SlideShare a Scribd company logo
1 of 15
Running head: CRIME ANALYSIS TECHNOLOGY
1
CRIME ANALYSIS TECHNOLOGY
9
Crime Analysis Technology
Student’s Name
Institutional Affiliation
Crime Analysis Technology
Peer-Reviewed Article Analysis
Technology has evolved over the years in various sectors, with
new technological innovations being developed. One of the
areas that has witnessed great applications of technological
evolution is in the detection and prevention of crime. This
article will analyze the various technologies that are used to
prevent and detect crime.
Byrne and Marx (2011) in their article reviews the topic in
detail and gives insight in the role of technology in combating
crime.
The key data that will be used in this research is secondary data
from various peer-reviewed sources that review the topic of
Crime Analysis Technology from various perspectives. Byrne
and Marx (2011) presents various data on crime and the use of
Information Technology in crime detection and prevention. For
instance, it highlights that the percentage of schools in the
United States that deploy metal detectors is approximately 2%.
The article also approximates that as of 2006, one million
CCTV cameras had been deployed in the United States,
although the article does not provide current estimates on the
same.
The article plays a great role in my final research. It gives a
highlight of the various technological applications for crime
prevention and detection. This can provide a background for
further research, especially the technological innovations that
are currently being developed. The article also presents figures
about various elements of technology in crime prevention and
detection such as the number of CCTV cameras, the crime rates
such as the registered sex offenders, among others. Projections
can therefore be made to the future.
The article mentions several significant facts. First, it classifies
technological innovations in criminal justice as hard technology
versus soft technology. Hard technology innovations include
hardware and materials while soft technology innovations
include information systems and computer software. Examples
of hard technology is the CCTV cameras, metal detectors, and
security systems at homes and schools. Examples of soft
technology include predictive policing technology, crime
analysis techniques, software, and data sharing techniques,
among others. Both of the two categories of technological
innovations are important in criminal justice. Another fact is the
new technology of policing. The article identifies hard policing
technological tools such as non-lethal weaponry and
technologies for officer safety. It highlights soft policing
technologies such as data-driven policies in policing and
information sharing. Another important fact that the article
mentions is the issues that should be considered in
technological innovations in criminal justice. Some of the issues
mentioned in the article is that policy should be determined by
research and evaluation and using evidence-based practice
should be used to develop new programs or remodel the existing
ones.
Overall, the article provides a good background for further
research in technology in criminal justice system. More
innovations may be included in further research due to ongoing
technological innovations for crime prevention and detection.
For example, further research should look at technological
innovations to curb cyber-bullying due to the huge impact of
social media.
References
Byrne, J. & Marx, G. (2011). Technological Innovations in
Crime Prevention and Policing. A
Review of the Research on Implementation and Impact.
Retrieved from
https://www.ncjrs.gov/pdffiles1/nij/238011.pdf
Running head:
CRIME ANALYSI
S
TECHNOLOGY
1
Crime Analys
is Technology
Student’s Name
Institutional Affiliation
Running head: CRIME ANALYSIS TECHNOLOGY
1
Crime Analysis Technology
Student’s Name
Institutional Affiliation
Unit 3.2: Peer Review Article
With your research, you will be reviewing a total of four (4)
peer reviewed articles. For this discussion board, attach 1 of
your articles and summarize it briefly for your peers.
· What key data will you be using for your research?
· How do you think this article will play a role in your final
research?
· What are the 3 most important facts do you think this article
covers?
The key data I will be using in my research is what is most and
least common to society in the technology era. Anything from
mobile phone technology, social media investigation and safety,
to computer analyst software and safety, also how law
enforcement uses the same tools and more to prevent,
investigate, and catch an offender. The three most important
facts this article will provide is information on the devices,
tools, and techniques that is most important to the research
O, U. S. D. (2007). Investigative Uses of Technology: Devices,
Tools, and Techniques. Retrieved January 30, 2020, from
https://www.crime-scene-investigator.net/investigative-uses-of-
technology-devices-tools-and-techniques.html
Running head: DATA
1
DATA
9
Data
Student’s Name
Institutional Affiliation
Data
There are many approaches of managing and storing data.
Spreadsheets and databases are some of the most common
approaches of handling data. The choice one uses should be
based on ease of use, analytical capabilities, and the efficiency
of the system, data integrity, among other reasons. A
spreadsheet has data arranged in rows and columns. One of the
most common spreadsheets packages is Microsoft Excel.
Databases have data arranged in structured ways.
For my data, I will use databases. This is because they have
many advantages over spreadsheets. First, they enhance data
quality checks. This is because databases allow certain variables
as the only possible entries. For instance, if the input is either
male or female, the database will not accept any other entry.
Databases also have a feature that check for duplication,
something which is not available in spreadsheets (Matthews,
2010). Another reason for the use of databases is that databases
allows the integration of data, a function that spreadsheets can
also perform but through custom programming which may
require additional technical expertise. Databases are also
resource efficient if large volumes of data are involved
compared to spreadsheets. Databases also allow for user
efficiency because the display of data can be tailored to a user’s
need. For example, a user may get the information he needs
from a database easily without going through all the data
contained in the database. Databases also ensure cost efficiency
when large volumes of data are involved (Matthews, 2010).
However, the volume of data may determine whether to use a
spreadsheet or a database. In some situations where simplicity
is desired and the volume of data is low, it may be advantageous
to use a spreadsheet such as Excel because many people are
aware of how to use it.
To organize my data into a database, I will name the database,
identify the objects, define and name a table for each object,
identify the attributes associated with each object, define and
name columns, and determine the primary key.
References
Matthews, A. (2010). Spreadsheets & databases. Pretoria:
MattLo
Running head:
DATA
1
Data
Student’s Name
Institutional Affiliation
Running head: DATA
1
Data
Student’s Name
Institutional Affiliation
Running head: CRIME ANALYSIS
1
CRIME ANALYSIS TECHNOLOGY
5
Crime Analysis Technology
Crime analysis is a function that usually involves the systemic
analysis in identifying as well as analyzing the crime patterns
and trends. Crime analysis is very important for law
enforcement agencies as it helps law enforcers effectively
deploy the available resources in a better and effective manner,
which enables them to identify and apprehend suspects. Crime
analysis is also very significant when it comes to arriving at
solutions devised to come up with the right solution to solve the
current crime problem and issues as well as coming up with the
right prevention strategies. Since the year 2014, crime rates in
the USA have increased steadily as per a study done by
USAFacts, which is a non-partisan initiative (Osborne &
Wernicke, 2013). With this increase in crime rates, which has
majorly resulted in massive growth in technology, it is essential
to come up with better means and ways of dealing with the
increased crime rates. With the current advancement in
technology, better law enforcement tools developed, which has
enabled better crime deterrence in better and efficient ways. All
this has been facilitated by the efforts of crime analysts who
have come up with better tools and thus enabling the law
enforcers to better deal with the crimes (Osborne & Wernicke,
2013). In this paper, I will consider the application of crime
analysis technology and techniques in fighting crimes.
Application of crime analysis technology and techniques used to
make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in
predictive policing software have enabled security agencies to
effectively use predictive policing ("Crime Analysis: Fighting
Crime with Data," 2017). Application of this software has
enabled better crime prevention as with data obtained in the
previous crimes have been used to predict possible future severe
crimes in a specific area.
Through the adoption and use of crime analysis, law
enforcement agencies have been able to fight against crimes as
when compared with the past effectively. The use of crime
analysis comes at the right time, where there has been an
increase in crime rates in the current digital error. In a survey
done by Wynyard group in 2015, the study revealed that for
every 10 law enforcement officials 9 of them believe that the
use of current technology in crime analysis has had positive
effects in helping the agencies in solving crimes as they can
identify essential links and trends in crimes ("Crime Analysis:
Fighting Crime with Data," 2017). In the same way, other
sectors have benefited from data analysis with spreadsheets,
databases, and mapping, law enforcers have been able to use
data analysis to come up with a better decision. Crime analysis
has had many positive impacts in different areas, which
includes robberies and arsons with pattern examining as well as
reviewing events sequence (Santos, 2012).
Use crime analysis technology is very useful in fighting
terrorism activities through analysis of previous crimes and thus
predicting any intended cyber-attacks. One of the most
important federal agency mandated to deal with terrorist
activity is the FBI. Therefore, be essential to implementing the
initiative to the FBI agent. FBI is a U.S. domestic security and
intelligence service. The FBI operates under the United States
department of justice jurisdiction and usually reports to the
director of national intelligence and attorney general. FBI is the
United States leading organization when it comes to matters
aimed at countering terrorist activities as well as investigation
of criminal activities. The FBI formed in 1908, the organization
currently has about 35,204 employees and its headquarters are
in Washington, D.C. Having being involved in both law
enforcing responsibilities as well as intelligence, the FBI is
unique as it has dual responsibilities and thus significant agency
in the U.S. Some of the vital roles includes ensuring the United
States has protection from terrorist activities as well as foreign
threat activities. In addition, it mandates upholding and
enforcing criminal laws of the U.S. as well as providing
criminal justice services and leadership to both federal, state,
international agencies as well as municipal. Implementing a
better law enforcement initiative in the FBI is therefore very
important, as it will strengthen the ability of the FBI when it
comes to dealing with the terrorist as well as ensuring the
nation has protection from other foreign threats. To ensure the
success of the initiative, most of the stakeholders will be
technological companies. Technological companies will ensure
the success of the action reaches achievement. The target
audience will be the leaders of the FBI agents, as this will
ensure that the information reaches the rest of the FBI
fraternity.
References
Crime Analysis and Patterns. (n.d.). The International Crime
Drop. doi:10.1057/9781137291462.0014
Crime Analysis: Fighting Crime with Data. (2017, June 12).
Retrieved from
https://www.floridatechonline.com/blog/criminal-justice/crime-
analysis-fighting-crime-with-data/
Crime Analysts Fight Crime From Behind a Keyboard. (2019,
July 29). Retrieved from
https://online.campbellsville.edu/criminal-justice/crime-
analysts/
Federal Bureau of Investigation (FBI): History, Role & Purpose.
(n.d.). Retrieved from
https://study.com/academy/lesson/federal-bureau-of-
investigation-fbi-history-role-purpose.html
Osborne, D., & Wernicke, S. (2013). Introduction to Crime
Analysis: Basic Resources for Criminal Justice Practice.
London, England: Routledge.
Santos, R. B. (2012). Crime Analysis With Crime Mapping.
SAGE.
The United States. Federal Bureau of Investigation. (n.d.). The
FBI Story.
Crime Analysis technology:
This area has become the most important asset in the modern
world. This topic interest me because it is the most common
denominator between law enforcers and law offenders. What is
also interesting is that information technology is literally at the
fingertips of everybody. It is more interesting and feasible
because it is one of the more effective ways of solving crime
whether it is a detective triangulating signal off a cellphone
tower to place an alleged killer in the area of a crime or doing a
scan of a confiscated computer to detect inappropriate
pornography. This is an interesting topic because it addresses
developments that can be used to collect enormous amounts of
evidence in crimes. However, it might be less feasible than the
other topics due to the devastating effects that a mistake caused
in this field can have on the universe.
For my Capstone Project I choose Crime Analysis Technology
and techniques of fighting crimes. There is so much crime
solving, current or cold case based on ever-evolving technology
and the access it gives crime fighters. I believe extensive
research and knowledge of this topic is researchable as well as
presentable. The current technology and social media craze, law
enforcement needs to take advantage of it and to society needs
to be knowledgeable of how safe or dangerous it can be.

More Related Content

Similar to Running head CRIME ANALYSIS TECHNOLOGY .docx

A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramAimee Brown
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmIJERA Editor
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docxdrennanmicah
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
Text mining on criminal documents
Text mining on criminal documentsText mining on criminal documents
Text mining on criminal documentsZhongLI28
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisZhongLI28
 
An Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningAn Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningSonali Chawla
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docxmehek4
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docxmattinsonjanel
 
Correlation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentCorrelation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentIJERA Editor
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGIJDKP
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGIJDKP
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
 

Similar to Running head CRIME ANALYSIS TECHNOLOGY .docx (20)

A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer Program
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithm
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Text mining on criminal documents
Text mining on criminal documentsText mining on criminal documents
Text mining on criminal documents
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
 
An Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningAn Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine Learning
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
 
Correlation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentCorrelation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data Environment
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
 

More from todd271

Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docxRunning head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docxtodd271
 
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docxtodd271
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxtodd271
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxtodd271
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxtodd271
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxtodd271
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxtodd271
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxtodd271
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docxtodd271
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docxtodd271
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxtodd271
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxtodd271
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docxtodd271
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docxtodd271
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxtodd271
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxtodd271
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxtodd271
 
Running head COMPANY NAME .docx
Running head COMPANY NAME                                      .docxRunning head COMPANY NAME                                      .docx
Running head COMPANY NAME .docxtodd271
 
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docxRunning head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docxtodd271
 

More from todd271 (20)

Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docxRunning head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
 
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docx
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docx
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docx
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docx
 
Running head COMPANY NAME .docx
Running head COMPANY NAME                                      .docxRunning head COMPANY NAME                                      .docx
Running head COMPANY NAME .docx
 
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docxRunning head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
Running head COURT MANAGEMENT POLICY1COURT MANAGEMENT P.docx
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Running head CRIME ANALYSIS TECHNOLOGY .docx

  • 1. Running head: CRIME ANALYSIS TECHNOLOGY 1 CRIME ANALYSIS TECHNOLOGY 9 Crime Analysis Technology Student’s Name Institutional Affiliation Crime Analysis Technology Peer-Reviewed Article Analysis Technology has evolved over the years in various sectors, with new technological innovations being developed. One of the areas that has witnessed great applications of technological
  • 2. evolution is in the detection and prevention of crime. This article will analyze the various technologies that are used to prevent and detect crime. Byrne and Marx (2011) in their article reviews the topic in detail and gives insight in the role of technology in combating crime. The key data that will be used in this research is secondary data from various peer-reviewed sources that review the topic of Crime Analysis Technology from various perspectives. Byrne and Marx (2011) presents various data on crime and the use of Information Technology in crime detection and prevention. For instance, it highlights that the percentage of schools in the United States that deploy metal detectors is approximately 2%. The article also approximates that as of 2006, one million CCTV cameras had been deployed in the United States, although the article does not provide current estimates on the same. The article plays a great role in my final research. It gives a highlight of the various technological applications for crime prevention and detection. This can provide a background for further research, especially the technological innovations that are currently being developed. The article also presents figures about various elements of technology in crime prevention and detection such as the number of CCTV cameras, the crime rates such as the registered sex offenders, among others. Projections can therefore be made to the future. The article mentions several significant facts. First, it classifies technological innovations in criminal justice as hard technology versus soft technology. Hard technology innovations include hardware and materials while soft technology innovations include information systems and computer software. Examples of hard technology is the CCTV cameras, metal detectors, and security systems at homes and schools. Examples of soft technology include predictive policing technology, crime analysis techniques, software, and data sharing techniques, among others. Both of the two categories of technological
  • 3. innovations are important in criminal justice. Another fact is the new technology of policing. The article identifies hard policing technological tools such as non-lethal weaponry and technologies for officer safety. It highlights soft policing technologies such as data-driven policies in policing and information sharing. Another important fact that the article mentions is the issues that should be considered in technological innovations in criminal justice. Some of the issues mentioned in the article is that policy should be determined by research and evaluation and using evidence-based practice should be used to develop new programs or remodel the existing ones. Overall, the article provides a good background for further research in technology in criminal justice system. More innovations may be included in further research due to ongoing technological innovations for crime prevention and detection. For example, further research should look at technological innovations to curb cyber-bullying due to the huge impact of social media. References Byrne, J. & Marx, G. (2011). Technological Innovations in Crime Prevention and Policing. A Review of the Research on Implementation and Impact. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/238011.pdf Running head:
  • 4. CRIME ANALYSI S TECHNOLOGY 1 Crime Analys is Technology Student’s Name Institutional Affiliation
  • 5. Running head: CRIME ANALYSIS TECHNOLOGY 1 Crime Analysis Technology Student’s Name Institutional Affiliation Unit 3.2: Peer Review Article With your research, you will be reviewing a total of four (4) peer reviewed articles. For this discussion board, attach 1 of your articles and summarize it briefly for your peers. · What key data will you be using for your research?
  • 6. · How do you think this article will play a role in your final research? · What are the 3 most important facts do you think this article covers? The key data I will be using in my research is what is most and least common to society in the technology era. Anything from mobile phone technology, social media investigation and safety, to computer analyst software and safety, also how law enforcement uses the same tools and more to prevent, investigate, and catch an offender. The three most important facts this article will provide is information on the devices, tools, and techniques that is most important to the research O, U. S. D. (2007). Investigative Uses of Technology: Devices, Tools, and Techniques. Retrieved January 30, 2020, from https://www.crime-scene-investigator.net/investigative-uses-of- technology-devices-tools-and-techniques.html Running head: DATA 1 DATA 9 Data
  • 7. Student’s Name Institutional Affiliation Data There are many approaches of managing and storing data. Spreadsheets and databases are some of the most common approaches of handling data. The choice one uses should be based on ease of use, analytical capabilities, and the efficiency of the system, data integrity, among other reasons. A spreadsheet has data arranged in rows and columns. One of the most common spreadsheets packages is Microsoft Excel. Databases have data arranged in structured ways. For my data, I will use databases. This is because they have many advantages over spreadsheets. First, they enhance data quality checks. This is because databases allow certain variables as the only possible entries. For instance, if the input is either male or female, the database will not accept any other entry. Databases also have a feature that check for duplication, something which is not available in spreadsheets (Matthews, 2010). Another reason for the use of databases is that databases allows the integration of data, a function that spreadsheets can also perform but through custom programming which may require additional technical expertise. Databases are also resource efficient if large volumes of data are involved compared to spreadsheets. Databases also allow for user efficiency because the display of data can be tailored to a user’s
  • 8. need. For example, a user may get the information he needs from a database easily without going through all the data contained in the database. Databases also ensure cost efficiency when large volumes of data are involved (Matthews, 2010). However, the volume of data may determine whether to use a spreadsheet or a database. In some situations where simplicity is desired and the volume of data is low, it may be advantageous to use a spreadsheet such as Excel because many people are aware of how to use it. To organize my data into a database, I will name the database, identify the objects, define and name a table for each object, identify the attributes associated with each object, define and name columns, and determine the primary key. References Matthews, A. (2010). Spreadsheets & databases. Pretoria: MattLo
  • 10. Running head: DATA 1 Data Student’s Name Institutional Affiliation Running head: CRIME ANALYSIS 1 CRIME ANALYSIS TECHNOLOGY 5
  • 11. Crime Analysis Technology Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who
  • 12. have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient. Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area. Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis has had many positive impacts in different areas, which includes robberies and arsons with pattern examining as well as reviewing events sequence (Santos, 2012). Use crime analysis technology is very useful in fighting terrorism activities through analysis of previous crimes and thus predicting any intended cyber-attacks. One of the most important federal agency mandated to deal with terrorist activity is the FBI. Therefore, be essential to implementing the initiative to the FBI agent. FBI is a U.S. domestic security and
  • 13. intelligence service. The FBI operates under the United States department of justice jurisdiction and usually reports to the director of national intelligence and attorney general. FBI is the United States leading organization when it comes to matters aimed at countering terrorist activities as well as investigation of criminal activities. The FBI formed in 1908, the organization currently has about 35,204 employees and its headquarters are in Washington, D.C. Having being involved in both law enforcing responsibilities as well as intelligence, the FBI is unique as it has dual responsibilities and thus significant agency in the U.S. Some of the vital roles includes ensuring the United States has protection from terrorist activities as well as foreign threat activities. In addition, it mandates upholding and enforcing criminal laws of the U.S. as well as providing criminal justice services and leadership to both federal, state, international agencies as well as municipal. Implementing a better law enforcement initiative in the FBI is therefore very important, as it will strengthen the ability of the FBI when it comes to dealing with the terrorist as well as ensuring the nation has protection from other foreign threats. To ensure the success of the initiative, most of the stakeholders will be technological companies. Technological companies will ensure the success of the action reaches achievement. The target audience will be the leaders of the FBI agents, as this will ensure that the information reaches the rest of the FBI fraternity.
  • 14. References Crime Analysis and Patterns. (n.d.). The International Crime Drop. doi:10.1057/9781137291462.0014 Crime Analysis: Fighting Crime with Data. (2017, June 12). Retrieved from https://www.floridatechonline.com/blog/criminal-justice/crime- analysis-fighting-crime-with-data/ Crime Analysts Fight Crime From Behind a Keyboard. (2019, July 29). Retrieved from https://online.campbellsville.edu/criminal-justice/crime- analysts/ Federal Bureau of Investigation (FBI): History, Role & Purpose. (n.d.). Retrieved from https://study.com/academy/lesson/federal-bureau-of- investigation-fbi-history-role-purpose.html Osborne, D., & Wernicke, S. (2013). Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice. London, England: Routledge. Santos, R. B. (2012). Crime Analysis With Crime Mapping. SAGE. The United States. Federal Bureau of Investigation. (n.d.). The FBI Story. Crime Analysis technology: This area has become the most important asset in the modern world. This topic interest me because it is the most common denominator between law enforcers and law offenders. What is also interesting is that information technology is literally at the fingertips of everybody. It is more interesting and feasible because it is one of the more effective ways of solving crime whether it is a detective triangulating signal off a cellphone tower to place an alleged killer in the area of a crime or doing a scan of a confiscated computer to detect inappropriate
  • 15. pornography. This is an interesting topic because it addresses developments that can be used to collect enormous amounts of evidence in crimes. However, it might be less feasible than the other topics due to the devastating effects that a mistake caused in this field can have on the universe. For my Capstone Project I choose Crime Analysis Technology and techniques of fighting crimes. There is so much crime solving, current or cold case based on ever-evolving technology and the access it gives crime fighters. I believe extensive research and knowledge of this topic is researchable as well as presentable. The current technology and social media craze, law enforcement needs to take advantage of it and to society needs to be knowledgeable of how safe or dangerous it can be.