Importance of information technology application to crime analysis 1. Identify and explain three types of technology that are necessary for accurate crime analysis. Technology employed in analyzing crime resembles that employed elsewhere. Analysts utilize desktop computers for carrying out most desk jobs and laptops on the field and when delivering presentations....
Importance of information technology application to crime analysis
1. Identify and explain three types of technology that are necessary for accurate crime analysis.
Technology employed in analyzing crime resembles that employed elsewhere. Analysts utilize desktop computers for carrying out most desk jobs and laptops on the field and when delivering presentations. In several instances, the crime analysis divisions of law enforcement organizations possess an independent server for storing geographical and tabular information, besides software shared among analysts (Chapter 7: Crime Analysis Technology, 2005).
1. Geographic Data System
Such a system develops, houses and organizes geographic information. County and city level organizations generally employ these systems for developing and maintaining information on parcels, avenues, edifices, highways, etc., in addition to storing aerial photos and relevant details useful to utilities, planning and other organizations. Furthermore, these organizations normally glean geographical and tabular information from a third party (e.g., census, typological and demographic data), which is stored together with geographical details about the area. One must bear in mind that criminal analysts don’t gather or maintain information stored by geographic information systems, but instead simply make use of it to aid their analytic activities (Chapter 7: Crime Analysis Technology, 2005).
2. Computer-Aided Dispatch System (CAD)
This is a very specialized system which employs geographic portraits and telecommunication for aiding law enforcement, ambulance and fire department communication and response. The former utilize it for deploying personnel, tracking their actions and location, and monitoring traffic stops and other officer-initiated events. The system records the major part of dispatcher-officer interaction. For analyzing crimes, analysts glean call summary information from these systems which record all calls (together with call duration, time, nature, disposition and time of deployment of personnel to the crime location). A CAD system gathers, houses and enables information download, though normally lacks crime analysis function, which is performed by other technologies (Chapter 7: Crime Analysis Technology, 2005).
3. Records Management System (RMS)
This system is responsible for data entry function and information storage, specifically created for law enforcement organizations. Certain organizations directly log data onto such systems while others employ other applications like the previously mentioned CAD for data download to the system. An ideal RMS comprises of every relevant information the organization possesses. It may be in the form of a combination of distinct databases on detention reports, crime reports, individual details, vehicle details, field data, evidential and property data, accident report, investigative reports and snapshot information and other requests for services. Besides data collection and storage, RMSs help gauge information quality, provide details and retrieve incidents. Akin to CAD systems, a majority of RMSs lack criminal analysis capability; information is downloaded to other programs for analytic purposes (Chapter 7: Crime Analysis Technology, 2005).
2. Identify four or more methods of collecting, storing, and retrieving information needed for crime analysis, using examples to support their importance.
Analysts employ the following four primary general desktop programs for information organization and analysis performance:
1. Spreadsheet Software
Spreadsheets portray data in columns and rows. Such programs enable easy creation and modification of spreadsheets. All cells have distinct values or entries with users able to determine information kind in individual cells (like, string or numeric variables, date or time format, etc.). These programs may offer a narrow collection of functions since they aren’t exactly database programs. For instance, a maximum of 65536 records may be stored in an Excel spreadsheet. Further, crime analysts employ such software to conduct statistical analyses, owing to the various basic statistical functions such software offers. More complex functions offered spreadsheets include macro creation (a macro is a program capable of automatic task execution, including information summarization and report formatting (Chapter 7: Crime Analysis Technology, 2005).
2. Database Management Software
Such programs provide information entry, storage, modification and extraction capability. Examples include RMS and CAD systems, which are utilized for crime analysis-connected information collection and storage. Besides these large-scale systems, analysts employ Microsoft Access and similar small programs as well, for information organization and analysis. Such software aids data entry, recognition of multiple linkages between records, development of automated reports, export option, and provision of superior query instruments vital to crime analysis. Analysts generally download information from large-scale systems to small programs or directly enter them into their desktop programs (Chapter 7: Crime Analysis Technology, 2005).
3. Statistical Software
These programs access information gleaned from database management systems and spreadsheets to aid data entry. Their chief function is information manipulation and statistical computation from millions of records. Certain criminal analysis divisions employ Statistical Analysis Software, StataQuest, Statistical Package for the Social Sciences and similar programs. Analysts requiring complex information analysis and manipulation capabilities unmanageable by other programs may make use of statistical software (Chapter 7: Crime Analysis Technology, 2005).
4. Geographic Information System (GIS) Software
GISs are superior computer tools facilitating tabular and geographical information modification, viewing, analysis and query. Users can effectively view information behind geographical features, integrate a number of features, manipulate maps and information and carry out statistical functions. Such programs are largely employed for information assimilation via geographic variables, information portrayal by means of maps, and spatial relationship analysis. MapInfo and Environmental Systems Research Institute are the most widely employed GISs at present (Chapter 7: Crime Analysis Technology, 2005).
3. Analyze two benefits of crime analysis to the community and two benefits to law enforcement, and why.
Analyzing crime facilitates understanding of local dynamics (individuals, risk factors, etc.) and events. Risk factors like edifices, areas and businesses attracting crime may be determined. GISs may facilitate effective and efficient matching of service demand and supply. Awareness of problem areas aids proactive combating of crime and communication with the community to develop support. Law enforcement crime analysis enhances investigation success by ensuring officials can access a more extensive range of actionable integrated intelligence crucial for crime-solving and enhances evidence handling and report preparation accuracy and pace. Technological advances empowers law enforcement authorities and enables them to engage in more direct community work. Their situational awareness and understanding of ongoing crises increases, and they may be able to adopt crime prevention measures in a timely manner (Fiorenza, 2014).
References
Chapter 7: Crime Analysis Technology. (2005). Retrieved 9 December 2017 from https://uk.sagepub.com/sites/default/files/upm-binaries/6245_Chapter_7_Boba_Final_PDF_4.pdf
Fiorenza, P. (2014, September 18). 7 Benefits of Using Analytics to Fight Crime. Retrieved December 09, 2017, from https://www.govloop.com/7-benefits-using-analytics-fight-crime/
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.