Crime Analysis

954 Words4 Pages
HOW TECHNOLOGY IS USED IN CRIME ANALYSIS CJ 216 Highfill, Lucrissa 9/7/2010 Leave this page blank The first step in the crime analysis process is the collection of data; this step is closely connected to data storage. As noted above, this step occurs outside the direct control of the crime analysis function. In most police agencies, officers and/or civilian employees enter crime reports and other data into a computer system. Officers may write reports in longhand that are then entered into the computer system by data entry clerks, officers may input incident reports directly into a computer system, or police dispatchers may write reports directly into the computer system. The policies dictating data entry procedures, as…show more content…
Temporal, spatial (crime mapping), and sociodemographic factors are key areas of focus in crime analysts’ examinations of crime, disorder, and other police-related issues. The goals of crime analysis are to assist police in criminal apprehension, crime and disorder reduction, crime prevention, and evaluation. The crime analysis process—that is, the general way in which crime analysis is practiced—includes the steps of data collection, data collation, analysis, dissemination of results, and the receipt of feedback from users of the information. The data modification sub cycle is a sub process within the crime analysis process in which the analyst makes changes in data collection and collation procedures based on insights gained during the analysis. The term crime analysis refers to a general concept and to a discipline practiced in the policing community. The five major types of crime analysis— intelligence analysis, criminal investigative analysis, tactical crime analysis, strategic crime analysis, and administrative crime analysis—differ from one another in purpose, scope, data, and analysis techniques. Tactical crime analysis is the study of recent criminal incidents and potential criminal activity through the examination of characteristics such as how, when, and where the activity has occurred to assist
Open Document