Muutke küpsiste eelistusi

E-raamat: Introduction to Criminal Justice Information Systems [Taylor & Francis e-raamat]

(Auburn University, Montgomery, Alabama, USA)
  • Formaat: 335 pages
  • Ilmumisaeg: 30-Jun-2020
  • Kirjastus: Routledge
  • ISBN-13: 9781315368504
Teised raamatud teemal:
  • Taylor & Francis e-raamat
  • Hind: 161,57 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 230,81 €
  • Säästad 30%
  • Formaat: 335 pages
  • Ilmumisaeg: 30-Jun-2020
  • Kirjastus: Routledge
  • ISBN-13: 9781315368504
Teised raamatud teemal:

This book gives an overview of the various software systems and technologies currently used in the criminal justice environment. It covers a variety of topics critical to each member of the criminal justice system: police, prosecutor, courts, and corrections. It details the current systems in use, how they are used, and how separate systems inte



The proliferation of information systems throughout the criminal justice system has prompted many universities supporting criminal justice programs to add criminal justice information systems technology to their curriculums. Several universities have gone so far as to hire professors with specializations in information technology and to offer criminal justice information systems as an area of concentration.



Introduction to Criminal Justice Information Systems

gives an overview of the various software systems and technologies currently used in the criminal justice environment. The book covers a variety of topics critical to each member of the criminal justice system: police, prosecutor, courts, and corrections. It details the current systems in use, how they are used, and how separate systems interact with others. It also suggests how the current technology and the processes built upon it will evolve.



While designed as a textbook to meet the needs of an introductory criminal justice information technology course, Introduction to Criminal Justice Information Systems is also a flexible resource useful to professionals in relevant areas of the criminal justice system. With rapidly increasing development and use of technology in modern law enforcement, this book provides a much-needed reference for those who are responsible for its implementation as well as an essential introduction to those who will become responsible for it. An instructor's manual is available as an electronic download upon request.

Preface xvii
Acknowledgments xix
Author xxi
Chapter 1 Overview of criminal justice information systems
1(24)
Introduction
1(1)
The evolution of CJISs
2(9)
Development of criminal history systems
4(2)
Evolution of CAD systems
6(1)
Record management systems
7(2)
Mobile computing
9(2)
Exploring criminal justice enterprise computing
11(3)
Court management systems
11(2)
Correction management systems
13(1)
Data warehousing and data mining
14(1)
Workgroup applications in criminal justice agencies
15(5)
Property and evidence systems
15(1)
Crime analysis and geographic mapping systems
16(1)
Automated fingerprint identification systems and live scan devices
16(1)
Mug shot systems
16(1)
Facial recognition systems
17(1)
Citation collection systems
18(1)
Case and investigation management systems
19(1)
Current trends in CJISs
20(2)
References
22(3)
Chapter 2 Justice information system standards and national systems
25(28)
Introduction
25(1)
Hypertext markup language
26(1)
Extensible markup language
27(14)
Global Justice XML Data Model
28(3)
National Information Exchange Model
31(5)
Regional Data Exchange
36(1)
Law Enforcement Information Sharing Program
36(1)
National Crime Information Center 2000
37(4)
Uniform Crime Reports
41(5)
Part 1 crimes
41(1)
Part 2 crimes
42(4)
Law Enforcement Online
46(1)
National Law Enforcement Telecommunication System
47(1)
Law Enforcement Information Technology Standards Council
47(2)
World Wide Web
49(1)
References
50(3)
Chapter 3 9-1-1: Its history, current status, and the next generation
53(20)
Introduction
53(2)
Basic 9-1-1: How it works
55(1)
Enhanced 9-1-1
56(2)
Challenges faced by the 9-1-1 system
58(8)
Private branch exchange systems
59(1)
TTY/TDD communications
60(1)
Cellular phone technology
61(3)
Voice over Internet protocol
64(2)
Next generation 9-1-1
66(5)
References
71(2)
Chapter 4 Police computer-aided dispatch systems
73(32)
Introduction
73(1)
System performance requirements
74(1)
Administrative functions
75(3)
Window configurations
75(1)
Squad or shift activation
76(1)
Code table management
76(1)
Unit recommendation and validation tables
77(1)
Training support
78(1)
Calls for service data transfer
78(1)
CAD system baseline functions
78(6)
Activity logging
78(2)
Audit trail
80(1)
User-definable expert advisor
80(1)
Library function
80(1)
Cardfile
81(2)
Command line
83(1)
Online messaging/conferencing
84(1)
Call entry process
84(7)
Basic required data elements
84(1)
Call receipt methodologies
85(1)
Receipt of 9-1-1 calls
85(1)
Receipt of calls on 7/10-digit phone lines
86(1)
Call receipt through mobile computers (on-view events)
87(1)
Call receipt through voice radio
87(1)
Minimum required data elements
87(1)
Call priority
87(1)
Ability to add or modify information to a call in progress
88(1)
Duplicate call detection
88(1)
CAD geofile processing
89(1)
Hazard information file
90(1)
Premise information file
90(1)
Premise history file
91(1)
Call scheduling
91(1)
Dispatch process
91(7)
Basic data elements
92(1)
Command area dispatch
92(1)
Call pending queue
93(1)
Unit status monitoring
93(1)
Status timers
94(1)
Available units window
95(1)
Event history
95(1)
Nonpatrol units
96(1)
Unit history
96(1)
Unit recommendation
96(1)
Officer history
96(1)
System status management
97(1)
Supervisory function
98(1)
Supervisory workstation
98(1)
Supervisor monitoring capability
98(1)
Emergency alert
98(1)
Administrative function
99(1)
Code table management
99(1)
Unit validation and recommendation tables
100(1)
CAD mapping
100(3)
GPS/AVL requirements
102(1)
Access to internal databases
102(1)
Access to external databases
103(1)
References
103(2)
Chapter 5 Police record management systems
105(26)
Introduction
105(1)
Enterprise information system
106(23)
Calls for service
107(1)
Linkages to other modules
107(1)
Master name index
108(4)
Known associates
112(2)
Interfaces
114(1)
Master vehicle index
114(2)
Interfaces
116(1)
Master location index
116(3)
Incidents
119(2)
Arrest
121(1)
Linkages to other modules
122(2)
Interfaces
124(1)
Juvenile contact
124(1)
Known offender
125(1)
Linkages to other modules
125(1)
Interfaces
126(1)
Field interview reports
126(1)
Citations
126(1)
Linkages to other modules
127(1)
Interfaces
127(1)
Wants, warrants, and protective orders
127(1)
Interfaces
128(1)
Reference
129(2)
Chapter 6 Police workgroup applications
131(26)
Workgroup applications
131(24)
Crime analysis and geographic information systems
132(4)
Interfaces
136(1)
Automated fingerprint identification systems
136(3)
Mug shot systems
139(1)
Property and evidence
140(4)
Linkages to other modules
144(1)
Interfaces
145(1)
Case management
145(1)
Linkages
146(3)
Investigation, vice, intelligence, and narcotic systems
149(2)
Interfaces
151(1)
Pawnshop
151(1)
Linkages to other modules
152(1)
False alarms
153(1)
Linkages to other modules
154(1)
Subpoena tracking module
154(1)
Linkages to other modules
155(1)
Summary
155(1)
References
156(1)
Chapter 7 Mobile computing
157(24)
Introduction
157(1)
History of mobile computing
157(5)
Data radio and wireless technology as transport mediums
162(3)
Mobile computing security
165(1)
Mobile computing and dispatch operations
165(2)
Field report writing
167(1)
The mobile office
168(6)
Crime analysis information
170(1)
Digital photography
170(1)
Wireless mobile video
171(1)
Biometric tools
172(1)
Reference information
172(1)
Briefing information
172(1)
Cellular telephones
173(1)
The future of mobile computing
174(4)
Convertible laptops
174(1)
Tablet personal computers (PC)
174(2)
Personal digital assistance
176(1)
Voice to text and text to voice
176(2)
Technology integration
178(1)
References
178(3)
Chapter 8 Crime analysis and crime mapping
181(26)
Introduction
181(1)
The history of crime analysis
182(3)
Intelligence analysis
185(1)
Intelligence-led policing
186(1)
GISs and crime mapping
187(2)
Crime mapping types
189(4)
Crime analysis and information technology
193(2)
Information technology and crime analysis
195(10)
Tactical crime analysis
196(1)
Strategic crime analysis
197(1)
Operations analysis
198(2)
Administrative crime analysis
200(2)
Predictive policing
202(2)
Intelligence analysis
204(1)
References
205(2)
Chapter 9 Corrections information technology
207(26)
Introduction
207(1)
History of correction information technology
208(1)
Jail booking/intake systems
208(6)
Jail booking/intake components
209(1)
Subject name
209(2)
Subject's alias
211(1)
Personal information
211(1)
Inmate classification
211(1)
Suicide attempts
212(1)
Gang affiliation
212(1)
Medical history
213(1)
Personal property
213(1)
Corrections management information systems
214(6)
Inmate tracking
215(1)
Cell tracking
215(1)
Movement tracking
215(1)
Inmate identification
216(1)
Disciplinary tracking
217(1)
Visitor tracking
217(1)
Prisoner phone logs
218(1)
Medical tracking
218(2)
Doctors, dentists, and nurses
220(1)
Inmate medical billing
220(1)
Inmate accounting
221(1)
Commissary and food service management
221(2)
Commissary
222(1)
Commissary inventory tracking subsystem
222(1)
Commissary privileges
222(1)
Commissary transactions
222(1)
Sentence management
223(3)
Sentence compliance
223(1)
Inmate rehabilitation training
224(1)
Inmate release and reintegration
225(1)
Victim information and victim notification
225(1)
Schedule management
226(4)
Court scheduling
226(1)
Medical and dental scheduling
227(1)
Work release
228(1)
Community CMS
228(1)
Presentencing investigation
229(1)
Case management
229(1)
Master name index
229(1)
Case file
229(1)
Jail and prison management external systems interface requirements
230(1)
Integration with AFISs and mug shot systems
230(1)
References
231(2)
Chapter 10 Prosecutor information management systems
233(24)
Prosecutorial system
233(1)
History of prosecutorial systems
233(1)
Prosecutor record management information system overview
234(21)
Case manager
234(1)
Master name index
235(1)
Victim and witness tracking
235(4)
Analysis and disposition
239(1)
Master calendaring
239(4)
Attorney assignment
243(1)
Property and evidence tracking
243(1)
Document management
243(3)
Juror tracking
246(1)
Discovery tracking
246(1)
Worthless checks
246(3)
Restitution tracking
249(1)
Child support module
249(3)
Reports
252(1)
Preformatted reports
252(1)
Ad hoc report generator
252(2)
Transfer data to external report generators
254(1)
Internet capabilities
254(1)
Data warehousing and data mining capability
255(1)
References
255(2)
Chapter 11 Court management information systems
257(30)
Introduction
257(2)
Court docket module
259(4)
Master name index
263(2)
Sentencing and rulings
265(12)
Work credit payments
276(1)
Cash bond
276(1)
Unallocated
276(1)
Multipayment
276(1)
Garnishment
277(1)
Warrants
277(4)
Electronic ticketing
281(1)
Court minutes
281(1)
Court scheduling
281(3)
Ad hoc search capability
284(1)
Standardized reports
285(1)
Integrated justice information systems and court management software
285(1)
References
285(2)
Chapter 12 The challenges of implementing a criminal justice information system
287(22)
Critical success factors in implementing criminal justice information systems
287(1)
Functional requirement specification
288(1)
Development of an FRS
288(4)
Business issues
288(2)
Functional issues
290(1)
Technical issues
291(1)
Development of the request for proposal
292(1)
Implementing the system
293(1)
The role of the "executive" champion
293(1)
The role of the project manager
294(1)
The end user and managing their expectations
295(2)
Project planning
297(1)
Scope creep and how to manage it
298(2)
Test plans and procedures
300(2)
Bringing a new system operational
302(1)
System documentation
303(1)
Daily support for installed systems
304(1)
Change management ensuring systems are used to their fullest potential
305(1)
User groups and criminal justice information systems
306(1)
Managing system growth and budgeting for change
307(1)
References
308(1)
Chapter 13 The future of technology in law enforcement
309(14)
Introduction
309(1)
Driving forces influencing technology adoption
310(4)
Changes in policing models
310(1)
Environmental factors driving innovation
311(1)
Cloud computing and administrative functions
312(1)
Cloud computing and mission critical functions
312(2)
The pervasive use of video
314(2)
Video surveillance and monitoring
314(1)
Automated license plate readers
315(1)
Mobile video systems
315(1)
Further development of social media
316(1)
Smartphone and tablet technology
317(2)
Collaboration technologies
319(1)
Continuing innovation
320(1)
References
321(2)
Index 323
Dr. Ralph Ioimo is an associate professor and the head of the Justice and Public Safety Department at Auburn University in Montgomery, Alabama. He has over 30 years of law enforcement and public management experience and was a deputy chief of police with the Simi Valley Police Department in California. He assisted the nation in establishing the first standardized police records management system and has participated in state and national steering committees on public safety automation. He has lectured at numerous state and national conferences and symposiums on public safety technology issues and has been published in trade and academic journals on a variety of information technology issues. He was the first executive director of the Integrated Justice Information Systems Institute in Ashburn, Virginia. He also uses his extensive professional and academic experience to provide unique approaches to system implementation consulting.