SlideShare a Scribd company logo
1 of 15
Running head: CRIME ANALYSIS TECHNOLOGY
1
CRIME ANALYSIS TECHNOLOGY
9
Crime Analysis Technology
Student’s Name
Institutional Affiliation
Crime Analysis Technology
Peer-Reviewed Article Analysis
Technology has evolved over the years in various sectors, with
new technological innovations being developed. One of the
areas that has witnessed great applications of technological
evolution is in the detection and prevention of crime. This
article will analyze the various technologies that are used to
prevent and detect crime.
Byrne and Marx (2011) in their article reviews the topic in
detail and gives insight in the role of technology in combating
crime.
The key data that will be used in this research is secondary data
from various peer-reviewed sources that review the topic of
Crime Analysis Technology from various perspectives. Byrne
and Marx (2011) presents various data on crime and the use of
Information Technology in crime detection and prevention. For
instance, it highlights that the percentage of schools in the
United States that deploy metal detectors is approximately 2%.
The article also approximates that as of 2006, one million
CCTV cameras had been deployed in the United States,
although the article does not provide current estimates on the
same.
The article plays a great role in my final research. It gives a
highlight of the various technological applications for crime
prevention and detection. This can provide a background for
further research, especially the technological innovations that
are currently being developed. The article also presents figures
about various elements of technology in crime prevention and
detection such as the number of CCTV cameras, the crime rates
such as the registered sex offenders, among others. Projections
can therefore be made to the future.
The article mentions several significant facts. First, it classifies
technological innovations in criminal justice as hard technology
versus soft technology. Hard technology innovations include
hardware and materials while soft technology innovations
include information systems and computer software. Examples
of hard technology is the CCTV cameras, metal detectors, and
security systems at homes and schools. Examples of soft
technology include predictive policing technology, crime
analysis techniques, software, and data sharing techniques,
among others. Both of the two categories of technological
innovations are important in criminal justice. Another fact is the
new technology of policing. The article identifies hard policing
technological tools such as non-lethal weaponry and
technologies for officer safety. It highlights soft policing
technologies such as data-driven policies in policing and
information sharing. Another important fact that the article
mentions is the issues that should be considered in
technological innovations in criminal justice. Some of the issues
mentioned in the article is that policy should be determined by
research and evaluation and using evidence-based practice
should be used to develop new programs or remodel the existing
ones.
Overall, the article provides a good background for further
research in technology in criminal justice system. More
innovations may be included in further research due to ongoing
technological innovations for crime prevention and detection.
For example, further research should look at technological
innovations to curb cyber-bullying due to the huge impact of
social media.
References
Byrne, J. & Marx, G. (2011). Technological Innovations in
Crime Prevention and Policing. A
Review of the Research on Implementation and Impact.
Retrieved from
https://www.ncjrs.gov/pdffiles1/nij/238011.pdf
Running head:
CRIME ANALYSI
S
TECHNOLOGY
1
Crime Analys
is Technology
Student’s Name
Institutional Affiliation
Running head: CRIME ANALYSIS TECHNOLOGY
1
Crime Analysis Technology
Student’s Name
Institutional Affiliation
Unit 3.2: Peer Review Article
With your research, you will be reviewing a total of four (4)
peer reviewed articles. For this discussion board, attach 1 of
your articles and summarize it briefly for your peers.
· What key data will you be using for your research?
· How do you think this article will play a role in your final
research?
· What are the 3 most important facts do you think this article
covers?
The key data I will be using in my research is what is most and
least common to society in the technology era. Anything from
mobile phone technology, social media investigation and safety,
to computer analyst software and safety, also how law
enforcement uses the same tools and more to prevent,
investigate, and catch an offender. The three most important
facts this article will provide is information on the devices,
tools, and techniques that is most important to the research
O, U. S. D. (2007). Investigative Uses of Technology: Devices,
Tools, and Techniques. Retrieved January 30, 2020, from
https://www.crime-scene-investigator.net/investigative-uses-of-
technology-devices-tools-and-techniques.html
Running head: DATA
1
DATA
9
Data
Student’s Name
Institutional Affiliation
Data
There are many approaches of managing and storing data.
Spreadsheets and databases are some of the most common
approaches of handling data. The choice one uses should be
based on ease of use, analytical capabilities, and the efficiency
of the system, data integrity, among other reasons. A
spreadsheet has data arranged in rows and columns. One of the
most common spreadsheets packages is Microsoft Excel.
Databases have data arranged in structured ways.
For my data, I will use databases. This is because they have
many advantages over spreadsheets. First, they enhance data
quality checks. This is because databases allow certain variables
as the only possible entries. For instance, if the input is either
male or female, the database will not accept any other entry.
Databases also have a feature that check for duplication,
something which is not available in spreadsheets (Matthews,
2010). Another reason for the use of databases is that databases
allows the integration of data, a function that spreadsheets can
also perform but through custom programming which may
require additional technical expertise. Databases are also
resource efficient if large volumes of data are involved
compared to spreadsheets. Databases also allow for user
efficiency because the display of data can be tailored to a user’s
need. For example, a user may get the information he needs
from a database easily without going through all the data
contained in the database. Databases also ensure cost efficiency
when large volumes of data are involved (Matthews, 2010).
However, the volume of data may determine whether to use a
spreadsheet or a database. In some situations where simplicity
is desired and the volume of data is low, it may be advantageous
to use a spreadsheet such as Excel because many people are
aware of how to use it.
To organize my data into a database, I will name the database,
identify the objects, define and name a table for each object,
identify the attributes associated with each object, define and
name columns, and determine the primary key.
References
Matthews, A. (2010). Spreadsheets & databases. Pretoria:
MattLo
Running head:
DATA
1
Data
Student’s Name
Institutional Affiliation
Running head: DATA
1
Data
Student’s Name
Institutional Affiliation
Running head: CRIME ANALYSIS
1
CRIME ANALYSIS TECHNOLOGY
5
Crime Analysis Technology
Crime analysis is a function that usually involves the systemic
analysis in identifying as well as analyzing the crime patterns
and trends. Crime analysis is very important for law
enforcement agencies as it helps law enforcers effectively
deploy the available resources in a better and effective manner,
which enables them to identify and apprehend suspects. Crime
analysis is also very significant when it comes to arriving at
solutions devised to come up with the right solution to solve the
current crime problem and issues as well as coming up with the
right prevention strategies. Since the year 2014, crime rates in
the USA have increased steadily as per a study done by
USAFacts, which is a non-partisan initiative (Osborne &
Wernicke, 2013). With this increase in crime rates, which has
majorly resulted in massive growth in technology, it is essential
to come up with better means and ways of dealing with the
increased crime rates. With the current advancement in
technology, better law enforcement tools developed, which has
enabled better crime deterrence in better and efficient ways. All
this has been facilitated by the efforts of crime analysts who
have come up with better tools and thus enabling the law
enforcers to better deal with the crimes (Osborne & Wernicke,
2013). In this paper, I will consider the application of crime
analysis technology and techniques in fighting crimes.
Application of crime analysis technology and techniques used to
make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in
predictive policing software have enabled security agencies to
effectively use predictive policing ("Crime Analysis: Fighting
Crime with Data," 2017). Application of this software has
enabled better crime prevention as with data obtained in the
previous crimes have been used to predict possible future severe
crimes in a specific area.
Through the adoption and use of crime analysis, law
enforcement agencies have been able to fight against crimes as
when compared with the past effectively. The use of crime
analysis comes at the right time, where there has been an
increase in crime rates in the current digital error. In a survey
done by Wynyard group in 2015, the study revealed that for
every 10 law enforcement officials 9 of them believe that the
use of current technology in crime analysis has had positive
effects in helping the agencies in solving crimes as they can
identify essential links and trends in crimes ("Crime Analysis:
Fighting Crime with Data," 2017). In the same way, other
sectors have benefited from data analysis with spreadsheets,
databases, and mapping, law enforcers have been able to use
data analysis to come up with a better decision. Crime analysis
has had many positive impacts in different areas, which
includes robberies and arsons with pattern examining as well as
reviewing events sequence (Santos, 2012).
Use crime analysis technology is very useful in fighting
terrorism activities through analysis of previous crimes and thus
predicting any intended cyber-attacks. One of the most
important federal agency mandated to deal with terrorist
activity is the FBI. Therefore, be essential to implementing the
initiative to the FBI agent. FBI is a U.S. domestic security and
intelligence service. The FBI operates under the United States
department of justice jurisdiction and usually reports to the
director of national intelligence and attorney general. FBI is the
United States leading organization when it comes to matters
aimed at countering terrorist activities as well as investigation
of criminal activities. The FBI formed in 1908, the organization
currently has about 35,204 employees and its headquarters are
in Washington, D.C. Having being involved in both law
enforcing responsibilities as well as intelligence, the FBI is
unique as it has dual responsibilities and thus significant agency
in the U.S. Some of the vital roles includes ensuring the United
States has protection from terrorist activities as well as foreign
threat activities. In addition, it mandates upholding and
enforcing criminal laws of the U.S. as well as providing
criminal justice services and leadership to both federal, state,
international agencies as well as municipal. Implementing a
better law enforcement initiative in the FBI is therefore very
important, as it will strengthen the ability of the FBI when it
comes to dealing with the terrorist as well as ensuring the
nation has protection from other foreign threats. To ensure the
success of the initiative, most of the stakeholders will be
technological companies. Technological companies will ensure
the success of the action reaches achievement. The target
audience will be the leaders of the FBI agents, as this will
ensure that the information reaches the rest of the FBI
fraternity.
References
Crime Analysis and Patterns. (n.d.). The International Crime
Drop. doi:10.1057/9781137291462.0014
Crime Analysis: Fighting Crime with Data. (2017, June 12).
Retrieved from
https://www.floridatechonline.com/blog/criminal-justice/crime-
analysis-fighting-crime-with-data/
Crime Analysts Fight Crime From Behind a Keyboard. (2019,
July 29). Retrieved from
https://online.campbellsville.edu/criminal-justice/crime-
analysts/
Federal Bureau of Investigation (FBI): History, Role & Purpose.
(n.d.). Retrieved from
https://study.com/academy/lesson/federal-bureau-of-
investigation-fbi-history-role-purpose.html
Osborne, D., & Wernicke, S. (2013). Introduction to Crime
Analysis: Basic Resources for Criminal Justice Practice.
London, England: Routledge.
Santos, R. B. (2012). Crime Analysis With Crime Mapping.
SAGE.
The United States. Federal Bureau of Investigation. (n.d.). The
FBI Story.
Crime Analysis technology:
This area has become the most important asset in the modern
world. This topic interest me because it is the most common
denominator between law enforcers and law offenders. What is
also interesting is that information technology is literally at the
fingertips of everybody. It is more interesting and feasible
because it is one of the more effective ways of solving crime
whether it is a detective triangulating signal off a cellphone
tower to place an alleged killer in the area of a crime or doing a
scan of a confiscated computer to detect inappropriate
pornography. This is an interesting topic because it addresses
developments that can be used to collect enormous amounts of
evidence in crimes. However, it might be less feasible than the
other topics due to the devastating effects that a mistake caused
in this field can have on the universe.
For my Capstone Project I choose Crime Analysis Technology
and techniques of fighting crimes. There is so much crime
solving, current or cold case based on ever-evolving technology
and the access it gives crime fighters. I believe extensive
research and knowledge of this topic is researchable as well as
presentable. The current technology and social media craze, law
enforcement needs to take advantage of it and to society needs
to be knowledgeable of how safe or dangerous it can be.

More Related Content

Similar to Crime Analysis Technology

A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramAimee Brown
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmIJERA Editor
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docxdrennanmicah
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
Text mining on criminal documents
Text mining on criminal documentsText mining on criminal documents
Text mining on criminal documentsZhongLI28
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisZhongLI28
 
An Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningAn Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningSonali Chawla
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docxmehek4
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docxmattinsonjanel
 
Correlation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentCorrelation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentIJERA Editor
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGIJDKP
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGIJDKP
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
 

Similar to Crime Analysis Technology (20)

A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer Program
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithm
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Text mining on criminal documents
Text mining on criminal documentsText mining on criminal documents
Text mining on criminal documents
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
 
An Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningAn Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine Learning
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
 
Correlation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentCorrelation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data Environment
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
 

More from healdkathaleen

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxhealdkathaleen
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxhealdkathaleen
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxhealdkathaleen
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxhealdkathaleen
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxhealdkathaleen
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxhealdkathaleen
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxhealdkathaleen
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxhealdkathaleen
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxhealdkathaleen
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxhealdkathaleen
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxhealdkathaleen
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxhealdkathaleen
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxhealdkathaleen
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxhealdkathaleen
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxhealdkathaleen
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxhealdkathaleen
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxhealdkathaleen
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxhealdkathaleen
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxhealdkathaleen
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxhealdkathaleen
 

More from healdkathaleen (20)

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docx
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docx
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docx
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docx
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docx
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docx
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docx
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docx
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docx
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docx
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docx
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docx
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docx
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docx
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docx
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Crime Analysis Technology

  • 1. Running head: CRIME ANALYSIS TECHNOLOGY 1 CRIME ANALYSIS TECHNOLOGY 9 Crime Analysis Technology Student’s Name Institutional Affiliation Crime Analysis Technology Peer-Reviewed Article Analysis Technology has evolved over the years in various sectors, with new technological innovations being developed. One of the areas that has witnessed great applications of technological
  • 2. evolution is in the detection and prevention of crime. This article will analyze the various technologies that are used to prevent and detect crime. Byrne and Marx (2011) in their article reviews the topic in detail and gives insight in the role of technology in combating crime. The key data that will be used in this research is secondary data from various peer-reviewed sources that review the topic of Crime Analysis Technology from various perspectives. Byrne and Marx (2011) presents various data on crime and the use of Information Technology in crime detection and prevention. For instance, it highlights that the percentage of schools in the United States that deploy metal detectors is approximately 2%. The article also approximates that as of 2006, one million CCTV cameras had been deployed in the United States, although the article does not provide current estimates on the same. The article plays a great role in my final research. It gives a highlight of the various technological applications for crime prevention and detection. This can provide a background for further research, especially the technological innovations that are currently being developed. The article also presents figures about various elements of technology in crime prevention and detection such as the number of CCTV cameras, the crime rates such as the registered sex offenders, among others. Projections can therefore be made to the future. The article mentions several significant facts. First, it classifies technological innovations in criminal justice as hard technology versus soft technology. Hard technology innovations include hardware and materials while soft technology innovations include information systems and computer software. Examples of hard technology is the CCTV cameras, metal detectors, and security systems at homes and schools. Examples of soft technology include predictive policing technology, crime analysis techniques, software, and data sharing techniques, among others. Both of the two categories of technological
  • 3. innovations are important in criminal justice. Another fact is the new technology of policing. The article identifies hard policing technological tools such as non-lethal weaponry and technologies for officer safety. It highlights soft policing technologies such as data-driven policies in policing and information sharing. Another important fact that the article mentions is the issues that should be considered in technological innovations in criminal justice. Some of the issues mentioned in the article is that policy should be determined by research and evaluation and using evidence-based practice should be used to develop new programs or remodel the existing ones. Overall, the article provides a good background for further research in technology in criminal justice system. More innovations may be included in further research due to ongoing technological innovations for crime prevention and detection. For example, further research should look at technological innovations to curb cyber-bullying due to the huge impact of social media. References Byrne, J. & Marx, G. (2011). Technological Innovations in Crime Prevention and Policing. A Review of the Research on Implementation and Impact. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/238011.pdf Running head:
  • 4. CRIME ANALYSI S TECHNOLOGY 1 Crime Analys is Technology Student’s Name Institutional Affiliation
  • 5. Running head: CRIME ANALYSIS TECHNOLOGY 1 Crime Analysis Technology Student’s Name Institutional Affiliation Unit 3.2: Peer Review Article With your research, you will be reviewing a total of four (4) peer reviewed articles. For this discussion board, attach 1 of your articles and summarize it briefly for your peers. · What key data will you be using for your research?
  • 6. · How do you think this article will play a role in your final research? · What are the 3 most important facts do you think this article covers? The key data I will be using in my research is what is most and least common to society in the technology era. Anything from mobile phone technology, social media investigation and safety, to computer analyst software and safety, also how law enforcement uses the same tools and more to prevent, investigate, and catch an offender. The three most important facts this article will provide is information on the devices, tools, and techniques that is most important to the research O, U. S. D. (2007). Investigative Uses of Technology: Devices, Tools, and Techniques. Retrieved January 30, 2020, from https://www.crime-scene-investigator.net/investigative-uses-of- technology-devices-tools-and-techniques.html Running head: DATA 1 DATA 9 Data
  • 7. Student’s Name Institutional Affiliation Data There are many approaches of managing and storing data. Spreadsheets and databases are some of the most common approaches of handling data. The choice one uses should be based on ease of use, analytical capabilities, and the efficiency of the system, data integrity, among other reasons. A spreadsheet has data arranged in rows and columns. One of the most common spreadsheets packages is Microsoft Excel. Databases have data arranged in structured ways. For my data, I will use databases. This is because they have many advantages over spreadsheets. First, they enhance data quality checks. This is because databases allow certain variables as the only possible entries. For instance, if the input is either male or female, the database will not accept any other entry. Databases also have a feature that check for duplication, something which is not available in spreadsheets (Matthews, 2010). Another reason for the use of databases is that databases allows the integration of data, a function that spreadsheets can also perform but through custom programming which may require additional technical expertise. Databases are also resource efficient if large volumes of data are involved compared to spreadsheets. Databases also allow for user efficiency because the display of data can be tailored to a user’s
  • 8. need. For example, a user may get the information he needs from a database easily without going through all the data contained in the database. Databases also ensure cost efficiency when large volumes of data are involved (Matthews, 2010). However, the volume of data may determine whether to use a spreadsheet or a database. In some situations where simplicity is desired and the volume of data is low, it may be advantageous to use a spreadsheet such as Excel because many people are aware of how to use it. To organize my data into a database, I will name the database, identify the objects, define and name a table for each object, identify the attributes associated with each object, define and name columns, and determine the primary key. References Matthews, A. (2010). Spreadsheets & databases. Pretoria: MattLo
  • 10. Running head: DATA 1 Data Student’s Name Institutional Affiliation Running head: CRIME ANALYSIS 1 CRIME ANALYSIS TECHNOLOGY 5
  • 11. Crime Analysis Technology Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who
  • 12. have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient. Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area. Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis has had many positive impacts in different areas, which includes robberies and arsons with pattern examining as well as reviewing events sequence (Santos, 2012). Use crime analysis technology is very useful in fighting terrorism activities through analysis of previous crimes and thus predicting any intended cyber-attacks. One of the most important federal agency mandated to deal with terrorist activity is the FBI. Therefore, be essential to implementing the initiative to the FBI agent. FBI is a U.S. domestic security and
  • 13. intelligence service. The FBI operates under the United States department of justice jurisdiction and usually reports to the director of national intelligence and attorney general. FBI is the United States leading organization when it comes to matters aimed at countering terrorist activities as well as investigation of criminal activities. The FBI formed in 1908, the organization currently has about 35,204 employees and its headquarters are in Washington, D.C. Having being involved in both law enforcing responsibilities as well as intelligence, the FBI is unique as it has dual responsibilities and thus significant agency in the U.S. Some of the vital roles includes ensuring the United States has protection from terrorist activities as well as foreign threat activities. In addition, it mandates upholding and enforcing criminal laws of the U.S. as well as providing criminal justice services and leadership to both federal, state, international agencies as well as municipal. Implementing a better law enforcement initiative in the FBI is therefore very important, as it will strengthen the ability of the FBI when it comes to dealing with the terrorist as well as ensuring the nation has protection from other foreign threats. To ensure the success of the initiative, most of the stakeholders will be technological companies. Technological companies will ensure the success of the action reaches achievement. The target audience will be the leaders of the FBI agents, as this will ensure that the information reaches the rest of the FBI fraternity.
  • 14. References Crime Analysis and Patterns. (n.d.). The International Crime Drop. doi:10.1057/9781137291462.0014 Crime Analysis: Fighting Crime with Data. (2017, June 12). Retrieved from https://www.floridatechonline.com/blog/criminal-justice/crime- analysis-fighting-crime-with-data/ Crime Analysts Fight Crime From Behind a Keyboard. (2019, July 29). Retrieved from https://online.campbellsville.edu/criminal-justice/crime- analysts/ Federal Bureau of Investigation (FBI): History, Role & Purpose. (n.d.). Retrieved from https://study.com/academy/lesson/federal-bureau-of- investigation-fbi-history-role-purpose.html Osborne, D., & Wernicke, S. (2013). Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice. London, England: Routledge. Santos, R. B. (2012). Crime Analysis With Crime Mapping. SAGE. The United States. Federal Bureau of Investigation. (n.d.). The FBI Story. Crime Analysis technology: This area has become the most important asset in the modern world. This topic interest me because it is the most common denominator between law enforcers and law offenders. What is also interesting is that information technology is literally at the fingertips of everybody. It is more interesting and feasible because it is one of the more effective ways of solving crime whether it is a detective triangulating signal off a cellphone tower to place an alleged killer in the area of a crime or doing a scan of a confiscated computer to detect inappropriate
  • 15. pornography. This is an interesting topic because it addresses developments that can be used to collect enormous amounts of evidence in crimes. However, it might be less feasible than the other topics due to the devastating effects that a mistake caused in this field can have on the universe. For my Capstone Project I choose Crime Analysis Technology and techniques of fighting crimes. There is so much crime solving, current or cold case based on ever-evolving technology and the access it gives crime fighters. I believe extensive research and knowledge of this topic is researchable as well as presentable. The current technology and social media craze, law enforcement needs to take advantage of it and to society needs to be knowledgeable of how safe or dangerous it can be.