| 000 | 06218nam a22007575i 4500 | ||
|---|---|---|---|
| 001 | 978-3-032-10028-3 | ||
| 003 | DE-He213 | ||
| 005 | 20260304124512.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 251201s2026 sz | s |||| 0|eng d | ||
| 020 |
_a9783032100283 _9978-3-032-10028-3 |
||
| 024 | 7 |
_a10.1007/978-3-032-10028-3 _2doi |
|
| 050 | 4 | _aHV6772-6773.3 | |
| 072 | 7 |
_aJKV _2bicssc |
|
| 072 | 7 |
_aSOC004000 _2bisacsh |
|
| 072 | 7 |
_aLNQE _2thema |
|
| 082 | 0 | 4 |
_a364.168 _223 |
| 100 | 1 |
_aMcKay, Carolyn. _eauthor. _0(orcid)0000-0003-0136-5055 _1https://orcid.org/0000-0003-0136-5055 _4aut _4http://id.loc.gov/vocabulary/relators/aut _923805 |
|
| 245 | 1 | 0 |
_aDigital Vulnerability in Criminal Justice _h[electronic resource] : _bVulnerable People and Communication Technologies / _cby Carolyn McKay. |
| 250 | _a1st ed. 2026. | ||
| 264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Palgrave Macmillan, _c2026. |
|
| 300 |
_aXIII, 178 p. 5 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 341 | 0 |
_bPDF/UA-1 _2onix |
|
| 341 | 0 |
_bTable of contents navigation _2onix |
|
| 341 | 0 |
_bSingle logical reading order _2onix |
|
| 341 | 0 |
_bShort alternative textual descriptions _2onix |
|
| 341 | 0 |
_bUse of color is not sole means of conveying information _2onix |
|
| 341 | 0 |
_bUse of high contrast between text and background color _2onix |
|
| 341 | 0 |
_bNext / Previous structural navigation _2onix |
|
| 341 | 0 |
_bAll non-decorative content supports reading without sight _2onix |
|
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aChapter 1. Introducing Digital Criminal Justice -- Part I Understanding Digital Vulnerability (Conceptually And Methodologically) -- Chapter 2. Digital Criminology, Vulnerability Theories And Digital Vulnerability -- Chapter 3. Researching Digitalisesd Criminal Justice With Empirical Methods -- Part II Empirical Insights Into Digital Vulnerability -- Chapter 4. What Is Vulnerability In Criminal Justice? -- Chapter 5. Remote Vulnerable Witnesses, Complainants And Victims -- Chapter 6. Remote Vulnerable Defendants -- Chapter 7. Future Visions Of Digitalised Criminal Justice -- Chapter 8. Conclusion. | |
| 506 | 0 | _aOpen Access | |
| 520 | _aThis open access book examines the impact of digitalisation processes on fair, accessible and inclusive criminal justice for vulnerable individuals. Based on original empirical data from an Australian Research Council funded national study, the book evaluates digitalised criminal justice, specifically, the increasing use of remote hearings and virtual courts, and the interrelationship with vulnerability. It asks: in what ways do remote communication technologies, such as videolinks, videoconferencing, and pre-recorded evidence, assist or disadvantage vulnerable witnesses, complainants, victims and defendants in the criminal justice system? By interviewing and surveying 175 Australian judicial officers, prosecutors, defence lawyers and affiliated professionals, the book examines the impact of digitalised criminal justice on all vulnerable individuals. Themes include the benefits and challenges to human connection, communication, comprehension and confidentiality, as well as court authority, cross-examination, and emotional expression. While there are certain universal and non-contentious experiences of videolinks, the key practical findings are sharply delineated between vulnerable witnesses versus vulnerable defendants. Theoretically, the book merges digital criminology with vulnerability theories to contribute understandings of ‘digital vulnerability’, that is, the interplay between digital technologies and vulnerable individuals in criminal justice. Digital Vulnerability in Criminal Justice provides critical and contemporary insights, and forward-looking recommendations for ensuring fair digitalised criminal justice into the future. Dr Carolyn McKay is Associate Professor in Law at the University of Sydney Law School where she teaches Criminal Law, Procedure, and Digital Criminology. She is author of The Pixelated Prisoner: Prison Video Links, Court ‘Appearance’ and The Justice Matrix (2018, Routledge) and recipient of an Australian Research Council ‘Discovery Early Career Researcher Award’ (2021-2025) for the Digital Criminal Justice Project: Vulnerability and the Digital Subject (DE210100586). | ||
| 532 | 8 | _aAccessibility summary: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub. | |
| 532 | 8 | _aNo reading system accessibility options actively disabled | |
| 532 | 8 | _aPublisher contact for further accessibility information: accessibilitysupport@springernature.com | |
| 650 | 0 |
_aComputer crimes. _95656 |
|
| 650 | 0 | _aVictims of crimes. | |
| 650 | 0 | _aCritical criminology. | |
| 650 | 0 |
_aCrime. _916808 |
|
| 650 | 0 | _aTechnology. | |
| 650 | 0 | _aPsychology. | |
| 650 | 0 | _aMass Media. | |
| 650 | 0 |
_aTechnology _xSociological aspects. |
|
| 650 | 1 | 4 |
_aCybercrime. _95659 |
| 650 | 2 | 4 | _aVictimology. |
| 650 | 2 | 4 | _aCritical Criminology. |
| 650 | 2 | 4 |
_aCrime and Technology. _916810 |
| 650 | 2 | 4 |
_aCyberpsychology. _913981 |
| 650 | 2 | 4 | _aScience, Technology and Society. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer Nature eBook | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783032100276 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783032100290 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783032100306 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-032-10028-3 |
| 912 | _aZDB-2-LCR | ||
| 912 | _aZDB-2-SXLC | ||
| 912 | _aZDB-2-SOB | ||
| 999 |
_c579875 _d579875 |
||