“One of the most common ways that companies attempt to address organizational diversity is through formal training. Yet research on the effectiveness of such programs has yielded mixed results: Some studies show that diversity training is effective, others show it’s ineffective, and still others show that it may actually lead to backlash. This has led to pessimism regarding diversity training, with some claiming it simply doesn’t work.”
Source: Lindsey, A., King, E., Membere, A., & Ho Kwan, C. (2017). Harvard Business Review Digital Articles and available from this link (open access with personal registration)
Full Moon & Orb Sydney Heads/Flickr
“The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement, military, business and social engagement with cyber policy and security issues.”
Source: Nevill, L., Hawkins, Z., Feakin, T., & Woodall, J. (2016). Australian Strategic Policy Institute (ASPI) and available from this link (open access).
Collins Beach, Manly
“The purpose of this framework is to support better strategic management of risks associated with natural hazards. It does this through providing a series of tasks that support the allocation of risk ownership as part of strategic planning activities. This framework is not intended to replace current risk processes, but to enhance and add value to what is already there.”
Source: Young, C., Jones, R., Kumnick, M., Christopher, G. & Casey, N. (2017). Bushfire and Natural Hazards CRC and available from this link (open access)
“This resource was produced by the Australian Institute of Family Studies on behalf of Victoria Police. Using evidence from the psychological and criminological literature, it addresses some of the common myths and misconceptions about sexual offending, including adult rape and sexual offences as well as child sexual abuse. It provides clear information on what should be considered a misconception, as well as what is considered ‘typical’ and ‘common’ behaviour in both offenders and victims.”
Source: Victoria Police and available from this link (open access).
Clouds and pine trees/Flickr
“Criminologist Professor Ben Bowling explains that as globalised crime and cyber offenses ramp up, policing activities too are increasingly crossing national borders, raising problematic questions around governance and public accountability. Ben also examines issues around stop-and-search police powers in the global context.”
Source: Bowling, Ben (2017). Melbourne University Up Close podcast (40 mins) and available from this link (open access).
“Gender representation is essential to quality outcomes in police services. Currently, the Queensland Police Service (QPS) contains 26% women, compared to the 50.4% of women in the Queensland population. Our research supports the QPS goal of achieving a gender representative police service by highlighting gendered barriers and facilitators from the point of career consideration through the stages of the police application process. Findings outlined in this paper aim to improve the QPS application process to enhance future representation and the quality of the police service.”
Source: Spence, J., Putt, C., Chan, L., Barrett, J., Bennett, S., & Newman, M. (2017). Police Science: Australian and New Zealand Journal of Evidence-Based Policing, and available from this link (open access).
“In England and Wales, there are three commonly used but not necessarily commonly designed or operated, mental health interventions associated with policing, Liaison and Diversion, Street Triage and specialist staff embedded in Police Contact Control Rooms. A fourth US designed model, Crisis Intervention Teams (CITs), is now attracting some interest in England and Wales, and these four are to be considered in this review. A fifth intervention, Mental Health Courts, was trialed but has now been abandoned in England and Wales and so has been excluded, but remains in use elsewhere.”
Source: Kane, E., Evans, E., & Shokraneh, F. (2017). BMC Systematic reviews, and available from this link (open access).
“This blueprint offers practical lessons for launching data sharing, integration, and analysis projects that can better inform crime prevention and reduction strategies, with a focus on spatial analysis. It addresses the major challenges those engaged in data sharing projects will encounter and describes strategies to overcome those challenges. The blueprint also serves as a guide on the spatial-statistical methods that can facilitate cross-sector analysis; new trends in the technology, culture, and practice of data sharing; and the potential for future interagency and cross-jurisdictional data sharing and analyses to inform public safety strategies.”
Source: La Vigne, N. (2017). Urban Institute and available from this link (open access).
Manly Harbour/M. Hardy
“As the Department of Defense (DOD) transitions to a new administration, it will be accompanied by numerous editorials advocating for equipment modernization and changing our theater-specific postures. Many of these discussions will call for altering DOD’s current strategy. In essence, they will reiterate a dogmatic logic among the department’s leadership: the best way to solve a problem is to develop a new strategy. To succeed, we must realize that focusing mainly on strategy will cause us to overlook our greatest advantage—organizational culture.”
Source: Schmidt, M., & Slaughter, R. (2017). Joint Force Quarterly and available from this link (open access).
“The 2017 report has identified six key enablers of organised crime in Australia as follows: Money laundering; Technology and digital infrastructure; Professional facilitators; Identity crime; Corruption within the public sector; Violence and intimidation. The report explores existing and emerging organised crime threats affecting the Australian community and our national interests.”
Source: Australian Criminal Intelligence Commission (ACIC) and available from this link (open access).