Catalog Description

Hours: 54 lecture
Description: An overview of Information and Technology systems and strategies used in the administration of criminal justice; applying these systems and information across the spectrum of Crime Prevention and Intervention in a holistic manner to address Law Enforcement Investigations and Community Safety; topics covered include CAD (Computer Aided Dispatch), RMS (Records Management Systems), CCTV, Video Surveillance, Dash-Cams and Body-Cams, Automated License Plate Readers, Automated Gunshot Detection Systems, etc. (CSU)

Course Student Learning Outcomes

  • CSLO #1: Analyze the impact of technology (specifically computers) on the administration of justice.
  • CSLO #2: Evaluate the use and effectiveness of technology (information systems) within law enforcement.
  • CSLO #3: Design and construct methods utilizing technology tools to assist law enforcement agencies in receiving and providing information from and to their respective communities to help reduce crime and the fear of crime.
  • CSLO #4: Analyze and evaluate the significance of social media as both a challenge and a tool within the criminal justice system.

Effective Term

Fall 2025

Course Type

Credit - Degree-applicable

Contact Hours

54

Outside of Class Hours

108

Total Student Learning Hours

162

Course Objectives

Lecture Objectives:
1. Develop computer skills including word processing; spreadsheet analysis and comparisons; analysis and evaluation of data base and telecommunications applications as practiced in law enforcement settings;
2. Identify and evaluate different system strategies in the use of the computer in law enforcement operations; including different program applications that produce crime support data found in criminal records, identification applications, Computer Assisted Dispatch systems, statistics to support management decisions and the use of computers in investigations;
3. Recognize and evaluate laws related to computer crime and develop the necessary probable cause in order to prosecute a computer crime.

General Education Information

  • Approved College Associate Degree GE Applicability
    • CSU GE Applicability (Recommended-requires CSU approval)
      • Cal-GETC Applicability (Recommended - Requires External Approval)
        • IGETC Applicability (Recommended-requires CSU/UC approval)

          Articulation Information

          • CSU Transferable

          Methods of Evaluation

          • Essay Examinations
            • Example: Students will write an essay in which they analyze different types of computer fraud.
          • Objective Examinations
            • Example: Students will identify the various types of computer systems commonly used by law enforcement.

          Repeatable

          No

          Methods of Instruction

          • Lecture/Discussion
          • Distance Learning

          Lecture:

          1. Instructor will lead class discussion related to various uses and applications of computer systems within Law Enforcement.

          Distance Learning

          1. Using LMS, Instructor will lead a Discussion Board to determine and identify different types of computer fraud.

          Typical Out of Class Assignments

          Reading Assignments

          1. Read associated articles and develop a relational data base. 2. Read "Laws Related to Computer Crimes" and be prepared to discuss their application.

          Writing, Problem Solving or Performance

          1. Recover deleted material from a data storage devise. 2. Research and prepare a class presentation on a specific crime analysis software program.

          Other (Term projects, research papers, portfolios, etc.)

          Required Materials

          • Information Technology and The Criminal Justice System
            • Author: April Pattavina
            • Publisher: SAGE
            • Publication Date: 2005
            • Text Edition: 2nd
            • Classic Textbook?: No
            • OER Link:
            • OER:
          • Law Enforcement Information Technology: A Managerial, Operational and Practicioner Guide
            • Author: Chu
            • Publisher: Routledge
            • Publication Date: 2001
            • Text Edition: 1st
            • Classic Textbook?: No
            • OER Link:
            • OER:
          • Digital Frontier Technologies in the 21st Century
            • Author: Milivojevic
            • Publisher: Routledge
            • Publication Date: 2021
            • Text Edition: 1st
            • Classic Textbook?: No
            • OER Link:
            • OER:
          • Cyber Crime and Digital Forensics
            • Author: Holt & Bossler
            • Publisher: Routledge
            • Publication Date: 2022
            • Text Edition: 3rd
            • Classic Textbook?: No
            • OER Link:
            • OER:

          Other materials and-or supplies required of students that contribute to the cost of the course.