Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: March 29, 2024 Fri

Time: 2:45 am

Results for computers

10 results found

Author: Kitteringham, Glenn

Title: Lost Laptops == Lost Data: Measuring Costs, Managing Threats

Summary: A lost laptop creates a two-dimensional problem for organizations. First, the laptop itself must be recovered or replaced. Second, is the prospect that critical information on the company, its plan, and its customers could have been lost as well. This report looks at both types of losses, from a statistical and cost point of view. It examines the internal and external factors that contribute to laptop theft, and offers a range of detailed solutions to address the problem.

Details: Alexandria, VA: ASIS International Foundation, 2008. 67p.

Source: CRISP Report: Connecting Research in Security to Practice

Year: 2008

Country: United States

URL:

Shelf Number: 113051

Keywords:
Computers
Laptop Theft
Theft
Theft of Computers

Author: Groff, Elizabeth

Title: Identifying and Measuring the Effects of Information Technologies on Law Enforcement Agencies

Summary: This guide by the Institute for Law and Justice provides information that will help police departments measure the effects of information technologies to support community policing activities. The guide is based on the results of an assessment of the COPS Office’s 2002 Making Officer Redeployment Effective (MORE) grantees; however, the results apply to any agency that is considering or has recently made a technology purchase. The guide is relevant to departments of all sizes and covers a variety of applications — automated field reporting systems, computer aided dispatch, records management systems, and others. The guide focuses on the three E’s–efficiency, effectiveness, and enabling–which identify the different ways the technology may affect agencies. The intent is to provide practical measures based on these three E’s for how information technologies contribute to achieving department goals and can be used to examine the merits of such expenditures.

Details: Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, 2008. 86p.

Source: Internet Resource: Accessed October 4, 2011 at: http://www.cops.usdoj.gov/files/RIC/Publications/e08084156-IT.pdf

Year: 2008

Country: United States

URL: http://www.cops.usdoj.gov/files/RIC/Publications/e08084156-IT.pdf

Shelf Number: 113061

Keywords:
Community-Oriented Policing
Computers
Crime Analysis
Information Technology

Author: Erez, Edna

Title: Jihad, Crime, and the Internet - Content Analysis of Jihadist Forum Discussions

Summary: The study’s findings indicate that most Jihadist on-line forum discussions are brief, involve a small number of participants from among the registered forum members, and include few entries and pages. Forum participants often refer viewers to approved web site and share authentic Jihadist multimedia. References and quotes from religious sources are common. Just over one-third of the discussions include calls for Jihad, and 3 percent of the communications discussed non-terrorist illegal activities, particularly computer-related and software-related offenses. Content analysis of the forum discussions identified four categories of content: information dissemination, religious preaching, instruction or training, and social interactions. These content categories support three core activities of the terrorist organization: ideological foundation, organizational structure, and operational means. Based on these findings the study offers a number of policy recommendations. First, analyze the forum discussions to determine the current status of Jihadist attention and interest. Second, respond to threats by adding interference at any touch point along the communication process. Third, mitigate the harm posed by exposure of Web site viewers to violent imagery. Fourth, the content of forum discussions could increase understanding of the context of the Arab, Muslim, and Jihadist milieu in which the forum social interactions occur. Recommendations for further research are offered. The peer reviews seriously challenge the study’s methodology and conclusions. One of the core criticisms among peer reviewers is that sweeping generalizations are frequently made with little, if any, documented evidence to validate them. Extensive references from a literature review.

Details: Washington, DC: National Institute of Justice, 2011. 179p.

Source: Internet Resource: Accessed on January 23, 2012 at https://www.ncjrs.gov/pdffiles1/nij/grants/236867.pdf

Year: 2011

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/236867.pdf

Shelf Number: 123756

Keywords:
Computers
Information Technology
Internet
Jihadism
Terrorism

Author: Coscia, Michele

Title: How and Where Do Criminals Operate? Using Google to track Mexican Drug Trafficking Organizations

Summary: We develop a tool that uses Web content to obtain quantitative information about the mobility and modus operandi of criminal groups, information that would otherwise require the operation of large scale, expensive intelligence exercises to be obtained. Exploiting indexed reliable sources such as online newspapers and blogs, we use unambiguous query terms and Google's search engine to identify the areas of operation of criminal organizations, and to extract information about the particularities of their mobility patters. We apply our tool to Mexican criminal organizations to identify their market strategies, their preferred areas of operation, and the way in which these have evolved over the last two decades. By extracting this knowledge, we provide crucial information for academics and policy makers increasingly interested in organized crime. Our findings provide evidence that criminal organizations are more strategic and operate in more differentiated ways than current academic literature had suggested.

Details: Cambridge, MA: Department of Government, Harvard University, 2012. 25p.

Source: Internet Resource: Accessed October 7, 2012 at http://www.gov.harvard.edu/files/CosciaRios_GoogleForCriminals.pdf

Year: 2012

Country: Mexico

URL: http://www.gov.harvard.edu/files/CosciaRios_GoogleForCriminals.pdf

Shelf Number: 126637

Keywords:
Computers
Crime Analysis
Drug Trafficking (Mexico)
Information Technology
Organized Crime

Author: Champion, Nina

Title: Through the Gateway: How Computers Can Transform Rehabilitation

Summary: The Prison Reform Trust and Prisoners Education Trust have worked together to identify more effective ways of using information communication technologies (ICT) in prison, and the benefits that are likely to come from expanding their use. ICT for education, resettlement and family ties can be an important tool in reducing reoffending. In this report, ICT refers to computers, telephones, video conferencing tools, wingbased pc terminals, e-readers, internet and intranet technology. In December 2012, the Ministry of Justice issued a strategy that highlights the importance it gives to ICT in the way it operates as a modern department of government: "This means wherever possible our services, including information and transactions, will be delivered through digital channels, rather than face-to-face, phone or post. It will involve changing the way we work, and transforming our processes and practices. Most importantly, digital services will be designed around the needs of our users, whether public, practitioners, staff, partner organisations or stakeholders. Those who may struggle to access or use these services by themselves will be given support so they're not excluded by these changes." (The Right Honourable Chris Grayling, MP, 2012) This study considers to what extent the strategy could benefit prisoners' rehabilitation and what more could be done to use ICT in prisons to help reduce reoffending after release. This report is based on a survey of prisons, sent to all governors and directors in England and Wales, visits to nine prisons, and three expert roundtables: on education, family ties, and resettlement. It is also based on a survey of prisoners' families and a focus group of prisoners' families.

Details: London: Prison Reform Trust; Mitcham, Surrey, Prisoners Education Trust, 2013. 52p.

Source: Internet Resource: Accessed November 6, 2013 at: http://www.prisonreformtrust.org.uk/Portals/0/Documents/Through%20the%20gateway.pdf

Year: 2013

Country: United Kingdom

URL: http://www.prisonreformtrust.org.uk/Portals/0/Documents/Through%20the%20gateway.pdf

Shelf Number: 131589

Keywords:
Computers
Prisoner Rehabilitation (U.K.)
Reoffending

Author: Casady, Tom K.

Title: A Randomized-Trial Evaluation of a Law Enforcement Application for Smartphones and Laptops that Uses GIS and Location-Based Services to Pinpoint Persons-of-Interest

Summary: This report summarizes a project that developed, implemented, and evaluated a GIS-enabled application that dynamically identifies the location of persons of interest, such as gang members, sex offenders, parolees, and so on. The application, called P3i, is designed for use by law enforcement officers. P3i pushes the location data to officers' smartphones, tablets, and MDT (mobile display terminal)/laptops. A randomized evaluation was conducted with the Lincoln (Nebraska) Police Department (LPD). Officers (N = 90) were randomly assigned to one of five GPS-enabled devices or a no-P3i, control condition. Over a six-month period, 75 treatment officers were compared to the 15 control officers on a variety of productivity measures as well as to officers' prior year's performance. Measures included citation arrests, warrant arrests, and information reports. We also collected self-report data from surveys asking officers about the duration, frequency, and intensity of their use of the technology. Analyses provide some evidence that officers who used the P3i application on GPS-enabled devices were more productive than controls and more productive than they had been during the prior year. Follow-up analyses suggested a variety of individual difference factors (e.g., high performance officers in 2011, low performance officers in 2010, males) also were correlated with increases in productivity. In focus group discussions with a subset of the officers in the study, the officers expressed great enthusiasm for the P3i application and their use of new mobile technologies in general. The officers had many suggestions for improvements and provided insights into how they specifically used their devices and P3i. A cost-benefit analysis suggested that implementation of the device results in a savings of around $800 per officer, assuming a five-year device life and 7% interest rate. Additional assumptions considering different economic and technical scenarios were also developed and reported, but the results remained basically positive except for iPads, only have positive net benefits when there are no usage costs, while other devices have positive net benefits in almost all cases. In order to better understand officer adoption of P3i as well as their use of smartphones and tablets for work purposes, the project also examined what might account for the use of technology. Consistent with other studies, we found performance expectancy, a belief that the application would aid the participant in the performance of his or her duties, had the primary, significant effect on P3i usage. Thus, this study supports the position that if technology is made available, and officers have a reasonable expectation that it will help them in their work, they will utilize the technology. Further, if that technology actually can help them in their efforts, it is likely that the increase in productivity can be measured and captured. Our project also shows, however, that it may be difficult to find sensitive measures that will capture increases in productivity. One problem that can be anticipated is that outcomes are multi-determined, and thus it can be difficult to find measures that will be sensitive to positive impacts because of the multiple causes for the effects in which we are interested.

Details: Lincoln, NE: University of Nebraska-Lincoln, 2015. 96p.

Source: Internet Resource: Accessed March 9, 2015 at: https://www.ncjrs.gov/pdffiles1/nij/grants/248593.pdf

Year: 2015

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/248593.pdf

Shelf Number: 134761

Keywords:
Computers
Cost-Benefit Analysis
Geographical Information Systems (GID)
Police Technology (U.S.)
Smartphones

Author: Hollywood, John

Title: High-Priority Information Technology Needs for Law Enforcement

Summary: This study reports on strategic planning activities supporting the National Institute of Justice (NIJ) in the area of information technology, collecting and analyzing data on law enforcement needs and offering potential solutions through technology assessment studies, extensive outreach and liaison activities, and subject matter expert panels. Strategic planning will help NIJ make the best investments to leverage its limited funds and help the range of technology developers supporting law enforcement better understand the law enforcement community's needs and priorities. By looking across the top-ranking needs, the authors identified 11 crosscutting themes in total. These themes are further grouped into three overarching keynotes - a broad need to improve the law enforcement community's knowledge of technology and practices, a broad need to improve the sharing and use of law enforcement-relevant information, and a broad need to conduct research, development, testing, and evaluation on a range of topics. The latter category includes research on both the "non-material" side of technology, including policy and practices, and more traditional technical development. Key Findings Law Enforcement's Knowledge of IT and Its Dissemination Can Be Improved -A wide range of efforts have been undertaken to disseminate technology information to law enforcement practitioners. -A strong desire for help in technology use and management remains, implying needs for improvement in technology dissemination and education. Sharing, Displaying, and Using Information Effectively Is a Major Challenge -Enabling the sharing of information across law enforcement systems is a difficult problem - technically, organizationally, and commercially. -Information-sharing efforts to date have had limited coverage and can be inconsistent with each other. Further, it is difficult for new developers and users to learn about all of the available information-sharing tools and technologies. -Tools that display situational awareness information to law enforcement users at all levels are lacking. -In addition to sharing information within law enforcement, there is a need to improve mechanisms for communicating with the public. Additional Areas Need Research and Development -There is a need to improve systems for monitoring and protecting the health of officers, including both physical and mental health. -There is a need to improve security, privacy, and civil rights policies for using IT. -There is a need to improve the affordability of law enforcement IT systems across their entire life cycle. -There is an overarching need to identify promising practices that can leverage IT effectively to reduce crime. There is a need to improve IT, along with supporting training and policies, to help law enforcement respond to major incidents. -There is a need to improve, and improve the use of, a range of deployable sensors. These include body-worn cameras, field biometrics, electronic evidence collection systems, and video surveillance systems. Recommendations -A federal coordinator for technology-related outreach should be designated; this coordinator would work with various offices involved to develop and monitor a dissemination strategy capturing who will do what, for whom, and when. -This coordinator should maintain and monitor a master list of outstanding needs and development tasks to address them. -The coordinator should also capture which information-sharing projects are addressing the required tasks and disseminate all gathered information in an information-sharing strategic plan. -Work on providing common operational picture/dashboard displays to law enforcement officers should be undertaken. -Communications between the public and law enforcement should be improved. -The emotional state and physical health of officers should be monitored. -Federal efforts to provide tracking systems for responders during major events should be undertaken.

Details: Santa Monica, CA: RAND, 2015. 94p.

Source: Internet Resource: Accessed March 9, 2015 at: http://www.rand.org/pubs/research_reports/RR737.html

Year: 2015

Country: United States

URL: http://www.rand.org/pubs/research_reports/RR737.html

Shelf Number: 134764

Keywords:
Computers
Information Sharing
Information Technology
Law Enforcement Technology
Police Education and Training
Police Technology (U.S.)

Author: Taylor, Steven R.

Title: Market Survey of Location-Based Offender Tracking Technologies, Version 1.1

Summary: In September of 2013, the Johns Hopkins University Applied Physics Laboratory (JHU/APL) was selected by the Department of Justice, National Institute of Justice (NIJ) to establish the National Institute of Justice Technology Research, Test, and Evaluation (NIJ RT&E) Center within the National Law Enforcement and Corrections Technology Center (NLECTC) System. The purpose of the NIJ RT&E Center is to provide in-depth technical reports and support for NIJ's non-forensic research and development efforts. The Center will inform the criminal justice field concerning offender tracking and monitoring technologies, systems, products, services and related issues in a more innovative, sustainable, efficient, and effective manner. Under NIJ Cooperative Agreement, Award No. 2013-MU-CX-K111, the NIJ RT&E Center was commissioned to conduct a market survey of offender tracking systems (OTS)-hardware and software-to assist public safety and criminal justice practitioners who may be considering the acquisition and implementation of this type of technology in their community. To collect market survey data on OTS products, a request for information (RFI) was created; data was solicited directly from OTS product vendors and it was posted as a Notice in the Federal Register. This paper provides background context for OTS, the NIJ RT&E Center's methodology for developing the market survey, and results from the market survey. This market survey presents a view of the technologies available at the time of publication. When considering an acquisition of OTS equipment, additional information should be sought from the specific vendors of interest. Contact information for the manufacturers is provided in Section 5- Market Survey Data Analysis.

Details: Laurel, MD: The Johns Hopkins University Applied Physics Laboratory, 2016. 166p.

Source: Internet Resource: Accessed June 28, 2016 at: https://www.ncjrs.gov/pdffiles1/nij/grants/249889.pdf

Year: 2016

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/249889.pdf

Shelf Number: 139511

Keywords:
Computers
Corrections Technology
Offender Monitoring
Offender Supervision

Author: Hollywood, John

Title: Fostering Innovation in U.S. Law Enforcement: Identifying High-Priority Technology and Other Needs for Improving Law Enforcement Operations and Outcomes

Summary: The National Institute of Justice tasked RAND to host a panel of law enforcement experts to identify high-priority needs for innovation in law enforcement, covering advances in technology, policy, and practice. The needs discussed in this report can help prioritize research, development, and dissemination efforts in ways that will provide the greatest value to law enforcement practitioners. The panel identified four top findings. First, there is a need to improve practitioners' knowledge of available research and technology, starting with a central knowledge repository and research on how to improve dissemination and training methods. Second, there is a need for practices and technologies to improve police-community relations, both to improve encounters with the public and to improve community relations more broadly. Third, there is a need to improve the sharing and use of information in a range of ways. These include means to get crime analysis capabilities to all agencies (including small and disadvantaged agencies), software development to reduce information overload, and model proposal and contract language to make systems interoperable. Fourth, there is a need to reduce backlogs in forensic processing; panelists suggested broadening U.S. Department of Justice forensic grants outside of DNA to help address the backlogs. Additional high-priority needs included further development of policies and use cases for unmanned aerial vehicles, best practices for selecting and using personal gear, and improving defenses against active shooters. The latter included improving both suspicious activity reporting processes and efforts to educate the public on responding to an active shooter. There is also a need for a review of technologies that might improve officers' health. Key Findings Four Top Themes Identified There is a demand for practices and technologies to improve practitioners' knowledge of technologies and how to use them. At the core of needs under this theme was a call for a virtual information repository: a single source for capturing and sharing law enforcement information. There is a call for practices and technologies to improve police-community relations. Very high interest in this theme is being driven largely by the social and political tensions raised in recent years, in the wake of officer-involved shootings controversies and civic unrest in Ferguson, Missouri, Baltimore, Maryland, and other jurisdictions. There is a need to improve the sharing and use of information. This includes identifying what information is most useful, to avoid the problem of officers being overloaded with information. There is a need to improve forensic capabilities. Many needs here concerned remediating forensic backlogs and lacks of resources driving them. Additional High-Priority Needs There is a need to improve a range of personal equipment and practices for using them. There is a need to develop policies and core use cases for unmanned aerial systems. There is a need to improve dispatch center operations. There is a need to improve defenses against active shooters, both to improve reporting to detect them before they attack and to improve training on how the public should respond. There is a need to identify requirements for technologies to improve officers' physical and mental health.

Details: Santa Monica, CA: RAND, 2017. 136p.

Source: Internet Resource: Accessed September 1, 2017 at: https://www.rand.org/pubs/research_reports/RR1814.html

Year: 2017

Country: United States

URL: https://www.rand.org/pubs/research_reports/RR1814.html

Shelf Number: 147003

Keywords:
Computers
Information Technology
Law Enforcement Technology
Police Education and Training
Police Technology (U.S.)
Police-Community Relations

Author: Hollywood, John

Title: Addressing Emerging Trends to Support the Future of Criminal Justice: Findings of the Criminal Justice Technology Forecasting Group

Summary: The Bureau of Justice Assistance (BJA) has established the Criminal Justice Technology Forecasting Group (CJTFG), an expert advisory panel that includes both practitioners and researchers to deliberate on the effects that major technology and social trends could have on criminal justice in the next three to five years and identify potential responses. This report captures the results from the CJTFG's meetings and initiatives. It presents the emerging trends and highlights of the group's discussion about them. It then presents the results of analyses to assess connections between the trends, leading to recognizing the crosscutting themes that those connections represent. In addition, the report presents analyses to generate a set of recommended ways to address the trends that the full group reviewed and approved. The CJTFG covered a wide range in topics in its deliberations, identifying close to two dozen trends contributing to six overarching themes along with their potential impacts. The group, with the assistance of the RAND Corporation, BJA, and the Institute for Intergovernmental Research, has identified more than a dozen ways ahead in response and sponsored initiatives in direct support of four of these ways ahead. Key Findings A Lack of Business Cases, Implementation Processes, and Security, Privacy, and Civil Rights Knowledge Hamper IT Opportunities Few know how to use and acquire many of the new technologies efficiently and effectively. Few know about the security, privacy, and civil rights protections needed to employ them safely. Business Cases and Processes for Technologies Are Lacking Business processes for operationalizing new technologies are lacking. Big Data and Analytics Are Emerging The emergence of analytics, big data, and situational awareness displays, devices, and data streams offers substantial opportunities, barriers, and risks for the criminal justice community. Security, Privacy, and Civil Rights See Challenges from New Technologies Cybersecurity protections and investigations are increasingly needed. Emerging surveillance technologies require new legal foundations. Increasing commercial pressures on unbreakable encryption might be hampering criminal investigations. The Field Needs to Get to Criminal Justice Community-Wide Integration Information must be integrated and shared, and digital evidence must be managed on a massive scale, if the field is to systematically benefit from new technologies. Safety and Community Relations Need Research and Development to Improve Agencies are facing pressures to adopt community-based models of law enforcement while pressure also mounts to crack down on violence and terrorism. Accountability, body-worn cameras, and improved less-lethal weapons are needed. New Technologies Bring New Challenges Implementing new technology, such as touch and rapid DNA and remote weapon detection, could have serious and unintended consequences but also major and unanticipated benefits. Recommendations Develop common business cases and process templates for operationalizing new technologies. Conduct research to improve how criminal justice technology information is made available to both practitioners and researchers. Integrate security, privacy, and civil rights protections into the common business processes for adapting new technologies. Educate the public on how criminal justice technologies work or (do not work) in the real world. Collect data on the going-dark problem of investigators being unable to access devices with strong encryption. Research how to change organizational cultures to support information-sharing and safeguarding. Develop regional and shared-services models for information-sharing capabilities. Identify practices and technologies that can both reduce crime and improve community relations. Explore exchanges with international partners on how to use cameras for investigative and accountability purposes. Develop new immobilization and restraint devices to provide alternatives to lethal uses of force. Assess the potential of remote weapon-detection capabilities.

Details: Santa Monica, CA: RAND, 2018. 68p.

Source: Internet Resource: Accessed May 31, 2018 at: https://www.rand.org/pubs/research_reports/RR1987.html

Year: 2018

Country: United States

URL: https://www.rand.org/pubs/research_reports/RR1987.html

Shelf Number: 150419

Keywords:
Computers
Criminal Justice Technology
Information Sharing
Information Technology
Law Enforcement Technology