1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P111 ppt

10 63 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Nội dung

1034 Measurements in E-Business EMERGING ISSUES IN E-BUSINESS MEASUREMENTS Online interviewing and focus groups. Purely quantitative analyses of clickstream data and Internet survey research methods are limited in their abilities to enlighten us. Web surveys have notoriously low response rates, and are often suspect in their abilities to gather a representative sample (Dillman, 2000). Simple frequency counts of consumer actions yield very shallow data. Since technology has sped up the transmission of Internet content, and advances in software have dramatically enhanced Web design and graphics, researchers have expanded the use of online quali- tative research. For instance, it is not uncommon to hold online focus groups wherein respondents can interactively participate in virtual forums. Participants can evaluate prototypes, respond to potential advertisements, and hold meaningful, insightful conversations about various aspects of e-business. Furthermore, online interviewing is growing in popularity. This is a way to effectively reach some very narrow groups of respondents and gather very rich, powerful data. Online LQWHUYLHZVDOVRDOORZIRUJUHDWHUÀH[LELOLW\IRO- low-up questions, and provide greater depth of analysis. Qualitative Internet research is certainly DQHPHUJLQJ¿HOG Content analysis. Again, as advances in technology, hardware, and software progress, researchers have begun to analyze Internet con- tent more directly and more precisely (Boush & Kahle, 2004). The essence of content analysis is to measure words and phrases throughout a page, a site, a chatroom, a blog, and so forth. Researchers have detected meaningful patterns in the data, PDGH¿WWLQJLQWHUSUHWDWLRQVDQGGHULYHGVWUDWHJLF insights for future actions. Researchers have even coined a new phrase to describe the word-of-mouth communication over the Internet. Dubbed word on-line (WOL), researchers have noted the pow- HUIXOLQÀXHQFHRIWKHRQOLQHFRPPXQLW\DQGWKH ever-expanding number of conversations (Granitz & Ward, 1996). Continuing challenges in electronic survey research. As technological advances make elec- tronic survey research easier, faster, and cheaper, a number of challenging issues arise. First, the issue of low response rates must be addressed. Surely a nonresponse bias must be affecting some research results. Second, asking the right questions and recording the right answers from the right respondents has become increasingly GLI¿FXOW:HFDQQRWVLPSO\FRQWLQXHWRPDNHXS in quantity of data what we knowingly lack in quality of data. We must strive to keep e-business research meaningful and strategically useful. Fi- nally, we must develop a viable communications framework that encompasses the interactivity of e-business, the informational asymmetry that abounds, as well as the unique perspectives of Internet users and e-businesses. Within a sound framework, valid, reliable, and relevant metrics will emerge as the new standard. Future research. The emergence of the Internet as the foundation for business communications worldwide has given rise to a wealth of truly spec- tacular measurement tools. Business researchers now have access to an abundance of data that, just a few years ago, might have been deemed un- imaginable. Furthermore, they have the research tools to analyze and interpret mass quantities of information; thereby, giving valuable meaning to seemingly chaotic data. Researchers can now track consumer responses and measure psychological issues in a multitude of forms. Straub, et al. (2002) not only provide an expert synopsis of existing metrics, but also provide excellent foresight into numerous e-business metrics that require further exploration, examination, and validation. The OLNHO\³QH[WVWHS´LQRQOLQHEXVLQHVVPHWULFVZLOO be the measurement of the Internet consumption experience. Some major research questions arise, including (1) What makes the Internet consump- tion experience so different? (2) Which off-line behavioral/communications/business theories 1035 Measurements in E-Business apply to the online context and which need to be altered? (3) What information processing and decision-making theories apply to the CME? (4) Which metrics apply to the online business-to- business context? REFERENCES Aiken D., Liu, B., Mackoy, R., & Osland, G. (2004). Building Internet trust: Signaling through trustmarks. International Journal of Internet Marketing and Advertising, 1(3), 1-17. Bakos, Y. (1997). Reducing buyer search costs: Implications for electronic marketplaces. Manage- ment Science, 43(12), 1676-1692. Bakos, Y. (1998). The emerging role of electronic marketplaces on the Internet. Communications of the ACM, 41(8), 35-42. Benassi, P. (1999). TRUSTe: An online privacy seal program. Communications of the ACM, 42(2), 56-59. Bettman, J., Johnson, E., & Payne, J. (1990). A componential analysis of cognitive effort in choice. Organizational Behavior & Human Decision Processes, 45, 111-139. Bettman, J., Luce, M. F., & Payne, J. (1998, De- cember). Constructive consumer choice processes. Journal of Consumer Research, 25, 187-217. Biswas, A., & Krishnan, R. (2004). The Internet’s impact on marketing: Introduction to the JBR spe- FLDOLVVXHRQ³0DUNHWLQJRQWKH:HE%HKDYLRUDO strategy and practices and public policy.” Journal of Business Research, 57, 681-684. Bhat, S., Bevans, M., & Sengupta, S. (2002). Measuring users’ Web activity to evaluate and enhance advertising effectiveness. Journal of Advertising, 31(3), 97-106. Bhatnagar A., & Ghose, S. (2004). Segmenting FRQVXPHUVEDVHGRQWKHEHQH¿WVDQGULVNVRI,Q- ternet shopping. Journal of Business Research, 57, 1352-1360. Boush, D. M., & Kahle, L. (2004). What, and how, we can learn from online consumer discussion groups. In C. Haugtvedt, K. Machleit, & R. Yalch (Eds.), Online consumer psychology: Understand- LQJDQGLQÀXHQFLQJEHKDYLRULQWKHYLUWXDOZRUOG (pp. 101-121). Mahwah, NJ: Lawrence Erlbaum Associates. Csikszentmihalyi, M. (1990). Flow: The psychol- ogy of optimal experience. New York: Harper and Row. Dillman, D. (2000). Mail and Internet surveys: The tailored design method. New York: John Wiley and Sons. Garbarino, E. C., & Edell, J. A. (1997). Cognitive effort, affect, and choice. Journal of Consumer Research, 24, 147-158. Geissler, G., Zinkhan, G., & Watson, R. T. (2001, April). Web home-page complexity and commu- nication effectiveness. Journal of the Association for Information Systems, 2, 1-46. Glazer, R. (1991). Marketing in an information- intensive environment: Strategic implications of knowledge as an asset. Journal of Marketing, 55(Oct.), 1-19. Gladwell, M. (2000). The tipping point. New York: Little, Brown and Company. Granitz, N. A., & Ward, J. C. (1996). Virtual community: A sociocognitive analysis. Advances in Consumer Research, 23, 161-166. Handy, C. (1995, May-June). Trust and the vir- tual organization. Harvard Business Review, 73, 40-50. Hine C., & Eve, J. 1998). Privacy in the market- place. The Information Society, 14(4), 253-262. Hoffman, D., & Novak, T. (1996). Marketing in hypermedia computer-mediated environments: 1036 Measurements in E-Business Conceptual foundations. Journal of Marketing, 60, 50-68. Hoffman, D., & Novak, T. (1997). A new mar- keting paradigm for electronic commerce. The Information Society, 13, 43-54. Hoffman, D., & Novak, T. (1998). Trustbuilders vs. trustbusters. The Industry Standard.Retrieved Aug, 2003, from http://www.thestandard.com/ar- ticles/article_print/0,1454,235,000.html Hoffman, D., Novak, T., & Peralta, M. (1999). Building consumer trust online. Communications of the Association for Computing Machinery, 42(4), 80-85. Jarvenpaa, S. L., &Tractinsky, N. (1999). Con- sumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Com- munications, 15(2), 1-35. Keen C., Wetzels, M., de Ruyter, K., & Feinberg, R. (2004). E-tailers vs. retailers: Which factors determine consumer preferences. Journal of Business Research, 57, 685-695. Kirmani, A., & Rao, A. R. (2000). No pain, no gain: A critical review of the literature on sig- naling unobservable product quality. Journal of Marketing, 64, 66-79. Maule, J. A., & Edland, A. C. (1997). The effects of time pressure on human judgment and deci- sion making. In R. Ranyard, W. R. Crozier, & O. Svenson (Eds.). Decision making: Cognitive models and explanations (pp. 189-204). London: Routledge. McKnight, H. D., & Chervany, V (2002). What trust means in e-commerce customer relation- ships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35-59. Milne, G. R., &Boza, E. (1999). Trust and concern in consumers’ perceptions of marketing informa- tion management practices. Journal of Interactive Marketing, 13(1), 5-24. Novak, T., Hoffman, D., & Yung, Y. F. (2000). 0RGHOLQJWKHÀRZFRQVWUXFWLQRQOLQHHQYLURQ- ments: A structure modeling approach. Marketing Science, 19(1), 22-42. Parasuraman, A., & Zinkhan, G. M. (2002). Marketing to and serving customers through the Internet: An overview and research agenda. Journal of the Academy of Marketing Science, 30(Fall), 286-295. Rayport, J. F., & Jaworski, B. J. (2002). Introduc- tion to e-commerce. Boston: McGraw-Hill. Richard, M. O., & Chandra, R. (2005). A model of consumer Web navigational behavior: Conceptual development and application. Journal of Business Research, 58, 1019-1029. Sharma A., & Sheth, J. N. (2004). Web-based marketing: The coming revolution in market- ing thought and strategy. Journal of Business Research, 57, 696-702. Sh e eh a n , K . B., & H oy, M. G. (2 0 0 0). D i me n sio n s of privacy concern among online consumers. Journal of Public Policy and Marketing, 19(1), 62-73. Straub, D. W., Hoffman, D. L., Weber, B. W. , 6WHLQ¿HOG&7RZDUGQHZPHWULFVIRU net-enhanced organizations. Information Systems Research, 13(3), 227-238. Varadarajan, P. R., & Yadav, M. S. (2002). Mar- keting strategy and the Internet: An organizing framework. Journal of the Academy of Marketing Science, 30(4), 296-312. Weiner, R., Deighton, J., Gupta, S., Johnson, E., Mellers, B., Morwitz, V., et al. (1997). Choice in computer-mediated environments. Marketing Letters, 8(3), 287-296. 1037 Measurements in E-Business Williamson, O. E. (1993, April). Calculativeness, trust, and economic organization. Journal of Law and Economics, 36, 487-500. Wright, P. (1974). The harassed decision maker: Time pressures, distractions, and the use of evidence. Journal of Applied Psychology, 59(5), 555-561. Yadav, M. S., & Varadarajan, P. R. (2005). Inter- activity in the electronic marketplace: An exposi- tion and implications for research. Journal of the Academy of Marketing Science, 33(4), 585-604. KEY TERMS Click-Stream: The series of links that a user goes through when using the Internet (Rayport & Jaworski, 2002). Cognitive Effort: Information load that deals with how cognitive processes handle incoming stimuli (information) (Bettman et al., 1990). Conversion Rates: A frequency measure- ment of the completion of some action(s) by an e-consumer as a proportion of the total number of visitors to site (Bhat et al., 2002; Rayport & Jaworski, 2002). Flow: The state during Web navigations char- acterized by (1) a seamless sequence of responses facilitated by interactivity, (2) an intrinsically enjoyable experience, (3) accompanied by a loss of self-consciousness that is (4) self-reinforcing (Novak, et al., 2000). Stickiness: Sometimes a subjective/attitudinal measurement of how attractive and memorable a site is (Gladwell, 2000). Stickiness can also be evaluated according to the frequency of Web-site visits and the average time spent per visit (Bhat et al., 2002). This work was previously published in Handbook of Research on Electronic Surveys and Measurements, edited by R. Reynolds; R. Woods; J. Baker, pp. 416-424, copyright 2007 by Information Science Reference (an imprint of IGI Global). 1038 Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 4.5 Electronic Policing: A Framework for Crime Control and Citizen Services Roongrasamee Boondao Ubon Rajathanee University, Thailand Nitin Kumar Tripathi Asian Institute of Technology, Thailand ABSTRACT This chapter examines electronic policing (e- policing), which has played an increasing role in government-management reform and has become an important area for e-government research. Firstly, the strategic framework and develop- ment of e-policing are reviewed. A framework of mobile policing is introduced that is derived from the system requirements of both police and citizens. We examine how an e-policing system is implementing this framework for improving the HIIHFWLYHQHVVDQGHI¿FLHQF\RIFULPHFRQWURODQG also providing services to citizens. The system not R Q O\ VL PSO L ¿ HV W K H FRO OH FW LR Q  VW RU D J H D Q GU HW U L H YD O of crime data but also uses Bayesian analysis to JLYHFRQVWDQWO\UH¿QHGSUHGLFWLRQVRIWKHULVNVRI crime in different localities, along with the factors LQ ÀXHQFLQJWKHU LVNOHYHOV)LQDOO\HYDOXDWLRQVRI the system are discussed. User evaluations of the system allowed us to study the potential of the system for crime control and citizen services. INTRODUCTION Public administrative work has characteristics that distinguish it from business. The public sector provides a wide range of services to so- ciety that are different from those provided by EXVLQHVV¿UPV7KHJRYHUQPHQWXVHVLQIRUPD- tion and communication technology to improve HIIHFWLYHQHVVDQGHI¿FLHQF\WRPHHWWKHUHTXLUH- ments of new forms of government management and accountability and to satisfy the demand of external agencies for information. E-government FDQIDFLOLWDWHPRUHHI¿FLHQWDQGHIIHFWLYHDS- plications of e-business principles, which could provide citizens, employees, government agencies and businesses with more convenient access to 1039 Electronic Policing: A Framework for Crime Control and Citizen Services government information and services (Hernon, Reylea, Dugan, & Cheverie, 2002). Police work can be viewed as being representative of govern- PHQWZRUNDVSROLFHRI¿FHUVPXVWSURYLGHPDQ\ critical services to citizens, ranging from policing duties (law enforcement, crime prevention, crime investigation, etc.) to nonpolicing duties (search and rescue, public relations, etc.). To modernize police work, a number of researchers and police agencies have emphasized the use of information and communication technology to improve ef- IHFWLYHQHVVHI¿FLHQF\DQGWUDQVSDUHQF\PDNLQJ police work more citizen centered and assisting in local problem-solving initiatives to reduce crime and ensure public safety (Lincolnshire Police, 2003; Liu & Hu, 2005; 3DFL¿F&RXQFLORQ,QWHU- national Policy (PCIP), 2002; Police Information Technology Organization (PITO), 2002; Spicer & Mines, 2002; Sussex Police, 2003; Woods, 2001). Crime control is one vital police task that is still problematic from a number of aspects. There is the problem of organizing the crime investigation SURFHVV3ROLFHKDYHGLI¿FXOWLHVLQcrime inves- tigation. They need support from witnesses. In order to motivate the public to interact with police agencies, police need to provide crime information and also convenient methods of communication. There have been a number of research studies and police projects relating to e-policing and crime control. E-policing strategic frameworks also have attracted the attention of police policy makers (Lincolnshire Police, 2003; Spicer & Mines, 2002; Sussex Police, 2003). A number of researchers have covered particular aspects of the application of information communication technology (ICT) to police work, such as information sharing and monitoring (Chen et al., 2003; Falcon, 1998; Zeng, Chen, Hsinchun, Daspit, Shan, Nandiraju, Chau, & Lin, 2003), forensic evidence (Smith, Puch, Wynn, Bates, Evett, & Champod, 2002), burglary prediction (Oatley & Ewart, 2003), crime knowl- edge management (Pendharkar & Bhaskar, 2003) and geographic information systems (GIS) for crime analysis and monitoring (Bowers, Newton, & Nutter, 2001; Costello & Wiles, 2001; Gupta, 2001; Rich, 1999). However, in addition to crime control, police agencies also provide other services to citizens. Most of the studies and projects cited focus on only a particular aspect of police opera- tions, without considering citizen services. In this chapter, we report on our experience in designing and evaluating an integrated system for crime control and citizen services. This ap- proach was implemented in a prototype system. The prototype system provides wireless GIS to support police work and also services to citizens. In addition, the research developed a Bayesian network model for analysis of the factors affect- ing crime risk. This chapter is organized into four VHFWLRQV³%DFNJURXQG´RIHSROLFLQJLVDUHYLHZ of e-policing systems development with research TXHVWLRQV IURP WKLV VWXG\ RXWOLQHG ³0RELOH Policing Framework” provides insight into the development of the framework, the application scenarios of the system, system evaluation and LPSOLFDWLRQVIRUSUDFWLFH³)XWXUH7UHQGV´FRQ- siders developments in technology and areas for IXUWKHUVWXG\DQGWKH³&RQFOXVLRQ´ BACKGROUND 'H¿QLQJ(3ROLFLQJ 'H¿Q LW LRQ VRIHS ROLFL QJDERX QGL QWKHOLW HUDW XU H 7KHIROORZLQJGH¿QLWLRQVFKDUDFWHUL]HHSROLFLQJ in a variety of ways. • E-policing refers to the use of the Internet to deliver police services to the public. A Web site, e-mail and fax are contact methods that the public can use in addition to the telephone and face-to-face channels. The ideal is to provide consistent citizen access irrespective of the access channel that is being used (Sussex Police, 2003). 1040 Electronic Policing: A Framework for Crime Control and Citizen Services • The use of the computer (including digital telephony) technologies to deliver police services (Lincolnshire Police, 2003). • E-policing focuses on the needs of the IURQWOLQHSROLFHRI¿FHUDQGWKHSXEOLF7KH exploitation of new technology will sup- port the provision of an infrastructure and communications network to facilitate get- ting information and services to the right person at the right time in the right place, ZKHWKHUWRDFLWL]HQRUSROLFHRI ¿FH UD VZHOO as providing choice for the public (Spicer & Mines, 2002). • E-policing is the use of ICT in police work WRLPSURYHHIIHFWLYHQHVVDQGHI¿FLHQF\ VXSSRUWIURQWOLQHRI¿FHUVDQGDVVLVWLQORFDO problem-solving initiatives to reduce crime and reassure the public (Woods, 2001). In practice, police work covers a wide range of functions. Goldstein (1977) has categorized these as follows: • To prevent and control conduct widely recog- nized as threatening to life and property • To aid individuals who are in danger of physical harm, such as the victims of violent attacks • To facilitate the movement of people and vehicles • To assist those who cannot care for them- selves—the intoxicated, the addicted, the mentally ill, the physically disabled, the old and the young • 7R UHVROYH FRQÀLFW ZKHWKHU LW EH DPRQJ individuals, groups or individuals, or indi- viduals and their government • To identify problems that have the potential for becoming more serious problems • To create and maintain a feeling of security in communities The Working Group on E-Government in the Developing World, under the auspices of the 3DFL¿F &RXQFLO RQ ,QWHUQDWLRQDO 3ROLF\ OLVWHG the following as broad categories of goals for e-government (PCIP, 2002): • Improving services to citizens • Improving the SURGXFWLYLW\DQGHI¿FLHQF\ of government agencies • Strengthening the legal system and law enforcement • Promoting priority economic sectors • Improving the quality of life for disadvan- taged communities • Strengthening good governance and broad- ening public participation It can be readily seen that a number of these goals can be effectively applied to e-policing. E- policing can employ numerous features of local e-government as the building blocks for service delivery, such as acknowledging that it is impor- tant to provide to the public appropriate services electronically 24 hours a day, 7 days a week (Spicer & Mines, 2002). ICT has played an important role in providing support for police functions. E-policing has huge potential in both developed and developing countries. Internet technology is expected to enhance police services in terms of FRQYHQLHQFHDQGFRVWHI¿FLHQFLHVWKDWZLOOJLYH the public increased choice when deciding how to use police services and help build a new police VHUYLFHWKDW¿WV st century needs (Woods, 2001). A number of e-policing strategic frameworks have been proposed as ways of delivering e-policing. In England, most e-policing strategic frame- works have been produced in response to the government’s White Paper on Modernizing *RYHUQPHQWZKLFKOLVWVWKHREMHFWLYH³%\ all services (with exclusions for policy or opera- tional reasons) should be available electronically” (Lincolnshire Police, 2003; Spicer & Mines, 2002; Sussex Police, 2003). In addition, the police agencies follow the Police Information Technol- ogy Organization (PITO) national e-policing strategic framework. As an important part of the 1041 Electronic Policing: A Framework for Crime Control and Citizen Services e-government initiative in the U.K., the e-polic- ing program was introduced to revolutionize the police service and improve the effectiveness of crime prevention and detection by providing the following (PITO, 2002): • Ready access for the public to police informa- tion and services through a variety of easy to use, safe and secure channels, including the use of intermediaries; • Provision of information and services of relevance to the citizen, particularly victims RIFULPHLQDWLPHO\DQGHI¿FLHQWPDQQHU • Support for cooperative working across police forces and with other criminal justice agencies and local authorities; • Better use of information across all forces and with other criminal justice agencies to support the implementation of the National Intelligence Model and to make policing more effective in combating criminality; • The collection, exchange and storage of information in a secure and trusted environ- ment; and • Flexibility to accommodate new business requirements and to take advantage of changes in technology. Development of E-Policing Most police agencies have developed their own information technology (IT) systems to support their work. Primarily, these IT systems can be grouped into categories based on the particular applications for which they were developed. Examples of each type from the literature are reviewed here under the following categories: information sharing and monitoring, intelligent crime analysis and GIS for crime analysis and monitoring. Information sharing and monitoring. Information sharing and monitoring are especially important for crime analysis and investigation. Timely ac- cess to information is often critical. With rapid advancement of IT and the Internet, researchers and police agencies have paid special attention to developing such systems. Future Alert Contact Network (Falcon, 1998) is a community-based policing system. It offers the functionality of monitoring all incoming records relevant to a UHTXHVW DQG WKHQ QRWL¿HV DQ RI¿FHU E\ HPDLO or pager when the request is met. COPLINK Connect system (Chen et al., 2003) enables law enforcement agencies to search for information more effectively by providing an interface that integrates data from various sources, including incident records, mug shots and gang information. COPLINK Agent (Zeng et al., 2003) is designed to SURYLGHDXWRPDWLFLQIRUPDWLRQ¿OWHULQJDQGPRQL- toring functionalities. The system also supports knowledge sharing by proactively identifying RI¿FHUVZKRDUHZRUNLQJRQWKHVDPHRUVLPLODU cases on a real-time basis. Intelligent crime analysis. T he adding of an intel- ligent component to crime analysis is one of the most attractive areas to researchers. Some intel- ligent techniques, such as Bayesian networks, and neuron networks have been applied to crime analysis. Smith et al. (2002) developed an inferen- tial framework for a future custom-built decision support system to help forensic scientists perform their sometimes delicate and nonstandard tasks. A system would be particularly helpful for sci- entists who investigate forensic evidence arising from high-volume crime, such as the burglary of electronic equipment, which frequently occurs and shares many qualitative features. Oatley and Ewart (2003) undertook a study making use of both historical and contemporaneous informa- tion to generate a burglary prediction system. 7KHLU SDSHU GHWDLOHG KRZ WKH ¿QDO SUHGLFWLRQV on the likelihood of burglary were calculated by combining all of the varying sources of evidence into a Bayesian belief network and the issues surrounding the construction of such a model. Pendharkar and Bhaskar (2003) proposed an ap- 1042 Electronic Policing: A Framework for Crime Control and Citizen Services proach for building a hybrid Bayesian network based on a multiagent system for drug crime knowledge management. They used distributed DUWL¿FLDO LQWHOOLJHQFH DUFKLWHFWXUH WR FUHDWH D multiagent information system that integrated distributed knowledge sources and information to aid decision making. GIS for crime analysis and monitoring. GIS have been adopted by police forces for use in several areas, such as crime pattern analysis, repeat vic- timization and crime monitoring. Bowers et al. (2001) developed a GIS-based database application WRDVVLVWLQWKHLGHQWL¿FDWLRQRIYXOQHUDEOHWDUJHWV for a domestic-dwelling, target-hardening scheme. 7KHLUV\VWHPXVHGGH¿QHGFULWHULDWRSULRULWL]H recent victims of burglary. This prioritization system produced targeting information on a daily basis. Costello and Wiles (2001) used geocoded crime data to look at the patterns produced by analyzing the location of offenses and the resi- dential addresses of offenders and victims, and the relationships between the locations linked by offenses. Gupta (2001) developed a GIS routine to help police to correlate, visualize and analyze crime data. The crime picture becomes crystal clear, thereby improving police management. Rich (1999) illustrated that mapping can be used for WUDFNLQJGU XJÀRZLQWRWKH8QLWHG6WDWHVDQGODZ enforcement areas. However, in these cases, GIS ZDVXVHGLQDSSOLFDWLRQVVXLWDEOHIRURI¿FHZRUN ZLWKRXWZLUHOHVVDFFHVVIRUSROLFHLQWKH¿HOG Research Questions Each of the above systems focuses on only certain aspects of police operations but does not consider services to citizens. The goal of the system de- veloped here is to provide an integrated solution to crime control and the provision of services to citizens. Effective crime control requires the col- lection, organization and retrieval of a variety of data. Multiple types of data, such as text (crimi- nal data, property data, gang information, case information), graphic (photographs of criminals, pictures of crime scenes) and geographic data (crime locations, details of the area), need to be accessed when and where they are needed, espe- cially in time-critical situations. A new trend in technology, wireless access devices like personal digital assistants (PDAs) and mobile telephones are among the most important technologies to support e-policing initiatives. Since people tend to carry their mobile devices with them wherever they go, they remain linked to the Internet at all times, not only when sitting at a desk in front of a computer. Therefore, police agencies need to plan for a massive change in the way many of the public use the Internet and interact with each other and with agencies. A police agency also needs to look for ways to utilize wireless technol- RJ\WRLPSURYHWKHHIIHFWLYHQHVVDQGHI¿FLHQF\ of the delivery of core operations and in doing VRKHOSWKHSXEOLF3ROLFHRI¿FHUVVSHQGDORWRI their time patrolling the streets and investigating crimes. To accommodate this mobility, wireless access is important. Geographical locations play an important role in crime control. It would be of YDOXHWRWKHSROLFHRI¿FHUVWRDFFHVVJHRPDSSLQJ data anywhere and at anytime. For this research a Bayesian network model was developed to analyze the factors affecting crime risk. The objective of this study was to answer these three important research questions: • How can e-policing services be integrated to serve communities better? • How will such a system support police of- ¿F HU VL QW KH L U FU L PH FR QW U R O D QG L Q Y H V W LJ D W L Y H  work? • How will the system support citizens in obtaining services from police agencies? 1043 Electronic Policing: A Framework for Crime Control and Citizen Services MOBILE POLICING FRAMEWORK Architecture of a Mobile Police System Here we propose a framework for an integrated wireless GIS to support crime control and provide services to citizens. The design of the framework w a s g u i d e d b y u s e r r e q u i r e m e n t s f r o m b o t h p o l i c e and citizens that were obtained through structured questionnaires and interviews. The proposed ar- chitecture of the system is illustrated in Figure 1. The system consists of a user interface, a database management system (DBMS), which contains VSDWLDODQGQRQVSDWLDOGDWDEDVHDQG¿YHIXQFWLRQDO modules, namely the wireless GIS module, crime factor analysis module, reporting and searching module, location-based system (LBS) module and security module. The functionality of each module is described below. Wireless GIS module. The wireless GIS module is used to develop real-time crime data access to KHOSWKHSROLFHWREHPRUHHIIHFWLYHDQGHI¿FLHQW in crime control and also provide services to citizens. The wireless GIS with integration of technologies, such as global positioning systems (GPS), digital photography, digital videography and databases, is used for developing the functions of crime recording, updating and representing crime-map data. The system consists of mobile devices capable of accessing the Internet with proper extensions for a GPS receiver and compact ÀDVK FDPHUD'DWDFDQ EHVLPSO\ORJJHGIURP the crime scenes and uploaded to a geo-database server. OpenGIS enables spatial data sharing and system interoperability, leading to data integrity and timeliness and reduced data replication. Open source software and freeware packages, such as Minnesota MapServer, PostgreSQL and PostGIS, were used to develop the system (Boondao, Es- ichaikul, & Tripathi, 2004a). Crime factor analysis module. The crime factor analysis module (Boondao, Esichaikul, & Trip- athi, 2004b) was developed based on the crime pattern analysis of Brantingham and Branting- ham (1991) and theory of crime control through environmental design (Jeffery, 1971; Rhodes & Conly, 1991). Pattern theory focuses attention and research on the environment and crime and insists that crime locations, characteristics of such locations, the movement paths that bring offenders and victims together at such locations and people’s perceptions of crime locations are VLJQL¿FDQW REMHFWV IRU VWXGLHV 3DWWHUQ WKHRU\ synthesizes its attempt to explain how changing VSDWLDODQGWHPSRUDOHFRORJLFDOVWUXFWXUHVLQÀX- Figure 1. Architecture of a mobile police system PDA User Interface G2E, G2C, G2G Wireless GIS Module Security Module Reporting and Searching Module Crime Factor Analysis Module Crime data GIS data DBMS Mobile Phone Internet LBS Module . crime analysis and GIS for crime analysis and monitoring. Information sharing and monitoring. Information sharing and monitoring are especially important for crime analysis and investigation EXVLQHVV¿UPV7KHJRYHUQPHQWXVHVLQIRUPD- tion and communication technology to improve HIIHFWLYHQHVVDQGHI¿FLHQFWRPHHWWKHUHTXLUH- ments of new forms of government management and accountability and to satisfy the demand of external. government agencies and businesses with more convenient access to 1039 Electronic Policing: A Framework for Crime Control and Citizen Services government information and services (Hernon,

Ngày đăng: 07/07/2014, 10:20

TỪ KHÓA LIÊN QUAN