Family Watchdog Analysis GIS Lab: Attributes of Information Parent Perspective General Goal: Keep children away from risk Specific Usage: – Look up specific.

Slides:



Advertisements
Similar presentations
CRM project. Agenda Introduction About Project Modules.
Advertisements

SEARCH AND SEIZURE The 4 th. Disclaimer Mr Koepping is NOT an attorney. This discussion is for the purpose of explaining general constitutional principles.
Indianapolis, Indiana Offender Notification Meetings.
Intermediate Access: Center for Teaching Advancement and Assessment Research On Creating a Database from Scratch.
Data vs. Information Data raw facts no context just numbers and text Information data with context processed data value-added to data –summarized –organized.
P4 – Features and Functions of Information Systems
BD Finance Training. Table of Contents:  The BD Bible  Stages of working with the Bible  Your KPIs  Napoleon Tools  Cash Flow  The Next Step Dream.
Welcome to CJ 325 Psychology for Law Enforcement Unit 7 Seminar.
Innovative Strategies Jack McDevitt Institute on Race and Justice College of Criminal Justice Northeastern University.
The Economics of National Security Lesson 3. How Much Would You Be Willing to Pay? You are the owner of a coffee shop in a dangerous part of town. The.
Sex Crime Prevention 1 Vermont Criminal Information Center Sex Crime Prevention.
Children online: Risks they might face Awareness raising session – Secondary.
CASE STUDY 2.2 : PUSHING PAPERS CAN BE FUN
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Data - Information - Knowledge
EXAMPLES Attributes of Information. Overview Information Systems help companies achieve their goals. How do they do it? 1. By processing raw data into.
Today’s Goals Concepts  I want you to understand the difference between  Data  Information  Knowledge  Intelligence.
Chapter 7 Using Data Flow Diagrams
Topics Creating DFD Physical and logical DFD Event driven modeling
CS 128/ES Lecture 3a1 Map Types. CS 128/ES Lecture 3a2 Two Related Hierarchies Data Information Knowledge Input Process Output Question: When.
Major Topic: Types of IS
Chapter 9 Using Data Flow Diagrams
Chapter 7 Using Data Flow Diagrams
Lab Review Material that will be on the exam. Where to find Material Course Website Calendar –Lecture Slides (PowerPoint) –Assigned Reading Blackboard.
Out of this nettle, danger, we pluck this flower, safety. ~William Shakespeare I want to become a police officer because I like to make things easier.
Police Administration: Structures, Processes, and Behavior
WELCOME TO SECOND SEMESTER! WE’VE MADE IT HALF WAY! "Anything worth doing, is worth doing right." Hunter S. Thompson 1/28/14 Learning Target: Describe.
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
s By Mollie.
Chapter 7 Using Data Flow Diagrams
Criminal Just Process - Arrest. REMEMBER!! – Criminal Justice Process includes every event from investigation to conviction and punishment – At any time.
MODULE 5 Best Practice Approaches Applying a Women-Centred Approach to Child Protection Investigations 1.
Lily  It is the kind of writing used in high school and college classes.  Academic writing is different from creative writing, which is the kind.
PARENT NOTIFICATION SYSTEMS School District Planning Considerations Planning Considerationsfor Implementing and Activation.
END THE SILENCE. THE TEAM APPROACH COMMUNITY NOTIFICATION IN COLLABORATION WITH LAW ENFORCEMENT & VICTIM SERVICES.
Lab 1 slides 7/25/2005. Chapter 1Slide 2 Principles of Information Systems, Fifth Edition Data vs. Information Data: raw facts or measurements Information:
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
Technology assessment in math 2400 calculus 2 spring assessment day 2010 jenn berg.
Why use a Database B8 B8 1.
GIS ANALYSIS IN PUBLIC SAFETY Denise Stuckey GIS Production Manager The Schneider Corporation.
Record Keeping How should our data be handled? Katie Fore.
Inquiry Based Learning District Learning Day 1:45-2:45 August 5, 2015.
Time series Model assessment. Tourist arrivals to NZ Period is quarterly.
Clear & Cole, American Corrections, 8 th Chapter 22 Community Justice.
Formulating a Simulation Project Proposal Chapter3.
1 Chapter 14 Obtaining Physical and other Evidence Obtaining Physical and other Evidence.
Task Analysis Methods IST 331. March 16 th
Children online: Risks they might face Awareness raising session – Secondary.
Slide 1 Controlling Sequences of Events Traffic lights Event table.
 News article. OzP0QqsRg&feature=related.
Crime Stoppers now uses the most up to date, encrypted mobile reporting system available – P3 Tips. Tipsters can send crime information and engage in.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
CMSC 104, Section 301, Fall Lecture 18, 11/11/02 Functions, Part 1 of 3 Topics Using Predefined Functions Programmer-Defined Functions Using Input.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
4TH AMENDMENT  The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Scientific data storage: How are computers involved in the following?
CJ I / Critical Thinking 3/13/16 Why do you think it is important that law enforcement agencies have limited authority? What do you think are the key benefits.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Actualizing The EHR Implications For Residency Training.
Algorithms and Flowcharts
ICT Scheme of Work Thursday 26th January 2012.
JavaScript/ App Lab Programming:
The Visual Storyteller:
Training Documentation – Replacing GSPR with RFQ 2.0
Police and Society A Question of Attitude
Governance Assistant for Office365
Preparation for learning:
Attributes of Information
Authority to Detain and Arrest; Use of Force
Presentation transcript:

Family Watchdog Analysis GIS Lab: Attributes of Information Parent Perspective General Goal: Keep children away from risk Specific Usage: – Look up specific people, i.e., soccer coach, Religious Ed. Teacher, neighbors. – Look at surrounding areas for possible dangerous areas. – Is the bus stop safe? Is the walk to Walmart safe?

My Top Three (parent perspective) Complete – A parent would be very upset if the system was missing the sex offenders in their neighborhood. If the data is incomplete. The systme is useless Timely – Similar to complete, if the data only gets updated once a year, a sex offender could move next door and they system may report it for a long time. Accurate – What if an address is entered incorrectly? Sex offender could be next door but the inaccurate system reports them on a different street.

Different Perspective Police Office / Investigator Perspective General Goal: To find suspects and reduce incidents Specific Usage: – Look for known offenders near an area where there was an incident – Look for problem areas to patrol, i.e., sex offenders near playgrounds, schools, bus stops, etc.

Police Officer’s Top Three Complete – The map may have sex offenders but not playgrounds, bus stops, schools, etc., which means you can’t identify problem areas so easily Timely – Sex offenders may move often to avoid scrutiny. An officer needs to know about this movement ASAP. Reliable – You don’t want the system going down in the middle of an investigation. For parents, who might access the system occasionally, reliability is less of a concern, but for an officer it may be quite important

Bottom Choices Parent Perspective: The economy of the data is not a concern for parents since they have no stake in the profits of the system. – However, the organization that provides the system has to worry about cost, or they may not be able to provide the system in the future. The flexibility of the data is not a concern since parents are unlikely to need the data for other purposes. – Whereas, a police officer may want to combine the sex offender map with other crime maps.

Bottom Choices Police Office Perspective Simplicity might not be a factor, since a police officer may get the training to use a very complex GIS crime mapping systems. – Simplicity is more important for novice users A police officer may be able to better determine what information is relevant vs. irrelevant. They probably want complete information even though some of it may seem irrelevant.

Argument about Security Answer depending on how you define secure. Secure (top secret): – A tip on the whereabouts of a fugitive is more valuable if the cops can keep it a secret – If the media reports it, the criminal might flee before the cops arrive. Secure (authorized control): – The information could be publicly accessible, but only authorities can edit and control it

Argument about Security Secure (top secret): Least Important The more information shared, the more awareness there will be about dangerous sex offenders. This system should NOT be a secret. Secure (authorized control): Most Important If the sex offenders could edit the information, the system breaks down completely. – PARIS, France (CNN) -- A French judge has issued an arrest warrant for U.S. cyclist Floyd Landis for allegedly hacking into the computer system of the French anti-doping agency's laboratory

Excel Lab: Data  Information

Simplicity Formatting and labeling data is one way to transform data to information Labels add context and explanation Formatting add Simplicity, – i.e., easier to understand and interpret [Sidoti Example]

Convention Center Data  Information

Input  Processing  Output Input: Raw Data Output: Information (report, chart, graph, map) Processes: (always verbs) Processing examples from Excel Lab? – Lookups (automation) – Sorting – Averaging (simplification) – Subtotaling (simplification, more relevant)

CMC Lab Synchronous vs. Asynchronous Communication vs. Collaboration Other benefits – Work flow – Task Management – Calendaring – Document/Content Management

IS for Competitive Advantage The last major topic 5 Forces (Porter’s) 5 Strategies (role of Information Systems).