Using the attached word documents from the implicated learning experiment create a report on the experiment. In your report, write a brief introduction explaining the differences between implicit and explicit….
Utilize the GCU Library and government crime analysis websites to research CAD system and RMS, the two major crime analysis systems that are used in law enforcement
Complete each of the prompts below. NOTE: be sure to support your responses with scholarly research and information from government websites. Additionally, please note the word counts for each prompt.
1. Utilize the GCU Library and government crime analysis websites to research CAD system and RMS, the two major crime analysis systems that are used in law enforcement.
A. What kind of data can crime analysts retrieve from these systems? (200-250-Words)
B. How do crime analysts use this data to create a crime analysis product? (400-500 Words)
2. Access the “Sample products Page” on the IACA website: https://iaca.net/sample-crime-analysis-products/
Choose a sample crime analysis product. Identify what types of data sources you would utilize to create the product you have chosen.
A. Imagine you are a crime analyst who is tasked with creating a bulletin for a “beat” officer near downtown San Jose to help the officer better understand the types of crimes that occur in the area. Complete the crime analysis template (below) by doing the following:
Access the Shawnee Police “All Points Bulletin” to help see what a final product looks like. https://www.iaca.net/CAUDC/Products/ShawneeCigSmashGrabRedacted.pdf
Access the San Jose Crime map. http://www.sjpd.org/crimestats/CrimeReports.html
In the search bar on the map, type in “Downtown San Jose California.”
Complete the template by using the crime data from the San Jose downtown area. List a total of 30 crimes, and include four different types of crimes.
Known Incidents Chart
Incidents Map – Paste in a screenshot of the map of the downtown area of San Jose, CA, that you are using for the crime analysis.
(Paste Map here)
3. From the data you have delineated above, for each of the four crimes, apply Routine Activity Theory to determine the crime incidents and behaviors of the environment, probable suspects, and probable victims likely to be involved in these types of crimes. (700-800 words)