Preface |
|
xvii | |
Acknowledgments |
|
xix | |
Author |
|
xxi | |
|
Chapter 1 Overview of criminal justice information systems |
|
|
1 | (24) |
|
|
1 | (1) |
|
|
2 | (9) |
|
Development of criminal history systems |
|
|
4 | (2) |
|
|
6 | (1) |
|
Record management systems |
|
|
7 | (2) |
|
|
9 | (2) |
|
Exploring criminal justice enterprise computing |
|
|
11 | (3) |
|
|
11 | (2) |
|
Correction management systems |
|
|
13 | (1) |
|
Data warehousing and data mining |
|
|
14 | (1) |
|
Workgroup applications in criminal justice agencies |
|
|
15 | (5) |
|
Property and evidence systems |
|
|
15 | (1) |
|
Crime analysis and geographic mapping systems |
|
|
16 | (1) |
|
Automated fingerprint identification systems and live scan devices |
|
|
16 | (1) |
|
|
16 | (1) |
|
Facial recognition systems |
|
|
17 | (1) |
|
Citation collection systems |
|
|
18 | (1) |
|
Case and investigation management systems |
|
|
19 | (1) |
|
|
20 | (2) |
|
|
22 | (3) |
|
Chapter 2 Justice information system standards and national systems |
|
|
25 | (28) |
|
|
25 | (1) |
|
Hypertext markup language |
|
|
26 | (1) |
|
Extensible markup language |
|
|
27 | (14) |
|
Global Justice XML Data Model |
|
|
28 | (3) |
|
National Information Exchange Model |
|
|
31 | (5) |
|
|
36 | (1) |
|
Law Enforcement Information Sharing Program |
|
|
36 | (1) |
|
National Crime Information Center 2000 |
|
|
37 | (4) |
|
|
41 | (5) |
|
|
41 | (1) |
|
|
42 | (4) |
|
|
46 | (1) |
|
National Law Enforcement Telecommunication System |
|
|
47 | (1) |
|
Law Enforcement Information Technology Standards Council |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (3) |
|
Chapter 3 9-1-1: Its history, current status, and the next generation |
|
|
53 | (20) |
|
|
53 | (2) |
|
Basic 9-1-1: How it works |
|
|
55 | (1) |
|
|
56 | (2) |
|
Challenges faced by the 9-1-1 system |
|
|
58 | (8) |
|
Private branch exchange systems |
|
|
59 | (1) |
|
|
60 | (1) |
|
Cellular phone technology |
|
|
61 | (3) |
|
Voice over Internet protocol |
|
|
64 | (2) |
|
|
66 | (5) |
|
|
71 | (2) |
|
Chapter 4 Police computer-aided dispatch systems |
|
|
73 | (32) |
|
|
73 | (1) |
|
System performance requirements |
|
|
74 | (1) |
|
|
75 | (3) |
|
|
75 | (1) |
|
Squad or shift activation |
|
|
76 | (1) |
|
|
76 | (1) |
|
Unit recommendation and validation tables |
|
|
77 | (1) |
|
|
78 | (1) |
|
Calls for service data transfer |
|
|
78 | (1) |
|
CAD system baseline functions |
|
|
78 | (6) |
|
|
78 | (2) |
|
|
80 | (1) |
|
User-definable expert advisor |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (2) |
|
|
83 | (1) |
|
Online messaging/conferencing |
|
|
84 | (1) |
|
|
84 | (7) |
|
Basic required data elements |
|
|
84 | (1) |
|
Call receipt methodologies |
|
|
85 | (1) |
|
|
85 | (1) |
|
Receipt of calls on 7/10-digit phone lines |
|
|
86 | (1) |
|
Call receipt through mobile computers (on-view events) |
|
|
87 | (1) |
|
Call receipt through voice radio |
|
|
87 | (1) |
|
Minimum required data elements |
|
|
87 | (1) |
|
|
87 | (1) |
|
Ability to add or modify information to a call in progress |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (7) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Supervisor monitoring capability |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Unit validation and recommendation tables |
|
|
100 | (1) |
|
|
100 | (3) |
|
|
102 | (1) |
|
Access to internal databases |
|
|
102 | (1) |
|
Access to external databases |
|
|
103 | (1) |
|
|
103 | (2) |
|
Chapter 5 Police record management systems |
|
|
105 | (26) |
|
|
105 | (1) |
|
Enterprise information system |
|
|
106 | (23) |
|
|
107 | (1) |
|
Linkages to other modules |
|
|
107 | (1) |
|
|
108 | (4) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
116 | (3) |
|
|
119 | (2) |
|
|
121 | (1) |
|
Linkages to other modules |
|
|
122 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
Linkages to other modules |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
Linkages to other modules |
|
|
127 | (1) |
|
|
127 | (1) |
|
Wants, warrants, and protective orders |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (2) |
|
Chapter 6 Police workgroup applications |
|
|
131 | (26) |
|
|
131 | (24) |
|
Crime analysis and geographic information systems |
|
|
132 | (4) |
|
|
136 | (1) |
|
Automated fingerprint identification systems |
|
|
136 | (3) |
|
|
139 | (1) |
|
|
140 | (4) |
|
Linkages to other modules |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (3) |
|
Investigation, vice, intelligence, and narcotic systems |
|
|
149 | (2) |
|
|
151 | (1) |
|
|
151 | (1) |
|
Linkages to other modules |
|
|
152 | (1) |
|
|
153 | (1) |
|
Linkages to other modules |
|
|
154 | (1) |
|
|
154 | (1) |
|
Linkages to other modules |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
Chapter 7 Mobile computing |
|
|
157 | (24) |
|
|
157 | (1) |
|
History of mobile computing |
|
|
157 | (5) |
|
Data radio and wireless technology as transport mediums |
|
|
162 | (3) |
|
Mobile computing security |
|
|
165 | (1) |
|
Mobile computing and dispatch operations |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
168 | (6) |
|
Crime analysis information |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
The future of mobile computing |
|
|
174 | (4) |
|
|
174 | (1) |
|
Tablet personal computers (PC) |
|
|
174 | (2) |
|
Personal digital assistance |
|
|
176 | (1) |
|
Voice to text and text to voice |
|
|
176 | (2) |
|
|
178 | (1) |
|
|
178 | (3) |
|
Chapter 8 Crime analysis and crime mapping |
|
|
181 | (26) |
|
|
181 | (1) |
|
The history of crime analysis |
|
|
182 | (3) |
|
|
185 | (1) |
|
Intelligence-led policing |
|
|
186 | (1) |
|
|
187 | (2) |
|
|
189 | (4) |
|
Crime analysis and information technology |
|
|
193 | (2) |
|
Information technology and crime analysis |
|
|
195 | (10) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (2) |
|
Administrative crime analysis |
|
|
200 | (2) |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
205 | (2) |
|
Chapter 9 Corrections information technology |
|
|
207 | (26) |
|
|
207 | (1) |
|
History of correction information technology |
|
|
208 | (1) |
|
Jail booking/intake systems |
|
|
208 | (6) |
|
Jail booking/intake components |
|
|
209 | (1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
Corrections management information systems |
|
|
214 | (6) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (2) |
|
Doctors, dentists, and nurses |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Commissary and food service management |
|
|
221 | (2) |
|
|
222 | (1) |
|
Commissary inventory tracking subsystem |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (3) |
|
|
223 | (1) |
|
Inmate rehabilitation training |
|
|
224 | (1) |
|
Inmate release and reintegration |
|
|
225 | (1) |
|
Victim information and victim notification |
|
|
225 | (1) |
|
|
226 | (4) |
|
|
226 | (1) |
|
Medical and dental scheduling |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
Presentencing investigation |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Jail and prison management external systems interface requirements |
|
|
230 | (1) |
|
Integration with AFISs and mug shot systems |
|
|
230 | (1) |
|
|
231 | (2) |
|
Chapter 10 Prosecutor information management systems |
|
|
233 | (24) |
|
|
233 | (1) |
|
History of prosecutorial systems |
|
|
233 | (1) |
|
Prosecutor record management information system overview |
|
|
234 | (21) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Victim and witness tracking |
|
|
235 | (4) |
|
|
239 | (1) |
|
|
239 | (4) |
|
|
243 | (1) |
|
Property and evidence tracking |
|
|
243 | (1) |
|
|
243 | (3) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (3) |
|
|
249 | (1) |
|
|
249 | (3) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (2) |
|
Transfer data to external report generators |
|
|
254 | (1) |
|
|
254 | (1) |
|
Data warehousing and data mining capability |
|
|
255 | (1) |
|
|
255 | (2) |
|
Chapter 11 Court management information systems |
|
|
257 | (30) |
|
|
257 | (2) |
|
|
259 | (4) |
|
|
263 | (2) |
|
|
265 | (12) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (4) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
281 | (3) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Integrated justice information systems and court management software |
|
|
285 | (1) |
|
|
285 | (2) |
|
Chapter 12 The challenges of implementing a criminal justice information system |
|
|
287 | (22) |
|
Critical success factors in implementing criminal justice information systems |
|
|
287 | (1) |
|
Functional requirement specification |
|
|
288 | (1) |
|
|
288 | (4) |
|
|
288 | (2) |
|
|
290 | (1) |
|
|
291 | (1) |
|
Development of the request for proposal |
|
|
292 | (1) |
|
|
293 | (1) |
|
The role of the "executive" champion |
|
|
293 | (1) |
|
The role of the project manager |
|
|
294 | (1) |
|
The end user and managing their expectations |
|
|
295 | (2) |
|
|
297 | (1) |
|
Scope creep and how to manage it |
|
|
298 | (2) |
|
Test plans and procedures |
|
|
300 | (2) |
|
Bringing a new system operational |
|
|
302 | (1) |
|
|
303 | (1) |
|
Daily support for installed systems |
|
|
304 | (1) |
|
Change management ensuring systems are used to their fullest potential |
|
|
305 | (1) |
|
User groups and criminal justice information systems |
|
|
306 | (1) |
|
Managing system growth and budgeting for change |
|
|
307 | (1) |
|
|
308 | (1) |
|
Chapter 13 The future of technology in law enforcement |
|
|
309 | (14) |
|
|
309 | (1) |
|
Driving forces influencing technology adoption |
|
|
310 | (4) |
|
Changes in policing models |
|
|
310 | (1) |
|
Environmental factors driving innovation |
|
|
311 | (1) |
|
Cloud computing and administrative functions |
|
|
312 | (1) |
|
Cloud computing and mission critical functions |
|
|
312 | (2) |
|
The pervasive use of video |
|
|
314 | (2) |
|
Video surveillance and monitoring |
|
|
314 | (1) |
|
Automated license plate readers |
|
|
315 | (1) |
|
|
315 | (1) |
|
Further development of social media |
|
|
316 | (1) |
|
Smartphone and tablet technology |
|
|
317 | (2) |
|
Collaboration technologies |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (2) |
Index |
|
323 | |