Crime Data & Content Analysis Chapter 9 Exam Questions - Fundamentals of Research in Criminology 5th Edition Test Bank by Ronet D. Bachman. DOCX document preview.

Crime Data & Content Analysis Chapter 9 Exam Questions

Test Bank

Chapter 9: Analyzing Content and Police Data: Social-Network Analysis, Crime Mapping, Big Data, and Content Analysis

Multiple Choice

1. The act of compiling or analyzing data that were originally collected by someone else at another time is ______.

a. second-hand data analysis

b. secondary data analysis

c. inappropriate data analyses

d. tertiary analysis

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: What Do We Have in Mind?

Difficulty Level: Easy

2. Many researchers obtain data through the ICPSR, which is the ______.

a. Inter-state Configuration of Political and Social Research

b. Intra-University Collaboration for Policing and Social Research

c. Intra-University Consortium for Political and Social Research

d. Inter-social Consortium of Political and Social Research

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: Analyzing Secondary Data

Difficulty Level: Medium

3. There are four major types of secondary data ______.

a. surveys, statistics, records, documents

b. statistics, official surveys, historical records, documents

c. official statistics, official records, official historical documents, magazine surveys

d. surveys, official statistics, official records, other historical documents

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Analyzing Secondary Data

Difficulty Level: Medium

4. Types of relationships that can include many different forms such as face-to-face and online interactions, interaction with a criminal justice agency, and digital economic transactions, are included in ______.

a. social networks

b. real-world groups

c. close group networks

d. historically significant networks

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Comprehension

Answer Location: Social Network Analysis

Difficulty Level: Medium

5. One of the first graphical applications of social networks was created by Jacob Moreno to examine friendship choices, in his classic book ______.

a. The Social Network

b. Friendship Survival

c. Who Shall Survive?

d. The Sociometry Test

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Social-Network Analysis

Difficulty Level: Hard

6. A way of representing social configurations of a class would be to show a ______.

a. sociotextual representation

b. sociogram

c. sociometric representation

d. sociodrawing

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Comprehension

Answer Location: Social-Network Analysis

Difficulty Level: Hard

7. Social Network Analysis (SNA) usually consists of at least ______ data sets.

a. two

b. three

c. four

d. five

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Social-Network Analysis

Difficulty Level: Medium

8. Krebs’ analysis shows the benefits of SNA to describe the strength of the relationships for the 9/11/2001 terrorists, concluding that the best solution for network disruption may be to discover possible suspects and then through ______.

a. contextual analysis better understand the network

b. considering census sampling

c. snowball sampling, map their ego networks

d. probability sampling, then follow up with nonprobability sampling

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Analysis

Answer Location: Case Study: Networks of Terrorist Cells

Difficulty Level: Hard

9. Crime mapping for research purposes ______.

a. has been around only since 2000

b. has a very long history

c. is a relatively new finding (since 1980)

d. has been shown to be most effective with pushpins and maps

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Crime Mapping

Difficulty Level: Easy

10. The Betweenness Centrality Score is a statistic that measures the extent to which ______.

a. the data from one end of the SNA connects to data at the other end

b. nodes connect other nodes that are not directly linked to each other in SNA

c. some nodes connect to other nodes that are directly linked in SNA

d. the semi-nodes connect to each other in a straight fashion

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Case Study: Finding a Serial Killer

Difficulty Level: Medium

11. Bichler, Lim, and Larin (2017) found that the size of the shapes in the graphs (e.g., circles and diamonds) indicated that ______.

a. the focus should be pointed toward Smith

b. there was no connection

c. the degree of betweenness centrality

d. there would have been no way to make an arrest based on the current data

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Comprehension

Answer Location: Case Study: Finding a Serial Killer

Difficulty Level: Hard

12. The software tool that has made crime mapping increasingly available to researchers since the 1990s is ______ system.

a. geopolitical information

b. geographic intelligence

c. geographic interpol

d. geographic information

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Crime Mapping

Difficulty Level: Medium

13. Geospatial locations within jurisdictions where crimes are more likely to occur compared to other areas are known as ______.

a. hot locations

b. hot spots

c. heat-seeking spots

d. crime spots

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Crime Mapping

Difficulty Level: Easy

14. The goal of the research by Fitterer, Nelson, and Nathoo (2015) was to ______.

a. describe BNE data in Oregon

b. use data from the early time period to predict later occurrences of BNE

c. use data from later time periods to predict BNEs

d. create a data base of nationwide BNEs

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Case Study: Predicting Break and Entries (BNEs)

Difficulty Level: Medium

15. Modeling that uses data from several sources to predict the probability of crime occurring in the future, using the underlying factors of the environment that are associated with illegal behavior is ______ modeling.

a. risk topical

b. rated terrain

c. risk-terrain

d. rated topical

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: Case Study: Predicting Where Crime Will Occur

Difficulty Level: Medium

16. A key concern when original records are analyzed with either secondary data or Big Data is ______.

a. behavioral history

b. protection of perpretators

c. subject prediction

d. subject confidentiality

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Analysis

Answer Location: Ethical Issues in Using Big Data

Difficulty Level: Medium

17. The Inter-University Consortium for Political and Social Research carefully examines all data deposited in the archive for the ______.

a. possibility of disclosure risk

b. inevitability of disclosure of information

c. probability of information disclosure

d. insensitivity of information risk

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Ethical Issues in Using Big Data

Difficulty Level: Medium

18. ICPSR ensures subject confidentiality with work done by a ______.

a. data confidentialist

b. federal law officer

c. data archivist

d. human rights officer

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: Ethical Issues in Big Data

Difficulty Level: Medium

19. Political concerns intersect with ______ practice(s) in secondary data analyses

a. ethnic

b. racial

c. ethical

d. census

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Ethical Issues in Using Big Data

Difficulty Level: Medium

20. The collection of Big Data makes possible ______ and prediction of behavior on a large scale

a. surveillance

b. surveillance

c. protection

d. control

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Ethical Issues in Using Big Data

Difficulty Level: Medium

21. The systematic, objective, quantitative analysis of message characteristic is ______ analysis.

a. content

b. contextual

c. quantitative

d. tertiary

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Content Analysis

Difficulty Level: Easy

22. The goal of a content analysis is to develop inferences from ______.

a. communication in any form

b. oral communications

c. written communications

d. speeches

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Content Analysis

Difficulty Level: Easy

23. Because content analysis involves coding and categorizing text and discovering relationships among constructs in text, among other things, it bears some similarities to ______ analysis.

a. quantitative data

b. secondary quantitative data

c. qualitative data

d. identification

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Application

Answer Location: Content Analysis

Difficulty Level: Medium

24. Content analysis methods usually begin with ______.

a. written or visual images

b. text, speech broadcasts, or visual images

c. speeches or television broadcasts

d. surveys supplemented by text

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Content Analysis

Difficulty Level: Medium

25. In a content analysis, items such as newspaper articles or political conventions may be the ______.

a. population units

b. units of analysis

c. contextual units

d. analytical content

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Content Analysis

Difficulty Level: Medium

26. To ensure adequate representation of community newspapers in large cities, a(n) ______ sample might be the best choice

a. simple random

b. stratified random

c. enumerated random

d. nonrandom

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Knowledge

Answer Location: Select a sample of units from the population

Difficulty Level: Easy

27. The categories into which the text units are to be coded must be ______.

a. defined

b. denoted

c. computed

d. programmed

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Knowledge

Answer Location: Design coding procedures for the variables to be measured

Difficulty Level: Easy

28. The content analyst creates variables for analysis by ______.

a. cross-tabulating the variables

b. observing measures of central tendency

c. analyzing crime tendencies

d. counting occurrences of particular words, themes, or phrases

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Application

Answer Location: Base Statistical Analyses on Counting Occurrences of Particular Items

Difficulty Level: Medium

29. Taylor, et al. (2013) found that male and female children were equally likely to have been abducted by family, but the print media was more likely to ______.

a. report on female family abductions compared to males

b. focus on abductions by male family members

c. report more on abductions perpetrated by family members than strangers

d. focus on abductions of male children

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Application

Answer Location: Case Study: Media Portrayals of Abducted Children

Difficulty Level: Hard

30. Responsible use of secondary data requires a good understanding of the ______.

a. individual researchers involved

b. concepts in the current research

c. primary data source

d. print media’s reaction

Learning Objective: 9.4: Describe the steps necessary when performing a content analysis.

Cognitive Domain: Knowledge

Answer Location: Methodological Issues When Using Secondary Data

Difficulty Level: Easy

31. Researchers who rely on secondary data inevitably make trade-offs between their ability to use a particular data set and ______.

a. the specific hypotheses they can test

b. their choice of the data set

c. why they think they may not be able to match the analytic possibilities presented by the data

d. the potential harm in collecting primary data

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Ethical Issues When Using Secondary Data

Difficulty Level: Medium

32. Researchers who conclude they are being denied access to public records of the federal government may be able to obtain the data by ______.

a. mailing a request to the Institutional Review Board

b. sending a request to the President of the United States

c. filing a Freedom of Information Act request

d. there is no further step that may be taken

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Ethical Issues When Analyzing Available Data and Content

Difficulty Level: Hard

33. The Freedom of Information Act stipulates that all persons have a right to access all federal agency records unless ______.

a. the President of the United States bars access

b. the records are specifically exempted

c. their Institutional Review Board denies access

d. the subjects are still living

Learning Objective: 9.4: Describe the steps necessary when performing a content analysis.

Cognitive Domain: Comprehension

Answer Location: Ethical Issues When Analyzing Available Data and Content

Difficulty Level: Medium

34. Social network analysis and crime mapping are common techniques used ______.

a. understand how individual offenders approach a particular crime

b. to reduce, disrupt, and prevent crime

c. to respond to crime

d. both “ to reduce, disrupt, and prevent crime” and “ to respond to crime” are correct

Learning Objective: 9.4: Describe the steps necessary when performing a content analysis.

Cognitive Domain: Application

Answer Location: Conclusion

Difficulty Level: Medium

35. Subject confidentiality is a key concern when ______.

a. original records are analyzed

b. the ICPSR examines all data in the archive

c. secondary data is used but it still contains some identifying information

d. all of these

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Ethical Issues When Analyzing Available Data and Content

Difficulty Level: Hard

True/False

1. Secondary data analysis is the act of compiling or analyzing data that were originally collected by someone else at another time.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: What Do We Have in Mind?

Difficulty Level: Easy

2. There are only two types of secondary data.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: Analyzing Secondary Data

Difficulty Level: Easy

3. Social networks are types of relationships that can include many forms.

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Social Network Analysis

Difficulty Level: Easy

4. A node is another name for a graph representing social configurations

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Social Network Analysis

Difficulty Level: Medium

5. Bichler, Lim, and Larin (2017) performed an SNA regarding the Red River killings.

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Knowledge

Answer Location: Case Study: Finding a Serial Killer

Difficulty Level: Medium

6. Crime mapping provides maps to visually communicate analysis results.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Crime Mapping

Difficulty Level: Medium

7. Hotspots are geospatial locations within jurisdictions where crimes are less likely to occur.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: Crime Mapping

Difficulty Level: Easy

8. The easy availability of mapping tools provides more opportunities for intelligence-led policing.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Case Study: Predicting Break and Entries (BNEs)

Difficulty Level: Medium

9. Big Data is a very large data set which can be used to reveal patterns, trends, and associations between variables.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Big Data

Difficulty Level: Medium

10. Crime mapping allows law enforcement agencies to estimate where hot spots of crime are occurring.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Case Study: Predicting Where Crime Will Occur

Difficulty Level: Medium

11. Risk Terrain Modeling weights the independent variables and places them into a final model where criminal behavior is most likely to occur.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Case Study: Predicting Where Crime Will Occur

Difficulty Level: Medium

12. Subject confidentiality is a key concern when original records are analyzed with secondary data but not Big Data.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Comprehension

Answer Location: Ethical Issues in Using Big Data

Difficulty Level: Medium

13. If all information that could be used in any way to identify respondents cannot be removed from a data set, ICPSR will not allow access to the data to anyone.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Ethical Issues in Using Big Data

Difficulty Level: Hard

14. Content analysis is the systematic, objective, quantitative analysis of message characteristics.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Knowledge

Answer Location: Content Analysis

Difficulty Level: Easy

15. Often, a comprehensive archive can provide the primary data for analysis.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Identifying a Population of Documents or Other Textual Sources

Difficulty Level: Easy

16. The content analyst must decide what units are most appropriate to the research question.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Determine the Units of Analysis

Difficulty Level: Medium

17. Nonrandom sampling methods may never be used in content analysis.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Select a sample of units from the population

Difficulty Level: Medium

18. Homographs create special problems when developing coding procedures.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Analysis

Answer Location: Developing Reliable and Valid Coding Procedures Is Not an Easy Task

Difficulty Level: Hard

19. After coding procedures are developed, their reliability should be assessed by comparing different coders’ codes for the same variables.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Application

Answer Location: Developing Reliable and Valid Coding Procedures Is Not an Easy Task

Difficulty Level: Medium

20. Scholars analyzing crime depictions presented in the media generally conclude that depictions in newspaper and television are not misleading.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Analysis

Answer Location: Case Study: Media Portrayals of Abducted Children

Difficulty Level: Medium

21. If the units in a content analysis are individual issues of a newspaper, in a study of changes in news emphases, determining units of analysis may be relatively easy.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Determine the Units of Analysis

Difficulty Level: Medium

22. Reliable use of secondary data requires a good understanding of the primary data source.

Learning Objective: 9.4: Describe the steps necessary when performing a content analysis.

Cognitive Domain: Comprehension

Answer Location: Methodological Issues When Using Secondary Data

Difficulty Level: Hard

23. Subject confidentiality is a key concern when original records are analyzed.

Learning Objective: 9.4: Describe the steps necessary when performing a content analysis.

Cognitive Domain: Analysis

Answer Location: Ethical Issues When Analyzing Available Data and Content

Difficulty Level: Medium

24. Researchers who conclude that they are being denied access to public records of the federal government have no recourse to obtain the data.

Learning Objective: 9.4: Describe the steps necessary when performing a content analysis.

Cognitive Domain: Application

Answer Location: Ethical Issues When Analyzing Available Data and Content

Difficulty Level: Hard

25. Use of SNA and crime mapping techniques are now common techniques used by law enforcement agencies to reduce, disrupt and prevent crime.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Conclusion

Difficulty Level: Medium

Short Answer/Essay

1. What is the NACJID? Name any five of the datasets provided by the Bureau of Justice Statistics and National Institute of Justice cosponsored NACJID.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Knowledge

Answer Location: Analyzing Secondary Data

Difficulty Level: Medium

2. Describe and illustrate a sociogram.

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Comprehension

Answer Location: Social-Network Analysis

Difficulty Level: Medium

3. What is crime mapping? How has it been used? What are the three main functions of crime mapping?

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Application

Answer Location: Crime Mapping

Difficulty Level: Medium

4. What are hot spots? Why are they important? Give an example.

Learning Objective: 9.1: Explain how secondary data analysis is different from the methods we have already examined in this book.

Cognitive Domain: Application

Answer Location: Crime Mapping

Difficulty Level: Medium

5. What is “Big Data”? Give an example.

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Big Data

Difficulty Level: Medium

6. What is Google Ngrams? What does it show? Why is it an important tool?

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Big Data

Difficulty Level: Hard

7. What is Risk-Terrain Modeling? How does it differ from Crime Mapping?

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Case Study: Predicting Where Crime Will Occur

Difficulty Level: Hard

8. What are the ethical issues in using Big Data?

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Ethical Issues in Using Big Data

Difficulty Level: Medium

9. What is content analysis? What is the goal of a content analysis?

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Content Analysis

Difficulty Level: Medium

10. What types of units may be chosen for analysis? How does one determine units of analysis? How would a sample the units from the population? Design a coding procedure?

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Application

Answer Location: Identifying a Population of Documents or Other Textual Sources

Difficulty Level: Medium

11. How do you identify a population of documents or other textual sources in content analysis?

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Comprehension

Answer Location: Identifying a Population of Documents or Other Textual Sources

Difficulty Level: Medium

12. Why is developing reliable and valid coding procedures not an easy task? Give an example of a homograph and why it may cause problems.

Learning Objective: 9.3: Understand how computer technology has ushered in our ability to analyze Big Data and the effects this has had on criminal justice–related research.

Cognitive Domain: Application

Answer Location: Developing Reliable and Valid Coding Procedures Is Not an Easy Task

Difficulty Level: Medium

13. What types of challenges does analysis of secondary data have?

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Methodological Issues When Using Secondary Data

Difficulty Level: Medium

14. What ethical issues are there when analyzing available data and content?

Learning Objective: 9.2: Understand how social network analysis and crime mapping can be used for intelligence-led policing as well as basic research.

Cognitive Domain: Application

Answer Location: Ethical Issues When Analyzing Available Data and Content

Difficulty Level: Medium

15. Who decides whether there are any issues of concern regarding human subjects when it comes to secondary analysis of data? Are regulations clear on this matter?

Learning Objective: 9.4: Describe the steps necessary when performing a content analysis.

Cognitive Domain: Application

Answer Location: Ethical Issues When Analyzing Available Data and Content

Difficulty Level: Hard

Document Information

Document Type:
DOCX
Chapter Number:
9
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 9 Crime Data & Content Analysis
Author:
Ronet D. Bachman

Connected Book

Fundamentals of Research in Criminology 5th Edition Test Bank

By Ronet D. Bachman

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party