SlideShare a Scribd company logo
1 of 14
Question B
In other classes you will have met the HTP/HPI methodology
with its accreditation as Certified Performance Technologist
(CPT). Based on your article and text readings address how
ethics impact the performance improvement and learning
consultant.
Progressive Case Study Discussion
MacArthur and Associates is a business solutions organization.
The company was founded in 1962 and is celebrating 50 years
in business. The company started as a small temporary
personnel firm. Eventually, the company expanded into a firm
that specializes in staffing, contract IT services, equipment
leasing, and HR services. The company is privately held by the
MacArthur family. The founder’s son is currently the CEO and
daughter is the CFO. Both the son and daughter were brought
up in the firm and assumed their positions when their father
retired 10 years ago.
MacArthur and Associates has regional offices in most states
and the corporate office is located in Dallas, Texas. MacArthur
provides services to approximately 5000 businesses nationally
catering to the small and medium sized businesses with
revenues under $100,000,000. MacArthur provides services
through either their staff or personnel of around 20,000
temporary and fulltime service providers. Full-time employees
number at 500 nationally.
The company is financially sound and has traditionally small to
moderate growth annually. At 50 years old, the company is
positioned to make significant growth. MacArthur is looking to
improve performance as well as their ability to function as a
learning organization. You (the leader) and your team have
been hired as consultants to assist them with making the
necessary changes. Apply the theories, concepts, and
applications you learned throughout the course. Feel free to
incorporate other components that will realistically improve the
scenario. You will present the top three models for them to
consider. Include your ethical guidelines as a consultant. The
report should be a minimum of 200 words with supporting
references. Please make a recommendation with your
explanation for each model. Be sure to participate among your
classmates by sharing your thoughts on their theories and
strategies, as well.
should be 75 to 150 words, but may go longer depending on the
topic.If you use any source outside of your own thoughts, you
should reference that source.Include solid grammar,
punctuation, sentence structure, and spelling
RUNNING HEAD: DATA COLLECTION1
RUNNING HEAD: CRIME DATA SOURCES 3
The data that I have researched to show that there is a problem
regarding raising cases of homicide is obtained from the
National Incident-Based Reporting System (NIRS). This
database contains information of all the homicide incidents
reported to police. The study has the assumption that all
homicide crimes have been reported. The second source of data
is using previously research article through conducting a
systematic review of published work.
The sources of data for this research is a crime and research
databases. These databases contain crime data in the form of
national statistics. The data for the research is obtained directly
from the National Incident-Based Reporting System (NIRS).
Data from this system has not been analysed and is considered
raw data (Bierie, 2015). The NIRS is considered an advanced
system of Uniform Crime Reporting System. The NIRS contain
all information about arrests and crime arrested for. The data
has information regarding the victims and their relationship
with the offenders, the crimes committed, injuries obtained, the
weapons used, the location of the crimes and the type of
weapons used (Bierie, 2015). For this study, the NIRS database
is considered having adequate crime data that can be used in
responding to the objectives of the current investigation.
The second source of data is the systematic review of previous
researchers. Previous researchers contained analysed data
specific to difference researcher objective. Systematic review
data are specific to issues of concern (Alves et al., 2015). Data
from the systematic review will also assist in developing a
specific topic of inquiry through the study’s gap identification.
For the currently proposed study, the chosen data sources are
specific to incidents and comparing these incidents to
understanding the crime and its fuller impact in the society.
Combined agency and scholarly research help in understanding
homicide trends so that adequate crime mitigation strategies can
be achieved.
Reference
Alves, L. G. A., Lenzi, E. K., Mendes, R. S., & Ribeiro, H. V.
(2015). Spatial correlations, clustering and percolation-like
transitions in homicide crimes. EPL (Europhysics Letters),
111(1), 18002.
Bierie, D. M. (2015). Enhancing the National Incident-Based
Reporting System: A Policy Proposal. International journal of
offender therapy and comparative criminology, 59(10), 1125-
1143.
RUNNING HEAD: TECHNOLOGHY INFLUENCES
1
RUNNING HEAD: TECHNOLOGHY INFLUENCES
5
Technology Influences
One of the criminal justice problems which technology and
information systems have contributed to is the flourishment of
criminal gangs. Criminal gangs are social groups of individuals
that assemble with the intention of committing violent crimes or
drug offenses. New and emerging technologies and information
system are increasingly being adopted by criminal gangs in
perpetrating various crimes. The wider adoption of technology
by criminal gangs poses a great challenge to law enforcement
agencies. Gangs have been lured to adopt technology given the
ease with which they can set up cybercrime campaigns as well
as offer their online crime services. This includes the use of
ransomware to generate cash that is then used to bankroll
criminal activities including people and drug trafficking. Gangs
are also leveraging on technology to help make the well-
established crimes more profitable. For instance, gangs are now
using drones to traffic drugs across borders. Some gangs also
track social media to determine when people are not in their
homes so as to commit burglaries.
Gangs not only use technology as a facilitator for traditional
crimes such as child pornography but also as a means of
offending. Today, gangs are involved in digital piracy, hacking,
money laundering and identity fraud. The returns from these
crimes are then used to fund other more damaging crimes such
as child trafficking. Organized criminal gangs are also
leveraging on technology to evade law enforcement agencies.
The numerous number of encrypted messaging apps and mobile
devices enable gangs to communicate without detection from
law enforcement. Moreover, they are protected by privacy laws
which prohibit the government from tracking their
communications (Marshall & Thomas, 2017). This is one of the
challenges that face law enforcement efforts towards breaking
up gangs.
Although criminal gangs leverage on technology and
information systems to commit a crime, law enforcement
agencies can also leverage on technology to dismantle criminal
gangs. Among the technologies to hold promise in this regard is
big data and data analytics. Law enforcement can leverage on
big data and analytic tools such as social network analysis to
detect criminal gangs as well as understand their behavior
(McGuire & Holt, 2017). Social network analysis tools provide
vivid insight into the nature of society and how various actors
are connected to each other. Organized crime actors are just as
social as other social groups. Consequently, social network
analysis techniques can be employed to tease apart the
relationship between various members of gangs. For instance,
the police can leverage on mobile phone data to recreate the
networks that facilitate gang activity. This can then be mined to
enable law enforcers to understand the hierarchies within the
gangs as well as how the various subgroups are connected. This
can facilitate law enforcement officers to identify where to
concentrate their efforts.
Big data in combination with artificial intelligence also
arguments law enforcement agencies in dealing with organized
criminal gangs. An example of the application of artificial
intelligence in tackling criminal gangs is the use of “Predictive
policing”. This involves leveraging on data and predictive
algorithms to predict places, where crimes might take place, can
also curb street violence and even gangs (Moriarty, 2017). This
is because such technologies ensure that law enforcement agents
are deployed invulnerable areas where they would make a
difference rather than being randomly deployed. Technology
also enables law enforcement to detect crimes and prevent them
before they occur.
References
Marshall, D., & Thomas, T. (2017). Privacy and criminal
justice. Cham: Palgrave Macmillan.
McGuire, M., & Holt, T. (2017). The Routledge handbook of
technology, crime and justice. New York: Taylor & Francis
Group.
Moriarty, L. (2017). Criminal justice technology in the 21st
century. Springfield: Thomas.
Running head: INTERNAL AND EXTERNAL
STAKEHOLDERS PROGRAM1
INTERNAL AND EXTERNAL STAKEHOLDERS PROGRAM7
Internal and external stakeholders program
Identify the Internal and External Stakeholders
In general stakeholders include any group or individuals,
whether internal or external who may affect or may be affected
by the mission of a particular organization. For the correctional
facilities or the criminal justice system, these stakeholders
include customers, employees, legislators, government officials,
offenders, department of Correction, private businesses, the
media as well as special interest groups. In order for a
correctional service to be successful, it is important for the
agency to communicate with stakeholders as well as educate
them to gain support for its programs. Correctional facilities
have complex relationships with the stakeholders thus it is
necessary to manage and nurture them properly in order to
maintain their support (Idowu & Louche, 2011).
Discuss how internal or external stakeholders have influenced
the situation in a positive or negative way?
Internal Stakeholders
They include police officers, parole officers, correctional
officers, lawyers, court personnel as well as other individuals’
.The stakeholders who are responsible for enforcing and
interpreting the law form the criminal justice system internally.
Individuals who are convicted of crimes are regarded as internal
stakeholders of the criminal justice system. All these
stakeholders in the criminal justice system are related to each
other and their actions have effect on each other. In order to
perform their job in preventing crime, apprehend officers, as
well as treat offenders, they must work together.
External stakeholders
These stakeholders include elected officials, the media,
businesses, families, schools, groups who are involved in
serving victims of crime and the society in general. All these
have
How will you consider stakeholders in your solution to the
problem?
Individuals and groups behave differently in different
situations. The impact which both internal and external
stakeholders have on an organizational policy depends on their
relationship to the issue of concern as well as the organization
itself or both in some situations (Lacher, 2014). When a list of
possible stakeholders has been created it may be important to
estimate their importance as well as influence on the
organization. Influence is defined based on the power of a
stakeholder in terms of influencing the direction of the project
as well as the outcome. Importance of a stakeholder refers to
those stakeholders whose role is very crucial. Indirect influence
may be realized through:
· The social, economic or political status
· The varying degrees of organization as well as consensus in
groups
· Information influence through links with other groups
· Other stakeholders in assessing their importance to the project
problems
· The ability to influence the control of resources which are
important to the project.
In my solution to my problem will consider stakeholders by
conducting a stakeholder analysis once I have identified both
internal as well as external stakeholders. This will enable me to
categorize them according to the level of influence in the
organization. I will also map the stakeholders by placing each
stakeholder’s position on the stakeholders map according to
their level of influence as well as interest in my program.
I will develop a plan to manage stakeholders .After the process
of identifying stakeholders, categorizing as well as qualified
will develop a communication plan to manage my relationships.
Educate stakeholders. Their trigger points must be understood
in order to educate them for example by considering questions
such as, what information do they expect or who has the best
influence on the stakeholder.
Communicate brand identity. Correctional industries program
should communicate its brand identity in a clear, compelling as
well as consistent manner.
Creation of a communication plan that includes talking points
for stakeholder outreach. This points are aimed at persuasively
supporting my organization‘s mission.
Cultivate champions. Once a stakeholder is identified as a
potential ‘champion’ for my agency ensure that I build
communication strategies so that the stakeholder becomes an
advocate as well as promoter of the organization’s mission
together with its objectives.
Communicate with difficult stakeholders. It is necessary to
understand difficult stakeholders in order to build an affective
relationship development strategy.
Building of strategic alliances. In building strategic alliances, it
is necessary to build the desired outcomes as well as give
clarity about them.
Developing and maintaining security relationships. Reliable
security is important in any correctional facility to secure the
safety of offenders, staff, as well as the public.
Formulating a legislative strategy- The foundation of creating a
sustainable and a variable correctional industries program is
supportive legislative .This provides ongoing opportunities for
long-term prospects of offenders.
Utilizing the media- The media is a crucial tool in exchange of
information .This information is important for educating,
communicating as well as building stakeholder support.
How will you motivate individuals to buy into your solution?
Many correctional industries are not fully prepared for their role
so in order to motivate individuals to buy into my solution, I
will employ trained people so as to motivate correctional
offenders to participate in education programs will also ensure
external motivation from correctional practitioners such as
parole officer will also ensure the importance of enthusiasm as
well as inspiration to motivate offenders to take advantage of
educational facilities. There can also be the use of motivational
interviews to get individuals engage in self-motivation.
Conclusion
In order to ensure success in the criminal justice, a lot should
be invested in the stakeholders to ensure efficiency and
effectiveness.
References
Idowu, S. O., & Louche, C. (2011). Theory and practice of
corporate social responsibility. Heidelberg: Springer.
Lacher, d. O. N. (2014). Contemporary issues in criminal justice
management. S.l.: cognella academic publish.
RUNNING HEAD: CHALLENGING IDENIFICATION
1
CHALLENGE IDENTIFICATION
5
Challenge Identification
The broad area that I choose to focus on in this paper is
corrections and the challenge is wrongful convictions.
The context of the challenge
Wrongful conviction is defined as the act of punishing an
individual for an offense that he or she did not commit. The
concept of wrongful convictions is usually as a result of errors
in the process of justice. Wrongful conviction is a big challenge
in corrections and has seen many serve sentences while they are
innocent. Errors in the judicial system can have highly
contributed to the suffering of innocent people (Medwed, 2017).
The overreliance on forensic science is one factor that has to
lead to the challenge. Forensic science is believed to be a
reliable source of evidence in the correctional system. The use
of forensic evidence is crucial in the judicial system; however,
the evidence must be subjected to thorough evaluation before it
is used. In many occasions, there is mishandling of the evidence
as well as reliance on improper evidence. There is so much trust
that has been placed on the forensic evidence such that the
officers do not take time to adequately analyze it and also
accurately convey it during trials and this leads to the wrongful
convictions.
Coerced confessions have also contributed to wrongful
convictions. This is because the witnesses do not have the will
to provide information and this can lead to giving of false
evidence.
Importance of addressing the problem
It is crucial that the problem of wrongful convictions be
addressed. One of the reasons why this issue should be
addressed is that it has an adverse impact on not only the
victims but also to the family members. Wrongful convictions
sometimes lead to death penalty. When an individual has been
charged with a crime he or she did not commit, he may end up
dying innocently. This is an end of life and denying the person
the right to life. Besides, the death of the victims causes untold
suffering on the family and friends. In other cases, it could
attract life sentences as well as short-term sentences. The
sentencing makes the innocent person not enjoy freedoms of
liberty and control over their lives (Scott, 2010).
Secondly, it is pertinent to address the problem because it is an
indication of a limitation in the criminal justice system. The
general public has faith and trust in the justice system because
it is believed to be the department that should ensure social
control and uphold fairness. When there are numerous cases of
the problem, the public loses faith in it and it implies that the
society does not have any organization to perform this function.
Moreover, wrongful convictions are costly. For instance, when
an offender has been sentenced to a life sentence, the
government incurs various costs to ensure his or her needs are
met while serving this sentence.
Internal and external impact
The victims are highly impacted by the problem. Research has
indicated that wrongful convictions have a significant
physiological impact on the victims and also their families. The
psychological torture has been cited as one of the reasons for
the increased prison suicide rates (Scott, 2010).
Externally, families to this victims are traumatized and
segregated. When their member has been exonerated, it becomes
difficult for him to be absolved back into the family. Besides,
the society may also start discriminating these families.
Solution
The subjection of prisoners to DNA testing after they have been
convicted is one way to solve the problem. Since improper
conveying and evaluation is one of the factors leading to the
challenge, repeating the test after a judgment has been made
will help clear any doubts and confirm that the right offender is
held (Medwed, 2017).
Improved officer training is also another strategy to solve this
problem. The training will focus on areas such as eyewitness
identification as well as questioning to gather evidence. An
officer with the right skills will be in a better place to collect
more reliable evidence than one who is not properly skilled.
References
In Medwed, D. S. (2017). Wrongful convictions and the DNA
revolution: Twenty-five years of freeing the innocent.
Scott, L. (2010). It Never, Ever Ends”: The Psychological
Impact of Wrongful Conviction. American University Criminal
Law Brief 5, 5(2), 10-22. Retrieved from
http://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?art
icle=1063&context=clb
Stojkovic, S., Kalinch D, Klofas .J, (EDS). Criminal Justice
Organizations: Administration and Management 6th ed. (2015,
2012).

More Related Content

Similar to Question BIn other classes you will have met the HTPHPI metho.docx

The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led Policing
Melissa Dudas
 
FINALProject Report for public
FINALProject Report for publicFINALProject Report for public
FINALProject Report for public
Hina Pandya
 
John HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docx
John HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docxJohn HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docx
John HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docx
vrickens
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
drennanmicah
 
7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx
sodhi3
 
7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx
fredharris32
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
Patty Buckley
 
Running Head CRIMINAL JUSTICE SYSTEM .docx
Running Head CRIMINAL JUSTICE SYSTEM                             .docxRunning Head CRIMINAL JUSTICE SYSTEM                             .docx
Running Head CRIMINAL JUSTICE SYSTEM .docx
todd271
 
After reading Chapter 3 of the Mosher textbook, An Arresting Expe.docx
After reading Chapter 3 of the Mosher textbook, An Arresting Expe.docxAfter reading Chapter 3 of the Mosher textbook, An Arresting Expe.docx
After reading Chapter 3 of the Mosher textbook, An Arresting Expe.docx
daniahendric
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
wilcockiris
 
Leveraging Financial Social Media Data forCorporate Fraud De.docx
Leveraging Financial Social Media Data forCorporate Fraud De.docxLeveraging Financial Social Media Data forCorporate Fraud De.docx
Leveraging Financial Social Media Data forCorporate Fraud De.docx
croysierkathey
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
Twittercrisis
 

Similar to Question BIn other classes you will have met the HTPHPI metho.docx (20)

The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led Policing
 
FINALProject Report for public
FINALProject Report for publicFINALProject Report for public
FINALProject Report for public
 
John HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docx
John HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docxJohn HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docx
John HendersonTywon PettyAndrew shearer2.6.2020GSL 630.docx
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
An Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningAn Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine Learning
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
 
7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx
 
7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx7Research and Policy Development Paper.docx
7Research and Policy Development Paper.docx
 
Literature review police
Literature review policeLiterature review police
Literature review police
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
 
Running Head CRIMINAL JUSTICE SYSTEM .docx
Running Head CRIMINAL JUSTICE SYSTEM                             .docxRunning Head CRIMINAL JUSTICE SYSTEM                             .docx
Running Head CRIMINAL JUSTICE SYSTEM .docx
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
 
After reading Chapter 3 of the Mosher textbook, An Arresting Expe.docx
After reading Chapter 3 of the Mosher textbook, An Arresting Expe.docxAfter reading Chapter 3 of the Mosher textbook, An Arresting Expe.docx
After reading Chapter 3 of the Mosher textbook, An Arresting Expe.docx
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
 
Leveraging Financial Social Media Data forCorporate Fraud De.docx
Leveraging Financial Social Media Data forCorporate Fraud De.docxLeveraging Financial Social Media Data forCorporate Fraud De.docx
Leveraging Financial Social Media Data forCorporate Fraud De.docx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
 

More from makdul

According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
makdul
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docx
makdul
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docx
makdul
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docx
makdul
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
makdul
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
makdul
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docx
makdul
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docx
makdul
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
makdul
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docx
makdul
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
makdul
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
makdul
 

More from makdul (20)

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docx
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docx
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docx
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docx
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docx
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docx
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docx
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docx
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docx
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docx
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Question BIn other classes you will have met the HTPHPI metho.docx

  • 1. Question B In other classes you will have met the HTP/HPI methodology with its accreditation as Certified Performance Technologist (CPT). Based on your article and text readings address how ethics impact the performance improvement and learning consultant. Progressive Case Study Discussion MacArthur and Associates is a business solutions organization. The company was founded in 1962 and is celebrating 50 years in business. The company started as a small temporary personnel firm. Eventually, the company expanded into a firm that specializes in staffing, contract IT services, equipment leasing, and HR services. The company is privately held by the MacArthur family. The founder’s son is currently the CEO and daughter is the CFO. Both the son and daughter were brought up in the firm and assumed their positions when their father retired 10 years ago. MacArthur and Associates has regional offices in most states and the corporate office is located in Dallas, Texas. MacArthur provides services to approximately 5000 businesses nationally catering to the small and medium sized businesses with revenues under $100,000,000. MacArthur provides services through either their staff or personnel of around 20,000 temporary and fulltime service providers. Full-time employees number at 500 nationally. The company is financially sound and has traditionally small to moderate growth annually. At 50 years old, the company is positioned to make significant growth. MacArthur is looking to improve performance as well as their ability to function as a learning organization. You (the leader) and your team have been hired as consultants to assist them with making the
  • 2. necessary changes. Apply the theories, concepts, and applications you learned throughout the course. Feel free to incorporate other components that will realistically improve the scenario. You will present the top three models for them to consider. Include your ethical guidelines as a consultant. The report should be a minimum of 200 words with supporting references. Please make a recommendation with your explanation for each model. Be sure to participate among your classmates by sharing your thoughts on their theories and strategies, as well. should be 75 to 150 words, but may go longer depending on the topic.If you use any source outside of your own thoughts, you should reference that source.Include solid grammar, punctuation, sentence structure, and spelling RUNNING HEAD: DATA COLLECTION1 RUNNING HEAD: CRIME DATA SOURCES 3 The data that I have researched to show that there is a problem
  • 3. regarding raising cases of homicide is obtained from the National Incident-Based Reporting System (NIRS). This database contains information of all the homicide incidents reported to police. The study has the assumption that all homicide crimes have been reported. The second source of data is using previously research article through conducting a systematic review of published work. The sources of data for this research is a crime and research databases. These databases contain crime data in the form of national statistics. The data for the research is obtained directly from the National Incident-Based Reporting System (NIRS). Data from this system has not been analysed and is considered raw data (Bierie, 2015). The NIRS is considered an advanced system of Uniform Crime Reporting System. The NIRS contain all information about arrests and crime arrested for. The data has information regarding the victims and their relationship with the offenders, the crimes committed, injuries obtained, the weapons used, the location of the crimes and the type of weapons used (Bierie, 2015). For this study, the NIRS database is considered having adequate crime data that can be used in responding to the objectives of the current investigation. The second source of data is the systematic review of previous researchers. Previous researchers contained analysed data specific to difference researcher objective. Systematic review data are specific to issues of concern (Alves et al., 2015). Data from the systematic review will also assist in developing a specific topic of inquiry through the study’s gap identification. For the currently proposed study, the chosen data sources are specific to incidents and comparing these incidents to understanding the crime and its fuller impact in the society. Combined agency and scholarly research help in understanding homicide trends so that adequate crime mitigation strategies can be achieved. Reference
  • 4. Alves, L. G. A., Lenzi, E. K., Mendes, R. S., & Ribeiro, H. V. (2015). Spatial correlations, clustering and percolation-like transitions in homicide crimes. EPL (Europhysics Letters), 111(1), 18002. Bierie, D. M. (2015). Enhancing the National Incident-Based Reporting System: A Policy Proposal. International journal of offender therapy and comparative criminology, 59(10), 1125- 1143. RUNNING HEAD: TECHNOLOGHY INFLUENCES 1 RUNNING HEAD: TECHNOLOGHY INFLUENCES 5 Technology Influences One of the criminal justice problems which technology and information systems have contributed to is the flourishment of criminal gangs. Criminal gangs are social groups of individuals that assemble with the intention of committing violent crimes or drug offenses. New and emerging technologies and information system are increasingly being adopted by criminal gangs in perpetrating various crimes. The wider adoption of technology by criminal gangs poses a great challenge to law enforcement agencies. Gangs have been lured to adopt technology given the ease with which they can set up cybercrime campaigns as well
  • 5. as offer their online crime services. This includes the use of ransomware to generate cash that is then used to bankroll criminal activities including people and drug trafficking. Gangs are also leveraging on technology to help make the well- established crimes more profitable. For instance, gangs are now using drones to traffic drugs across borders. Some gangs also track social media to determine when people are not in their homes so as to commit burglaries. Gangs not only use technology as a facilitator for traditional crimes such as child pornography but also as a means of offending. Today, gangs are involved in digital piracy, hacking, money laundering and identity fraud. The returns from these crimes are then used to fund other more damaging crimes such as child trafficking. Organized criminal gangs are also leveraging on technology to evade law enforcement agencies. The numerous number of encrypted messaging apps and mobile devices enable gangs to communicate without detection from law enforcement. Moreover, they are protected by privacy laws which prohibit the government from tracking their communications (Marshall & Thomas, 2017). This is one of the challenges that face law enforcement efforts towards breaking up gangs. Although criminal gangs leverage on technology and information systems to commit a crime, law enforcement agencies can also leverage on technology to dismantle criminal gangs. Among the technologies to hold promise in this regard is big data and data analytics. Law enforcement can leverage on big data and analytic tools such as social network analysis to detect criminal gangs as well as understand their behavior (McGuire & Holt, 2017). Social network analysis tools provide vivid insight into the nature of society and how various actors are connected to each other. Organized crime actors are just as
  • 6. social as other social groups. Consequently, social network analysis techniques can be employed to tease apart the relationship between various members of gangs. For instance, the police can leverage on mobile phone data to recreate the networks that facilitate gang activity. This can then be mined to enable law enforcers to understand the hierarchies within the gangs as well as how the various subgroups are connected. This can facilitate law enforcement officers to identify where to concentrate their efforts. Big data in combination with artificial intelligence also arguments law enforcement agencies in dealing with organized criminal gangs. An example of the application of artificial intelligence in tackling criminal gangs is the use of “Predictive policing”. This involves leveraging on data and predictive algorithms to predict places, where crimes might take place, can also curb street violence and even gangs (Moriarty, 2017). This is because such technologies ensure that law enforcement agents are deployed invulnerable areas where they would make a difference rather than being randomly deployed. Technology also enables law enforcement to detect crimes and prevent them before they occur.
  • 7. References Marshall, D., & Thomas, T. (2017). Privacy and criminal justice. Cham: Palgrave Macmillan. McGuire, M., & Holt, T. (2017). The Routledge handbook of technology, crime and justice. New York: Taylor & Francis Group. Moriarty, L. (2017). Criminal justice technology in the 21st century. Springfield: Thomas. Running head: INTERNAL AND EXTERNAL STAKEHOLDERS PROGRAM1 INTERNAL AND EXTERNAL STAKEHOLDERS PROGRAM7 Internal and external stakeholders program Identify the Internal and External Stakeholders In general stakeholders include any group or individuals, whether internal or external who may affect or may be affected by the mission of a particular organization. For the correctional facilities or the criminal justice system, these stakeholders include customers, employees, legislators, government officials, offenders, department of Correction, private businesses, the media as well as special interest groups. In order for a correctional service to be successful, it is important for the agency to communicate with stakeholders as well as educate them to gain support for its programs. Correctional facilities have complex relationships with the stakeholders thus it is necessary to manage and nurture them properly in order to
  • 8. maintain their support (Idowu & Louche, 2011). Discuss how internal or external stakeholders have influenced the situation in a positive or negative way? Internal Stakeholders They include police officers, parole officers, correctional officers, lawyers, court personnel as well as other individuals’ .The stakeholders who are responsible for enforcing and interpreting the law form the criminal justice system internally. Individuals who are convicted of crimes are regarded as internal stakeholders of the criminal justice system. All these stakeholders in the criminal justice system are related to each other and their actions have effect on each other. In order to perform their job in preventing crime, apprehend officers, as well as treat offenders, they must work together. External stakeholders These stakeholders include elected officials, the media, businesses, families, schools, groups who are involved in serving victims of crime and the society in general. All these have How will you consider stakeholders in your solution to the problem? Individuals and groups behave differently in different situations. The impact which both internal and external stakeholders have on an organizational policy depends on their relationship to the issue of concern as well as the organization itself or both in some situations (Lacher, 2014). When a list of possible stakeholders has been created it may be important to estimate their importance as well as influence on the organization. Influence is defined based on the power of a stakeholder in terms of influencing the direction of the project as well as the outcome. Importance of a stakeholder refers to those stakeholders whose role is very crucial. Indirect influence may be realized through: · The social, economic or political status · The varying degrees of organization as well as consensus in groups
  • 9. · Information influence through links with other groups · Other stakeholders in assessing their importance to the project problems · The ability to influence the control of resources which are important to the project. In my solution to my problem will consider stakeholders by conducting a stakeholder analysis once I have identified both internal as well as external stakeholders. This will enable me to categorize them according to the level of influence in the organization. I will also map the stakeholders by placing each stakeholder’s position on the stakeholders map according to their level of influence as well as interest in my program. I will develop a plan to manage stakeholders .After the process of identifying stakeholders, categorizing as well as qualified will develop a communication plan to manage my relationships. Educate stakeholders. Their trigger points must be understood in order to educate them for example by considering questions such as, what information do they expect or who has the best influence on the stakeholder. Communicate brand identity. Correctional industries program should communicate its brand identity in a clear, compelling as well as consistent manner. Creation of a communication plan that includes talking points for stakeholder outreach. This points are aimed at persuasively supporting my organization‘s mission. Cultivate champions. Once a stakeholder is identified as a potential ‘champion’ for my agency ensure that I build communication strategies so that the stakeholder becomes an advocate as well as promoter of the organization’s mission together with its objectives. Communicate with difficult stakeholders. It is necessary to understand difficult stakeholders in order to build an affective relationship development strategy. Building of strategic alliances. In building strategic alliances, it is necessary to build the desired outcomes as well as give clarity about them.
  • 10. Developing and maintaining security relationships. Reliable security is important in any correctional facility to secure the safety of offenders, staff, as well as the public. Formulating a legislative strategy- The foundation of creating a sustainable and a variable correctional industries program is supportive legislative .This provides ongoing opportunities for long-term prospects of offenders. Utilizing the media- The media is a crucial tool in exchange of information .This information is important for educating, communicating as well as building stakeholder support. How will you motivate individuals to buy into your solution? Many correctional industries are not fully prepared for their role so in order to motivate individuals to buy into my solution, I will employ trained people so as to motivate correctional offenders to participate in education programs will also ensure external motivation from correctional practitioners such as parole officer will also ensure the importance of enthusiasm as well as inspiration to motivate offenders to take advantage of educational facilities. There can also be the use of motivational interviews to get individuals engage in self-motivation. Conclusion In order to ensure success in the criminal justice, a lot should be invested in the stakeholders to ensure efficiency and effectiveness. References Idowu, S. O., & Louche, C. (2011). Theory and practice of corporate social responsibility. Heidelberg: Springer. Lacher, d. O. N. (2014). Contemporary issues in criminal justice management. S.l.: cognella academic publish.
  • 11. RUNNING HEAD: CHALLENGING IDENIFICATION 1 CHALLENGE IDENTIFICATION 5 Challenge Identification The broad area that I choose to focus on in this paper is corrections and the challenge is wrongful convictions. The context of the challenge Wrongful conviction is defined as the act of punishing an individual for an offense that he or she did not commit. The concept of wrongful convictions is usually as a result of errors in the process of justice. Wrongful conviction is a big challenge in corrections and has seen many serve sentences while they are innocent. Errors in the judicial system can have highly
  • 12. contributed to the suffering of innocent people (Medwed, 2017). The overreliance on forensic science is one factor that has to lead to the challenge. Forensic science is believed to be a reliable source of evidence in the correctional system. The use of forensic evidence is crucial in the judicial system; however, the evidence must be subjected to thorough evaluation before it is used. In many occasions, there is mishandling of the evidence as well as reliance on improper evidence. There is so much trust that has been placed on the forensic evidence such that the officers do not take time to adequately analyze it and also accurately convey it during trials and this leads to the wrongful convictions. Coerced confessions have also contributed to wrongful convictions. This is because the witnesses do not have the will to provide information and this can lead to giving of false evidence. Importance of addressing the problem It is crucial that the problem of wrongful convictions be addressed. One of the reasons why this issue should be addressed is that it has an adverse impact on not only the victims but also to the family members. Wrongful convictions sometimes lead to death penalty. When an individual has been charged with a crime he or she did not commit, he may end up dying innocently. This is an end of life and denying the person the right to life. Besides, the death of the victims causes untold suffering on the family and friends. In other cases, it could attract life sentences as well as short-term sentences. The sentencing makes the innocent person not enjoy freedoms of liberty and control over their lives (Scott, 2010). Secondly, it is pertinent to address the problem because it is an indication of a limitation in the criminal justice system. The general public has faith and trust in the justice system because it is believed to be the department that should ensure social
  • 13. control and uphold fairness. When there are numerous cases of the problem, the public loses faith in it and it implies that the society does not have any organization to perform this function. Moreover, wrongful convictions are costly. For instance, when an offender has been sentenced to a life sentence, the government incurs various costs to ensure his or her needs are met while serving this sentence. Internal and external impact The victims are highly impacted by the problem. Research has indicated that wrongful convictions have a significant physiological impact on the victims and also their families. The psychological torture has been cited as one of the reasons for the increased prison suicide rates (Scott, 2010). Externally, families to this victims are traumatized and segregated. When their member has been exonerated, it becomes difficult for him to be absolved back into the family. Besides, the society may also start discriminating these families. Solution The subjection of prisoners to DNA testing after they have been convicted is one way to solve the problem. Since improper conveying and evaluation is one of the factors leading to the challenge, repeating the test after a judgment has been made will help clear any doubts and confirm that the right offender is
  • 14. held (Medwed, 2017). Improved officer training is also another strategy to solve this problem. The training will focus on areas such as eyewitness identification as well as questioning to gather evidence. An officer with the right skills will be in a better place to collect more reliable evidence than one who is not properly skilled. References In Medwed, D. S. (2017). Wrongful convictions and the DNA revolution: Twenty-five years of freeing the innocent. Scott, L. (2010). It Never, Ever Ends”: The Psychological Impact of Wrongful Conviction. American University Criminal Law Brief 5, 5(2), 10-22. Retrieved from http://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?art icle=1063&context=clb Stojkovic, S., Kalinch D, Klofas .J, (EDS). Criminal Justice Organizations: Administration and Management 6th ed. (2015, 2012).