Atjaunināt sīkdatņu piekrišanu

E-grāmata: Law Enforcement Information Technology: A Managerial, Operational, and Practitioner Guide

(Vancouver Police Department, Vancouver, Canada)
  • Formāts: 280 pages
  • Izdošanas datums: 21-Jun-2001
  • Izdevniecība: CRC Press Inc
  • ISBN-13: 9781420040890
  • Formāts - PDF+DRM
  • Cena: 100,67 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām
  • Formāts: 280 pages
  • Izdošanas datums: 21-Jun-2001
  • Izdevniecība: CRC Press Inc
  • ISBN-13: 9781420040890

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Writing not for engineers but for managers, supervisors, and line officers working in law enforcement who increasingly face new digital technology in all facets of their operations, Chu illustrates how information technology in applied in the profession. Technical people, consultants, vendors, and developers in information technology might also learn here about that particular market. He works with the Emergency Communications for Southwest British Columbia, C-Comm, in Vancouver, British Columbia. Annotation c. Book News, Inc., Portland, OR (booknews.com)

ARE YOU PREPARED FOR THE LAW ENFORCEMENT IT REVOLUTION? Law enforcement agencies that are laggards in Information Technology (IT) will soon, if not already, be considered mismanaged. Whether you are in an operational position, or you are a police officer who aspires to a higher rank, you must be aware of how IT can help you perform your job and help your organization.

DON'T BE INTIMIDATED BY IT ANY LONGER. With extensive experience implementing large-scale IT projects to the law enforcement community, author Jim Chu has assembled a comprehensive, one-stop guide that enables you to understand the many complexities and hurdles associated with IT systems. In a non-technical language, Law Enforcement Information Technology: A Managerial, Operational, and Practitioner Guide describes infrastructure components and outlines economic concepts that explain how and why IT adds value. It also includes seminal perspectives on why IT supports community policing, and how public policing is changing to a knowledge-based profession.

LEARN HOW TO APPLY IT AND MAXIMIZE THE USE OF INFORMATION. Used wisely and correctly, IT can be one of your greatest and most efficient assets in law enforcement. Whether you address automation or communicate with those who do, you need to understand the role of IT in all aspects of the public safety service delivery chain. Logically organized and easy to understand, Law Enforcement Information Technology helps you become well-versed in the latest terminology, products, and automation options and gives you the ability to work with technical resources in a partnership to improve the performance of your organization.

Recenzijas

"The book is logically organized and provides a complete review of all pertinent issues I know of no other publications that are as comprehensive and/or practitioner oriented. The bulk of literature currently available is not targeted at the law enforcement IT manager. This work fills a critical gap" -G. Matthew Snyder, Technology Administrator of the International Association of Chiefs of Police (IACP) Technology Center and Technical Assistance Program

"This is a well structured and very readable book which should be of considerable interest to a wide range of people within law enforcement agencies. I particularly like the use of case studies to illustrate the concepts and theories. Reading the book has been particularly useful to me in benchmarking our plans to implement the recommendations of the Patten Report on Policing in Northern Ireland." -Mr. Richard Miller, Chief Administration Officer, Royal Ulster Constabulary

Part I: Introduction 1(48)
The Strategic Significance of IT
3(20)
IT Is Important
3(2)
The Need to Understand IT
5(1)
Information Is an Asset
6(3)
Barriers to Information Use
9(1)
The Scope of IT
10(1)
The Structure of IT Resources
10(2)
The Chief Information Officer (CIO)
12(1)
How and Why It Is Used
13(5)
The Service Sector
13(2)
The Value Chain, and Lessons from the Commercial Sector
15(3)
The Call-for-Service Process
18(2)
End-of-Chapter Comments
20(3)
IT in Support of Community Policing
23(26)
Introduction
23(1)
The Roots of Modern Policing
23(1)
The Professional Policing Era
24(1)
Questioning the Reformers
25(3)
Community Policing Is Not Anti-Technology
28(1)
IT Supports the Mission of Community Policing
29(1)
Process Reengineering Produces Resources for Community Policing
30(1)
Law Enforcement Officers Are Knowledge Workers
31(4)
Knowledge Work and Productivity
32(1)
Problem-Oriented Policing --- Applying Knowledge
33(2)
Community Policing Is Decentralization
35(1)
The Community Is More Than Just the Police
36(2)
The New Community: The Internet
38(1)
Community Policing Websites
39(8)
Automated Regional Justice Information System (ARJIS)
39(1)
London, Ontario and P2S (Police to Stakeholder)
39(1)
Self-Serve Queries
40(1)
Self-Serve Police Reports
40(1)
Crime Prevention
40(2)
The Community Bulletin Board
42(1)
The Law Enforcement Agency Bulletin Board
43(1)
Police to Public Communications
44(1)
Recruiting the Knowledge Worker
45(1)
Digital Wanted Pictures
46(1)
End-of-Chapter Comments
47(2)
Part II: Management 49(46)
Strategic Planning and Reengineering Operations
51(18)
Introduction
51(1)
Leading the Technology Project
52(1)
Strategic Plans for IT
52(2)
The Rationale for Business Process Reengineering
54(2)
Principles of Reengineering
56(4)
Process Mapping
60(2)
The Agents of Process Change
62(1)
Managing Changes
63(5)
Case Study: As-Is and To-Be at the Vancouver Police Department
65(3)
End-of-Chapter Comments
68(1)
The Acquistion of IT
69(26)
Introduction
69(1)
The Business Case for IT
69(3)
Added Value
69(1)
Intangible Value
70(1)
Return on Investment (ROI), Net Present Value (NPV), and Payback
70(2)
The Acquisition of Software
72(2)
Custom-Developed Software
72(1)
Commercial Off-the-Shelf Software
73(1)
Application Service Providers
74(1)
Outsourcing
74(1)
Purchasing Systems
75(1)
Sole Source Agreement
75(1)
Contract for Operational Services
76(1)
Request for Information
76(1)
Request for Quotation
77(1)
Request for Proposal
78(6)
Developing the REP
78(3)
Evaluation of Responses
81(2)
Reference Checks and Site Visits
83(1)
The Contract
84(1)
Project Management
85(7)
Case Study: Project Management --- The Seven Deadly Sins
86(2)
Case Study: Project Justifications and the Western Australia Police Service
88(3)
Case Study: Outsourcing and the New Scotland Yard (London Metropolitan Police Service)
91(1)
End-of-Chapter Comments
92(3)
Part III: Major Applications 95(70)
Databases and Information
97(22)
Introduction
97(1)
Card File Indexes
97(1)
Basic Database Elements
98(3)
The Relational Database
101(1)
Queries
102(1)
Data Warehouses, Data Marts
103(1)
Data Mining
104(1)
Data Dictionary (Meta Data)
104(1)
Specialized Applications
105(1)
Crime Mapping and Database Applications
105(2)
DNA Databases
107(1)
Automated Fingerprint Identification System (AFIS)
108(1)
Facial Image Database Applications
108(1)
National and International Databases
109(1)
The Information Sharing Problem
110(1)
Regional Information Sharing Projects
111(5)
Case Study 1: NEGIS
112(1)
Case Study 2: RISS
113(1)
Case Study 3: ARJIS
113(1)
Case Study 4: PRIME-BC
114(1)
Case Study 5: RACKETS
115(1)
Case Study 6: HITS
116(1)
End-of-Chapter Comments
116(3)
Computer-Aided Dispatch
119(16)
Introduction to CAD
119(1)
Manual Processes and Workflow
120(4)
CAD Architecture
124(1)
CAD Functionality
124(4)
CAD and Management Information Systems
128(1)
Interfaces
128(3)
E-911
129(1)
Message Switch
129(1)
Mobile Data
129(1)
Voice Radio System
130(1)
Commercial Paging
130(1)
RMS
130(1)
The Internet
131(1)
Community Policing and CAD
131(1)
Costs
132(1)
End-of-Chapter Comments
132(3)
Records Management Systems
135(12)
Introduction
135(1)
Filing Systems and the Public Library Analogy
136(2)
Information Gathering Features in a Modern RMS
138(1)
Report Structure
138(3)
Occurrence Reports
139(1)
Street Check or Field Interview Reports
139(1)
Traffic Citations and Accidents
139(1)
Sex Offender Registries
139(1)
Booking Reports
139(1)
Criminal History Information
139(1)
Investigation Reports
140(1)
Evidence Reports
140(1)
Property Reports
140(1)
Statements
140(1)
Information Usage in Modern RMS
141(2)
Workflow Management
143(1)
End-of-Chapter Comments
144(3)
Mobile Computing
147(18)
Introduction
147(1)
Community Policing and the Mobile Worker
147(1)
The Communicating Information Continuum
147(3)
Mobile Data Terminals
150(1)
Mobile Workstations
150(1)
MWS Products
150(5)
Rugged Clamshell Notebook
151(1)
Rugged-Handled Tablet Computers
151(1)
Personal Digital Assistants
152(2)
Modular Computers
154(1)
Combination Clamshell and Modular Computers
154(1)
Printers
155(1)
Mounting and Consoles
155(1)
Functionality and Ergonomics
156(1)
Durability
156(1)
COPS MORE and Mobile Computing
156(1)
Definitions of Mobile Computing
156(2)
Mobile Computing: Method or Product?
158(5)
Case Study 1: Colorado State Patrol
159(1)
Case Study 2: Valley Emergency Communication Center, Utah
160(1)
Case Study 3: The Coos Bay (OR) Police Department
161(1)
Case Study 4: The London, Ontario Police Service
161(2)
End-of-Chapter Comments
163(2)
Part IV: IT Infrastructure 165(76)
Wireline Infrastructure
167(32)
Introduction to Infrastructure
167(1)
Elements of Communications
167(3)
Historical Electronic Communications Devices
170(3)
The Telegraph
170(2)
The Telephone
172(1)
A Law Enforcement Facility
173(1)
Telephone System Fundamentals
174(1)
Emergency Calling Service (911 and E-911)
175(1)
The PSTN and Customer Services
176(3)
Centrex
176(1)
Private Branch Exchange (PBX)
177(1)
Automatic Call Distribution (ACD)
178(1)
Auto Attendant
178(1)
Interactive Voice Recognition (IVR)
179(1)
Computer Telephone Integration (CTI)
179(1)
Terminals and Personal Computers
179(1)
Computer Architecture
180(4)
Network Fundamentals
184(1)
LAN Components
185(1)
Workstations
185(1)
Host or Server
185(1)
Physical Media (Cable Connections)
186(1)
Structured Wiring System
186(1)
A Law Enforcement Building --- LAN and Backbone Networks
187(1)
The OSI Reference Model and TCP/IP
188(1)
Wide Area and Metropolitan Area Networks
189(1)
Dialed Circuit Service
189(1)
Dedicated Circuits
190(1)
Analog Telephone Circuits
190(1)
T-Carrier Services
190(1)
Digital Subscriber Lines
190(1)
Synchronous Optical Networks (SONET)
191(1)
Circuit-Switched Services
191(1)
Packet-Switched Services
191(2)
X.25
192(1)
Frame Relay
192(1)
Asynchronous Transfer Mode (ATM)
192(1)
The Internet
193(2)
Virtual Private Networks (VPN)
195(1)
Case Study 1: The Kansas Bureau of Investigation VPN Network
195(1)
Case Study 2: The DISC System and Information Sharing over a VPN
196(1)
End-of-Chapter Comments
196(3)
Wireless Voice IT Infrastructure
199(28)
Introduction
199(1)
A History of Law Enforcement Radio
200(2)
Basic Principles of Radio
202(1)
The Electromagnetic Spectrum
203(2)
Spectrum Bandwidth
205(1)
Spectrum Conservation
206(1)
Providing Coverage (Making a Radio ``Work'')
206(3)
Receiver Voting Systems
207(1)
Transmitter Steering
208(1)
Simulcasting
208(1)
Multicasting
209(1)
Coverage Impediments
209(4)
Propagation
209(2)
Fringe Areas
211(1)
RF Dead Zones
212(1)
Microwave
213(1)
Satellite
214(1)
Wireless Digital Signals
214(1)
Trunking
215(1)
APCO Project 25
216(2)
Interoperability
218(2)
Commercial Cellular Telephone
220(1)
Commercial Radio
221(2)
Specialized Mobile Radio
221(1)
Enhanced Specialized Mobile Radio
222(1)
Commercial Wireless Service Usage
223(1)
Acquiring a Land Mobile Radio System
223(1)
LMRS Vendors
224(1)
End-of-Chapter Comments
224(3)
Wireless Data IT Infrastructure
227(14)
An Introduction to Wireless Data
227(1)
Bandwidth Limitations
228(1)
How Wireless Data Are Used
228(2)
Components of a Wireless Data Network
230(1)
User Devices and Applications
230(1)
Wireless Backbone
231(1)
Software Applications
231(1)
Private Land Mobile Radio System Data
231(2)
Commercial Data Services
233(1)
Circuit-Switched Cellular Telephone Networks
234(1)
Wireless Packet Data
235(3)
ARDIS
236(1)
BellSouth Wireless Data
236(1)
Cellular Digital Packet Data (CDPD)
237(1)
Third Generation (3G) Wireless
238(1)
Geographical Positioning Systems (GPS)
238(1)
Middleware
239(1)
End-of-Chapter Comments
239(2)
Appendix 241(2)
Index 243