SlideShare a Scribd company logo
1 of 13
HARNESSING THE POWER
OF TECHNOLOGY IN
INSTITUTIONAL CORRECTIONS
BY NANCY LA VIGNE
One researcher reflects on the challenges and opportunities
associated with implementing and evaluating
criminal justice technologies.
A
s criminologists, we are typically well trained in evaluation
methodology but less so in the issues and nuances
associated with technology deployment. When we evaluate
criminal justice technology, we must understand both the
capacity of the technology and how people use it. Focusing on
one at
the expense of the other can render the entire evaluation effort
futile.
We learned that lesson the hard way during an NIJ-funded
evaluation
of the use of radio frequency identification device (RFID)
technology
to reduce sexual assaults and inmate infractions in a women’s
prison.1 Although our evaluation revealed much about the
promise of
RFID technology for monitoring, tracking, and investigating
inmates,
it was seen largely as a failure, because the implementation of
the technology was fraught with problems. (Read more about
the
evaluation at NIJ.gov, keyword: 229196.)
Social science publications often favor studies that yield
statistically significant findings in the expected
direction. But we can arguably learn much more from failure
than from success, and these lessons can help
improve both technology deployment and evaluation
methodologies.
This article offers some lessons learned from our evaluation
about the challenges and opportunities
associated with deploying criminal justice technologies in the
manner most likely to yield their intended
impact. Doing so requires:
• Developing a clear understanding of how you envision that the
technology will work — the logic behind its
implementation and use.
• Educating users about implementation and training
requirements to ensure cultural buy-in and full
deployment — the fidelity piece.
• Engaging in early and ongoing assessment to identify and
correct implementation problems and challenges and
learn how they relate to intended impact — the feedback loop.
http://nij.gov/publications/Pages/publication-
detail.aspx?ncjnumber=229196
2 Harnessing the Power of Technology in Institutional
Corrections
National Institute of Justice | www.NIJ.gov
Although the contextual example for this article is
implementing RFID technology in a women’s prison,
the implications for policy, practice, and evaluation can
apply to a wide array of criminal justice technologies
in a variety of field settings.
RFID in Correctional Settings
RFIDs have a tag or “chip” that uses wireless data
communication to transmit information to electronic
sensors, allowing users to locate and track tagged
objects with a unique identifier.2
RFID technology was first used during World War II
to identify whether approaching planes were friend
or foe. Today, commercial groups commonly use it
to track merchandise from warehouse to distribution
to point of sale.3 RFID technology is also found in
access control and payment systems, such as building
access keycards, transit payment cards, and highway
electronic toll collection systems.
Most RFIDs are “passive,” meaning that the chips
can be read only when in close proximity to a sensor.
For example, community corrections agencies use
passive RFIDs to electronically monitor those on
home detention.
“Active” RFIDs have a battery-operated device
integrated with the chip, enabling the tagged item to
both receive signals and transmit data back to the
sensor in near real time. Active RFIDs have
three components:
• A chip embedded in a bracelet, which is often worn
on the ankle.
• A series of data extension units, which read and
transmit data from the chips.
• Computer software that can document the location
and identity of those wearing the bracelets.4
Institutional correctional settings have been using
active RFIDs for at least a decade5 for things as basic
as perimeter control, as well as more sophisticated
applications, such as issuing alerts when two rival gang
members are in close proximity. RFIDs can aid housing
unit “counts,” identify whether inmates are in the proper
locations (e.g., classroom, yard, housing unit) according
to their schedules, and even monitor inmates’ eating
habits.6 The technology can also serve as a valuable
investigative tool, generating historical data on an
inmate’s location and the time of his or her movements.
The Northeast Pre-Release Center (NEPRC), a
women’s prison in Cleveland, Ohio, that was the
setting of our NIJ-funded evaluation from 2005
through 2007, intended to use RFIDs in all of these
ways. Unfortunately, the implementation of the
technology was filled with problems. Service was
interrupted for several months, staff received minimal
training, bracelets were used inconsistently (at one
point, 25 percent of inmates did not have bracelets),
and NEPRC restricted software use to perimeter
control. The prison never employed the technology’s
most powerful feature: tailored, inmate-specific
exclusionary zones.7
Understanding the Logic
One early flaw in NEPRC’s deployment of RFID
technology was the absence of a well-articulated logic
model. Quite simply, a logic model asks the question,
“How is the technology supposed to work?” Answering
that question thoroughly will increase the odds that
users deploy the technology as intended. In the case
of NEPRC, this would have entailed conversations with
all staff members about the nature, frequency, and
context of their most challenging threats to safety and
security. These conversations should have taken place
well before NEPRC deployed the RFIDs and should
When we evaluate criminal
justice technology, we must
understand both the capacity of
the technology and how people
use it. Focusing on one at the
expense of the other can render
the entire evaluation effort futile.
http://www.NIJ.gov
NIJ Journal / Issue No. 278 May 2017 3
National Institute of Justice | www.NIJ.gov
In the case of the NEPRC RFID evaluation, the prison
— unbeknownst to us, the researchers — had never
fully implemented the technology’s exclusionary
zone features, which, theoretically, would yield the
greatest deterrent effect. Moreover, halfway into the
deployment period, we learned that the system was
inoperable and that, as a result, officers had stopped
equipping new inmates with bracelets.
That these incidents occurred and took several
months for us to discover represents a failure on the
part of all involved parties. The prison should have
been monitoring and documenting the technology’s
usage weekly, if not daily. And we should have
requested that documentation throughout the course
of our evaluation.
Ongoing Assessment
Ongoing assessment and impact evaluation are also
critical. The former allows for midcourse corrections
and relies on the types of fidelity metrics described
above. The latter can help guide decisions about
continued financial investment in the technology and
possible expansion to other facilities.
We have established the value of partnering with a
local researcher prior to deploying the technology.
have included detailed discussions of the technology’s
capabilities and training and operational requirements.
Table 1 presents one example of a simplistic RFID
logic model, which can help identify the main uses of
the RFIDs. It also helps underscore the critical role of
human interaction with the technology. For example,
even if a prison sets appropriate exclusionary zones
and equips 100 percent of its inmates with RFID
bracelets, the technology is unlikely to have an impact
if officers do not respond to system alerts that are
generated when inmates are out of place or in close
proximity to prohibited people.
Monitoring Fidelity
Engaging users in this thinking early on not
only engenders buy-in but also helps guide the
development of performance measures. Performance
measures can help document whether the technology
was implemented as intended. Indeed, implementation
fidelity is the cornerstone of effective technology
deployment. Institutions must train their officers on
how to properly use the technology and must routinely
monitor and hold them accountable.
From a researcher’s perspective, accurate
documentation of the technology’s use is a necessity.
Table 1. RFID Logic Model
Inputs Outputs Outcomes Impacts
Software: Program
perimeter areas and
exclusionary zones
Alerts issued when
inmates are out of place
Greater inmate
compliance with rules
Reduced escapes,
enhanced safety
Hardware: Sensor
installment and
ankle bracelets
Ankle bracelets
on inmates
Increased perception
that infractions and
violations of facility policy
will be detected
Reduced misconduct
Training: Staff responses
to alerts
Swift response to alerts
Increased identification
of misconduct
Reduced misconduct
Training: Use of RFID data
for investigations
New source of evidence
to investigate infractions
and misconduct
Increased apprehension
of inmates, faster
case resolution
Reduced misconduct,
reduced incidence of
false allegations
http://www.NIJ.gov
4 Harnessing the Power of Technology in Institutional
Corrections
National Institute of Justice | www.NIJ.gov
When doing so, corrections administrators would
benefit from securing an agreement that the
researcher is willing to embrace an “action research”
approach rather than the more traditional evaluation
methodology. Traditionally, researchers erect a firm
firewall and do not report back implementation
or impact findings until they have concluded their
evaluation. Action research, by contrast, involves
ongoing analytic support and engagement.
Some purists frown upon action research, saying the
approach creates a Hawthorne effect of sorts, whereby
the researcher’s activities affect the nature of the
intervention. However, researchers with a practical bent
are increasingly embracing action research. Corrections
leaders should demand this time-honored approach
when deciding to team with evaluation partners.
Corrections officials would also benefit from includi ng
a cost-benefit component in their evaluation
partnerships. This component can provide crucial data
to help inform decisions about ongoing investment,
expansion, and sustainability.
Summing It Up
Shortly after the release of our final RFID evaluati on
report, I found myself in the conference room of
a corrections agency in a nearby jurisdiction. The
director objected to our finding that the technology
had no impact when implemented at its most basic
capacity, as was the case at NEPRC, and he launched
into a tirade about our so-called “substandard”
evaluation. I learned later that his agency had just
committed considerable resources to implementing
its own RFID system, and he felt that our evaluation
threatened the wisdom of that investment.
He is not alone. Far too often, we draw erroneous
conclusions about the effectiveness of criminal
justice technologies based on evaluations that yield
no impact. But in this case — and arguably in many
like it — the failure is not in the technology itself but
in the deployment. As Thomas Edison once famously
observed, “Just because something doesn’t do what
you planned it to do doesn’t mean it’s useless.”
When deploying technology, corrections agencies
should gather staff input, train and engage all
users, and routinely monitor and document usage.
Evaluation partners can help collect data and
provide that all-important feedback loop, which can
lead to midcourse corrections aimed at enhancing
implementation fidelity. Following this approach will
prevent false assumptions and increase the odds that
the technology will yield its intended impact.
About the Author
Nancy La Vigne is the director of the Justice Policy
Center at the Urban Institute.
For More Information
Read the final RFID evaluation report, Evaluating the
Use of Radio Frequency Identification Device (RFID)
Technology to Prevent and Investigate Sexual Assaults in
a Correctional Setting, at NIJ.gov, keyword: 229196.
This article discusses the following grant:
• “Evaluating the Use of Radio Frequency Identification
Devices to Prevent and Investigate Sexual Assaults in
Correctional Settings,” grant number 2007-RP-BX-0001.
Notes
1. Nancy G. La Vigne, Robin Halberstadt, and Barbara
Parthasarathy, “Evaluating the Use of Radio Frequency
Identification Device (RFID) Technology to Prevent and
Investigate Sexual Assaults in a Correctional Setting,” Final
report to the National Institute of Justice, grant number
2007-RP-BX-0001, December 2009, NCJ 229196,
https://www.ncjrs.gov/pdffiles1/nij/grants/229196.pdf.
2. National Law Enforcement and Corrections Technology
Center, Technology Primer: Radio Frequency Identification
(Washington, DC: U.S. Department of Justice, National
Institute of Justice, 2005).
3. Bob Violino, “The History of RFID Technology,” RFID
Journal
(January 16, 2005), http://www.rfidjournal.com/articles/
view?1338.
http://www.NIJ.gov
http://nij.gov/publications/Pages/publication-
detail.aspx?ncjnumber=229196
http://nij.gov/funding/awards/pages/award-
detail.aspx?award=2007-RP-BX-0001
http://nij.gov/funding/awards/pages/award-
detail.aspx?award=2007-RP-BX-0001
http://nij.gov/funding/awards/pages/award-
detail.aspx?award=2007-RP-BX-0001
http://www.rfidjournal.com/articles/view?1338
http://www.rfidjournal.com/articles/view?1338
NIJ Journal / Issue No. 278 May 2017 5
National Institute of Justice | www.NIJ.gov
4. Nancy G. La Vigne, “Evaluability Assessment of Radio
Frequency Identification Device (RFID) Use in Correctional
Settings,” Final report to the National Institute of Justice,
2006, https://www.ncjrs.gov/pdffiles1/nij/radio-frequency-
identification.pdf.
5. Ibid.; Laura J. Hickman, Lois M. Davis, Edward Wells,
and Mel Eisman, “Tracking Inmates and Locating Staff
with Active Radio-Frequency Identification (RFID): Early
Lessons Learned in One U.S. Correctional Facility,” Final
report to the National Institute of Justice, grant number
2005-IJ-CX-K062, June 2010, NCJ 230781, https://www.
ncjrs.gov/pdffiles1/nij/grants/230781.pdf.
6. La Vigne, “Evaluability Assessment of Radio Frequency
Identification Device (RFID) Use in Correctional Settings.”
7. Robin L. Halberstadt and Nancy G. La Vigne, “Evaluating
the Use of Radio Frequency Identification Device (RFID)
Technology to Prevent and Investigate Sexual Assaults in a
Correctional Setting,” The Prison Journal 91 (2011): 227-249.
Image source: ©JacobH, iStock.com.
NCJ 250343
Cite this article as: Nancy La Vigne, “Harnessing
the Power of Technology in Institutional Corrections,”
NIJ Journal 278, November 2016, https://nij.gov/
journals/278/Pages/harnessing-power-of-technology-
in-institutional-corrections.aspx.
http://www.NIJ.gov
https://www.ncjrs.gov/pdffiles1/nij/radio-frequency-
identification.pdf
https://www.ncjrs.gov/pdffiles1/nij/radio-frequency-
identification.pdf
https://www.ncjrs.gov/pdffiles1/nij/grants/230781.pdf
https://www.ncjrs.gov/pdffiles1/nij/grants/230781.pdf
https://nij.gov/journals/278/Pages/harnessing-power-of-
technology-in-institutional-corrections.aspx
https://nij.gov/journals/278/Pages/harnessing-power-of-
technology-in-institutional-corrections.aspx
https://nij.gov/journals/278/Pages/harnessing-power-of-
technology-in-institutional-corrections.aspx

More Related Content

Similar to HARNESSING THE POWER OF TECHNOLOGY IN INSTITUTIONAL CORREC

Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
 
Tracking Technology.docx
Tracking Technology.docxTracking Technology.docx
Tracking Technology.docxwrite5
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Ensuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and DevicesEnsuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and DevicesTerso Solutions
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...Hisham Al Zanoon
 
Rapid DNA Technology
Rapid DNA TechnologyRapid DNA Technology
Rapid DNA TechnologyPalash Mehar
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Clinton DSouza
 
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic PracticeA Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic PracticeCSCJournals
 
Making the clinical process safe and efficient using RFID in healthcare
Making the clinical process safe and efficient using RFID in healthcare Making the clinical process safe and efficient using RFID in healthcare
Making the clinical process safe and efficient using RFID in healthcare ePractice.eu
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
 

Similar to HARNESSING THE POWER OF TECHNOLOGY IN INSTITUTIONAL CORREC (20)

Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Tracking Technology.docx
Tracking Technology.docxTracking Technology.docx
Tracking Technology.docx
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Ensuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and DevicesEnsuring Integrity for Medical Tissues and Devices
Ensuring Integrity for Medical Tissues and Devices
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
 
Rapid DNA Technology
Rapid DNA TechnologyRapid DNA Technology
Rapid DNA Technology
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
 
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic PracticeA Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
 
Making the clinical process safe and efficient using RFID in healthcare
Making the clinical process safe and efficient using RFID in healthcare Making the clinical process safe and efficient using RFID in healthcare
Making the clinical process safe and efficient using RFID in healthcare
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 

More from JeanmarieColbert3

Hai,this is Anusha. am looking for a help with my research.docx
Hai,this is Anusha. am looking for a help with my research.docxHai,this is Anusha. am looking for a help with my research.docx
Hai,this is Anusha. am looking for a help with my research.docxJeanmarieColbert3
 
Guys I need your help with my international law class, Its a course.docx
Guys I need your help with my international law class, Its a course.docxGuys I need your help with my international law class, Its a course.docx
Guys I need your help with my international law class, Its a course.docxJeanmarieColbert3
 
hare some memories of encounters with people who had very different .docx
hare some memories of encounters with people who had very different .docxhare some memories of encounters with people who had very different .docx
hare some memories of encounters with people who had very different .docxJeanmarieColbert3
 
Hacker or SupporterAnswer ONE of the following questionsQuestio.docx
Hacker or SupporterAnswer ONE of the following questionsQuestio.docxHacker or SupporterAnswer ONE of the following questionsQuestio.docx
Hacker or SupporterAnswer ONE of the following questionsQuestio.docxJeanmarieColbert3
 
HA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docx
HA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docxHA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docx
HA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docxJeanmarieColbert3
 
HA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
HA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docxHA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
HA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docxJeanmarieColbert3
 
hacer oír salir suponer traer ver 1. para la clase a la.docx
hacer oír salir suponer traer ver 1.  para la clase a la.docxhacer oír salir suponer traer ver 1.  para la clase a la.docx
hacer oír salir suponer traer ver 1. para la clase a la.docxJeanmarieColbert3
 
H07 Medical Coding IDirections  Be sure to make an electronic c.docx
H07 Medical Coding IDirections  Be sure to make an electronic c.docxH07 Medical Coding IDirections  Be sure to make an electronic c.docx
H07 Medical Coding IDirections  Be sure to make an electronic c.docxJeanmarieColbert3
 
Guidelines1.Paper consisting of 2,000-2,250 words; however,.docx
Guidelines1.Paper consisting of 2,000-2,250 words; however,.docxGuidelines1.Paper consisting of 2,000-2,250 words; however,.docx
Guidelines1.Paper consisting of 2,000-2,250 words; however,.docxJeanmarieColbert3
 
Guidelines12-point fontCambria fontSingle space50 words ma.docx
Guidelines12-point fontCambria fontSingle space50 words ma.docxGuidelines12-point fontCambria fontSingle space50 words ma.docx
Guidelines12-point fontCambria fontSingle space50 words ma.docxJeanmarieColbert3
 
HA425 Unit 2 discussion- Organizational Behavior and Management in H.docx
HA425 Unit 2 discussion- Organizational Behavior and Management in H.docxHA425 Unit 2 discussion- Organizational Behavior and Management in H.docx
HA425 Unit 2 discussion- Organizational Behavior and Management in H.docxJeanmarieColbert3
 
GuidelinesPaper  is based on one novel , Frankenstein. We ha.docx
GuidelinesPaper  is based on one novel , Frankenstein. We ha.docxGuidelinesPaper  is based on one novel , Frankenstein. We ha.docx
GuidelinesPaper  is based on one novel , Frankenstein. We ha.docxJeanmarieColbert3
 
Guidelines1.Paper word count should be 1,000-1,250. Refer.docx
Guidelines1.Paper word count should be 1,000-1,250. Refer.docxGuidelines1.Paper word count should be 1,000-1,250. Refer.docx
Guidelines1.Paper word count should be 1,000-1,250. Refer.docxJeanmarieColbert3
 
Guided Response Respond to at least two of your classmates.  Ch.docx
Guided Response Respond to at least two of your classmates.  Ch.docxGuided Response Respond to at least two of your classmates.  Ch.docx
Guided Response Respond to at least two of your classmates.  Ch.docxJeanmarieColbert3
 
Guided ResponseReview the philosophies of education that your.docx
Guided ResponseReview the philosophies of education that your.docxGuided ResponseReview the philosophies of education that your.docx
Guided ResponseReview the philosophies of education that your.docxJeanmarieColbert3
 
Guided Response  When responding to your peers, suggest ways to.docx
Guided Response  When responding to your peers, suggest ways to.docxGuided Response  When responding to your peers, suggest ways to.docx
Guided Response  When responding to your peers, suggest ways to.docxJeanmarieColbert3
 
Guided Response As you read the responses of your classmates, con.docx
Guided Response As you read the responses of your classmates, con.docxGuided Response As you read the responses of your classmates, con.docx
Guided Response As you read the responses of your classmates, con.docxJeanmarieColbert3
 
Guided ResponseReview several of your classmates’ posts and res.docx
Guided ResponseReview several of your classmates’ posts and res.docxGuided ResponseReview several of your classmates’ posts and res.docx
Guided ResponseReview several of your classmates’ posts and res.docxJeanmarieColbert3
 
Guided ResponseYou must reply to at least one classmate. As y.docx
Guided ResponseYou must reply to at least one classmate. As y.docxGuided ResponseYou must reply to at least one classmate. As y.docx
Guided ResponseYou must reply to at least one classmate. As y.docxJeanmarieColbert3
 
Guided ResponseRespond to at least one classmate that has been .docx
Guided ResponseRespond to at least one classmate that has been .docxGuided ResponseRespond to at least one classmate that has been .docx
Guided ResponseRespond to at least one classmate that has been .docxJeanmarieColbert3
 

More from JeanmarieColbert3 (20)

Hai,this is Anusha. am looking for a help with my research.docx
Hai,this is Anusha. am looking for a help with my research.docxHai,this is Anusha. am looking for a help with my research.docx
Hai,this is Anusha. am looking for a help with my research.docx
 
Guys I need your help with my international law class, Its a course.docx
Guys I need your help with my international law class, Its a course.docxGuys I need your help with my international law class, Its a course.docx
Guys I need your help with my international law class, Its a course.docx
 
hare some memories of encounters with people who had very different .docx
hare some memories of encounters with people who had very different .docxhare some memories of encounters with people who had very different .docx
hare some memories of encounters with people who had very different .docx
 
Hacker or SupporterAnswer ONE of the following questionsQuestio.docx
Hacker or SupporterAnswer ONE of the following questionsQuestio.docxHacker or SupporterAnswer ONE of the following questionsQuestio.docx
Hacker or SupporterAnswer ONE of the following questionsQuestio.docx
 
HA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docx
HA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docxHA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docx
HA415 Unit 6Discussion TopicHealthcare systems are huge, compl.docx
 
HA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
HA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docxHA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
HA410 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
 
hacer oír salir suponer traer ver 1. para la clase a la.docx
hacer oír salir suponer traer ver 1.  para la clase a la.docxhacer oír salir suponer traer ver 1.  para la clase a la.docx
hacer oír salir suponer traer ver 1. para la clase a la.docx
 
H07 Medical Coding IDirections  Be sure to make an electronic c.docx
H07 Medical Coding IDirections  Be sure to make an electronic c.docxH07 Medical Coding IDirections  Be sure to make an electronic c.docx
H07 Medical Coding IDirections  Be sure to make an electronic c.docx
 
Guidelines1.Paper consisting of 2,000-2,250 words; however,.docx
Guidelines1.Paper consisting of 2,000-2,250 words; however,.docxGuidelines1.Paper consisting of 2,000-2,250 words; however,.docx
Guidelines1.Paper consisting of 2,000-2,250 words; however,.docx
 
Guidelines12-point fontCambria fontSingle space50 words ma.docx
Guidelines12-point fontCambria fontSingle space50 words ma.docxGuidelines12-point fontCambria fontSingle space50 words ma.docx
Guidelines12-point fontCambria fontSingle space50 words ma.docx
 
HA425 Unit 2 discussion- Organizational Behavior and Management in H.docx
HA425 Unit 2 discussion- Organizational Behavior and Management in H.docxHA425 Unit 2 discussion- Organizational Behavior and Management in H.docx
HA425 Unit 2 discussion- Organizational Behavior and Management in H.docx
 
GuidelinesPaper  is based on one novel , Frankenstein. We ha.docx
GuidelinesPaper  is based on one novel , Frankenstein. We ha.docxGuidelinesPaper  is based on one novel , Frankenstein. We ha.docx
GuidelinesPaper  is based on one novel , Frankenstein. We ha.docx
 
Guidelines1.Paper word count should be 1,000-1,250. Refer.docx
Guidelines1.Paper word count should be 1,000-1,250. Refer.docxGuidelines1.Paper word count should be 1,000-1,250. Refer.docx
Guidelines1.Paper word count should be 1,000-1,250. Refer.docx
 
Guided Response Respond to at least two of your classmates.  Ch.docx
Guided Response Respond to at least two of your classmates.  Ch.docxGuided Response Respond to at least two of your classmates.  Ch.docx
Guided Response Respond to at least two of your classmates.  Ch.docx
 
Guided ResponseReview the philosophies of education that your.docx
Guided ResponseReview the philosophies of education that your.docxGuided ResponseReview the philosophies of education that your.docx
Guided ResponseReview the philosophies of education that your.docx
 
Guided Response  When responding to your peers, suggest ways to.docx
Guided Response  When responding to your peers, suggest ways to.docxGuided Response  When responding to your peers, suggest ways to.docx
Guided Response  When responding to your peers, suggest ways to.docx
 
Guided Response As you read the responses of your classmates, con.docx
Guided Response As you read the responses of your classmates, con.docxGuided Response As you read the responses of your classmates, con.docx
Guided Response As you read the responses of your classmates, con.docx
 
Guided ResponseReview several of your classmates’ posts and res.docx
Guided ResponseReview several of your classmates’ posts and res.docxGuided ResponseReview several of your classmates’ posts and res.docx
Guided ResponseReview several of your classmates’ posts and res.docx
 
Guided ResponseYou must reply to at least one classmate. As y.docx
Guided ResponseYou must reply to at least one classmate. As y.docxGuided ResponseYou must reply to at least one classmate. As y.docx
Guided ResponseYou must reply to at least one classmate. As y.docx
 
Guided ResponseRespond to at least one classmate that has been .docx
Guided ResponseRespond to at least one classmate that has been .docxGuided ResponseRespond to at least one classmate that has been .docx
Guided ResponseRespond to at least one classmate that has been .docx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

HARNESSING THE POWER OF TECHNOLOGY IN INSTITUTIONAL CORREC

  • 1. HARNESSING THE POWER OF TECHNOLOGY IN INSTITUTIONAL CORRECTIONS BY NANCY LA VIGNE One researcher reflects on the challenges and opportunities associated with implementing and evaluating criminal justice technologies. A s criminologists, we are typically well trained in evaluation methodology but less so in the issues and nuances associated with technology deployment. When we evaluate criminal justice technology, we must understand both the capacity of the technology and how people use it. Focusing on one at the expense of the other can render the entire evaluation effort futile. We learned that lesson the hard way during an NIJ-funded evaluation of the use of radio frequency identification device (RFID) technology to reduce sexual assaults and inmate infractions in a women’s prison.1 Although our evaluation revealed much about the promise of RFID technology for monitoring, tracking, and investigating inmates, it was seen largely as a failure, because the implementation of the technology was fraught with problems. (Read more about the evaluation at NIJ.gov, keyword: 229196.)
  • 2. Social science publications often favor studies that yield statistically significant findings in the expected direction. But we can arguably learn much more from failure than from success, and these lessons can help improve both technology deployment and evaluation methodologies. This article offers some lessons learned from our evaluation about the challenges and opportunities associated with deploying criminal justice technologies in the manner most likely to yield their intended impact. Doing so requires: • Developing a clear understanding of how you envision that the technology will work — the logic behind its implementation and use. • Educating users about implementation and training requirements to ensure cultural buy-in and full deployment — the fidelity piece. • Engaging in early and ongoing assessment to identify and correct implementation problems and challenges and learn how they relate to intended impact — the feedback loop. http://nij.gov/publications/Pages/publication- detail.aspx?ncjnumber=229196 2 Harnessing the Power of Technology in Institutional Corrections National Institute of Justice | www.NIJ.gov Although the contextual example for this article is
  • 3. implementing RFID technology in a women’s prison, the implications for policy, practice, and evaluation can apply to a wide array of criminal justice technologies in a variety of field settings. RFID in Correctional Settings RFIDs have a tag or “chip” that uses wireless data communication to transmit information to electronic sensors, allowing users to locate and track tagged objects with a unique identifier.2 RFID technology was first used during World War II to identify whether approaching planes were friend or foe. Today, commercial groups commonly use it to track merchandise from warehouse to distribution to point of sale.3 RFID technology is also found in access control and payment systems, such as building access keycards, transit payment cards, and highway electronic toll collection systems. Most RFIDs are “passive,” meaning that the chips can be read only when in close proximity to a sensor. For example, community corrections agencies use passive RFIDs to electronically monitor those on home detention. “Active” RFIDs have a battery-operated device integrated with the chip, enabling the tagged item to both receive signals and transmit data back to the sensor in near real time. Active RFIDs have three components: • A chip embedded in a bracelet, which is often worn on the ankle.
  • 4. • A series of data extension units, which read and transmit data from the chips. • Computer software that can document the location and identity of those wearing the bracelets.4 Institutional correctional settings have been using active RFIDs for at least a decade5 for things as basic as perimeter control, as well as more sophisticated applications, such as issuing alerts when two rival gang members are in close proximity. RFIDs can aid housing unit “counts,” identify whether inmates are in the proper locations (e.g., classroom, yard, housing unit) according to their schedules, and even monitor inmates’ eating habits.6 The technology can also serve as a valuable investigative tool, generating historical data on an inmate’s location and the time of his or her movements. The Northeast Pre-Release Center (NEPRC), a women’s prison in Cleveland, Ohio, that was the setting of our NIJ-funded evaluation from 2005 through 2007, intended to use RFIDs in all of these ways. Unfortunately, the implementation of the technology was filled with problems. Service was interrupted for several months, staff received minimal training, bracelets were used inconsistently (at one point, 25 percent of inmates did not have bracelets), and NEPRC restricted software use to perimeter control. The prison never employed the technology’s most powerful feature: tailored, inmate-specific exclusionary zones.7 Understanding the Logic One early flaw in NEPRC’s deployment of RFID technology was the absence of a well-articulated logic
  • 5. model. Quite simply, a logic model asks the question, “How is the technology supposed to work?” Answering that question thoroughly will increase the odds that users deploy the technology as intended. In the case of NEPRC, this would have entailed conversations with all staff members about the nature, frequency, and context of their most challenging threats to safety and security. These conversations should have taken place well before NEPRC deployed the RFIDs and should When we evaluate criminal justice technology, we must understand both the capacity of the technology and how people use it. Focusing on one at the expense of the other can render the entire evaluation effort futile. http://www.NIJ.gov NIJ Journal / Issue No. 278 May 2017 3 National Institute of Justice | www.NIJ.gov In the case of the NEPRC RFID evaluation, the prison — unbeknownst to us, the researchers — had never fully implemented the technology’s exclusionary zone features, which, theoretically, would yield the greatest deterrent effect. Moreover, halfway into the deployment period, we learned that the system was inoperable and that, as a result, officers had stopped equipping new inmates with bracelets.
  • 6. That these incidents occurred and took several months for us to discover represents a failure on the part of all involved parties. The prison should have been monitoring and documenting the technology’s usage weekly, if not daily. And we should have requested that documentation throughout the course of our evaluation. Ongoing Assessment Ongoing assessment and impact evaluation are also critical. The former allows for midcourse corrections and relies on the types of fidelity metrics described above. The latter can help guide decisions about continued financial investment in the technology and possible expansion to other facilities. We have established the value of partnering with a local researcher prior to deploying the technology. have included detailed discussions of the technology’s capabilities and training and operational requirements. Table 1 presents one example of a simplistic RFID logic model, which can help identify the main uses of the RFIDs. It also helps underscore the critical role of human interaction with the technology. For example, even if a prison sets appropriate exclusionary zones and equips 100 percent of its inmates with RFID bracelets, the technology is unlikely to have an impact if officers do not respond to system alerts that are generated when inmates are out of place or in close proximity to prohibited people. Monitoring Fidelity
  • 7. Engaging users in this thinking early on not only engenders buy-in but also helps guide the development of performance measures. Performance measures can help document whether the technology was implemented as intended. Indeed, implementation fidelity is the cornerstone of effective technology deployment. Institutions must train their officers on how to properly use the technology and must routinely monitor and hold them accountable. From a researcher’s perspective, accurate documentation of the technology’s use is a necessity. Table 1. RFID Logic Model Inputs Outputs Outcomes Impacts Software: Program perimeter areas and exclusionary zones Alerts issued when inmates are out of place Greater inmate compliance with rules Reduced escapes, enhanced safety Hardware: Sensor installment and ankle bracelets Ankle bracelets
  • 8. on inmates Increased perception that infractions and violations of facility policy will be detected Reduced misconduct Training: Staff responses to alerts Swift response to alerts Increased identification of misconduct Reduced misconduct Training: Use of RFID data for investigations New source of evidence to investigate infractions and misconduct Increased apprehension of inmates, faster case resolution Reduced misconduct, reduced incidence of false allegations
  • 9. http://www.NIJ.gov 4 Harnessing the Power of Technology in Institutional Corrections National Institute of Justice | www.NIJ.gov When doing so, corrections administrators would benefit from securing an agreement that the researcher is willing to embrace an “action research” approach rather than the more traditional evaluation methodology. Traditionally, researchers erect a firm firewall and do not report back implementation or impact findings until they have concluded their evaluation. Action research, by contrast, involves ongoing analytic support and engagement. Some purists frown upon action research, saying the approach creates a Hawthorne effect of sorts, whereby the researcher’s activities affect the nature of the intervention. However, researchers with a practical bent are increasingly embracing action research. Corrections leaders should demand this time-honored approach when deciding to team with evaluation partners. Corrections officials would also benefit from includi ng a cost-benefit component in their evaluation partnerships. This component can provide crucial data to help inform decisions about ongoing investment, expansion, and sustainability. Summing It Up Shortly after the release of our final RFID evaluati on report, I found myself in the conference room of
  • 10. a corrections agency in a nearby jurisdiction. The director objected to our finding that the technology had no impact when implemented at its most basic capacity, as was the case at NEPRC, and he launched into a tirade about our so-called “substandard” evaluation. I learned later that his agency had just committed considerable resources to implementing its own RFID system, and he felt that our evaluation threatened the wisdom of that investment. He is not alone. Far too often, we draw erroneous conclusions about the effectiveness of criminal justice technologies based on evaluations that yield no impact. But in this case — and arguably in many like it — the failure is not in the technology itself but in the deployment. As Thomas Edison once famously observed, “Just because something doesn’t do what you planned it to do doesn’t mean it’s useless.” When deploying technology, corrections agencies should gather staff input, train and engage all users, and routinely monitor and document usage. Evaluation partners can help collect data and provide that all-important feedback loop, which can lead to midcourse corrections aimed at enhancing implementation fidelity. Following this approach will prevent false assumptions and increase the odds that the technology will yield its intended impact. About the Author Nancy La Vigne is the director of the Justice Policy Center at the Urban Institute. For More Information
  • 11. Read the final RFID evaluation report, Evaluating the Use of Radio Frequency Identification Device (RFID) Technology to Prevent and Investigate Sexual Assaults in a Correctional Setting, at NIJ.gov, keyword: 229196. This article discusses the following grant: • “Evaluating the Use of Radio Frequency Identification Devices to Prevent and Investigate Sexual Assaults in Correctional Settings,” grant number 2007-RP-BX-0001. Notes 1. Nancy G. La Vigne, Robin Halberstadt, and Barbara Parthasarathy, “Evaluating the Use of Radio Frequency Identification Device (RFID) Technology to Prevent and Investigate Sexual Assaults in a Correctional Setting,” Final report to the National Institute of Justice, grant number 2007-RP-BX-0001, December 2009, NCJ 229196, https://www.ncjrs.gov/pdffiles1/nij/grants/229196.pdf. 2. National Law Enforcement and Corrections Technology Center, Technology Primer: Radio Frequency Identification (Washington, DC: U.S. Department of Justice, National Institute of Justice, 2005). 3. Bob Violino, “The History of RFID Technology,” RFID Journal (January 16, 2005), http://www.rfidjournal.com/articles/ view?1338. http://www.NIJ.gov http://nij.gov/publications/Pages/publication- detail.aspx?ncjnumber=229196 http://nij.gov/funding/awards/pages/award- detail.aspx?award=2007-RP-BX-0001
  • 12. http://nij.gov/funding/awards/pages/award- detail.aspx?award=2007-RP-BX-0001 http://nij.gov/funding/awards/pages/award- detail.aspx?award=2007-RP-BX-0001 http://www.rfidjournal.com/articles/view?1338 http://www.rfidjournal.com/articles/view?1338 NIJ Journal / Issue No. 278 May 2017 5 National Institute of Justice | www.NIJ.gov 4. Nancy G. La Vigne, “Evaluability Assessment of Radio Frequency Identification Device (RFID) Use in Correctional Settings,” Final report to the National Institute of Justice, 2006, https://www.ncjrs.gov/pdffiles1/nij/radio-frequency- identification.pdf. 5. Ibid.; Laura J. Hickman, Lois M. Davis, Edward Wells, and Mel Eisman, “Tracking Inmates and Locating Staff with Active Radio-Frequency Identification (RFID): Early Lessons Learned in One U.S. Correctional Facility,” Final report to the National Institute of Justice, grant number 2005-IJ-CX-K062, June 2010, NCJ 230781, https://www. ncjrs.gov/pdffiles1/nij/grants/230781.pdf. 6. La Vigne, “Evaluability Assessment of Radio Frequency Identification Device (RFID) Use in Correctional Settings.” 7. Robin L. Halberstadt and Nancy G. La Vigne, “Evaluating the Use of Radio Frequency Identification Device (RFID) Technology to Prevent and Investigate Sexual Assaults in a Correctional Setting,” The Prison Journal 91 (2011): 227-249. Image source: ©JacobH, iStock.com.
  • 13. NCJ 250343 Cite this article as: Nancy La Vigne, “Harnessing the Power of Technology in Institutional Corrections,” NIJ Journal 278, November 2016, https://nij.gov/ journals/278/Pages/harnessing-power-of-technology- in-institutional-corrections.aspx. http://www.NIJ.gov https://www.ncjrs.gov/pdffiles1/nij/radio-frequency- identification.pdf https://www.ncjrs.gov/pdffiles1/nij/radio-frequency- identification.pdf https://www.ncjrs.gov/pdffiles1/nij/grants/230781.pdf https://www.ncjrs.gov/pdffiles1/nij/grants/230781.pdf https://nij.gov/journals/278/Pages/harnessing-power-of- technology-in-institutional-corrections.aspx https://nij.gov/journals/278/Pages/harnessing-power-of- technology-in-institutional-corrections.aspx https://nij.gov/journals/278/Pages/harnessing-power-of- technology-in-institutional-corrections.aspx