Skip to main content
Top

2. Digital Criminology, Vulnerability Theories and Digital Vulnerability

  • Open Access
  • 2026
  • OriginalPaper
  • Chapter
Published in:

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter delves into the theoretical foundations of digital criminology and vulnerability theories to present a framework for understanding digital vulnerability. It explores how remote communication technologies can both support and exacerbate vulnerabilities in the criminal justice system. The text examines the role of digital criminology in critiquing criminal justice technologies and the potential for digital solutions to either mitigate or intensify vulnerabilities. It also discusses the significance of vulnerability theories in understanding the unique challenges faced by vulnerable individuals in accessing justice. The chapter concludes by highlighting the need for a nuanced approach to digital vulnerability, recognizing the complex interplay between technology, vulnerability, and criminal procedure. Readers will gain insights into the potential benefits and drawbacks of remote communication technologies in the criminal justice system, as well as the importance of considering vulnerability in the design and implementation of these technologies.

Introduction

This chapter centres on the theoretical underpinnings and conceptual vocabulary of the project. Here, I synthesise digital criminology and vulnerability theories to contribute to understandings of digital vulnerability as a framework for interrogating the new social solutions—or harms—that may arise when vulnerable people use remote communication technologies to access to criminal justice.
The chapter begins with an explanation of digital criminology as a critical criminological theory that builds on extant sociological literature to examine the relationships between criminal justice and technologies. Digital criminology provides a structure for critiquing criminal justice technologies and a way to resist dominant techno-solutionist approaches that assume that technologies necessarily solve social problems. In relation to this specific project, digital criminology provides a framework for evaluating remote communication technologies and how they impact, both positively and negatively, the administration of criminal justice and legal experiences of vulnerable individuals. The chapter then surveys vulnerability theory scholarship to show how understandings of vulnerability are contested. Connecting both digital criminology and vulnerability theories gives rise to digital vulnerability as a framework for asking: what new social solutions or harms arise when vulnerable people use remote communication technologies to access justice? Digital vulnerability is a conceptual framework for capturing the convergence of digital communication technologies and vulnerability with criminal procedure. What we will see is how technologies provide techniques of mitigation in supporting some vulnerable individuals’ resilience and access to justice. Conversely, in other cases, remote communication technologies can exacerbate inequalities and diminish vulnerable individuals’ effective participation: techniques of intensification.

Significance of Theory

Theories and concepts might seem abstract and nebulous. However, they enable the researcher to go beyond the descriptive process of merely recounting the facts or object of research, whether that be observed behaviour, events or other phenomena: through theoretical engagement, the research can be critically analysed rather than just described. Concepts are ‘claims about the nature of the world and the various associations that comprise it’ bundled into a representative term, and they assist in critiquing, interrogating and understanding reality and common properties of behaviour, events or phenomena (Mitchell et al., 2022, p. 653). Such conceptual engagement aids in the next steps of systematic research: articulating and problematising the object of research, identifying patterns and providing explanations, nuanced understandings, meanings, relationships, interpretations, critique and alternative perspectives (Krohn, 2018). For current purposes, criminology has a ‘robust canon of theories’ at hand (Steinmetz & Nobles, 2018, p. 2) that could, potentially, be applied to the digitalisation of criminal justice in the twenty-first century, for instance: strain theory, feminist criminology, actor-network theory, surveillance theory, cultural criminology, amongst others. Can such extant theories be retooled for the contemporary techno-social, cyber or digital contexts? While there is potential for recalibrating such mainstream criminological theories (Marganski, 2018; Yar, 2018), they are perhaps deficient in contextualising lived human experience, social, cultural, gendered and political aspects, structural biases or the ‘multi-dimensional qualities of the phenomena under investigation’ as they interact with emergent technologies (Steinmetz & Nobles, 2018, p. 5). With these potential shortcomings in mind, I adopt an approach that draws on, and merges, the theory of digital criminology with vulnerability theories to arrive at digital vulnerability.

Digital Criminology as Theoretical Framework

Digital Criminology Versus Cybercriminology

Digital criminology helps to understand the techno-social realm of digitalised criminal justice and the potential for digital good or harm. Powell et al. (2018) explain that digital criminology builds on extant sociological literature to examine the relationships between law, justice, society and technologies. However, it is important to first distinguish cybercriminology. Cybercriminology focuses on computer-focused, computer-assisted and technology-enabled crimes, the targets of such crimes and crime control measures (Holt & Bossler, 2016; Jaishankar, 2011). On that basis alone, cybercriminology is not a productive framework for my study. Firstly, with its focus on crimes and control, it does not attend to the broader criminal justice issues such as the implications of digitalisation for courts or prisons. Second, cybercriminology has largely lacked an engagement with power relationships, social structures, intersectionality and inequalities including vulnerable populations. Thirdly, using the cyber- prefix, for example, cyber-fraud, cyber-porn, cyber-trespass, cybercriminology reinforces the offline/online dichotomy, that is, the perceived difference between offline, In Real Life (IRL) or terrestrial worlds, versus online, virtual realms or cyberspace. For example, Holt and Bossler (2016, p. 7) provide that online crimes have analogies ‘to, but distinctions from, traditional crime in physical spaces’. However, the reality is that so-called cyber-crimes are not detached from the material world and rely on human action for offending and victimisation (Bakken & Harder, 2024; Kaufmann & Mork Lomell, 2025). In distinguishing between virtual and physical spaces, cybercriminology ignores the uninterrupted continuum and intimate entwining of offline and online experiences in everyday life.
Contrary to cybercriminology, Brown (2006, p. 236) proposes a techno-social approach, arguing that the distinctions between real and virtual are illusory: ‘there is quite simply no such thing as a “technological” crime (such as a “cyber crime”) as distinct from an “embodied” crime’. A techno-social approach recognises that crimes and criminal justice issues are constructed by surrounding societal, cultural and political pressures to the same extent that they are constructed by technologies (Leman-Langlois, 2008). Digital criminology has evolved from techno-social contexts and interdisciplinary theories including Castells’s (2010) conceptualisations of the network society and information age, with his assertion that society cannot be understood without reference to its technological toolkit. According to sociologist Lupton (2015, p. 2), ‘we now live in a digital society’, requiring a reflective and critical interrogation of technologies in digitalised society in the context of power structures and barriers to equality. In this digital society, technologies are so enmeshed in our everyday existence that they are barely visible or noticeable (Lash, 2002), yet ‘actively constitute selfhood, embodiment, social life, social relations and social institutions’ (Lupton, 2015, p. 2). This raises the concept of citizens as digital subjects (Krasmann, 2017), recognising the integration of our online and offline realities. Criminology as a discipline and body of knowledge has developed a digital focus to investigate ‘the multifaceted role performed by digital technologies as intersectional and transformative mediums in the crime and justice field’ (Smith et al., 2017, p. 259). That is, there is an imperative to understand the affordances (Wood et al., 2022), limitations and interactions of technologies in the specific context of criminal justice.
Digital technologies are ubiquitous across all criminal justice institutions and processes as well as in criminality and victimisation, giving rise to ‘digital criminology’, defined by Smith et al. (2017, p. 263) as:
a criminology that concerns itself conceptually, methodologically and empirically with the task of understanding how digital devices/data are mediating experiences, impressions and processes.
The descriptor, digital, has been adopted as a multi-dimensional means to encompass ongoing technological innovation (Powell et al., 2018). However, this assertion has been challenged by the current rise of Artificial Intelligence (Schuilenburg & Peeters, 2020) and the forecast move from digital technologies towards quantum computing. Of course, it is not ‘a technology’s use of binary electronic signals to process information that matters’, it is the technology’s capacity to intensify or alleviate harms that is important (Mitchell et al., 2022, p. 664). Moreover, focusing solely on digitality ignores the confluence of digital, analogue and emergent technologies (Wood et al., 2022). Moreover, ‘technologies’ can be understood from various perspectives: as technical artefacts or objects, facilitators and mediators (Mitchell et al., 2022), as well as philosophically according to Martin Heidegger (1977), Donna Haraway (1987) and Don Ihde (1990), amongst many others.
Recognising the digital turn in criminology, Smith et al. (2017) argue that criminologists need to respond to the role of digital technologies in criminality and crime control as well as their applications in criminal justice agencies, institutions, legal practice and by publics. This digital turn can be even more finely tuned. For instance, Ellis (2023) proposes a ‘digiqueer criminology’ to address the intersection of technologies, the digital media ecosystem and the inequalities experienced by LGBTQ+ populations.

Technologies and Harms

Digital criminology provides a means to critique technologies and resist hegemonic techno-solutionist and managerialist agendas that optimistically assume that technologies necessarily act as a panacea to solve social problems without attending to potential new or extended harms (Berg, 2022; Morozov, 2013; Pink, 2022; Wood, 2025). Rather than assuming that new technologies democratise systems and institutions to enhance participation, Madianou (2019, p. 2) observes that technologies are intrinsic to the exercise of control by key stakeholders, and have the potential to skew asymmetrical power relations, particularly when entrepreneurial, multinational, private companies are involved. This connects with the digital divide, mentioned in Chapter ‘Introducing Digital Criminal Justice’, and the uneven distribution of technologies resulting in pronounced social inequities and barriers.
The theory of digital criminology offers connections with harms-based approaches or zemiology, organised around the concept of social harm (Hillyard & Tombs, 2007), human-technological interactions and the cumulative, unintended harms. Whereas criminology focuses on the technology-crime nexus, zemiology places emphasis on social harms that are not necessarily criminalised—the ‘technology-harm nexus’ according to Wood (2025, p. 10; see also Van Brakel & Govaerts, 2024). Technologies are neither intrinsically good nor bad, but rather positioned as a ‘neutral good’ dependant on their application, social context, management and power relations (Halford & Savage, 2010, p. 940; Donoghue, 2017).

The Use of Digital Criminology

While recognising some conceptual limitations and contrasting emphases, I adopt the approach of Powell et al. (2018, p. 31) who propose a digital criminology as a form of critical criminology and as a theory that takes ‘as its central focus the intersections of technologies and social harms, as well as a broader concern with justice and injustice’. Applying this to my specific project, digital criminology provides a framework for evaluating remote communication technologies, how they configure, manage and redefine digital, analogue and hybrid criminal justice environments and processes, generate human and nonhuman interactions and mediate the legal experiences of vulnerable individuals. Digital criminology acknowledges how technologies shape, reproduce and represent power relations and institutional processes in the criminal justice sector. It recognises our growing technological dependency and the embedding of technologies in critical infrastructure of criminal justice, leading to the networked connection between justice agencies to form a justice matrix (McKay, 2018) or digital ecosystem, ecology or entanglement (Turnbull et al., 2023). In this way, digital criminology can facilitate the interrogation of managerialist concerns of efficiency and rationalisation, securitisation and risk, and the role of private corporations (such as multinational videoconferencing vendors) in essential public services (Kaufmann & Mork Lomell, 2025). Through a digital criminological framework, this study examines how digitalisation transforms, ameliorates or exacerbates core criminological concerns of social justice, equality/inequality, access/barriers to justice and power/vulnerability.

Vulnerability Theory

The next conceptual point of reference is that of vulnerability, a contested concept yet one of great significance given that vulnerable individuals are disproportionately affected by criminal justice, as well as by civil proceedings such as guardianship, child protection, immigration detention and mental health tribunals. Here I focus on theoretically derived understandings that demonstrate how the concept of vulnerability is fluid and fraught. While Chapter ‘What Is Vulnerability in Criminal Justice?’ will explain legally derived perspectives on vulnerability, Chapters ‘Remote Vulnerable Witnesses, Complainants and Victims’ and ‘Remote Vulnerable Defendants’ show how judicial officers and legal professionals often have understandings of vulnerability that exceed strict legal definitions.
The starting point within a justice or legal needs context (Newman et al., 2021) is Martha Fineman’s analysis of the vulnerable legal subject. Human vulnerability is ‘universal, constant, and complex’ and also unique to our own physical, economic and institutional relationships and thus experienced individually (Fineman, 2010, pp. 268–9). She differentiates between ‘vulnerable population’, that has a stigmatising ‘air of victimhood, deprivation, dependency, or pathology attached to it’, from her use of ‘vulnerable detached from any specific subgroups’ (Fineman, 2010, p. 266). While the law aspires to treat individuals equally, Fineman (2010) argues that aspiration does not account for the hard fact that not all people are equal, whether that be on the basis of wealth, health, education, employment, social status, housing, race, gender and general life opportunities, amongst many other variables. In her analysis, Fineman raises the tensions between vulnerability, equality, dependency and the ascendent, yet hypothetical, concept of individual autonomy that both underscores legal responsibly and, simultaneously, resists state interference or support.
Vulnerability relates to our fragile corporeality, but it is not limited to bodily harms and Fineman observes that vulnerability can arise from, or be compounded by, institutions and webs of relationships. She posits that vulnerability is ‘the characteristic that positions us in relation to each other as human beings and also suggests a relationship of responsibility between state and individual’ (2010, p. 255). Vulnerability provides a compelling means to understand inequality and the state’s obligation to respond and protect its citizens, and to ensure the even distribution of opportunities and services from societal institutions. That is, with the recognition of profound inequalities and systemic disadvantage in society, Fineman’s vulnerability necessitates social, institutional and state responsibilities to ‘mediate, compensate, and lessen our vulnerability through programs, institutions, and structures’ and ‘to ensure meaningful equality of opportunity and access’ (Fineman, 2010, p. 269). In the present study, this highlights state responsibilities to provide equitable and meaningful access to justice.
The counterpoint to vulnerability is not invulnerability, which would be impossible, but rather resilience (Newman et al., 2021), that is, the capacity to withstand or overcome adversity. This can be achieved by the state providing resources that build capabilities in vulnerable subjects (Creutzfeldt et al., 2024). Resilience can be addressed through legal protections including ‘law and policy that position vulnerability as the organizing principle and seek to alleviate’ harmful implications (Fineman, 2010, p. 268). Fineman’s specific conceptualisation of vulnerability resonates with my focus on digitalised criminal justice institutions, and how related law and procedure need to ameliorate and compensate for vulnerability, support capabilities and ensure equality of access and opportunity.
There are many scholars who engage with vulnerability theory because ‘vulnerability is a possible effect of any criminal justice’ encounter (Bartkowiak-Théron & Asquith, 2017, p. 285; Fairclough, 2023). Gudjonsson (2010, p. 166) seeks a ‘generic definition’ of ‘psychological vulnerabilities’ applicable to vulnerable witnesses, victims and suspects in police interviews, finding it includes ‘psychological characteristics or mental state which render a witness prone, in certain circumstances, to providing information which is inaccurate, unreliable or misleading’. Gudjonsson (2010, p. 167) also engages with ‘legal competencies constructs’ related to an individual’s functional abilities and capacities. Understanding and identifying these issues is important in recognising how vulnerable individuals may be at a disadvantage when trying to cope with the demands and stresses of the criminal justice system including their abilities to comprehend, make informed decisions and articulate accurate information. Luna (2009) and Ranchordas and Beck (2025) recognise the cumulative, multi-layered aspects and cascading impacts of vulnerability, while eschewing the stigmatising labelling of entire populations as vulnerable.
The Australian case of Anunga v R (1976) establishes the significance of recognising the vulnerabilities of suspects during police interviews (Tudor-Owen et al., 2023) and there is considerable literature regarding vulnerable suspects in police custody (Skinns et al., 2024). In the context of suspects in police detention and citing Brown (2015), Dehaghani (2020, p. 255) states that vulnerability has tended to focus on individual considerations—or ‘deficits’—including innate or ‘natural’ ‘physical and/or personal factors such as childhood, old age, disability, sensory impairment and mental health problems’ as well as more transitory states such as pregnancy. That is, vulnerability is often framed through ‘deficit discourse’, as compared with a strength-based discourse (Fogarty et al., 2018). There are also situational factors or ‘social, economic and living conditions’ (Vironkannas et al., 2020, p. 5) that frame a person’s engagement with criminal procedure. One problem in considering situational factors is that they can suggest a level of perceived rational choice, individual weakness and thereby delineate between the deserving and undeserving (Brown, 2015; Dehaghani, 2020). Situational vulnerability includes experiences of the criminal justice system and incarceration, vulnerabilities that are often overlooked by justice agencies’ guidances (Brown et al., 2017; Fairclough et al., 2023; Tudor-Owen et al., 2023). Moreover, there are the broad environmental and socio-economic conditions, processes and institutions that produce and perpetuate vulnerability, requiring the recognition of the multi-dimensional ‘temporal, situational, relational and structural nature of vulnerability’ (Vironkannas et al., 2020, p. 19). Dehaghani argues for a holistic examination of vulnerability, namely, an approach that accounts for situational as well as individual factors within Fineman’s proposition of vulnerability as an inherent human condition. That is, we first accept that all ‘human beings … are universally susceptible to harm, injury and dependency’ and our ‘strength, weaknesses and abilities’ are relevant to individual resilience when we interact with the world and institutions (Dehaghani, 2020, p. 256). So, rather than focusing on individual vulnerabilities or deficits, the focus ought to be on the state’s responsiveness and how interactions and institutions deplete or support resilience. For example, resilience is supported by access to legal aid, but resilience is depleted by the law that is ‘complicated, alien and often impenetrable’ (Dehaghani, 2020, p. 262).
While Dehaghani applies this approach to the specific context of police detention, her approach can be applied more broadly to how criminal procedures and criminal justice interactions, environments and technologies reduce or support resilience. For instance, we shall see later how the resilience of vulnerable witnesses during a criminal trial might be built through special measures that can be considered ‘assets’ of support (Fairclough, 2023, p. 5) including remote witness facilities. Love (2019) argues for Fineman’s conceptualisation of vulnerability to be an organising principle in criminal procedure, that is, a basis for building witness resilience and encouraging meaningful participation so that their testimony contributes coherently to the fact-finding exercise. Bringing vulnerability theory into criminal procedure recognises witnesses as ‘vulnerable subjects’ and draws attention to the state’s responsibility to provide effective access to justice (Love, 2019, p. 2). In this way, criminal procedure and ‘the rules of evidence have the potential to mobilize knowledge from vulnerable witnesses, ensuring participation and encouraging resilience’ (Love, 2019, p. 18; see also Cossins, 2020).
Conversely, we shall see later how the resilience of remote individuals might, in some circumstances, be drained by their physical isolation from their lawyer and the court, impeding their participation. For instance, Pivaty (2021), in examining vulnerable child suspects, finds that certain criminal procedures deplete the resilience of child suspects and simultaneously deepen the inequalities they face before the justice system. This is due to the coercive and traumatic experiences of arrest, police custody and interrogation, as well as the failures of the justice system to provide adequate safeguards that are specifically relevant for vulnerable child suspects. While Pivaty finds that their resilience may be enhanced through access to legal assistance and the support of a ‘trusted person’, she also questions the efficacy and sufficiency of these measures. That is, the basic provision of these measures legitimises the coercive criminal procedures applied to children. Other studies point to further considerations for vulnerable suspects and defendants. In Australia, Hughes et al. (2022) argue that vulnerable, over-policed and over-incarcerated groups are over-represented in bail hearings with vulnerabilities arising from the impacts of colonisation, inter-generational trauma and systemic oppression. They examine the multiple and intersecting vulnerabilities of bail applicants and how those vulnerabilities compound their interactions with the criminal justice system and lead to poorer justice outcomes.
Vulnerability, as a concept, has recognised limitations. Although vulnerability is much utilised, it remains nebulous, poorly examined and fetishized. The term can be interpreted as normative, pathologising, paternalistic, condescending and disempowering, and its overuse has led to it becoming meaningless and ineffectual. It can stereotype whole populations who are perceived as weak, deficient and lacking agency and power, while not necessarily protecting them against harms. What exactly makes individuals vulnerable is objectively unclear and highly contextual, and focusing on individual incapacities deflects attention from the structural forces that generate and reproduce vulnerabilities (Bartkowiak-Théron & Asquith, 2017; Brown et al., 2017; Dehaghani, 2020; Dehaghani et al., 2024; Fairclough, 2023; Levine et al., 2004; Luna, 2009; Pivaty, 2021; Travers et al., 2020; van den Hoonaard, 2020; Vironkannas et al., 2020). Focusing on external and objective measures of vulnerability can reduce an individual to a series of risk factors (Dunn et al., 2008). Rather than focusing on vulnerability, Taggart (2024) argues that attention should be placed, instead, on effective participation or, perhaps, ‘communicative participation’ (Duff et al., 2007: 199).
On the other hand, Brown et al. (2017, p. 15) observe that vulnerability studies tend to focus on theoretical debates and call for ‘empirical realities of vulnerability’ that contribute insights from relevant stakeholders including practitioners to address ‘important gaps between theorisations and lived experiences of vulnerability’. Additionally, they argue that the ‘careful deployment of vulnerability may have the potential to assist with theorising that animates dimensions of disadvantage and inequality’. It is certainly an aim of this study and later chapters to contribute empirical realities of vulnerability from judicial officers, lawyers and criminal justice professionals. Thus, while it is recognised that vulnerability is contextual and perhaps deficient, it still provides a useful framework for understanding disadvantage and inequality in this study’s examination of digitalised legal practice, process and policy (Carney, 2018) and the social injustices or harms that can result (Gilson, 2016). This study focuses on populations who ‘face persistent conditions of vulnerability’ (Tsatsou, 2022, p. 1) including people-in-prison with their ‘imported vulnerability’ or ‘life baggage’ (Goyes, 2024, p. 601; Liebling, 1992), as well as those people whose multi-layered vulnerabilities might evolve and vary throughout the criminal process, such as vulnerable complainants (Mergaerts & Dehaghani, 2020). The careful deployment of vulnerability theory forces an awareness and triage of those persons who genuinely need additional resources to support their resilience, effective participation, communication needs and comprehension (McKay & Macintosh, 2024).

Towards a Framework of Digital Vulnerability

Let us now move to this book’s melding of vulnerability theory with digital criminology to contribute to understandings of digital vulnerability. While digital vulnerability has already been applied in certain criminal justice contexts, as detailed below, instead of merely applying the prefix digital to vulnerability, my conceptualisation draws explicitly from the core foundations of digital criminology. It focuses on the techno-social aspects of digital society, the ubiquity and ‘centrality of digital technologies in modern political and social life’, and the emergence of unintended consequences, inequalities and harms (Powell et al., 2018, p. 3). That is, my use of the term, digital vulnerability, builds on the conceptual, methodological and empirical concerns of digital criminology (Smith et al., 2017) to understand how the digitalisation of criminal procedure positively and negatively impacts and mediates the interactions with vulnerable persons and, indeed, generates new human-technology interactions (Kellmeyer, 2019). Being directly informed by digital criminology enables the theoretical analysis to capture a nuanced understanding of the transformations brought about by digitalisation in criminal courts, justice agencies, procedural protections and legal practice.
Moreover, the merger of digital criminology with vulnerability theory gives rise to digital vulnerability as a framework for asking: what new social solutions or harms arise when vulnerable people use remote communication technologies to access justice? In what ways do these technologies support or deplete resilience in criminal procedure? Do technologies replicate, exaggerate or alleviate existing inequalities? Are individuals made more or less vulnerable by these technologies? Techno-solutionism is necessarily both embraced and resisted, depending on the vulnerable person’s circumstances and whether the technologies operate to enable access to justice—or generate barriers to justice.
As a starting point, although in the context of ICT, Ransbotham et al. (2016, p. 1) define digital vulnerability as ‘susceptibility to harm that stems from the use of digital technologies’. In the context of European private law, Liu (2023) defines the concept as vulnerability caused by digital technologies with the concept interrogating the risks, harms, disruptions of technologies and how special legal protections might assist in addressing vulnerabilities and inequalities. Regarding vulnerable people in administrative law, Creutzfeldt et al. (2024, p. 150) propose ‘the lens of digital legal consciousness’ that captures the intersection of digital and legal capabilities.
There are limited extant applications of digital vulnerability in criminal justice scholarship. Betts and Spenser (2017) make reference to digital vulnerability in their examination of young people’s experiences of digital technology and cyberbullying, but their application is limited to the risks of online interactions and victimisation (see also Carcelén-García et al., 2023). Vargas et al. (2019) provide a useful and compelling conceptualisation of digital vulnerability to understand the impacts of technology in producing unequal exposure to data breaches by government agencies. Their article applies digital vulnerability as a framework to understand how electronic or digital contact with the criminal justice system may generate unequal risks of harm within the specific context of having incriminating information publicly released. While their focus is on 911 emergency calls in the US, they propose that the concept of digital vulnerability can be applied to other technologies in criminal justice for identifying hidden ‘inequalities rooted in technology’ (Vargas et al., 2019, p. 72). They build on Fineman’s conceptualisation of vulnerability to propose that digital vulnerability ‘extends prior research by emphasizing that citizen vulnerability occurs not only physically during police stops on the streets or trials in county courts, but also digitally across cyberspace and radio waves’ (2019, p. 74). The authors offer insights into how technological advances can have ‘detrimental and often unintended consequences for citizens’ including ‘producing new forms of digital racial inequalities’ (2019, p. 72). In the context of suspects and defendants, Rice and Skinns’s blog (2021, n.p.) suggests that they should all be treated as ‘digitally vulnerable’ in the face of technologically mediated criminal procedure, requiring attention to be paid to protections and adjustments aimed at ensuring fairness and equality. Finally, Ranchordas and Beck (2025) touch upon the rise of e-courts and digitalised criminal procedure as generating new vulnerabilities and exacerbating pre-existing vulnerabilities relating to individuals’ communication needs. I build on these earlier engagements with digital vulnerability to conceptualise it in the specific context of remote communication technologies in criminal courtrooms and practice.

Conclusion: A New Imagining of Digital Vulnerability

In my coupling of digital criminology with vulnerability theory, I aim to contribute to extant theoretical understandings of digital vulnerability by, firstly, overtly drawing on digital criminology’s attentiveness to techno-sociality and, secondly, by folding-in vulnerability theory’s notion of resilience. This chapter has sought to chart these two frameworks separately and then, like a Venn diagram, identify their intersecting, overlapping or complementary elements to present a new imagining of digital vulnerability.
Digital vulnerability is used here to understand the interplay between digital communication technologies and vulnerable individuals in the digitalised criminal justice. It recognises the enmeshment of technologies in everyday life that necessarily flow into contemporary criminal justice agencies and institutions and that, thereby, transform interactions with vulnerable individuals. As a conceptual framework, digital vulnerability captures the convergence of digital communication technologies and vulnerability with criminal procedure. It highlights the fundamental role of technologies in shaping ‘social, political, and technological processes’ of institutional order and power relations (Madianou, 2019, p. 3). Furthermore, with this framework, we can understand how ‘innovation is linked to experimentation and risk-taking which is particularly problematic when applied to vulnerable populations’ (Madianou, 2019, p. 3). Beyond entrenched social inequalities, it is widely recognised that, even in developed nations, there is ‘digital social inequality’ (Halford & Savage, 2010, p. 938) and ‘unequal technosocial relations’ (Powell et al., 2018, p. 10) meaning a lack of parity in access to internet, suitable devices and skills due to socio-economic, age, gender, social marginalisation and racial reasons. There is a need for ‘digital social inclusion’ that allows populations to access the transactional and relational benefits of the digital realm for myriad purposes (Powell et al., 2018, p. 29) including access to courts and lawyers, while minimising risk and emphasising dignity.
Here the concept of digital vulnerability is applied to the content analysis and empirical data (Chapters ‘Remote Vulnerable Witnesses, Complainants and Victims’, ‘Remote Vulnerable Defendants’ and ‘Future Visions of Digitalised Criminal Justice’) to reveal how technologies may build or deplete the resilience of vulnerable witnesses and defendants. Through this analysis, I seek to push the boundaries in terms of the conceptualisation of digital vulnerability. As a tool for empirical analysis, the concept assists in identifying how vulnerabilities may be ameliorated by technologies, that is, techniques of mitigation that support resilience and enable access to justice, effective participation, engagement, comprehension and dignity. Simultaneously, the concept assists in unveiling the compounding of existing harms, potential new harms and unintended consequences and inequalities wrought by technologies: techniques of intensification. These harms might include barriers to justice and the amplification of asymmetrical power relationships from disconnection with human processes, unmet communication needs, lack of autonomy and control: techniques that drain resilience and exacerbate vulnerabilities. What we will see is how these tensions can often push and pull in opposing directions so that what might be a beneficial mechanism of support to one vulnerable individual in criminal procedure might disadvantage another vulnerable individual. This polarising analysis seeks to prompt greater awareness of the diverse and uneven impacts of digitalisation, and encourage courts and lawyers to account for the risks of digitalisation. New technologies need to be designed and implemented responsibly, ethically and inclusively, and abide by the imperative of ‘Do No Harm’ (Australian Red Cross, 2024, n.p.).
This model of digital vulnerability is positioned as specifically relevant to processes of digitalisation in the justice system that necessitate theorists to respond empirically, conceptually and epistemologically to the role of digital technologies in criminality, control, courts and punishment. It provides a means to understand the intersection between the individual, structural and systemic vulnerabilities of individuals and social inequalities, on one hand, with the use of remote communication technologies, on the other hand. The concept engages with how the human aspects of communication in digitalised procedure may be enhanced or compromised; how some technologies might build capacity and overcome disadvantage or, alternatively, produce and reproduce inequality. These themes are woven throughout the book and the final chapter will engage with the need to ground processes of digitalisation and legal innovation in human values. With this conceptualisation of digital vulnerability, the book aims to provide a critical understanding of, and deep engagement with, vulnerability in the increasingly digitalised legal environment.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits any noncommercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if you modified the licensed material. You do not have permission under this license to share adapted material derived from this chapter or parts of it.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Title
Digital Criminology, Vulnerability Theories and Digital Vulnerability
Author
Carolyn McKay
Copyright Year
2026
DOI
https://doi.org/10.1007/978-3-032-10028-3_2
go back to reference Anunga v R. (1976). 11 ALR 412.
go back to reference Australian Red Cross Humanitech. (2024). Humanity first: A prototype guiding ethical technology development. https://www.humanitech.org.au/humanity-first/
go back to reference Bakken, S. A., & Harder, S. K. (2024). Introduction to special issue: Bridging the online–offline divide in criminology. International Criminal Justice Review, 34(3), 177–182. https://doi.org/10.1016/j.chb.2014.06.018CrossRef
go back to reference Bartkowiak-Théron, I., & Asquith, N. L. (2017). Conceptual divides and practice synergies in law enforcement and public health: Some lessons from policing vulnerability in Australia. Policing and Society, 27(3), 276–288. https://doi.org/10.1080/10439463.2016.1216553CrossRef
go back to reference Berg, M. (2022). Digital technography: A methodology for interrogating emerging digital technologies and their futures. Qualitative Inquiry, 28(7), 827–836. https://doi.org/10.1177/107780042210968CrossRef
go back to reference Betts, L. R., & Spenser, K. A. (2017). “People think it’s a harmless joke”: young people’s understanding of the impact of technology, digital vulnerability and cyberbullying in the United Kingdom. Journal of Children and Media, 11(1), 20–35. https://doi.org/10.1080/17482798.2016.1233893CrossRef
go back to reference Brown, K. (2015). Vulnerability and young people: Care and social control in policy and practice. Policy Press.CrossRef
go back to reference Brown, K., Ecclestone, K., & Emmel, N. (2017). The many faces of vulnerability. Social Policy and Society, 16(3), 497–510. https://doi.org/10.1017/S1474746416000610CrossRef
go back to reference Brown, S. (2006). The criminology of hybrids: Rethinking crime and law in Technosocial networks. Theoretical Criminology, 10(2), 223–244. https://doi.org/10.1177/1362480606063140CrossRef
go back to reference Carcelén-García, S., Narros-González, M. J., & Galmes-Cerezo, M. (2023). Digital vulnerability in young people: gender, age and online participation patterns. International Journal of Adolescence and Youth, 28(1), 811–830. https://doi.org/10.1080/02673843.2023.2287115CrossRef
go back to reference Carney, T. (2018). Vulnerability: False hope for vulnerable social security clients. University of New South Wales Law Journal, 41(3), 783–817. https://doi.org/10.53637/SJAL7506CrossRef
go back to reference Castells, M. (2010). The rise of the network society. Wiley-Blackwell.
go back to reference Cossins, A. (2020). Achieving best evidence for vulnerable witnesses: The use of trauma-informed theory to reform the sexual assault trial. In Closing the justice gap for adult and child sexual assault (pp. 533–576). Palgrave Macmillan. https://doi.org/10.1057/978-1-137-32051-3_11CrossRef
go back to reference Creutzfeldt, N., Kyprianides, A., Bradford, B., & Jackson, J. (2024). Access to justice, Digitalization and Vulnerability: Exploring Trust in Justice. Bristol University Press.CrossRef
go back to reference Dehaghani, R. (2020). Interrogating vulnerability: Reframing the vulnerable suspect in police custody. Social and Legal Studies, 30(2), 251–271. https://doi.org/10.1177/0964663920921921CrossRef
go back to reference Dehaghani, R., Fairclough, S., & Pierpoint, H. (2024). The vulnerable accused: Guest editorial. Criminal Law Review, 9, 587–589.
go back to reference Donoghue, J. (2017). The rise of digital justice: Courtroom technology, public participation and access to justice. The Modern Law Review, 80(6), 995–1025. https://doi.org/10.1111/1468-2230.12300CrossRef
go back to reference Duff, A., Farmer, L., Marshall, S., & Tadros, V. (Eds.). (2007). The trial on trial: Volume 3: Towards a normative theory of the criminal trial. Hart Publishing, Bloomsbury Collections.
go back to reference Dunn, M. C., Clare, I. C. H., & Holland, A. J. (2008). To empower or to protect? Constructing the ‘vulnerable adult’ in English law and public policy. Legal Studies, 28(2), 234–253. https://doi.org/10.1111/j.1748-121X.2008.00085.xCrossRef
go back to reference Ellis, J. (2023). Representation, resistance and the Digiqueer: Fighting for recognition in technocratic times. Policy Press.CrossRef
go back to reference Fairclough, S. (2023). Resilience-building in adversarial trials: Witnesses, special measures and the principle of orality. Social & Legal Studies, 33(4), 643–667. https://doi.org/10.1177/09646639231201913CrossRef
go back to reference Fairclough, S., Mergaerts, L., & Dehaghani, R. (2023). Introduction: The vulnerable accused in the criminal justice system. In R. Dehaghani, S. Fairclough, & L. Mergaerts (Eds.), Vulnerability, the accused, and the criminal justice system multi-jurisdictional perspectives (pp. 1–18). Routledge.
go back to reference Fineman, M. (2010). The vulnerable subject and the responsive state. Emory Law Journal, 60(2), 251–276.
go back to reference Fogarty, W., Lovell, M., Lagenberg, J., & Heron, M.-J. (2018). Deficit discourse and strengths-based approaches: Changing the narrative of aboriginal and Torres Strait islander health and wellbeing. The Lowitja Institute.
go back to reference Gilson, E. (2016). The perils and privileges of vulnerability: Intersectionality, relationality, and the injustices of the US prison nation. Philosophia, 6(1), 43–59. https://doi.org/10.1353/phi.2016.0011CrossRef
go back to reference Goyes, D. R. (2024). Trauma and imported vulnerability in prison suicides. Punishment & Society, 0(0). https://doi.org/10.1177/14624745241295499
go back to reference Gudjonsson, G. H. (2010). Psychological vulnerabilities during police interviews. Why are they important? Legal and Criminological Psychology, 15(2), 161–175. https://doi.org/10.1348/135532510X500064CrossRef
go back to reference Halford, S., & Savage, M. (2010). Reconceptualizing digital social inequality. Information, Communication & Society, 13(7), 937–955. https://doi.org/10.1080/1369118X.2010.499956CrossRef
go back to reference Haraway, D. (1987). A manifesto for cyborgs: Science, technology, and socialist feminism in the 1980s. Australian Feminist Studies, 2(4), 1–42.CrossRef
go back to reference Heidegger, M. (1977). The question concerning technology and other essays (Paperback ed.). Harper & Row.
go back to reference Hillyard, P., & Tombs, S. (2007). From ‘crime’ to social harm? Crime. Law and Social Change, 48(1–2), 9–25. https://doi.org/10.1007/s10611-007-9079-zCrossRef
go back to reference Holt, T. J., & Bossler, A. M. (2016). Cybercrime in Progress: Theory and prevention of technology-enabled offenses. Routledge.
go back to reference Hughes, D., Colvin, E., & Bartkowiak-Théron, I. (2022). Police and vulnerability in bail decisions. International Journal for Crime, Justice and Social Democracy, 11(3), 122–138. https://doi.org/10.5204/ijcjsd.1905CrossRef
go back to reference Ihde, D. (1990). Technology and the lifeworld: from garden to earth. Indiana University Press.CrossRef
go back to reference Jaishankar, K. (Ed.). (2011). Cyber criminology: Exploring internet crimes and criminal behavior. Taylor and Francis Group.
go back to reference Kaufmann, M., & Mork Lomell, H. M. (Eds.). (2025). De Gruyter handbook of digital criminology. De Gruyter.
go back to reference Kellmeyer, P. (2019). Digital vulnerability: A new challenge in the age of super-convergent technologies. Bioethica Forum, 12(1/2), 60–62. https://doi.org/10.24894/BF.2019.12015CrossRef
go back to reference Krasmann, S. (2017). Imagining Foucault. On the digital subject and “visual citizenship”. Foucault Studies, 23, 10–26. https://doi.org/10.22439/fs.v0i0.5339CrossRef
go back to reference Krohn, M. D. (2018). Foreword. In K. F. Steinmetz & M. R. Nobles (Eds.), Technocrime and criminological theory (pp. xiv–xvi). Routledge.
go back to reference Lash, S. (2002). Critique of information. Sage.CrossRef
go back to reference Leman-Langlois, S. (Ed.). (2008). Technocrime: Technology, crime and social control. Willan.
go back to reference Levine, C., Faden, R., Grady, C., Hammerschmidt, D., Eckenwiler, L., & Sugarman, J. (2004). The limitations of ‘vulnerability’ as protection for human research participants. American Journal of Bioethics, 4(3), 44–49. https://doi.org/10.1080/15265160490497083CrossRef
go back to reference Liebling, A. (1992). Suicides in prison. Routledge.
go back to reference Liu, M. (2023). Conference on ‘digital vulnerability in European private law’ at the University of Ferrara on 15 and 16 June 2023. European Review of Private Law, 31(4), 895–910. https://doi.org/10.54648/erpl2023037CrossRef
go back to reference Love, H. (2019). The vulnerable subject on trial: Addressing testimonial injustice in the rules of evidence. Elder Law Review, 12, 1–18.
go back to reference Luna, F. (2009). Elucidating the concept of vulnerability: layers not labels. International Journal of Feminist Approaches to Bioethics, 2(1), 121–139.CrossRef
go back to reference Lupton, D. (2015). Digital Sociology. Routledge.
go back to reference Madianou, M. (2019). Technocolonialism: Digital innovation and data practices in the humanitarian response to refugee crises. Social Media + Society, 5(3). https://doi.org/10.1177/2056305119863146
go back to reference Marganski, A. J. (2018). Feminist theory and technocrime: Examining online harassment, stalking, and gender violence in contemporary society. In K. F. Steinmetz & M. R. Nobles (Eds.), Technocrime and criminological theory (pp. 11–34). Routledge.
go back to reference McKay, C. (2018). The pixelated prisoner: Prison video links, court ‘appearance’ and the justice matrix. Routledge.CrossRef
go back to reference McKay, C., & Macintosh, K. (2024). Digital vulnerability: People-in-prison, videoconferencing and the digital criminal justice system. Journal of Criminology, 57(3), 313–333. https://doi.org/10.1177/26338076231217794CrossRef
go back to reference Mergaerts, L., & Dehaghani, R. (2020). Protecting vulnerable suspects in police investigations in Europe: Lessons learned from England and Wales and Belgium. New Journal of European Criminal Law, 11(3), 313–334. https://doi.org/10.1177/2032284420943299CrossRef
go back to reference Mitchell, M., Wood, J., O’Neill, T., Wood, M., Pervan, F., Anderson, B., & Arpke-Wales, W. (2022). Technology-facilitated violence: A conceptual review. Criminology & Criminal Justice, 25(2), 649–669. https://doi.org/10.1177/17488958221140549CrossRef
go back to reference Morozov, E. (2013). To save everything, click here: Technology, solutionism, and the urge to fix problems that Don’t exist. Penguin Books.
go back to reference Newman, D., Mant, J., & Gordon, F. (2021). Vulnerability, legal need and technology in England and Wales. International Journal of Discrimination and the Law, 21(3), 230–253. https://doi.org/10.1177/13582291211031375CrossRef
go back to reference Pink, S. (2022). Methods for researching automated futures. Qualitative Inquiry, 28(7), 1–7. https://doi.org/10.1177/10778004221096845CrossRef
go back to reference Pivaty, A. (2021). Kinderen en buitengerechtelijke afdoeningen in het strafrecht. Mogelijke gevolgen voor kwetsbaarheid [Children and out-of-court disposals in criminal law. Possible consequences for vulnerability]. Tijdschrift Voor Familie-en Jeugdrecht, 43(10), 244–251.
go back to reference Powell, A., Stratton, G., & Cameron, R. (2018). Digital criminology: Crime and justice in digital society. Routledge.CrossRef
go back to reference Ranchordas, S., & Beck, M. (2025). Vulnerability. In M. Kaufmann & H. M. Lomell (Eds.), Handbook of digital criminology. De Gruyter. https://doi.org/10.2139/ssrn.4596689CrossRef
go back to reference Ransbotham, S., Fichman, R. G., Gopal, R., & Gupta, A. (2016). Special section introduction—ubiquitous IT and digital vulnerabilities. Information Systems Research, 27(4), 834–847. https://doi.org/10.1287/isre.2016.0683CrossRef
go back to reference Schuilenburg, M., & Peeters, R. (Eds.). (2020). The algorithmic society: Technology, power, and knowledge. Routledge.
go back to reference Skinns, L., Wooff, A., & Rice, L. (2024). ‘Come on mate, let’s make you a cup of tea’: Theorising materiality and its impacts on detainee dignity inside police detention. Theoretical Criminology, 28(2), 175–194. https://doi.org/10.1177/13624806231184827CrossRef
go back to reference Smith, G. J. D., Bennett Moses, L., & Chan, J. (2017). The challenges of doing criminology in the big data era: Towards a digital and data-driven approach. British Journal of Criminology, 57(2), 259–274. https://doi.org/10.1093/bjc/azw096CrossRef
go back to reference Steinmetz, K. F., & Nobles, M. R. (Eds.). (2018). Technocrime and criminological theory. Routledge.
go back to reference Taggart, J. (2024). The effective participation of suspects in police custody. Criminal Law Review, 9, 590–608.
go back to reference Travers, M., Colvin, E., Bartkowiak-Théron, I., Sarre, R., Day, A., & Bond, C. (2020). Rethinking bail: Court reform or business as usual? Palgrave Macmillan.CrossRef
go back to reference Tsatsou, P. (Ed.). (2022). Vulnerable people and digital inclusion: Theoretical and applied perspectives. Springer Nature.
go back to reference Tudor-Owen, J., van Golde, C., Bull, R., & Gee, D. (2023). Interviewing vulnerable suspects: Safeguarding the process. Routledge.
go back to reference Turnbull, J., Searle, A., Hartman Davies, O., Dodsworth, J., Chasseray-Peraldi, P., von Essen, E., & Anderson-Elliott, H. (2023). Digital ecologies: Materialities, encounters, governance. Progress in Environmental Geography, 2(1–2), 3–32. https://doi.org/10.1177/27539687221145698CrossRef
go back to reference Van Brakel, R., & Govaerts, L. (2024). Exploring the impact of algorithmic policing on social justice: Developing a framework for rhizomatic harm in the pre-crime society. Theoretical Criminology, 0(0). https://doi.org/10.1177/13624806241246267
go back to reference van den Hoonaard, W. C. (2020). “Vulnerability” as a concept captive in its own prison. In R. Iphofen (Ed.), Handbook of research ethics and scientific integrity (pp. 577–588). Springer.CrossRef
go back to reference Vargas, R., Preito-Hodge, K., & Christofferson, J. (2019). Digital vulnerability: The unequal risk of e-contact with the criminal justice system. RSF: The Russell Sage Foundation Journal of the Social Sciences, 5(1), 71–88. https://doi.org/10.7758/rsf.2019.5.1.04CrossRef
go back to reference Vironkannas, E., Liuski, S., & Kuronen, M. (2020). The contested concept of vulnerability: a literature review. European Journal of Social Work, 23(2), 327–339. https://doi.org/10.1080/13691457.2018.1508001CrossRef
go back to reference Wood, M. A. (2025, forthcoming). How technologies harm: A relational approach. Bristol University Press.
go back to reference Wood, M. A., Mitchell, M., Pervan, F., Anderson, B., O’Neill, T., Wood, J., & Arpke-Wales, W. (2022). Inviting, affording, and translating harm: Understanding the role of technological mediation in technology-facilitated violence. British Journal of Criminology, 63(6), 1384–1404. https://doi.org/10.1093/bjc/azac095CrossRef
go back to reference Yar, M. (2018). Toward a cultural criminology of the internet. In K. F. Steinmetz & M. R. Nobles (Eds.), Technocrime and criminological theory (pp. 1–10). Routledge.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH, Ferrari electronic AG/© Ferrari electronic AG