Crime Prevention on Twitter

Week 1 – Interactive Assignment

32      32 unread replies.    57      57 replies.

Your  initial discussion thread is due on Day 3 (Thursday) and you have until  Day 7 (Monday) to respond to your classmates. Your grade will reflect  both the quality of your initial post and the depth of your responses.  Refer to the Discussion Forum Grading Rubric under the Settings icon  above for guidance on how your discussion will be evaluated.

Crime Prevention on Twitter

For this course, we are using Twitter to broaden your classroom  learning experience. It is not necessary to have your own Twitter  account to participate in the Twitter social media activities throughout  the course. The CRJ305 Twitter feed is accessible on our class website  and course credit will be earned by viewing Twitter and interacting with  your instructor and classmates on the course discussion board. However,  if you want to interact with your classmates and others on Twitter in  addition to the discussion boards, here are instructions for setting up  your own Twitter account: Signing up with Twitter (Links to an external site.)Links to an external site..  The purpose of this activity is to give you a chance to familiarize  yourself with Twitter and the international social media presence of  crime prevention topics. For this activity, you will visit Twitter.com (Links to an external site.)Links to an external site.  and click on the little magnifying glass on the left side of the screen  to reveal the search box to search Twitter. Then do the following:

  • In the search box, type the words “crime prevention” and click “enter” to initiate a Twitter search.
  • Scroll down the page and review some of the tweets that mention the term crime preventionChoose  two tweets that interest you that relate to a crime prevention program,  law enforcement approach to crime prevention, research on crime  prevention, etc. Please choose different tweets than those your  classmates have chosen. Therefore, you may want to complete this  activity early in the week to avoid duplicating your classmates’ chosen  tweets.
  • Share the links to the tweets in the discussion board. See below for further instructions on what to include in your discussion.
  • If you do not have a Twitter account, simply click on the tweet and  copy and paste the URL for the tweet. Share the link on the discussion  board. See below for further instructions on what to include in your  discussion.
  • In addition to the links to the two tweets you chose, please address the following in your discussion:
    • Overall, what did you observe in reviewing the tweets from the  Twitter search term “crime prevention?” For example, which agencies were  tweeting about crime prevention? Were they primarily in the United  States or abroad? Based on your review of the recent tweets (in the past  six months), do you think that the United States seems to be focused on  promoting crime prevention?
    • What specific topics in crime prevention did you find on Twitter?  Were they regarding crime prevention research, theory, and/or practice?
    • If you were to tweet to your U.S. Senators about the topic of crime  prevention, what would you say? (Remember that you can use only 140  characters or less on Twitter so be clever in your “tweet” to your  Senators).

Your initial post must be a minimum of 300 words in length. Support  your initial post with examples from your required reading material  and/or other sources. Please provide both in-text citations in APA style  and APA style references at the end of your initial post.

Guided Response: Review several of your peer’s  posts. Respond to at least two of your classmates’ posts by Day 7. In  your responses, offer a point of view that provides either support for  your classmates’ position(s) or constructive feedback indicating why you  disagree. Be sure to support your assertions with the required  resources this week and/or other sources, using the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.)Links to an external site.  document for guidance. Respond to at least two of your fellow students’  posts in a substantive manner and provide recommendations to extend  their thinking. You are encouraged to post your required replies earlier  in the week to promote more meaningful and interactive discourse in  this discussion forum. Continue to monitor the discussion forum until  5:00 p.m. (Mountain Time) on Day 7, and respond with robust dialogue to  anyone who replies to your initial post.

Discuss some difficulties you have faced

Paper #1

Write a two full page paper after reading chapter 2 & 3 of Boundaries in Marriage. Discuss the “Ten Laws of Boundaries in Marriage” and how to set “Boundaries with Yourself.” Whether one is married, or, have never been married, how do these relationship principles apply to you? Do you know anyone who needs relationship counseling?

Paper #2

Write a two full page reflection paper after reading chapters 5 & 6 of Boundaries in Marriage discussing what the author mean concerning “What You Value Is What You’ll Have.” What do you , or have you valued and what were the consequences of having the wrong kind of loves. How important is the love of God for one’s life?

Paper #3

Write two full page reflection after reading Boundaries chapter 7-10 on the role of honesty, faithfulness, compassion, and forgiveness in relationships. No relationship, whether marriage, friendships, or family is ever perfect. Discuss some difficulties you have faced and how these brief chapters can inform one’s decisions concerning relationships.

Papers must be in APA format. The material should come from the following book: Boundaries In Marriage by Dr. Henry Cloud & Dr. John Townsend copyright 1999.

Book ISBN: 978-0-310-24314-4

Professional Position Within A Criminal Justice Agency

 

Prior to beginning work on this Journal element, please select a professional position within a criminal justice agency/organization or a juvenile justice agency/organization. Then, locate an agency/organization that employs individuals within that position. For this journal entry, you will briefly explore (in one to two pages) a professional position within a criminal justice agency/organization or a juvenile justice agency/organization in terms of duties and responsibilities. As noted below, you will need to gather information from the agency/organization that you select in order to address the below elements. You will then need to address the following:

· Describe how employment criteria relates to individual tasks and to agency/organizational processes relevant to this position in approximately two paragraphs. For tasks, consider duties related to the professional position, and for processes, consider agency activities, purposes, or objectives.

· Describe how technology relates to at least one individual task and to at least one agency/organizational process relevant to this position in approximately one paragraph.

· Discuss a perspective on how this position may contribute to criminal justice objectives and your own professional goals in approximately one paragraph.

To complete the above elements, you will need to collect information. You may choose to collect your information through one or more of the following pathways:

· Communicate with a person in the Human Resources department of the agency or organization.

· Communicate with a professional who holds the position.

· Research and collect the information from an agency or organizational website.

Submit your journal through Waypoint.

Carefully review the Grading Rubric  (Links to an external site.)Links to an external site.for the criteria that will be used to evaluate your assignment.

Discuss in detail why you need to use a write blocker

This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software’s EnCase and AccessData’s FTK, there are other tools that are available and should be part of your toolbox. Once you have properly identified and collected digital evidence, the next step is to analyze it. It does not really matter if you are performing analysis as part of a criminal investigation or as part of a corporate investigation; you should always follow the same protocols.

An emphasis in this course is on helping you understand why using an analysis protocol is important. It goes back to our discussion in week one regarding best practices and industry standards. Remember, you should NEVER, EVER work on original evidence if it can be avoided by any means; instead, use a forensic image. When you work on the image, you pick the tools you will use. Again, it does not matter which tool you actually use, as long as the tool is accepted by the forensic community, and you are able to testify to the tool’s validity as well as the process you used in your examination.

During your analysis, you should document every step you take and all of your findings. Some tools have a report function that works well to capture both the identified data and the date/time of your various analyses. However, this should always be supplemented with your own notes and documentation.

For this week’s discussion, complete the following questions below in detail.  Please discuss thoroughly and substantively in your post. Additionally, respond in a thorough, substantive, intelligent way to at least one of your fellow classmates that adds to our discussion and learning of this week’s topic!

1) Discuss in detail why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal case or a corporate case.

2) Imagine you are a computer forensic examiner receiving a suspect hard disk drive from a detective in your department.  The drive was seized properly during a legally executed search warrant. The detective signs the chain of custody log and hands you the drive. Your job is to accept the drive, conduct an analysis, and maintain the drive until trial. Please explain the steps you would take, from receipt of the evidence until testimony, including the reasons why you would take each step. For example, what would you check for when you sign for the drive on the chain of custody document?

APA format and reference link should be included