridge University Press.
  • Bayley, D. H., & Shearing, C. (1996). The future of policing. Law & Society Review, 30, 585–606.
  • Bayley, D. H., & Shearing, C. (2001). The new structure of policing: Description, conceptualization, and research agenda. Washington, DC: National Institute of Justice.
  • Berg, J., & Shearing, C. (2011). The practice of crime prevention: Design principles for more effective security governance. SA Crime Quarterly, 36, 23–30.
  • Bittner, E. (1967). Police discretion in emergency apprehension of mentally ill persons. Social Problems, 14, 278–292.10.2307/799150
  • Bittner, E. (1990a). Florence Nightingale in pursuit of Willie Sutton: A theory of the police. In E. Bittner (Ed.), Aspects of police work (pp. 233–268). Boston, MA: Northeastern University Press.
  • Bittner, E. (1990b). Urban police. In E. Bittner (Ed.), Aspects of police work (pp. 18–29). Boston, MA: Northeastern University Press.
  • Bottoms, A., & Wiles, P. (1995). Crime and insecurity in the city. In C. Fijnaut, J. Goethals, T. Peters, & L. Walgrave (Eds.), Changes in society, crime and criminal justice in Europe (pp. 1.1–1.10). Leuven: Kluwer.
  • Braithwaite, J. (2004). Methods of power for development: Weapons of the weak, weapons of the strong. Michigan Journal of International Law, 26, 297–330.
  • Brodeur, J. P. (2010). The policing web. Oxford: Oxford University Press.10.1093/acprof:oso/9780199740598.001.0001
  • Brundtland, G. H. (1987). Our common future: The world commission on environment and development. Oxford: Oxford University Press.
  • Caldeira, T. (1996). Fortified enclaves: The new urban segregation. Public Culture, 8, 303–328.10.1215/08992363-8-2-303
  • Council for Canadian Academies. (2014). Policing Canada in the 21st century: New policing for new challenges. Ottawa: Author.
  • Crawford, A. (1998). Community safety and the quest for security: Holding back the dynamics of social exclusion. Policy Studies, 19, 237–253. doi:10.1080/0144287980842375910.1080/01442879808423759
  • Diamond, J. (2005). Collapse: How societies choose to fail or succeed. New York, NY: Penguin.
  • Drahos, P. (2004). Intellectual property and pharmaceutical markets: A nodal governance approach. Temple Law Review, 77, 401–424.
  • Eck, J. E. (1994). Drug markets and drug places: A case-control study of the spacial structure of illicit drug dealing ( PhD dissertation). University of Maryland, College Park, MD.
  • Eck, J. E., & Wartell, J. (1996). Reducing crime and drug dealing by improving place management: A randomized experiment. Report to the San Diego police department. Washington, DC: Crime Control Institute.
  • Ericson, R. (1994). The division of expert knowledge in policing and security. British Journal of Sociology, 45, 149–175.10.2307/591490
  • Foucault, M. (1990). The history of sexuality, volume 1: An introduction. New York, NY: Vintage Books.
  • Froestad, J., & Shearing, C. (2013). Security governance, policing, and local capacity. Boca Raton, FL: CRC Press.
  • Hobbes, T. (1951). Leviathan. (C. B. Macpherson, Ed.). London: Penguin.
  • Hope, T. (2000). Inequality and the clubbing of private security. In J. B. Armstrong, S. H. Edwards, H. B. Roberson, & R. Y. Williams (Eds.), Teaching the American civil rights movement: Freedom’s bittersweet song (pp. 83–106). New York, NY: Routledge.
  • Independent Commission on Policing for Northern Ireland. (1999). A new beginning: Policing in Northern Ireland. Belfast: Stationery Office.
  • Independent Police Commission. (2013). Policing for a better Britain. London: Independent Police Commission.
  • Kerr, J. (2015). Securitization and policing of art theft: The case of London. London: Ashgate.
  • Latour, B. (1986). The powers of association. In J. Law (Ed.), Power, action, and belief: A new sociology of knowledge? (pp. 264–280). London: Routledge & Kegan Paul.
  • Loader, I., & Walker, N. (2007). Civilizing security. Cambridge, MA: Cambridge University Press.
  • Maitland, F. (1885). Justice and police. London: Macmillan.
  • Marks, M., Shearing, C., & Wood, J. (2009). Who should the police be? Finding a new narrative for community policing in South Africa. Police Practice and Research: An International Journal, 10, 145–155. doi:10.1080/1561426080226456010.1080/15614260802264560
  • Martin, J. (2013). Informal security nodes and force capital. Polcing and Society: An Internationa Journal of Research and Policy, 23, 145–163. doi:10.1080/10439463.2012.67182110.1080/10439463.2012.671821
  • Nakueira, S. (2014). New architectures of governance: Transnational private actors, enrolment strategies and the security governance of sports mega events ( PhD dissertation). University of Cape Town, South Africa.
  • O’Malley, P. (2004). Risk, uncertainty and government. London: The Glasshouse Press.
  • Parker, C., & Braithwaite, J. (2003). Regulation. In P. Cane & M. Tushnet (Eds.), The oxford handbook for legal studies (pp. 119–145). Oxford: Oxford University Press.
  • Piketty, T. (2014). Capital in the twenty-first century. Cambridge, MA: Harvard University Press.10.4159/9780674369542
  • Project Group Vision on Policing. (2006). Police in evolution. The Hague: Board of Chief Commissioners.
  • Punch, M. (2009). Police corruption: Deviance, accountability and reform in policing. Cullompton: Willan.
  • Rose, N. (1999). The powers of freedom: Reframing political thought. Cambridge, MA: Cambridge University Press.10.1017/CBO9780511488856
  • Sampson, R. (2006). Collective efficacy theory: Lessons learned and directions for future inquiry. In F. Cullen, J. Wright, & K. Blevins (Eds.), Taking stock: The status of criminological theory (pp. 149–168). New Brunswick, NJ: Transaction.
  • Shearing, C., & Ericson, R. (1991). Culture as figurative action. The British Journal of Sociology, 42, 481–506.10.2307/591444
  • Shearing, C., & Johnston, L. (2010). Nodal wars and network fallacies: A genealogical analysis of global insecurities. Theoretical Criminology, 14, 495–614. doi:10.1177/136248061037882810.1177/1362480610378828
  • Shearing, C., & Stenning, P. (1981). Modern private security: Its growth and implications. Crime and Justice, 3, 193–245.10.1086/449080
  • Shearing, C., & Stenning, P. (1983). Private security: Implications for social control. Social Problems, 30, 493–506.10.2307/800267
  • Shearing, C., & Wood, J. (2003). Nodal governance, democracy, and the new ‘denizens’. Journal of Law and Society, 30, 400–419. doi:10.1111/1467-6478.00263
  • Smith, D. E. (1987). The everyday world as problematic: A feminist sociology. Boston, MA: Northeastern University Press.
  • Thaler, R., & Sunstein, C. (2008). Nudge: Improving decisions about health, wealth, and happiness. New Haven, CT: Yale University Press.
  • Wood, J., & Shearing, C. (2007). Imagining security. London: Willan.
  • Zedner, L. (2009). Security. New York, NY: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.