DIGITAL SECURITY TECHNOLOGIES AND THE RECONFIGURATION OF THE CRIME TRIANGLE: EVIDENCE OF THE STRENGTHENING OF THE “CAPABLE GUARDIAN” IN THE CONTEXT OF THE STATE OF TOCANTINS
DOI:
https://doi.org/10.56238/sevened2026.024-002Keywords:
Situational Crime Prevention, Digital Surveillance, Predictive Analysis, Smart Public SecurityAbstract
The increasing complexity of contemporary crime has driven the incorporation of digital technologies as a central strategy in public security, especially in the context of smart cities. In this scenario, the problem arises of understanding how these technologies contribute to the reconfiguration of the conditions that favor the occurrence of crime, in light of the Crime Triangle Theory. Thus, the present study aimed to analyze how security technologies, especially video surveillance systems and digital applications, act in the reconfiguration of the elements of the Crime Triangle in the State of Tocantins. Methodologically, this is a qualitative, descriptive, and exploratory literature review, conducted based on the PRISMA protocol and Bardin’s content analysis. Data collection was carried out in the Scopus, Web of Science, and Google Scholar databases, resulting in a final corpus of 20 analyzed studies. The results show that security technologies predominantly act in strengthening the “capable guardian” through the expansion of surveillance, response capacity, and data integration. It was also observed that collaborative applications contribute to reducing the vulnerability of the “suitable target,” while systems based on artificial intelligence and data analysis increase the perceived risk for the “motivated offender,” albeit indirectly. However, the effectiveness of these technologies depends on factors such as institutional integration, infrastructure, and professional training. It is concluded that security technologies reconfigure the elements of the Crime Triangle, with greater impact on strengthening the guardian, constituting relevant tools for crime prevention, provided they are integrated into institutional strategies and adapted to the local context.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.