Presentation is loading. Please wait.

Presentation is loading. Please wait.

Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data.

Similar presentations


Presentation on theme: "Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data."— Presentation transcript:

1 Welcome to CJ 110 Professor Brown

2 Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data an analyst uses. Data that has been improperly collected or entered is among the greatest sources of frustration for analysts. The need for clean data cannot be over-emphasized; one bad piece of data in your analysis has the potential to taint an entire work product. As an analyst, you will need to know what types of problems to look for when you are using data from your agency, as well as information provided to you by others. The reliability of data must be evaluated, and you must be aware of issues within your agency’s records management system. These problems can and will affect your work product as an analyst, therefore you must understand how. An analyst cannot effect change in data collection without the support of the management structure. In this unit, we will discuss the importance of chain of command and how the confines of this management structure must be considered when attempting to rectify data integrity issues.

3 What will you learn this unit? Describe data Data Integrity/Compromised Data problems correct Chain of command in data changes/integrity

4 Chapter 7 This chapter details the types of problems an analyst is likely to encounter with data integrity and their ramifications as well as possible solutions. An analyst may be the biggest proponent of clean data in an agency, but he or she cannot be a lone ranger in the quest.

5 Key Terminology Data Integrity

6 Refers to the validity of data. Data integrity can be compromised in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another Software bugs or viruses. Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods T There are many ways to minimize these threats to data integrity. These include: Backing up data regularly Controlling access to data via security mechanisms Designing userinterfaces that prevent the input of invalid data Using error detection and correction software when transmitting data http://www.webopedia.com/TERM/D/data_integrity.html

7 Key Terminology Crime Analyst

8 The study of criminal incidents The identification of crime patterns, crime trends, and crime problems The analysis of these patterns, trends, and problems The dissemination of information to a police agency so that the agency can develop tactics and strategies to solve patterns, trends, and problems http://www.macrimeanalysts.com/aboutca.html

9 Key Terminology Chain of Command

10 Battlefield example on link Think about work situations

11 Data Integrity Problems – 5 minute question What data integrity concerns can you imagine encountering in the course of your analyst work?

12 Data Integrity Problems 5 minute question Where would you take those problems when you identify them?

13 Data Integrity Problems – 5 minute question How does an analyst work through the chain of command to address problems?


Download ppt "Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data."

Similar presentations


Ads by Google