Exam 1 Review: Technology and the Criminal Justice System

Exam 1 Review: Technology and the Criminal Justice System

<p>Exam 1 Review: Technology and the Criminal Justice System</p><p>Professor Byrne, Spring, 2015</p><p>Exam Date: Tuesday, March 3,2015</p><p>Required Reading in Text: Chapters 1, 2, 3, 4, 5, and 14</p><p>Required Readings from materials section: Byrne and Marx article ( pp17-25 only) Required Review of Links: China’s All Seeing Eye, Department of Pre-Crime</p><p>Exam Format: Short answers and essay format. Questions will be drawn from class lectures, the text, and the online links we reviewed in class. I recommend using the key topics identified below as a study guide. Key terms are identified for each topic area. You will be responsible for knowing these terms, as well as the basic facts related to each topic area (definitions of terms, evidence of effectiveness, extent of use, etc)</p><p>Listing of Key People and Terms: Identifications and short answers</p><p>1. Richard Sparks’s typology: Crime as Work, Crime at Work, and Crime after Work. (examples) – Kip Schlegal chapter, Lecture</p><p>2. Department of Pre-Crime: lecture/link</p><p>3. Static 99 and Rraser: Chapter 5/lecture</p><p>4. Gary Marx’s social engineering strategies: target removal, target devaluation, target insulation, offender weakening and incapacitation, exclusion, and offense/offender/ target identification. (definitions and examples) – Marx chapter(14)/ Lecture</p><p>5. Hard and Soft Technology: definition– Lecture, chapter 1</p><p>6. Social engineering strategies (chapter 14)</p><p>7. Sex offender registry and risk assessment: actuarial vs clinical assessment in Massachusetts-- lecture</p><p>8. False positives vs. false negatives: chapter 5/lecture</p><p>9. China’s All Seeing Eye: the Golden Shield. – Lecture/link</p><p>10. Electronic surveillance strategies used by federal law enforcement (see Byrne and Marx article) 11. CCTV and Street lighting effectiveness: Welsh and Farrington chapter 4</p><p>12. Silk Road: link/lecture</p><p>15. Bluesnarfing: chapter 2</p><p>16. Myths and realities about sex offenders: lecture</p><p>17. Exceptional Case Study Project: chapter 5</p><p>18. Network intrusions: hacking, phishing, pharming,wardriving-chapter 2</p><p>19. Enron and occupational fraud/ crime at work: chapter 2</p><p>20. The problem of identity fraud: chapter 3</p><p>Sample Essay questions for review:</p><p>1. Describe how techno-crime occurs at work, as work, and after work. Give examples of techno-crime in each setting. 2. Can CCTV prevent crime? What does the research reveal? 3. What do we currently know about preventing known sex offenders from re-offending? Discuss recidivism risk levels, and current strategies to reduce risk( registries, lifetime electronic monitoring) 4. What is the link( if any) between mental illness and violence? ( see text ch. 5) 5. What is threat assessment? Can we prevent school violence and/or terrorism using current threat assessment tools? 6. Can social engineering strategies be used to prevent crime? Describe Marx’s social engineering strategies and give examples. 7. Can we use soft technology to prevent homicide? 8. What are the new directions in crime prevention using hard and soft technology( facial recognition, gunshot location, biometrics, risk prediction, etc.) ?</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us