Deck 9: Analyzing Content and Police Data: Social-Network Analysis, Crime Mapping, Big Data, and Content Analysis

Full screen (f)
exit full mode
Question
A way of representing social configurations of a class would be to show a ______.

A) sociotextual representation
B) sociogram
C) sociometric representation
D) sociodrawing
Use Space or
up arrow
down arrow
to flip the card.
Question
Modeling that uses data from several sources to predict the probability of crime occurring in the future, using the underlying factors of the environment that are associated with illegal behavior is ______ modeling.

A) risk topical
B) rated terrain
C) risk-terrain
D) rated topical
Question
The Betweenness Centrality Score is a statistic that measures the extent to which ______.

A) the data from one end of the SNA connects to data at the other end
B) nodes connect other nodes that are not directly linked to each other in SNA
C) some nodes connect to other nodes that are directly linked in SNA
D) the semi-nodes connect to each other in a straight fashion
Question
ICPSR ensures subject confidentiality with work done by a ______.

A) data confidentialist
B) federal law officer
C) data archivist
D) human rights officer
Question
Types of relationships that can include many different forms such as face-to-face and online interactions, interaction with a criminal justice agency, and digital economic transactions, are included in ______.

A) social networks
B) real-world groups
C) close group networks
D) historically significant networks
Question
Social Network Analysis (SNA) usually consists of at least ______ data sets.

A) two
B) three
C) four
D) five
Question
The collection of Big Data makes possible ______ and prediction of behavior on a large scale

A) surveillance
B) surveillance
C) protection
D) control
Question
Political concerns intersect with ______ practice(s) in secondary data analyses

A) ethnic
B) racial
C) ethical
D) census
Question
The act of compiling or analyzing data that were originally collected by someone else at another time is ______.

A) second-hand data analysis
B) secondary data analysis
C) inappropriate data analyses
D) tertiary analysis
Question
Many researchers obtain data through the ICPSR, which is the ______.

A) Inter-state Configuration of Political and Social Research
B) Intra-University Collaboration for Policing and Social Research
C) Intra-University Consortium for Political and Social Research
D) Inter-social Consortium of Political and Social Research
Question
One of the first graphical applications of social networks was created by Jacob Moreno to examine friendship choices, in his classic book ______.

A) The Social Network
B) Friendship Survival
C) Who Shall Survive?
D) The Sociometry Test
Question
The Inter-University Consortium for Political and Social Research carefully examines all data deposited in the archive for the ______.

A) possibility of disclosure risk
B) inevitability of disclosure of information
C) probability of information disclosure
D) insensitivity of information risk
Question
There are four major types of secondary data ______.

A) surveys, statistics, records, documents
B) statistics, official surveys, historical records, documents
C) official statistics, official records, official historical documents, magazine surveys
D) surveys, official statistics, official records, other historical documents
Question
The software tool that has made crime mapping increasingly available to researchers since the 1990s is ______ system.

A) geopolitical information
B) geographic intelligence
C) geographic interpol
D) geographic information
Question
Geospatial locations within jurisdictions where crimes are more likely to occur compared to other areas are known as ______.

A) hot locations
B) hot spots
C) heat-seeking spots
D) crime spots
Question
Krebs' analysis shows the benefits of SNA to describe the strength of the relationships for the 9/11/2001 terrorists, concluding that the best solution for network disruption may be to discover possible suspects and then through ______.

A) contextual analysis better understand the network
B) considering census sampling
C) snowball sampling, map their ego networks
D) probability sampling, then follow up with nonprobability sampling
Question
The goal of the research by Fitterer, Nelson, and Nathoo (2015) was to ______.

A) describe BNE data in Oregon
B) use data from the early time period to predict later occurrences of BNE
C) use data from later time periods to predict BNEs
D) create a data base of nationwide BNEs
Question
Bichler, Lim, and Larin (2017) found that the size of the shapes in the graphs (e.g., circles and diamonds) indicated that ______.

A) the focus should be pointed toward Smith
B) there was no connection
C) the degree of betweenness centrality
D) there would have been no way to make an arrest based on the current data
Question
A key concern when original records are analyzed with either secondary data or Big Data is ______.

A) behavioral history
B) protection of perpretators
C) subject prediction
D) subject confidentiality
Question
Crime mapping for research purposes ______.

A) has been around only since 2000
B) has a very long history
C) is a relatively new finding (since 1980)
D) has been shown to be most effective with pushpins and maps
Question
Secondary data analysis is the act of compiling or analyzing data that were originally collected by someone else at another time.
Question
The Freedom of Information Act stipulates that all persons have a right to access all federal agency records unless ______.

A) the President of the United States bars access
B) the records are specifically exempted
C) their Institutional Review Board denies access
D) the subjects are still living
Question
Researchers who conclude they are being denied access to public records of the federal government may be able to obtain the data by ______.

A) mailing a request to the Institutional Review Board
B) sending a request to the President of the United States
C) filing a Freedom of Information Act request
D) there is no further step that may be taken
Question
Because content analysis involves coding and categorizing text and discovering relationships among constructs in text, among other things, it bears some similarities to ______ analysis.

A) quantitative data
B) secondary quantitative data
C) qualitative data
D) identification
Question
Content analysis methods usually begin with ______.

A) written or visual images
B) text, speech broadcasts, or visual images
C) speeches or television broadcasts
D) surveys supplemented by text
Question
Social networks are types of relationships that can include many forms.
Question
To ensure adequate representation of community newspapers in large cities, a(n) ______ sample might be the best choice

A) simple random
B) stratified random
C) enumerated random
D) nonrandom
Question
The categories into which the text units are to be coded must be ______.

A) defined
B) denoted
C) computed
D) programmed
Question
The systematic, objective, quantitative analysis of message characteristic is ______ analysis.

A) content
B) contextual
C) quantitative
D) tertiary
Question
Responsible use of secondary data requires a good understanding of the ______.

A) individual researchers involved
B) concepts in the current research
C) primary data source
D) print media's reaction
Question
The goal of a content analysis is to develop inferences from ______.

A) communication in any form
B) oral communications
C) written communications
D) speeches
Question
Taylor, et al. (2013) found that male and female children were equally likely to have been abducted by family, but the print media was more likely to ______.

A) report on female family abductions compared to males
B) focus on abductions by male family members
C) report more on abductions perpetrated by family members than strangers
D) focus on abductions of male children
Question
In a content analysis, items such as newspaper articles or political conventions may be the ______.

A) population units
B) units of analysis
C) contextual units
D) analytical content
Question
Subject confidentiality is a key concern when ______.

A) original records are analyzed
B) the ICPSR examines all data in the archive
C) secondary data is used but it still contains some identifying information
D) all of these
Question
A node is another name for a graph representing social configurations
Question
Bichler, Lim, and Larin (2017) performed an SNA regarding the Red River killings.
Question
Researchers who rely on secondary data inevitably make trade-offs between their ability to use a particular data set and ______.

A) the specific hypotheses they can test
B) their choice of the data set
C) why they think they may not be able to match the analytic possibilities presented by the data
D) the potential harm in collecting primary data
Question
Social network analysis and crime mapping are common techniques used ______.

A) understand how individual offenders approach a particular crime
B) to reduce, disrupt, and prevent crime
C) to respond to crime
D) both " to reduce, disrupt, and prevent crime" and " to respond to crime" are correct
Question
There are only two types of secondary data.
Question
The content analyst creates variables for analysis by ______.

A) cross-tabulating the variables
B) observing measures of central tendency
C) analyzing crime tendencies
D) counting occurrences of particular words, themes, or phrases
Question
Often, a comprehensive archive can provide the primary data for analysis.
Question
Researchers who conclude that they are being denied access to public records of the federal government have no recourse to obtain the data.
Question
If the units in a content analysis are individual issues of a newspaper, in a study of changes in news emphases, determining units of analysis may be relatively easy.
Question
Subject confidentiality is a key concern when original records are analyzed.
Question
Big Data is a very large data set which can be used to reveal patterns, trends, and associations between variables.
Question
Subject confidentiality is a key concern when original records are analyzed with secondary data but not Big Data.
Question
After coding procedures are developed, their reliability should be assessed by comparing different coders' codes for the same variables.
Question
The content analyst must decide what units are most appropriate to the research question.
Question
Use of SNA and crime mapping techniques are now common techniques used by law enforcement agencies to reduce, disrupt and prevent crime.
Question
Risk Terrain Modeling weights the independent variables and places them into a final model where criminal behavior is most likely to occur.
Question
Nonrandom sampling methods may never be used in content analysis.
Question
Homographs create special problems when developing coding procedures.
Question
Content analysis is the systematic, objective, quantitative analysis of message characteristics.
Question
Crime mapping allows law enforcement agencies to estimate where hot spots of crime are occurring.
Question
Reliable use of secondary data requires a good understanding of the primary data source.
Question
Scholars analyzing crime depictions presented in the media generally conclude that depictions in newspaper and television are not misleading.
Question
Hotspots are geospatial locations within jurisdictions where crimes are less likely to occur.
Question
If all information that could be used in any way to identify respondents cannot be removed from a data set, ICPSR will not allow access to the data to anyone.
Question
The easy availability of mapping tools provides more opportunities for intelligence-led policing.
Question
Crime mapping provides maps to visually communicate analysis results.
Question
What is the NACJID? Name any five of the datasets provided by the Bureau of Justice Statistics and National Institute of Justice cosponsored NACJID.
Question
What are hot spots? Why are they important? Give an example.
Question
What ethical issues are there when analyzing available data and content?
Question
What types of challenges does analysis of secondary data have?
Question
What types of units may be chosen for analysis? How does one determine units of analysis? How would a sample the units from the population? Design a coding procedure?
Question
What is Risk-Terrain Modeling? How does it differ from Crime Mapping?
Question
What is Google Ngrams? What does it show? Why is it an important tool?
Question
How do you identify a population of documents or other textual sources in content analysis?
Question
What is content analysis? What is the goal of a content analysis?
Question
What is "Big Data"? Give an example.
Question
Describe and illustrate a sociogram.
Question
What are the ethical issues in using Big Data?
Question
Why is developing reliable and valid coding procedures not an easy task? Give an example of a homograph and why it may cause problems.
Question
What is crime mapping? How has it been used? What are the three main functions of crime mapping?
Question
Who decides whether there are any issues of concern regarding human subjects when it comes to secondary analysis of data? Are regulations clear on this matter?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Analyzing Content and Police Data: Social-Network Analysis, Crime Mapping, Big Data, and Content Analysis
1
A way of representing social configurations of a class would be to show a ______.

A) sociotextual representation
B) sociogram
C) sociometric representation
D) sociodrawing
B
2
Modeling that uses data from several sources to predict the probability of crime occurring in the future, using the underlying factors of the environment that are associated with illegal behavior is ______ modeling.

A) risk topical
B) rated terrain
C) risk-terrain
D) rated topical
C
3
The Betweenness Centrality Score is a statistic that measures the extent to which ______.

A) the data from one end of the SNA connects to data at the other end
B) nodes connect other nodes that are not directly linked to each other in SNA
C) some nodes connect to other nodes that are directly linked in SNA
D) the semi-nodes connect to each other in a straight fashion
B
4
ICPSR ensures subject confidentiality with work done by a ______.

A) data confidentialist
B) federal law officer
C) data archivist
D) human rights officer
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Types of relationships that can include many different forms such as face-to-face and online interactions, interaction with a criminal justice agency, and digital economic transactions, are included in ______.

A) social networks
B) real-world groups
C) close group networks
D) historically significant networks
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Social Network Analysis (SNA) usually consists of at least ______ data sets.

A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
The collection of Big Data makes possible ______ and prediction of behavior on a large scale

A) surveillance
B) surveillance
C) protection
D) control
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Political concerns intersect with ______ practice(s) in secondary data analyses

A) ethnic
B) racial
C) ethical
D) census
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
The act of compiling or analyzing data that were originally collected by someone else at another time is ______.

A) second-hand data analysis
B) secondary data analysis
C) inappropriate data analyses
D) tertiary analysis
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Many researchers obtain data through the ICPSR, which is the ______.

A) Inter-state Configuration of Political and Social Research
B) Intra-University Collaboration for Policing and Social Research
C) Intra-University Consortium for Political and Social Research
D) Inter-social Consortium of Political and Social Research
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
One of the first graphical applications of social networks was created by Jacob Moreno to examine friendship choices, in his classic book ______.

A) The Social Network
B) Friendship Survival
C) Who Shall Survive?
D) The Sociometry Test
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
The Inter-University Consortium for Political and Social Research carefully examines all data deposited in the archive for the ______.

A) possibility of disclosure risk
B) inevitability of disclosure of information
C) probability of information disclosure
D) insensitivity of information risk
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
There are four major types of secondary data ______.

A) surveys, statistics, records, documents
B) statistics, official surveys, historical records, documents
C) official statistics, official records, official historical documents, magazine surveys
D) surveys, official statistics, official records, other historical documents
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
The software tool that has made crime mapping increasingly available to researchers since the 1990s is ______ system.

A) geopolitical information
B) geographic intelligence
C) geographic interpol
D) geographic information
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Geospatial locations within jurisdictions where crimes are more likely to occur compared to other areas are known as ______.

A) hot locations
B) hot spots
C) heat-seeking spots
D) crime spots
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Krebs' analysis shows the benefits of SNA to describe the strength of the relationships for the 9/11/2001 terrorists, concluding that the best solution for network disruption may be to discover possible suspects and then through ______.

A) contextual analysis better understand the network
B) considering census sampling
C) snowball sampling, map their ego networks
D) probability sampling, then follow up with nonprobability sampling
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
The goal of the research by Fitterer, Nelson, and Nathoo (2015) was to ______.

A) describe BNE data in Oregon
B) use data from the early time period to predict later occurrences of BNE
C) use data from later time periods to predict BNEs
D) create a data base of nationwide BNEs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Bichler, Lim, and Larin (2017) found that the size of the shapes in the graphs (e.g., circles and diamonds) indicated that ______.

A) the focus should be pointed toward Smith
B) there was no connection
C) the degree of betweenness centrality
D) there would have been no way to make an arrest based on the current data
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
A key concern when original records are analyzed with either secondary data or Big Data is ______.

A) behavioral history
B) protection of perpretators
C) subject prediction
D) subject confidentiality
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Crime mapping for research purposes ______.

A) has been around only since 2000
B) has a very long history
C) is a relatively new finding (since 1980)
D) has been shown to be most effective with pushpins and maps
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Secondary data analysis is the act of compiling or analyzing data that were originally collected by someone else at another time.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
The Freedom of Information Act stipulates that all persons have a right to access all federal agency records unless ______.

A) the President of the United States bars access
B) the records are specifically exempted
C) their Institutional Review Board denies access
D) the subjects are still living
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
Researchers who conclude they are being denied access to public records of the federal government may be able to obtain the data by ______.

A) mailing a request to the Institutional Review Board
B) sending a request to the President of the United States
C) filing a Freedom of Information Act request
D) there is no further step that may be taken
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
Because content analysis involves coding and categorizing text and discovering relationships among constructs in text, among other things, it bears some similarities to ______ analysis.

A) quantitative data
B) secondary quantitative data
C) qualitative data
D) identification
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Content analysis methods usually begin with ______.

A) written or visual images
B) text, speech broadcasts, or visual images
C) speeches or television broadcasts
D) surveys supplemented by text
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Social networks are types of relationships that can include many forms.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
To ensure adequate representation of community newspapers in large cities, a(n) ______ sample might be the best choice

A) simple random
B) stratified random
C) enumerated random
D) nonrandom
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
The categories into which the text units are to be coded must be ______.

A) defined
B) denoted
C) computed
D) programmed
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
The systematic, objective, quantitative analysis of message characteristic is ______ analysis.

A) content
B) contextual
C) quantitative
D) tertiary
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
Responsible use of secondary data requires a good understanding of the ______.

A) individual researchers involved
B) concepts in the current research
C) primary data source
D) print media's reaction
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
The goal of a content analysis is to develop inferences from ______.

A) communication in any form
B) oral communications
C) written communications
D) speeches
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Taylor, et al. (2013) found that male and female children were equally likely to have been abducted by family, but the print media was more likely to ______.

A) report on female family abductions compared to males
B) focus on abductions by male family members
C) report more on abductions perpetrated by family members than strangers
D) focus on abductions of male children
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
In a content analysis, items such as newspaper articles or political conventions may be the ______.

A) population units
B) units of analysis
C) contextual units
D) analytical content
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Subject confidentiality is a key concern when ______.

A) original records are analyzed
B) the ICPSR examines all data in the archive
C) secondary data is used but it still contains some identifying information
D) all of these
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
A node is another name for a graph representing social configurations
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Bichler, Lim, and Larin (2017) performed an SNA regarding the Red River killings.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
Researchers who rely on secondary data inevitably make trade-offs between their ability to use a particular data set and ______.

A) the specific hypotheses they can test
B) their choice of the data set
C) why they think they may not be able to match the analytic possibilities presented by the data
D) the potential harm in collecting primary data
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
Social network analysis and crime mapping are common techniques used ______.

A) understand how individual offenders approach a particular crime
B) to reduce, disrupt, and prevent crime
C) to respond to crime
D) both " to reduce, disrupt, and prevent crime" and " to respond to crime" are correct
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
There are only two types of secondary data.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
The content analyst creates variables for analysis by ______.

A) cross-tabulating the variables
B) observing measures of central tendency
C) analyzing crime tendencies
D) counting occurrences of particular words, themes, or phrases
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
Often, a comprehensive archive can provide the primary data for analysis.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
Researchers who conclude that they are being denied access to public records of the federal government have no recourse to obtain the data.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
If the units in a content analysis are individual issues of a newspaper, in a study of changes in news emphases, determining units of analysis may be relatively easy.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Subject confidentiality is a key concern when original records are analyzed.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
Big Data is a very large data set which can be used to reveal patterns, trends, and associations between variables.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
Subject confidentiality is a key concern when original records are analyzed with secondary data but not Big Data.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
After coding procedures are developed, their reliability should be assessed by comparing different coders' codes for the same variables.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
The content analyst must decide what units are most appropriate to the research question.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Use of SNA and crime mapping techniques are now common techniques used by law enforcement agencies to reduce, disrupt and prevent crime.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Risk Terrain Modeling weights the independent variables and places them into a final model where criminal behavior is most likely to occur.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
Nonrandom sampling methods may never be used in content analysis.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
Homographs create special problems when developing coding procedures.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Content analysis is the systematic, objective, quantitative analysis of message characteristics.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Crime mapping allows law enforcement agencies to estimate where hot spots of crime are occurring.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Reliable use of secondary data requires a good understanding of the primary data source.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Scholars analyzing crime depictions presented in the media generally conclude that depictions in newspaper and television are not misleading.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
Hotspots are geospatial locations within jurisdictions where crimes are less likely to occur.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
If all information that could be used in any way to identify respondents cannot be removed from a data set, ICPSR will not allow access to the data to anyone.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
The easy availability of mapping tools provides more opportunities for intelligence-led policing.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
Crime mapping provides maps to visually communicate analysis results.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
What is the NACJID? Name any five of the datasets provided by the Bureau of Justice Statistics and National Institute of Justice cosponsored NACJID.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
What are hot spots? Why are they important? Give an example.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
What ethical issues are there when analyzing available data and content?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
What types of challenges does analysis of secondary data have?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
What types of units may be chosen for analysis? How does one determine units of analysis? How would a sample the units from the population? Design a coding procedure?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
What is Risk-Terrain Modeling? How does it differ from Crime Mapping?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
What is Google Ngrams? What does it show? Why is it an important tool?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
How do you identify a population of documents or other textual sources in content analysis?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
What is content analysis? What is the goal of a content analysis?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
What is "Big Data"? Give an example.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Describe and illustrate a sociogram.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
What are the ethical issues in using Big Data?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
Why is developing reliable and valid coding procedures not an easy task? Give an example of a homograph and why it may cause problems.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
What is crime mapping? How has it been used? What are the three main functions of crime mapping?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Who decides whether there are any issues of concern regarding human subjects when it comes to secondary analysis of data? Are regulations clear on this matter?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.