Part I: Introduction |
|
1 | (48) |
|
The Strategic Significance of IT |
|
|
3 | (20) |
|
|
3 | (2) |
|
The Need to Understand IT |
|
|
5 | (1) |
|
|
6 | (3) |
|
Barriers to Information Use |
|
|
9 | (1) |
|
|
10 | (1) |
|
The Structure of IT Resources |
|
|
10 | (2) |
|
The Chief Information Officer (CIO) |
|
|
12 | (1) |
|
|
13 | (5) |
|
|
13 | (2) |
|
The Value Chain, and Lessons from the Commercial Sector |
|
|
15 | (3) |
|
The Call-for-Service Process |
|
|
18 | (2) |
|
|
20 | (3) |
|
IT in Support of Community Policing |
|
|
23 | (26) |
|
|
23 | (1) |
|
The Roots of Modern Policing |
|
|
23 | (1) |
|
The Professional Policing Era |
|
|
24 | (1) |
|
Questioning the Reformers |
|
|
25 | (3) |
|
Community Policing Is Not Anti-Technology |
|
|
28 | (1) |
|
IT Supports the Mission of Community Policing |
|
|
29 | (1) |
|
Process Reengineering Produces Resources for Community Policing |
|
|
30 | (1) |
|
Law Enforcement Officers Are Knowledge Workers |
|
|
31 | (4) |
|
Knowledge Work and Productivity |
|
|
32 | (1) |
|
Problem-Oriented Policing --- Applying Knowledge |
|
|
33 | (2) |
|
Community Policing Is Decentralization |
|
|
35 | (1) |
|
The Community Is More Than Just the Police |
|
|
36 | (2) |
|
The New Community: The Internet |
|
|
38 | (1) |
|
Community Policing Websites |
|
|
39 | (8) |
|
Automated Regional Justice Information System (ARJIS) |
|
|
39 | (1) |
|
London, Ontario and P2S (Police to Stakeholder) |
|
|
39 | (1) |
|
|
40 | (1) |
|
Self-Serve Police Reports |
|
|
40 | (1) |
|
|
40 | (2) |
|
The Community Bulletin Board |
|
|
42 | (1) |
|
The Law Enforcement Agency Bulletin Board |
|
|
43 | (1) |
|
Police to Public Communications |
|
|
44 | (1) |
|
Recruiting the Knowledge Worker |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
Part II: Management |
|
49 | (46) |
|
Strategic Planning and Reengineering Operations |
|
|
51 | (18) |
|
|
51 | (1) |
|
Leading the Technology Project |
|
|
52 | (1) |
|
|
52 | (2) |
|
The Rationale for Business Process Reengineering |
|
|
54 | (2) |
|
Principles of Reengineering |
|
|
56 | (4) |
|
|
60 | (2) |
|
The Agents of Process Change |
|
|
62 | (1) |
|
|
63 | (5) |
|
Case Study: As-Is and To-Be at the Vancouver Police Department |
|
|
65 | (3) |
|
|
68 | (1) |
|
|
69 | (26) |
|
|
69 | (1) |
|
|
69 | (3) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Return on Investment (ROI), Net Present Value (NPV), and Payback |
|
|
70 | (2) |
|
The Acquisition of Software |
|
|
72 | (2) |
|
Custom-Developed Software |
|
|
72 | (1) |
|
Commercial Off-the-Shelf Software |
|
|
73 | (1) |
|
Application Service Providers |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Contract for Operational Services |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (6) |
|
|
78 | (3) |
|
|
81 | (2) |
|
Reference Checks and Site Visits |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (7) |
|
Case Study: Project Management --- The Seven Deadly Sins |
|
|
86 | (2) |
|
Case Study: Project Justifications and the Western Australia Police Service |
|
|
88 | (3) |
|
Case Study: Outsourcing and the New Scotland Yard (London Metropolitan Police Service) |
|
|
91 | (1) |
|
|
92 | (3) |
Part III: Major Applications |
|
95 | (70) |
|
Databases and Information |
|
|
97 | (22) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (3) |
|
|
101 | (1) |
|
|
102 | (1) |
|
Data Warehouses, Data Marts |
|
|
103 | (1) |
|
|
104 | (1) |
|
Data Dictionary (Meta Data) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Crime Mapping and Database Applications |
|
|
105 | (2) |
|
|
107 | (1) |
|
Automated Fingerprint Identification System (AFIS) |
|
|
108 | (1) |
|
Facial Image Database Applications |
|
|
108 | (1) |
|
National and International Databases |
|
|
109 | (1) |
|
The Information Sharing Problem |
|
|
110 | (1) |
|
Regional Information Sharing Projects |
|
|
111 | (5) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (3) |
|
|
119 | (16) |
|
|
119 | (1) |
|
Manual Processes and Workflow |
|
|
120 | (4) |
|
|
124 | (1) |
|
|
124 | (4) |
|
CAD and Management Information Systems |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
Community Policing and CAD |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (3) |
|
Records Management Systems |
|
|
135 | (12) |
|
|
135 | (1) |
|
Filing Systems and the Public Library Analogy |
|
|
136 | (2) |
|
Information Gathering Features in a Modern RMS |
|
|
138 | (1) |
|
|
138 | (3) |
|
|
139 | (1) |
|
Street Check or Field Interview Reports |
|
|
139 | (1) |
|
Traffic Citations and Accidents |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
Criminal History Information |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
Information Usage in Modern RMS |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (3) |
|
|
147 | (18) |
|
|
147 | (1) |
|
Community Policing and the Mobile Worker |
|
|
147 | (1) |
|
The Communicating Information Continuum |
|
|
147 | (3) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (5) |
|
Rugged Clamshell Notebook |
|
|
151 | (1) |
|
Rugged-Handled Tablet Computers |
|
|
151 | (1) |
|
Personal Digital Assistants |
|
|
152 | (2) |
|
|
154 | (1) |
|
Combination Clamshell and Modular Computers |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Functionality and Ergonomics |
|
|
156 | (1) |
|
|
156 | (1) |
|
COPS MORE and Mobile Computing |
|
|
156 | (1) |
|
Definitions of Mobile Computing |
|
|
156 | (2) |
|
Mobile Computing: Method or Product? |
|
|
158 | (5) |
|
Case Study 1: Colorado State Patrol |
|
|
159 | (1) |
|
Case Study 2: Valley Emergency Communication Center, Utah |
|
|
160 | (1) |
|
Case Study 3: The Coos Bay (OR) Police Department |
|
|
161 | (1) |
|
Case Study 4: The London, Ontario Police Service |
|
|
161 | (2) |
|
|
163 | (2) |
Part IV: IT Infrastructure |
|
165 | (76) |
|
|
167 | (32) |
|
Introduction to Infrastructure |
|
|
167 | (1) |
|
Elements of Communications |
|
|
167 | (3) |
|
Historical Electronic Communications Devices |
|
|
170 | (3) |
|
|
170 | (2) |
|
|
172 | (1) |
|
A Law Enforcement Facility |
|
|
173 | (1) |
|
Telephone System Fundamentals |
|
|
174 | (1) |
|
Emergency Calling Service (911 and E-911) |
|
|
175 | (1) |
|
The PSTN and Customer Services |
|
|
176 | (3) |
|
|
176 | (1) |
|
Private Branch Exchange (PBX) |
|
|
177 | (1) |
|
Automatic Call Distribution (ACD) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Interactive Voice Recognition (IVR) |
|
|
179 | (1) |
|
Computer Telephone Integration (CTI) |
|
|
179 | (1) |
|
Terminals and Personal Computers |
|
|
179 | (1) |
|
|
180 | (4) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
Physical Media (Cable Connections) |
|
|
186 | (1) |
|
|
186 | (1) |
|
A Law Enforcement Building --- LAN and Backbone Networks |
|
|
187 | (1) |
|
The OSI Reference Model and TCP/IP |
|
|
188 | (1) |
|
Wide Area and Metropolitan Area Networks |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
Analog Telephone Circuits |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
Synchronous Optical Networks (SONET) |
|
|
191 | (1) |
|
Circuit-Switched Services |
|
|
191 | (1) |
|
|
191 | (2) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Asynchronous Transfer Mode (ATM) |
|
|
192 | (1) |
|
|
193 | (2) |
|
Virtual Private Networks (VPN) |
|
|
195 | (1) |
|
Case Study 1: The Kansas Bureau of Investigation VPN Network |
|
|
195 | (1) |
|
Case Study 2: The DISC System and Information Sharing over a VPN |
|
|
196 | (1) |
|
|
196 | (3) |
|
Wireless Voice IT Infrastructure |
|
|
199 | (28) |
|
|
199 | (1) |
|
A History of Law Enforcement Radio |
|
|
200 | (2) |
|
Basic Principles of Radio |
|
|
202 | (1) |
|
The Electromagnetic Spectrum |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
206 | (1) |
|
Providing Coverage (Making a Radio ``Work'') |
|
|
206 | (3) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (4) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (2) |
|
|
218 | (2) |
|
Commercial Cellular Telephone |
|
|
220 | (1) |
|
|
221 | (2) |
|
|
221 | (1) |
|
Enhanced Specialized Mobile Radio |
|
|
222 | (1) |
|
Commercial Wireless Service Usage |
|
|
223 | (1) |
|
Acquiring a Land Mobile Radio System |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (3) |
|
Wireless Data IT Infrastructure |
|
|
227 | (14) |
|
An Introduction to Wireless Data |
|
|
227 | (1) |
|
|
228 | (1) |
|
How Wireless Data Are Used |
|
|
228 | (2) |
|
Components of a Wireless Data Network |
|
|
230 | (1) |
|
User Devices and Applications |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
Private Land Mobile Radio System Data |
|
|
231 | (2) |
|
|
233 | (1) |
|
Circuit-Switched Cellular Telephone Networks |
|
|
234 | (1) |
|
|
235 | (3) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Cellular Digital Packet Data (CDPD) |
|
|
237 | (1) |
|
Third Generation (3G) Wireless |
|
|
238 | (1) |
|
Geographical Positioning Systems (GPS) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (2) |
Appendix |
|
241 | (2) |
Index |
|
243 | |