Foreword |
|
x | |
Acknowledgements |
|
xii | |
|
|
xiii | |
|
|
xv | |
|
1 The (Vulnerable) Suspect In The Criminal Process |
|
|
1 | (8) |
|
|
1 | (1) |
|
|
2 | (2) |
|
Constructing grounded theory |
|
|
4 | (1) |
|
Structure of the book and key themes |
|
|
5 | (4) |
|
2 Police Powers And Procedures: `Safeguarding' The (Vulnerable) Suspect |
|
|
9 | (22) |
|
|
9 | (1) |
|
Safeguarding the (vulnerable) suspect |
|
|
10 | (6) |
|
The appropriate adult safeguard: a distinct advantage? |
|
|
16 | (6) |
|
Implementing the appropriate adult safeguard: potential pitfalls |
|
|
22 | (2) |
|
`Remedies' for non-implementation of the appropriate adult safeguard |
|
|
24 | (1) |
|
Avoiding the reliance on `faulty' remedies |
|
|
25 | (1) |
|
The appropriate adult safeguard beyond England and Wales |
|
|
26 | (2) |
|
|
28 | (3) |
|
3 Police Custody: Getting Inside, Being Inside, Getting Onside And Being Onside |
|
|
31 | (9) |
|
|
31 | (1) |
|
Getting inside: accessing the research sites |
|
|
32 | (1) |
|
Being inside: knowing the research site |
|
|
32 | (3) |
|
Getting onside: participation with the custody officers |
|
|
35 | (2) |
|
Being onside: going native' and personal identities |
|
|
37 | (2) |
|
Conclusion: reflections on research |
|
|
39 | (1) |
|
4 Constructing Vulnerability - The Concept |
|
|
40 | (8) |
|
|
40 | (1) |
|
Principal manifestations of vulnerability |
|
|
41 | (1) |
|
Legal psychology and vulnerability |
|
|
42 | (4) |
|
|
46 | (2) |
|
5 Constructing Vulnerability - Pace, Code C And The Courts |
|
|
48 | (25) |
|
|
48 | (1) |
|
Code C and PACE: constructions of vulnerability and the appropriate adult safeguard |
|
|
49 | (3) |
|
Additional constructions of vulnerability |
|
|
52 | (2) |
|
Vulnerability in the courts |
|
|
54 | (7) |
|
Critiquing the courts' constructions |
|
|
61 | (9) |
|
Conclusions: clearing up Code C? |
|
|
70 | (3) |
|
6 Constructing Vulnerability - The Custody Officer Approach |
|
|
73 | (25) |
|
|
73 | (1) |
|
Expounding the general contours of vulnerability |
|
|
73 | (6) |
|
Constructing the `appropriate adult vulnerable' suspect |
|
|
79 | (14) |
|
Defining the role of the appropriate adult |
|
|
93 | (3) |
|
Conclusion - Code C or custody officer criteria'? |
|
|
96 | (2) |
|
7 Identifying Vulnerability In Police Custody |
|
|
98 | (20) |
|
|
98 | (2) |
|
Identifying vulnerability: the law and guidance |
|
|
100 | (7) |
|
Barriers to identification |
|
|
107 | (6) |
|
Identifying vulnerability - an investigation? |
|
|
113 | (2) |
|
Overcoming barriers?: concluding remarks |
|
|
115 | (3) |
|
8 Implementing The Appropriate Adult Safeguard |
|
|
118 | (14) |
|
|
118 | (1) |
|
Calling an appropriate adult: dissuasive factors |
|
|
118 | (5) |
|
Calling the appropriate adult: persuasive factors |
|
|
123 | (5) |
|
Comparing different decisions |
|
|
128 | (1) |
|
|
129 | (3) |
|
9 Comprehending The Custody Officer Approach |
|
|
132 | (16) |
|
|
132 | (1) |
|
Modelling the criminal process |
|
|
132 | (4) |
|
Understanding police behaviour: the interpretation of rules |
|
|
136 | (4) |
|
The role of law in policing and the appropriate adult safeguard |
|
|
140 | (5) |
|
Vulnerability and risk: explaining the `why' |
|
|
145 | (1) |
|
|
146 | (2) |
|
10 Reconceptualising Vulnerability? |
|
|
148 | (12) |
|
|
148 | (1) |
|
Theorising custody officer decision-making |
|
|
148 | (2) |
|
Closing or filling the gap |
|
|
150 | (7) |
|
Considerations for further research and concluding remarks |
|
|
157 | (3) |
Bibliography |
|
160 | (14) |
Index |
|
174 | |