Deck 11: Social Network Analysis, Crime Mapping, and Big Data

Full screen (f)
exit full mode
Question
All of the following are accurate statements from Rosenfeld, Bray, and Egley's study of gang and nongang homicides EXCEPT _which of the following?

A) Unlike nongang homicides, gang homicides were concentrated in disadvantaged areas.
B) Gang and nongang homicides were concentrated in disadvantaged areas.
C) Unlike gang homicides, nongang homicides were concentrated in affluent areas.
D) Gang and nongang homicides were concentrated in affluent areas.
Use Space or
up arrow
down arrow
to flip the card.
Question
With the use of ______, Shaw and McKay (1942) were able to relate incidents of juvenile delinquency to specific Chicago communities.

A) historical events research
B) comparative methods
C) controlled comparison
D) crime mapping
Question
Illuminating the geospatial relationship between some category of crime and corresponding characteristics such as poverty and disorganization across given locations is the purpose of ______.

A) narrative analysis
B) crime mapping
C) controlled comparison
D) content analysis
Question
Geographic information system is used in which type of analysis?

A) crime mapping
B) transnational research
C) content analysis
D) descriptive comparative research
Question
Hot spots refer to which of the following?

A) how fire spreads in arsons
B) seasonal fluctuations in temperature
C) areas in which crime is more likely to occur
D) electronic items that are more likely to be stolen
Question
How is risk-terrain modeling different than crime mapping?

A) Risk-terrain modeling involves data from a single source.
B) Risk-terrain modeling is qualitative in design.
C) Risk-terrain modeling takes into account features of the environment that encourage crime.
D) Risk-terrain modeling does not involve big data.
Question
Big data means ______.

A) a very large dataset
B) important findings in the field of criminology
C) data that were expensive to collect
D) a triangulated research project
Question
Which of the following concepts refers to an approach to analysis to describe and explore relationships both individuals and groups have with each other?

A) time series analysis
B) social network analysis
C) crime mapping
D) all of these
Question
Which of the following is a type of relationship that can be considered a social network?

A) face-to-face
B) online
C) ecomonic transaction
D) all of these
Question
Which of the following concepts refers to the type of data that measures the nature of the contacts, connections, attachments, and ties that one unit has to the next?

A) historical data
B) organizational data
C) relational data
D) none of these
Question
A ______ is a graphical way representing social configurations.

A) frequency distribution
B) histogram
C) parallelogram
D) sociogram
Question
Which of the following concepts represents the basic units in a sociogram?

A) nodes
B) actors
C) vertices
D) all of these
Question
Which of the following concepts refers to how the nodes are connected in a sociogram?

A) ties
B) links
C) arcs
D) all of these
Question
A ______ is where all of the units of observation are stored for a social network analysis.

A) nodelist
B) arclist
C) linklist
D) none of these
Question
A network matrix is also referred to as a ______.

A) node
B) binary network
C) adjacency matrix
D) none of these
Question
A ______ network distinguishes whether a relation does or does not exist between a pair of nodes.

A) primary
B) binary
C) secondary
D) interactive
Question
Which of the following is an accurate statement regarding a conclusion that could be drawn from Krebs (2001) social network analysis research regarding who was the likely leader of the cell?

A) Mohamed Atta was the likely leader of the cell.
B) Majed Moqed was likely the leader of the cell.
C) Mamduh Mahmud Salim was likely the leader of the cell.
D) Raed Hijazi was likely the leader of the cell.
Question
Which of the following is an accurate statement regarding a conclusion that could be drawn from Krebs (2001) social network analysis research regarding minimizing damage to the network?

A) keeping cell members close to each other and distant from other cells minimizes damage to the network is a cell member is captured or compromised
B) keeping cell members distant from each other and close to other cells minimizes damage to the network is a cell member is captured or compromised
C) keeping cell members distant from each other and distant from other cells minimizes damage to the network is a cell member is captured or compromised
D) none of these
Question
Which of the following is an accurate statement regarding a conclusion that could be drawn from Krebs (2001) social network analysis research regarding identifying illegal networks?

A) map superego networks
B) map ego networks
C) map geographical communalities
D) all of these
Question
Bichler et al. (2017) collected data about which serial killer for their social network analysis?

A) Ted Bundy
B) Greg Ridgeway
C) Alberto De Salvo
D) Jack the Ripper
Question
The serial killer examined in Bichler et al.'s (2017) is also known as ______.

A) the Boston Strangler
B) the Green River Killer
C) The Long Island Killer
D) Jack the Ripper
Question
The ______ is a statistic that measures the extent to which nodes connect to other nodes that are not directly linked to each other in a social network analysis.

A) withinness centrality score
B) withinness peripheral score
C) betweenness centrality score
D) withinness peripheral score
Question
Crime mapping has been described as a process of using a ______ information system to conduct special analysis of crime problems and other police-related issues.

A) geographic
B) financial
C) social media
D) none of these
Question
Which term represents something that geographical mapping strategies attempt to analyze?

A) location
B) distance
C) patterns
D) all of these
Question
In which decade did geographic information systems begin to emerge as a software tool for crime mapping?

A) 1970s
B) 1980s
C) 1990s
D) 2000s
Question
______ are geographic locations within jurisdictions where crimes cluster.

A) Cold spots
B) Hot spots
C) Sweet spots
D) none of these
Question
Hots spots can be found in what type of area?

A) specific addresses
B) blocks
C) clusters of blocks
D) all of these
Question
On a crime map, a ______ is a symbol that points to specific places where crime is likely to occur.

A) dot
B) crime site
C) crime gradient
D) none of these
Question
On a crime map, a ______ is a symbol that indicates where crime is likley to occur with a particular specified area.

A) dot
B) crime site
C) crime gradient
D) none of these
Question
On a crime map, a ______ is a symbol that indicates that the probability of crime is most likely inside the area and decreases as you move toward the edge of the area.

A) dot
B) crime site
C) crime gradient
D) none of these
Question
How many cases are in a big data set?

A) 1
B) 10-50
C) 50-100
D) >1000
Question
______ are frequency graphs of all words printed in more than one third of the world's book over time?

A) Ggrams
B) Bgrams
C) Ngrams
D) Mgrams
Question
Which company has a database that houses all words printed in more than one third of the world's book over time?

A) Facebook
B) Google
C) Twitter
D) Wikipedia
Question
______ have been credited with pioneering a new way to forecast crime using big data.

A) Caplan and Kennedy
B) Felson and Kennedy
C) Caplan and Felson
D) none of these
Question
______ modeling predicts the probability of crime occurring in the future using underlying factors of the environment that are associated with crime.

A) Heirarchical
B) Risk-terrain
C) Linear
D) Quadratic
Question
The key distinguishing feature betweeen ______ and ______ is that the latter takes into account features of the area that enable criminal behavior.

A) crime mapping; time series analysis
B) crime mapping; social network analysis
C) risk-terrain modeling; social network analysis
D) crime mapping; risk-terrain modeling
Question
Which of the following is an ethical issue with analysis using big data?

A) subject confidentiality
B) researcher role
C) low response rate
D) all of these
Question
______ policing refers to the strategy of using data, analysis, and criminal theory to guide police allocation and decision making.

A) Reactive
B) Zero tolerance
C) Intelligence-led
D) none of these
Question
The movie ______ focused on a world where people are arrested for criminal acts that they are predicted to do, not that they have actually committed.

A) The Matrix
B) The Minority Report
C) Total Recall
D) none of these
Question
Facebook users upload more than ______ photos every hour.

A) 1 million
B) 10 million
C) 100 milllion
D) 500 million
Question
Crime mapping was rejected by law enforcement agencies as being an invalid means of studying crime.
Question
Crime mapping can be used to test criminological theory.
Question
Risk-terrain modeling is a type of social network analysis.
Question
Social network analysis has been on a decline in terms of its use since the Internet and the emergence of social media platforms.
Question
Relational data measure the contacts, connections, attachments, and ties that related one unit to the next.
Question
Face-to-face, online and digital, economic transactions, interaction with a criminal justice agency, geopolitical relations among nation states are example of social networks.
Question
Relational data are properties of a specific unit (e.g., individual, group, city).
Question
Jacob Mereno used a sociometric test, which required individuals to choose their associates from a group in which they were a member, and requested that they label their associates as either "attractions" and "repulsions."
Question
In a social network analysis, relations are sometimes called actors or vertices.
Question
In a social network analysis, nodes are sometimes called ties, links, arcs, or edges.
Question
The Wire, The District, and CSI have used crime mapping in their shows.
Question
Crime mapping for intelligence-led policing has been in existence since the 1950s.
Question
Crime mapping is currently being used by the majority of urban law enforcement agencies.
Question
Hot spots can be specific addresses, blocks, or even clusters of blocks.
Question
Zero tolerance policing involves using data, analysis, and criminal theory to guide police allocation and decision making.
Question
Big data is simply defined as a dataset with more than 100 cases.
Question
Big data analyses are being used to predict the spread of flu, the behavior of consumers, and the prevalence of crime.
Question
Risk-terrain modeling is essentially special risk analysis in a more sophisticated form than the early maps of the Chicago school.
Question
Subject confidentiality is not a key concern when original records are analyzed with either secondary data or big data.
Question
List a research question where crime mapping would be appropriate.
Question
List a research question that might involve big data.
Question
List a research question that might involve social network analysis.
Question
Identify several categories of data that Bichler et al. (2017) included in their serial killer analysis.
Question
Define a sociogram.
Question
Define risk-terrain modeling.
Question
What is the dependent variable in risk-terrain modeling?
Question
What were the two dependent variables in Stansfeld and Williams (2014) family violence big data project?
Question
List several ethical issues using big data.
Question
What information did staff at The New York Times identify from an analysis of a de-identified big data set was released by AOL in 2006?
Question
Discuss the three main functions of crime mapping.
Question
Discuss why crime theory is useful for crime mapping.
Question
The National Institute of Justice published a document with a crime map displaying some common symbols used by crime analysts (Eck et al., 2005). List these commonly used symbols and explain their meaning.
Question
Summarize the main findings from Stansfield and Williams (2014) big data project examining family violence.
Question
Summarize the main findings from Krebs (2001) social network analysis of the terrorist network of the individuals involved in the September, 11, 2001, attack.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Social Network Analysis, Crime Mapping, and Big Data
1
All of the following are accurate statements from Rosenfeld, Bray, and Egley's study of gang and nongang homicides EXCEPT _which of the following?

A) Unlike nongang homicides, gang homicides were concentrated in disadvantaged areas.
B) Gang and nongang homicides were concentrated in disadvantaged areas.
C) Unlike gang homicides, nongang homicides were concentrated in affluent areas.
D) Gang and nongang homicides were concentrated in affluent areas.
B
2
With the use of ______, Shaw and McKay (1942) were able to relate incidents of juvenile delinquency to specific Chicago communities.

A) historical events research
B) comparative methods
C) controlled comparison
D) crime mapping
D
3
Illuminating the geospatial relationship between some category of crime and corresponding characteristics such as poverty and disorganization across given locations is the purpose of ______.

A) narrative analysis
B) crime mapping
C) controlled comparison
D) content analysis
B
4
Geographic information system is used in which type of analysis?

A) crime mapping
B) transnational research
C) content analysis
D) descriptive comparative research
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
5
Hot spots refer to which of the following?

A) how fire spreads in arsons
B) seasonal fluctuations in temperature
C) areas in which crime is more likely to occur
D) electronic items that are more likely to be stolen
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
6
How is risk-terrain modeling different than crime mapping?

A) Risk-terrain modeling involves data from a single source.
B) Risk-terrain modeling is qualitative in design.
C) Risk-terrain modeling takes into account features of the environment that encourage crime.
D) Risk-terrain modeling does not involve big data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
7
Big data means ______.

A) a very large dataset
B) important findings in the field of criminology
C) data that were expensive to collect
D) a triangulated research project
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following concepts refers to an approach to analysis to describe and explore relationships both individuals and groups have with each other?

A) time series analysis
B) social network analysis
C) crime mapping
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a type of relationship that can be considered a social network?

A) face-to-face
B) online
C) ecomonic transaction
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following concepts refers to the type of data that measures the nature of the contacts, connections, attachments, and ties that one unit has to the next?

A) historical data
B) organizational data
C) relational data
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
11
A ______ is a graphical way representing social configurations.

A) frequency distribution
B) histogram
C) parallelogram
D) sociogram
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following concepts represents the basic units in a sociogram?

A) nodes
B) actors
C) vertices
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following concepts refers to how the nodes are connected in a sociogram?

A) ties
B) links
C) arcs
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
14
A ______ is where all of the units of observation are stored for a social network analysis.

A) nodelist
B) arclist
C) linklist
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
15
A network matrix is also referred to as a ______.

A) node
B) binary network
C) adjacency matrix
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
16
A ______ network distinguishes whether a relation does or does not exist between a pair of nodes.

A) primary
B) binary
C) secondary
D) interactive
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is an accurate statement regarding a conclusion that could be drawn from Krebs (2001) social network analysis research regarding who was the likely leader of the cell?

A) Mohamed Atta was the likely leader of the cell.
B) Majed Moqed was likely the leader of the cell.
C) Mamduh Mahmud Salim was likely the leader of the cell.
D) Raed Hijazi was likely the leader of the cell.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is an accurate statement regarding a conclusion that could be drawn from Krebs (2001) social network analysis research regarding minimizing damage to the network?

A) keeping cell members close to each other and distant from other cells minimizes damage to the network is a cell member is captured or compromised
B) keeping cell members distant from each other and close to other cells minimizes damage to the network is a cell member is captured or compromised
C) keeping cell members distant from each other and distant from other cells minimizes damage to the network is a cell member is captured or compromised
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is an accurate statement regarding a conclusion that could be drawn from Krebs (2001) social network analysis research regarding identifying illegal networks?

A) map superego networks
B) map ego networks
C) map geographical communalities
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
20
Bichler et al. (2017) collected data about which serial killer for their social network analysis?

A) Ted Bundy
B) Greg Ridgeway
C) Alberto De Salvo
D) Jack the Ripper
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
21
The serial killer examined in Bichler et al.'s (2017) is also known as ______.

A) the Boston Strangler
B) the Green River Killer
C) The Long Island Killer
D) Jack the Ripper
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
22
The ______ is a statistic that measures the extent to which nodes connect to other nodes that are not directly linked to each other in a social network analysis.

A) withinness centrality score
B) withinness peripheral score
C) betweenness centrality score
D) withinness peripheral score
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
23
Crime mapping has been described as a process of using a ______ information system to conduct special analysis of crime problems and other police-related issues.

A) geographic
B) financial
C) social media
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
24
Which term represents something that geographical mapping strategies attempt to analyze?

A) location
B) distance
C) patterns
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
25
In which decade did geographic information systems begin to emerge as a software tool for crime mapping?

A) 1970s
B) 1980s
C) 1990s
D) 2000s
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
26
______ are geographic locations within jurisdictions where crimes cluster.

A) Cold spots
B) Hot spots
C) Sweet spots
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
27
Hots spots can be found in what type of area?

A) specific addresses
B) blocks
C) clusters of blocks
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
28
On a crime map, a ______ is a symbol that points to specific places where crime is likely to occur.

A) dot
B) crime site
C) crime gradient
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
29
On a crime map, a ______ is a symbol that indicates where crime is likley to occur with a particular specified area.

A) dot
B) crime site
C) crime gradient
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
30
On a crime map, a ______ is a symbol that indicates that the probability of crime is most likely inside the area and decreases as you move toward the edge of the area.

A) dot
B) crime site
C) crime gradient
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
31
How many cases are in a big data set?

A) 1
B) 10-50
C) 50-100
D) >1000
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
32
______ are frequency graphs of all words printed in more than one third of the world's book over time?

A) Ggrams
B) Bgrams
C) Ngrams
D) Mgrams
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
33
Which company has a database that houses all words printed in more than one third of the world's book over time?

A) Facebook
B) Google
C) Twitter
D) Wikipedia
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
34
______ have been credited with pioneering a new way to forecast crime using big data.

A) Caplan and Kennedy
B) Felson and Kennedy
C) Caplan and Felson
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
35
______ modeling predicts the probability of crime occurring in the future using underlying factors of the environment that are associated with crime.

A) Heirarchical
B) Risk-terrain
C) Linear
D) Quadratic
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
36
The key distinguishing feature betweeen ______ and ______ is that the latter takes into account features of the area that enable criminal behavior.

A) crime mapping; time series analysis
B) crime mapping; social network analysis
C) risk-terrain modeling; social network analysis
D) crime mapping; risk-terrain modeling
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is an ethical issue with analysis using big data?

A) subject confidentiality
B) researcher role
C) low response rate
D) all of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
38
______ policing refers to the strategy of using data, analysis, and criminal theory to guide police allocation and decision making.

A) Reactive
B) Zero tolerance
C) Intelligence-led
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
39
The movie ______ focused on a world where people are arrested for criminal acts that they are predicted to do, not that they have actually committed.

A) The Matrix
B) The Minority Report
C) Total Recall
D) none of these
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
40
Facebook users upload more than ______ photos every hour.

A) 1 million
B) 10 million
C) 100 milllion
D) 500 million
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
41
Crime mapping was rejected by law enforcement agencies as being an invalid means of studying crime.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
42
Crime mapping can be used to test criminological theory.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
43
Risk-terrain modeling is a type of social network analysis.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
44
Social network analysis has been on a decline in terms of its use since the Internet and the emergence of social media platforms.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
45
Relational data measure the contacts, connections, attachments, and ties that related one unit to the next.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
46
Face-to-face, online and digital, economic transactions, interaction with a criminal justice agency, geopolitical relations among nation states are example of social networks.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
47
Relational data are properties of a specific unit (e.g., individual, group, city).
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
48
Jacob Mereno used a sociometric test, which required individuals to choose their associates from a group in which they were a member, and requested that they label their associates as either "attractions" and "repulsions."
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
49
In a social network analysis, relations are sometimes called actors or vertices.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
50
In a social network analysis, nodes are sometimes called ties, links, arcs, or edges.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
51
The Wire, The District, and CSI have used crime mapping in their shows.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
52
Crime mapping for intelligence-led policing has been in existence since the 1950s.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
53
Crime mapping is currently being used by the majority of urban law enforcement agencies.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
54
Hot spots can be specific addresses, blocks, or even clusters of blocks.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
55
Zero tolerance policing involves using data, analysis, and criminal theory to guide police allocation and decision making.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
56
Big data is simply defined as a dataset with more than 100 cases.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
57
Big data analyses are being used to predict the spread of flu, the behavior of consumers, and the prevalence of crime.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
58
Risk-terrain modeling is essentially special risk analysis in a more sophisticated form than the early maps of the Chicago school.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
59
Subject confidentiality is not a key concern when original records are analyzed with either secondary data or big data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
60
List a research question where crime mapping would be appropriate.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
61
List a research question that might involve big data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
62
List a research question that might involve social network analysis.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
63
Identify several categories of data that Bichler et al. (2017) included in their serial killer analysis.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
64
Define a sociogram.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
65
Define risk-terrain modeling.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
66
What is the dependent variable in risk-terrain modeling?
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
67
What were the two dependent variables in Stansfeld and Williams (2014) family violence big data project?
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
68
List several ethical issues using big data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
69
What information did staff at The New York Times identify from an analysis of a de-identified big data set was released by AOL in 2006?
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
70
Discuss the three main functions of crime mapping.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
71
Discuss why crime theory is useful for crime mapping.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
72
The National Institute of Justice published a document with a crime map displaying some common symbols used by crime analysts (Eck et al., 2005). List these commonly used symbols and explain their meaning.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
73
Summarize the main findings from Stansfield and Williams (2014) big data project examining family violence.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
74
Summarize the main findings from Krebs (2001) social network analysis of the terrorist network of the individuals involved in the September, 11, 2001, attack.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 74 flashcards in this deck.