This course covers the major research and statistical techniques which criminologists,sociologists, and criminal justice researchers use to observe and interpret the social world. Part of this course focuses on issues related to the logic of research and research design and the general procedures for research design. Another part of the course will deal more specifically with a variety of particular techniques for gathering data: surveys; experiments and quasi-experiments; and field and observational methods. This course aims to make students more knowledgeable practitioners, consumers, and evaluators of social science data and research.
Students should be able to perform a number of simple, though powerful analyses to describe data and reach conclusions based on these data. The five primary goals of statistics for this class are: 1 summarizing large and small data sets; 2 examining the integrity of large and small data sets; 3 determining which statistics best portrays the data; 4 comparing more than one variable to others; 5 applying statistics to problem solving and data driven decision-making through proper data collection and research design.
This course introduces students to the range of thinking skills and reasoning abilities that are essential to crime and intelligence analysis.
Students will examine the nature of knowledge and develop their abilities to think reflectively, critically and logically. This course also covers many approaches to the task of discovering truth. A variety of structured analysis models will be used in conjunction with critical thinking to explore the basis of analysis.
This course focuses on the application of crime analysis tools, techniques and methods to support crime reduction initiatives, criminal investigations, and effective deployment of police resources. Students will learn how to prepare crime statistics and crime maps, identify crime patterns, develop concise and effective written products, and attain a thorough understanding of the current state of the Crime Analysis field in Canada.
Crime and Intelligence Analysis: An Integrated Real-Time Approach
This course introduces students to the types of crime and intelligence analysis, and the roles played by analysts themselves. The fundamentals of analysis, core competencies, models of intelligence, and logic will be discussed. Students will learn how to prepare and present intelligence products.
This course provides students with an in-depth study of the theory of strategic analysis and its relevant applications to crime and intelligence analysis. Various contemporary strategic methods and analytic products will be used for analyzing cases and developing short and long term goals to collect criminal intelligence. The course introduces the students to the theory, methodology and mathematical concepts in support of geographic profiling.
Crime pattern theory, mental maps, crime hunting area concepts and supporting technology are also covered. This course provides an overview of the spatial aspects of crime and intelligence analysis. The concept of environmental criminology and the relevance of geographic information systems GIS to crime and intelligence analysis will be covered. Students will learn how to use visualization and spatial analysis technologies in order to detect criminal patterns and to forecast the probability, time and location of future criminal events.
This course focuses on the application of criminal intelligence analysis tools, techniques and methods to the management of major cases which include homicide investigations, narcotics trafficking, sex offences, extortion and kidnapping. It also examines the importance of the analytical role in providing strategic and tactical direction in major crimes investigations. This course is designed to expose students to a wide range of analytical techniques that are essential to protecting the interests of national security.
Students will conduct the applied research and use advanced analytical methods to prepare collection plans and threat assessments on individuals or groups who pose a threat to national security. The course also examine the use advanced data mining tools, techniques and methods to expose and to determine the scope, nature and impact of their threat to national security, law and order.
This course will provide students with the latest techniques used to effectively gather online information for investigative purposes relating to persons, companies, and other assets. Students will be introduced to the methods of gathering online intelligence through social media platforms, search engines, and dark web searches.
In addition, students will learn how to assess potential counter-intelligence concerns. Particular emphasis will be placed on heightened awareness and the "paper trail" investigators may leave behind when using internet investigation tools. Approaches to maintain privacy and security when carrying out online investigations will also be explored and students will be introduced to a variety of online search methodologies.
Under the supervision of the graduation project research methodologist, faculty mentor s and industry subject matter expert, the student will build upon the project concept initiated in FSCT and complete a theoretical or applied independent research proposal. The research proposal should be innovative, experimental or explanatory in nature to demonstrate the practical application of knowledge and skills.
It should be comprehensive, covering all the operational aspects of the project and the measurement instrument to be employed. The research models employed and the research protocol followed will be well articulated and defined. The student is expected to attend the three in-class sessions and participate fully. Prerequisite: Completion of FSCT , all framework courses and all specialty courses or permission of program coordinator. In this second of three capstone graduation courses, and under the supervision of the course instructor, the student must complete the data collection and analysis as specified in the graduation project proposal developed in FSCT The student will apply the chosen research methodology and collect the requisite data needed to answer the research questions of interest.
The student must complete this phase of the project to a satisfactory level, as determined by the course instructor, program coordinator and subject matte expert where applicable before registering for the third and final course, FSCT The student is required to prepare a formal research paper akin to a scientific publication , submit a research poster and present the final research report to fellow students, faculty and industry guests at the yearly the Research Day.
The poster and the presentation are expected to clearly highlight the research questions posed, the model of measurement utilized, data analysis and key research findings. The required work period can be in a paid job, either temporary or permanent, in which students do productive work that is directly related to the core competencies of their chosen option within the B.
An unpaid position may also be acceptable for a work period. Regardless, positions must clearly demand the application, at a professional level, of the core competencies of the B. The intent of the work period is to provide experiential learning for the purpose of complementing and supplementing the various theories and topics covered throughout the course of studies. The student will apply forensic skills, knowledge, and ability in a forensics-related area. A final work-period report will be submitted. NOTES: Students will not be allowed to apply work performed as part of their required work period towards their "capstone" graduation project.
However, once the required hours have been reached and upon mutual agreement between all parties, the student may continue in the same organization to complete an appropriate graduation research project.
Prerequisite: Completion of all required courses in the Liberal Studies, Legal Framework, Applied Management, Investigative Framework and Specialty areas of the degree program or by approval of the program coordinator. In addition, students must complete a minimum of three months relevant work experience prior to program completion. The work experience must be reviewed and approved by the Program Coordinator.
Contact the Program Coordinators for further details. Do you want to know if they transfer to courses here at BCIT? The Bachelor of Technology in Forensic Investigation must be completed within seven years from acceptance into the program. Depending on the course learning outcomes, students will be graded on a combination of the following:. Contact the Program Coordinator for further details. Crime and intelligence analysts are employed by the military and law enforcement agencies at the municipal, provincial and federal levels. They also work for federal and provincial ministries whose mandates involve the environment, business, taxation and immigration.
Analysts may be called upon to provide a variety of analytical services and products.
Intelligence and Intelligence Analysis by Patrick F. Walsh | | Booktopia
Crime and intelligence analysis is a rapidly growing branch within law enforcement agencies and in the private sector, a trend that is expected to continue in the foreseeable future. The BCIT student outcomes reports present summary findings from the annual survey of former students administered by BC Stats one to two years after graduation. These reports combine the last three years of available results for the BCIT Outcomes Surveys of graduates and for Degree graduates.
The reports are organized into three-page summaries containing information on graduates' labour market experiences and opinions regarding their education.
More detailed information can be accessed at the BC Student Outcomes website. To view these results, you may need to have the Adobe Acrobat Reader installed in your Web browser. Students must complete a minimum of three months relevant work experience prior to program completion. IALEP provides a one-week course on planning, which includes topics ranging from project management to capital planning and facilities planning. ACFE provides a comprehensive range of courses in both foundation and advanced topics relating to fraud examination.
Please ensure you have reviewed the detailed information on this site, using the navigation to the right, before submitting the form below. As well, if you meet any of the following criteria, please follow the links for more information, instead of sending the form: you are an international student you are looking for financial aid you have already applied and want to check your application status.
I have read the information above and still have a question I need answered. School of Computing and Academic Studies. Investigate It Analytic techniques are an important addition to every analyst's toolbox. Graduates of this program will be able to: Synthesize information from disparate sources for the purpose of identifying crime patterns, series and trends Map crime locations and analyze hot spots of crime, disorder and incivilities Develop collection plans of high-risk and habitual offenders Collect, evaluate, maintain and collate crime and intelligence data for national security, law enforcement and the business community Design and maintain criminal intelligence databases for law enforcement action Prepare written and oral reports and various types of charts and graphs based on research, correlation and analysis of evidence.
Program Entry. Application processing Applications are accepted throughout the year. Entrance requirements Most courses may be taken for professional development purposes on an individual course basis without formally applying to the program. Step 1: Pre-entry assessment Contact the Program Assistant for a pre-entry assessment. Completion of one of the following options prior to admission: Option 1: A two-year diploma minimum of Criminal Record Check CRC Contact your local police department to obtain the appropriate forms - Letter for police department [PDF] Must be issued within one year of your application date The outcome of the CRC may influence your acceptability for this program Completed and signed applicant waiver form from the program area Resume Pre-entry bridging courses: 3.
Recommended for success Attend an information session prior to applying for this program. For more information and to register for an information session visit the Forensics website.
International applicants Part-time Studies course-by-course programs are only available to international students who have a valid status in Canada. Apply to program BCIT accepts only complete applications. In order to apply: Include proof of meeting all entrance requirements prior to submission. Convert all transcripts and supporting documents to PDF files. Have a credit card ready to pay the application fee. Apply Now You can check the status of your application online at any time using the Student Information System. Tuition fees Please see the Part-time Studies Fees page for information on tuition fees and refunds.
Financial assistance Financial assistance may be available for this program. Program delivery Combinations of various learning tools and methods will be used to engage students in participatory learning in class, online, and in the field.