welcome to cj 110 professor brown. unit 3: methods of data collection in this unit we will address...

13
Welcome to CJ 110 Professor Brown

Upload: alban-hunter

Post on 17-Jan-2018

215 views

Category:

Documents


0 download

DESCRIPTION

What will you learn this unit? Describe data Data Integrity/Compromised Data problems correct Chain of command in data changes/integrity

TRANSCRIPT

Page 1: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Welcome to CJ 110

Professor Brown

Page 2: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Unit 3: Methods of Data CollectionIn this unit we will address the importance of the origin and integrity of the

data an analyst uses. Data that has been improperly collected or entered is among the greatest sources of frustration for analysts. The need for clean data cannot be over-emphasized; one bad piece of data in your

analysis has the potential to taint an entire work product.

As an analyst, you will need to know what types of problems to look for when you are using data from your agency, as well as information

provided to you by others. The reliability of data must be evaluated, and you must be aware of issues within your agency’s records management

system. These problems can and will affect your work product as an analyst, therefore you must understand how.

An analyst cannot effect change in data collection without the support of the management structure. In this unit, we will discuss the importance of chain of command and how the confines of this management structure

must be considered when attempting to rectify data integrity issues.

Page 3: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

What will you learn this unit?

• Describe data• Data Integrity/Compromised• Data problems correct• Chain of command in data changes/integrity

Page 4: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Chapter 7

This chapter details the types of problems an analyst is likely to encounter with data

integrity and their ramifications as well as possible solutions. An analyst may be the

biggest proponent of clean data in an agency, but he or she cannot be a lone ranger in the

quest.

Page 5: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Key Terminology

Data Integrity

Page 6: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Data IntegrityRefers to the validity of data.

Data integrity can be compromised in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another

Software bugs or viruses. Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods T

There are many ways to minimize these threats to data integrity. These include: Backing up data regularly Controlling access to data via security

mechanisms Designing userinterfaces that prevent the input of invalid data Using error detection and correction software when transmitting data

• http://www.webopedia.com/TERM/D/data_integrity.html

Page 7: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Key Terminology

Crime Analyst

Page 8: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Crime Analyst

• The study of criminal incidents • The identification of crime patterns, crime trends, and

crime problems • The analysis of these patterns, trends, and problems • The dissemination of information to a police agency so

that the agency can develop tactics and strategies to solve patterns, trends, and problems

• http://www.macrimeanalysts.com/aboutca.html

Page 9: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Key Terminology

Chain of Command

Page 10: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Chain of Command

Battlefield example on link

Think about work situations

Page 11: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Data Integrity Problems – 5 minute question

What data integrity concerns can you imagine encountering in the course of your analyst

work?

Page 12: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Data Integrity Problems 5 minute question

Where would you take those problems when you identify them?

Page 13: Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data

Data Integrity Problems – 5 minute question

How does an analyst work through the chain of command to address problems?