Information Technology and the Criminal Justice SystemApril Pattavina How has information technology changed the way we monitor criminal behavior? How has it changed the way we examine patterns of criminal behavior? How have criminal justice organizations adapted to using information technology? What is the future of information in criminal justice? There have been many technical, analytical, legal, and organizational issues related to advances in computer and information technology over the past several decades. Given the substantial investments that federal, state, and local criminal justice agencies are making in information technology, they now consider it an integral component of understanding how our criminal justice system works.
Information Technology and the Criminal Justice System is recommended for upper level undergraduate and graduate level courses in Criminal Justice departments, including Information Technology and Criminal Justice; Criminal Justice Data Analysis; Crime Analysis; Technology and Criminal Justice; and Technology and Society. This book is also an excellent resource for professionals in the field. |
From inside the book
Results 1-5 of 53
... Victims of Crime to handle victim issues. This organizational structure has survived to this day. An important exception was the Crime Control Act of 1994,12 which among other things created an independent agency, the Office of ...
... victims, offenders, arrestees, and law enforcement officers injured or killed. In addition, under the NIBRS, the scope of reporting is widened to cover 22 crime categories that include a total of 46 specific offenses known as "Group A ...
... victims, particularly young victims. In 1990, the U.S. Supreme Court approved CCTV use in the courtroom in Maryland v. Craig.1'1 In its decision, the court recognized the critical importance of CCTV in the courtroom in that it allows ...
... victims. These devices will set "safe zones" that trigger alarms or warning notices on approach of the offender. In addition, tiny cameras could be attached to tracking devices to provide live video of an offender's location and ...
... victims' names. In 12%, criminals used the victims' existing credit card accounts. Unspecified employment-related motives accounted for 1 1 % of identity thefts, and the victims' bank accounts were entirely depleted in nearly 8% of the ...
Contents
5 | |
19 | |
Acquiring Implementing and Evaluating Information Technology | 29 |
THE CRIMINAL JUSTICE | 57 |
The Internet as a Conduit for Criminal Activity | 77 |
INFORMATION TECHNOLOGY | 99 |
Information Technology and Crime Analysis | 125 |
Police Strategies and Their Relationship | 131 |
Geographic Information Systems | 147 |
INFORMATION TECHNOLOGY | 167 |
Using | 195 |
Environment Technology | 221 |
THE FUTURE OF INFORMATION | 241 |
The Future of Information Technology | 261 |
Index | 273 |
About the Editor | 287 |