¶ … Computers in Solving Non-computer-Based Crime
This proposal for research involves a survey of law enforcement officials to determine how much they use computers as a tool to help solve crimes that are not committed by computer, such as murder and robberies. Using a questionnaire that utilizes a numerical scale for responses with opportunities for written comments as well, it will quantify the results and indicate areas for further research. Since little research has been done in this area, it should be considered a preliminary study.
Law enforcement has traditionally struggled to keep up, technologically, with the criminals they are charged with catching. During Prohibition, gangsters had machine guns and government agents did not. Now, in the year 2002, law enforcement may have a powerful and relatively new tool available to them in the war against crime: computers.
However, an exploration of the literature reveals little if any systematic study about the uses of technology in law enforcement. Isolated articles appear describing what various agencies do, but no one has surveyed government agencies to see if they use computers as a crime-solving tool, and if so, how they use it. No studies have been done regarding whether the use of computer technology is more efficient or less, and under what circumstances they are likely to be an advantage or a liability. There are no formal studies on what agencies use, how they have chosen what they use, whether they think they made a good choice, whether the software supports or hinders their efforts, and whether computers are viewed overall as a useful tool by those charged with solving crime.
This project proposes quantifying how law enforcement agencies use computer technology in the process of solving crimes. It would be a preliminary, or pilot study, and would raise more questions than it answers. In addition, as computer technology evolved, both the questions and the answers will change over time, but only by carefully examining the best role for computers is in crime investigation can law enforcement agencies make informed decisions that improve their efficiency rather than interfering with it.
Significant questions regarding this expensive technology have not been asked. What crimes most benefit from computer-assisted crime solving techniques? What are those techniques, and how do they apply to solving various types of crimes? How expensive is the technology, and is it cost-effective? Do computers make it easier for agencies to share information, or do the formats used by different agencies make it hard to share information? If so, how could those problems be solved?
Since technology is only as good as the people who use it, how do those asked to incorporate computers into their crime-fighting techniques feel about it? Are they allowed to be innovative in their use, setting up data bases as they think will serve them best, or are there departmental formats that must be followed? If an individual investigator can set up his or her own organizational system for him or herself, is that time-efficient, or could the time be better used following more traditional investigative patterns?
Once information regarding a crime has been computerized in some way, does it become rigid, or do investigators ever go back to the original data to look at it in its original form? How does the department protect against the problem of important information being left out, or inaccurate information being entered?
There is no established protocol for any investigative agency to add technology to its crime-solving techniques. It is suspected that individual states and local agencies may be gradually adding technology to their arsenal tools without any specific plan. Systematic research regarding how various agencies have implemented technology as a crime-solving tool could be valuable information for other organizations beginning that process themselves. Systematic study of how to use the potentially powerful computer as efficiently as possible, rather in a random way, would greatly enhance law enforcement efforts to solve serious crimes as quickly and accurately as possible.
SEARCH OF THE LITERATURE
One area that has received attention is in the use of computers to commit crimes. When the computer is the weapon used by criminals to commit a theft (monetary or information), it makes sense to use computers to solve that crime. Many countries have formed task forces to fight computer crime. For instance, Great Britain has formed a National Hi-Tech Crime Unit (ANA, 2001) to combat computer-related crime. These task forces focus on crime committed on the Internet. While important, it represents a small amount of serious crime committed today.
More broadly, white-collar crime has become a serious problem in...
Ted Bundy: All-American Serial Killer When women began disappearing in and around Seattle, Washington in 1974, nobody suspected Theodore Robert "Ted" Bundy would be behind their disappearances. Bundy was, after all, a student at the University of Washington, a political volunteer, and a suicide hotline operator. Again, no one would suspect him of being involved in the disappearances and murders of various women around Salt Lake City, Utah when he attended
Ted Bundy was born Theodore Robert Cowell on November 24, 1946. When he was four years old, Ted's mother moved with her son to Tacoma, Washington and remarried Johnnie Culpepper Bundy. Ted did not get along with his stepfather, although he would frequently babysit for his four half siblings. Throughout his youth, Ted showed signs of poor social skills development and adaptation. As Bell points out, "Ted became increasingly uncomfortable around
Ted Bundy: America’s Most Infamous Serial Killer Abstract While Ted Bundy is neither the most prolific nor the most horrific serial killer in America, he is one of the best known of American serial killers. This essay explores the reasons for Bundy’s infamy. It will explore Bundy’s normal guy persona and how that not only helped him gain his victims’ trust, but also helped foster public fascination with Bundy. Bundy committed crimes
"There are at least four (4) different subtypes -- common, alienated, aggressive, and dyssocial. Commons are characterized mostly by their lack of conscience; the alienated by their inability to love or be loved; aggressives by a consistent sadistic streak; and dyssocials by an ability to abide by gang rules, as long as those rules are the wrong rules" (O'Connor, 2005). Bundy clearly falls into the aggressive category. Describe and explain
Ted Bundy -- Serial Killer Ted Bundy: Serial Killer Theodore Robert Bundy aka Ted Bundy, was born Theodore Robert Cowell to Louise Cowell on November 24, 1946 in Burlington, Vermont at the Elizabeth Lund Home for Unwed Mothers. After spending eight weeks in the home Louise went to her parents house to raise her son in Philadelphia. Ted Bundy, serial killer grew up believing that his mother was his sister and his
Meg Anders, who uses the alias of Elizabeth Kendall in her book entitled The Phantom Prince, provides an insider's look at Bundy's nature, the face he showed to the world and the occasional private tears he shed in her presence. Other books, such as True Crime, published by Time Warner, give an overview of the facts that have already appeared in numerous articles in the press. I do not include
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now