welcome to cj 110 professor brown. unit 3: methods of data collection in this unit we will address...
DESCRIPTION
What will you learn this unit? Describe data Data Integrity/Compromised Data problems correct Chain of command in data changes/integrityTRANSCRIPT
Welcome to CJ 110
Professor Brown
Unit 3: Methods of Data CollectionIn this unit we will address the importance of the origin and integrity of the
data an analyst uses. Data that has been improperly collected or entered is among the greatest sources of frustration for analysts. The need for clean data cannot be over-emphasized; one bad piece of data in your
analysis has the potential to taint an entire work product.
As an analyst, you will need to know what types of problems to look for when you are using data from your agency, as well as information
provided to you by others. The reliability of data must be evaluated, and you must be aware of issues within your agency’s records management
system. These problems can and will affect your work product as an analyst, therefore you must understand how.
An analyst cannot effect change in data collection without the support of the management structure. In this unit, we will discuss the importance of chain of command and how the confines of this management structure
must be considered when attempting to rectify data integrity issues.
What will you learn this unit?
• Describe data• Data Integrity/Compromised• Data problems correct• Chain of command in data changes/integrity
Chapter 7
This chapter details the types of problems an analyst is likely to encounter with data
integrity and their ramifications as well as possible solutions. An analyst may be the
biggest proponent of clean data in an agency, but he or she cannot be a lone ranger in the
quest.
Key Terminology
Data Integrity
Data IntegrityRefers to the validity of data.
Data integrity can be compromised in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another
Software bugs or viruses. Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods T
There are many ways to minimize these threats to data integrity. These include: Backing up data regularly Controlling access to data via security
mechanisms Designing userinterfaces that prevent the input of invalid data Using error detection and correction software when transmitting data
• http://www.webopedia.com/TERM/D/data_integrity.html
Key Terminology
Crime Analyst
Crime Analyst
• The study of criminal incidents • The identification of crime patterns, crime trends, and
crime problems • The analysis of these patterns, trends, and problems • The dissemination of information to a police agency so
that the agency can develop tactics and strategies to solve patterns, trends, and problems
• http://www.macrimeanalysts.com/aboutca.html
Key Terminology
Chain of Command
Chain of Command
Battlefield example on link
Think about work situations
Data Integrity Problems – 5 minute question
What data integrity concerns can you imagine encountering in the course of your analyst
work?
Data Integrity Problems 5 minute question
Where would you take those problems when you identify them?
Data Integrity Problems – 5 minute question
How does an analyst work through the chain of command to address problems?