Forensic Computing

Forensic Computing

<p> CSCI 188 Forensic Computing CJ Notes Sources of Crime Data</p><p>I. Uniform Crime Reports a. Official crime data b. Obtained via crimes reported to police c. FBI is national repository for crime; responsible for collecting and disseminating reports d. Collects incidence data e. Limitations 1. not all crime reported to police 2. agencies may be bias data in how they classify offenses 3. Part II offenses only report arrests II. National Criminal Victimization Survey (NCVS) a. Begun in 1973 as VCS b. Bureau of Census survey sample of citizens as to their victimization experiences over the past six months c. Measures victimizations of persons in household 12 yoa and older d. Asks if offence reported to police; if not, why not e. Limitations 1. does not measure crimes where victim <12 yoa 2. does not measure homicides 3. does not measure commercial house robberies; bank robberies 4. does not measure burglaries</p><p>III. Self-Reports a. Asks persons about their criminality or deviance b. Offender directed c. Surveys of juveniles in schools; juveniles in detentions houses; inmates; citizens at large d. May be biased as respondents over-estimate (report) or under estimate activity e. Ethnographies are a type of self-report; anthropology heritage f. Use of informants to gain first-hand knowledge of behavior; lifestyle (early heroin user/addict research g. Use of “snowball” technique, where investigator is introduced to an addict, who in turn introduces the investigator to another and so on h. Allows investigators to study/learn about offenders in ways not possible with UCR or NCVS</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    1 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us