Catalog Description

Hours: 72 (54 lecture, 18 laboratory)
Description: An introduction to system strategies and computer techniques used by law enforcement agencies. Computer procedures, terminology, and program applications that produce crime support data. Database applications found in law enforcement identification, CAD (Computer Assisted Dispatch) systems, statistics, investigations and records management systems. (CSU)

Course Student Learning Outcomes

  • CSLO #1: Analyze the impact of technology (specifically computers) on the administration of justice.
  • CSLO #2: Evaluate the use and effectiveness of technology (information systems) within law enforcement.
  • CSLO #3: Design and construct methods utilizing technology tools to assist law enforcement agencies in receiving and providing information from and to their respective communities to help reduce crime and the fear of crime.
  • CSLO #4: Analyze and evaluate the significance of social media as both a challenge and a tool within the criminal justice system.

Effective Term

Fall 2017

Course Type

Credit - Degree-applicable

Contact Hours

72

Outside of Class Hours

108

Total Student Learning Hours

180

Course Objectives

Lecture Objectives:
1. Develop computer skills including word processing; spreadsheet analysis and comparisons; analysis and evaluation of data base and telecommunications applications as practiced in law enforcement settings;
2. Identify and evaluate different system strategies in the use of the computer in law enforcement operations; including different program applications that produce crime support data found in criminal records, identification applications, Computer Assisted Dispatch systems, statistics to support management decisions and the use of computers in investigations;
3. Recognize and evaluate laws related to computer crime and develop the necessary probable cause in order to prosecute a computer crime.
Laboratory Objectives:
1. Leverage computer applications to "mine" data from the internet;
2. Apply skills to newly developed systems in the field.

General Education Information

  • Approved College Associate Degree GE Applicability
    • CSU GE Applicability (Recommended-requires CSU approval)
      • Cal-GETC Applicability (Recommended - Requires External Approval)
        • IGETC Applicability (Recommended-requires CSU/UC approval)

          Articulation Information

          • CSU Transferable

          Methods of Evaluation

          • Essay Examinations
            • Example: Students will write an essay in which they analyze different types of computer fraud.
          • Objective Examinations
            • Example: Students will identify the various types of computer systems commonly used by law enforcement.
          • Skill Demonstrations
            • Example: Students will practice "mining" data from the internet during a mock investigation. Students will practice "mining" data from the internet during a mock investigation.

          Repeatable

          No

          Methods of Instruction

          • Laboratory
          • Lecture/Discussion
          • Distance Learning

          Lab:

          1. Instructor will provide hypothetical criminal scenario to students, requiring them to apply skills to locate "evidence" from the internet.

          Lecture:

          1. Instructor will lead class discussion related to various uses and applications of computer systems within Law Enforcement.

          Distance Learning

          1. Using LMS, Instructor will lead a Discussion Board to determine and identify different types of computer fraud.

          Typical Out of Class Assignments

          Reading Assignments

          1. Read associated articles and develop a relational data base. 2. Read "Laws Related to Computer Crimes" and be prepared to discuss their application.

          Writing, Problem Solving or Performance

          1. Recover deleted material from a data storage devise. 2. Research and prepare a class presentation on a specific crime analysis software program.

          Other (Term projects, research papers, portfolios, etc.)

          Required Materials

          • Information Technology and The Criminal Justice System
            • Author: April Pattavina
            • Publisher: SAGE
            • Publication Date: 2005
            • Text Edition: 2nd
            • Classic Textbook?: No
            • OER Link:
            • OER:
          • Computer Forensics Jump Start
            • Author: Barrett/Solomon/Broom
            • Publisher: SYBEX
            • Publication Date: 2005
            • Text Edition: 1st
            • Classic Textbook?: No
            • OER Link:
            • OER:
          • Introduction to Information Systems
            • Author: Rainer & Prince
            • Publisher: Wiley
            • Publication Date: 2015
            • Text Edition: 6th
            • Classic Textbook?: No
            • OER Link:
            • OER:

          Other materials and-or supplies required of students that contribute to the cost of the course.