Free Essay

Unit 1 Db Crjs 405

In:

Submitted By chkids0309
Words 1239
Pages 5
Nikki Jones
CRSJ 405- Unit 1 DB
July 24, 2013

The ways the data is collected through surveillance in the observation of what is happening this can also eliminate those who are afraid to speak out on the abuse or wrong doing of their actions. (Draper, & Swift, 2011) For those who do come forward, there is a process to go through of interviewing as a way to recreate the situation and the even as it happened. There is a story that has to unfold allowing the law enforcement to place them self in the scene and solve the problem as the best of their abilities. In the start of the interview, there are questions asked to make the person more comfortable this lets the official learn how the person will react to the information and look into the person’s ways. Having the victim to open up and build a relationship with the law enforcement member doing the interview, A brief history of the person such as marriage, family, and location of extended family, additionally this allows the In the event of suspect or danger to the partner, mom, dad, sisters, brothers, and children. The place of employment to not the route and routine the victim goes through each day. Items out of the ordinary for the day are pieced as a probable cause of the action being more likely to occur than a typical day.

Once the basics are outlined the story or capturing of the ordeal this can be compared with a painting, to writing a story as there need to be information on who was involved. What was around and used to commit the crime, this can also be the weapon or the item creating harm? Where creating a canvas to search the possibility to question anyone else who would have been in that area or should have been in the location on a regular basis make the possibility for a suspect. This proceeds to who was around is there any idea of the name or description of the person responsible of the actions taken. The time and date for the reporting as a when the additional setting if it was at night thing would have been dark, whether there were there street lights around. If there was any reason, they could think of why someone would want to do a bad thing towards them. Had there been a disagreement or verbal slamming of an individual to give the reasoning to get back at the victim, a financial transaction that had not been cleared up. Often even family items such as a sister’s ex-boyfriends new girlfriend’s mom kind of deal. There is a relationship. However, is not to be though that there would still remain to be a conflict? This mapping or painting of the areas and action in the situation can make a massive difference in the case. This is known as a way of collecting data by sampling and recruitment. (Draper, & Swift, 2011)

The uses of methodology making the way to gather information in order to see what changes need to be made in order to help protect and allow additional security measures. This includes the public as well as those incarcerated. An example is the NPS-8, in the concerns of custody, court system issues, the death sentence, and that currently serving incarceration. There are preset limits from a date to date in order to see the amount of problems and the importance of a change. Many times one occurrence is one to many. (Beck, 2013)

Another way the data is used in prisons is on the rape reports to stop the inmate from being sexually abused known as documentation NCJ 242114. This conceded with the federal act (PREA; P.L. 108-79) Prison Rape Elimination Act of 2003. (Beck, 2013) Under the NCJ 242114, there are classifications divided into areas of nonconsensual sexual acts, forced sexual activity, sexual victimization, staff sexual misconduct, staff sexual misconduct excluding touching and other sexual contacts only. There are limitations on how many occurrences of sexual abuse that many reported in a day as well as the surveys that may be filled. This does not ensure proper counting of happenings. An example would be a gang bang on in an inmate, only the limited amount would be able to be report, even though there may have been 15 offenders. (Beck, 2012) This is known as the text and documentation by using the medical documentation and occurrence recording.

On a younger level of data and elimination, including prevention is the NCJ 241446 operations. Helping to ensure the protection of principals, students, and teachers, the fact that there are crimes any nature of in schools is reasoning enough to have action taken. The children throughout the country should not have to have fears or face the horror of many of these issues while gaining their education. The uses to receive the information of what happens in the schools are a formula of various courses a total of 21 to be exact. Using surveys as the underling option to find out what happens to the students and facility. The problems with these are the students speaking up, coming forward, and willing to tell the truth. There are federal as well as specific school surveys such as the School Crime Supplement to the NCVS, School and Staffing Survey, Youth Risk Behavior Survey, School Survey on Crime and Safety, as well as the National Crime Victimization Survey (NCVS) to name a few. The questions and areas of concern are school conditions, student use of drugs and alcohol, victimization at school, student perceptions of personal safety at school, fights, the availably and possession of weapons, injury to teachers, bullying and even cyber-bullying. The idea behind the information is also to reduce and eliminate homicides, suicides, violent deaths, nonfatal victimization, crimes, and increase and reevaluate the way of disciplinary proceedings within the school and the active effectiveness. (Snyder & Truman, 2012)

In these cases, the use and funding for extra security, guards, and mentors such as the school would go can be reasonable proven to have a need for the man power. Location and community statics, funding under regulations and grant information needed for the state and federal levels within the government that fund helping the district and community. An example would be known areas that students are getting drugs or weapons from who allow the reported, to show an alternative patrol officer for the area. In the prison situation there would have to be higher patrol personnel and additional guards and upgrading for the facility in the amount of escapes or those bringing in contraband and harmful item in the facility.

Reference

Beck, Allen J., BJS Statistician Cantor, David; Hartge, John; & Smith, Tim; (2012). Retrieved from: http://www.bjs.gov/content/pub/pdf/svjfry12.pdf

Beck, Allen J., AREA Data Collection Activities, (2013). Retrieved from: http://www.bjs.gov/index.cfm?ty=pbdetail&iid=4637

Draper, A., & Swift, J. (2011). Qualitative research in nutrition and dietetics: data collection issues. Journal Of Human Nutrition & Dietetics, 24(1), 3-12. doi:10.1111/j.1365-277X.2010.01117.x

Motivans, Mark, & Smith, Steven K., Compendium Of Federal Justice Statistics, (2003) Retrieved from: http://www.bjs.gov/index.cfm?ty=pbdetail&iid=565

Snyder, Thomas, & Truman, Jennifer, Indicators Of School Crime And Safety, (2012). Retrieved from: http://www.bjs.gov/index.cfm?ty=pbdetail&iid=4677

Similar Documents

Free Essay

Hacking the Art of Exploitation

...and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher: William Pollock Production Editors: Christina Samuell and Megan Dunchak Cover Design: Octopod Studios Developmental Editor: Tyler Ortman Technical Reviewer: Aaron Adams Copyeditors: Dmitry Kirsanov and Megan Dunchak Compositors: Christina Samuell and Kathleen Mish Proofreader: Jim Brook Indexer: Nancy Guenther For information on book distributors or translations, please contact No Starch Press,...

Words: 139438 - Pages: 558