CJ-407 7-1
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
407
Subject
Accounting
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by angelina2964
P a g e | 1
The Objectives and Intentions of Writing an After-Action Review
Angelina Garcia
Southern New Hampshire University
CJ-407 Crime Analysis and Solutions
Professor, Krista Comrie
February 23, 2024
P a g e | 2
Use various forms of data and information to assess an operation.
For the plan to be successful, available means need to be utilized efficiently. The decision
was made to dispatch a specific unit of officers to arrest drunk drivers. As part of the operation, there were supposed to be several stages, such as the collection of intelligence, the planning, and the execution itself. To achieve the mission's objectives, a tightly planned strategy was to be implemented along with a group of highly trained police officers. A carefully planned and coordinated interstate road operation was required to capture the drunk drivers. The police and high-tech surveillance tools, as well as tactical teams of officers, were supposed to gather, plan, and carry out information in phases. To increase the likelihood of a successful outcome, these assets were coordinated to enhance their effectiveness. In addition to ensuring the safety of all involved, another objective of the operation was to cause as little disruption as possible to the neighborhood. To accomplish this task, the offenders avoided the major roads and used side streets to disrupt residents. 190 sworn-in police officers used cutting-edge tools for data collection and analysis, as well as their experiences and training, to achieve its goals. Furthermore, the city is strategically located for road checks due to its excellent infrastructure, including a bypass and interstate. This allowed the police to effectively monitor the situation and respond quickly to any threats. The police were able to maintain a strong presence in the area and
respond to any criminal activity. As a result, they were able to contain the situation and prevent further disruption. This demonstrates that the city's infrastructure is an asset in responding to and preventing criminal activity. As such, it is essential to maintain and upgrade the city's infrastructure to ensure public safety.
As part of the operation, several stages were carried out, the first of which involved conducting patrols of four offices, each in a separate vehicle. An operational strategy was
P a g e | 3
developed based on the findings of the investigation. As soon as the investigation was completed,
the police moved on to the planning phase, in which they outlined the exact steps that would be followed during the process. This stage was designed to increase the likelihood of a successful operation without jeopardizing personnel (Solensten and Willits, 2021). The final stage of the plan implementation process was its implementation. Officers will patrol Highway 493 and the critical roads of 27 West and 127 North, which see heavy traffic during rush hours. Teams of officers will conduct the operation, utilizing their usual patrol vehicles to deal with any dangers posed by drunk drivers (Al-Rousan and Umar, 2021). Three of the four police officers normally assigned to this shift will be going to other duties since the operation targets the hours between midnight and 3 a.m. when crime is statistically at its lowest level. There will be a reassignment of a police officer assigned to the area assigned to bars and restaurants located in the city's parking garages. Despite the well-planned and executed procedure, multiple consequences were caused by its outcome. There were severe injuries and fatalities caused by confrontations between suspects and police officers. Additionally, potential offenders used neighborhood side streets to avoid police officers, which increased the risk of civilians being attacked. The reassignment of police officers also resulted in the loss of revenue for bars and restaurants located in the parking garages, as customers were discouraged from visiting them. Moreover, the police presence in the area was reduced, leading to an increase in criminal activity.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
P a g e | 4
References
Al-Rousan, T. M., & Umar, A. A. (2021). Assessment of traffic sign comprehension levels among drivers in the Emirate of Abu Dhabi, UAE. Infrastructures, 6(9), 122.
Solensten, B., & Willits, D. W. (2021). Perceptions of Drug Recognition Experts (DREs) and DRE Evidence: A Qualitative Analysis of the Police, Prosecution, and Defense.
Related Documents
Related Questions
FBI and Financial Fraud
This assignment aligns with Outcome 4: Model techniques used to collect and analyze data.
Adapted from Question 24 on pages 14-40 & 14-41 of the textbook.
Go to the FBI websiteLinks to an external site. and use the search box in the top right corner to conduct a search on financial fraud. The FBI site provides numerous descriptions of financial fraud cases that they have prosecuted. Choose a case and select one of the convicted defendants named in the case. Use the profiling methods described in the chapter to perform a due diligence search and collect all the internet information that you can about this individual. The information that you collect can include news reports, addresses either physical or virtual, education background, etc. Document where you found the information by including the name of the website and its URL.
arrow_forward
The best way to enact a broad fraud prevention program is toa. Install airtight control systems of checks and supervision.b. Name an ethics officer who is responsible for receiving and acting upon fraud tips.c. Place dedicated hotline telephones on walls around the workplace with direct communication to the company ethics officer.d. Establish a corporate culture conducive to ethical behavior in the workplace
arrow_forward
Assignment 1: Individual research/essay
You are a newly hired fraud examiner. You have been asked to write a preliminary report on the Paving Company Case scenario based on the information presented in Units 1 to 4 and findings from your additional research. Your report should not exceed 2,000 words. The word limit is not inclusive of the bibliography and cover page.
In your response, the following points must be addressed fully:
a) Determine the type of fraud committed and describe the symptoms of fraud that might be evident to an investigator.
b) As discussed in units 1 to 4, all frauds involve key elements. Identify and describe using examples the elements of the Sharp's fraud.
c) In the scenario, Sharp’s employer has been putting more emphasis on controlling costs for the various businesses. With the slowing of overall spending in the construction sector, Travolta had ordered managers to closely monitor expenses. He had sold several companies and has given vice…
arrow_forward
Please Solve In 20mins
arrow_forward
Match the following terms and descriptions.
1.
Audit planning
2.
Preventive Controls
3.
System Evaluation and
Selection
4.
Recovery Operations Centre
(ROC)
5.
The Sarbanes/Oxley Act
Section 404
Identify optimal solution from alternatives.
Involves feasibility study and cost-benefit
analysis steps.
In the event of a major disaster, a
subscriber can occupy the premises and,
within a few hours, resume processing critical
applications.
The auditor's objective is to obtain sufficient
information about the firm to plan the other
phases of the audit.
Requires the management of public
companies to assess the effectiveness of
their organization's internal controls
Passive techniques designed to reduce the
frequency of occurrence of undesirable
events.
arrow_forward
Browse the internet to identify a recent case (within the last five years) related to cybercrime or identity theft. Provide details on the following, in a PowerPoint presentation with speaker notes:
Give a brief overview of the company or situation.
What were the risks and issues in the case?
Evaluate the ethical issues and privacy concerns involved in the case including possible controls to mitigate the risks.
arrow_forward
Your boss knows that you are taking a fraud examina- tion course at a local university. He is interested in learning more about data-driven fraud detection and asks you to prepare a short memo briefly explaining data-driven fraud detection methods and techniques. 1. List three data analysis methods and techniques and briefly explain them.
arrow_forward
A-1
arrow_forward
Domestic
arrow_forward
Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation:
Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?
Will different system access levels for different users be incorporated?
Will customer orders be received via the Internet?
Has the company identified an off‐site alternative computer processing location?
Does the project budget include line items for an upgraded, uninterrupted power source and firewall?
Required: In a two (2) page response, describe the control purpose for each point presented in the case.
arrow_forward
Write a scope statement for the case study
The department of public works for a large city has decided to develop a Web-based pothole tracking and repair system (PHTRS). The department hired a new system analyst to analyse and design the web-based PHTRS. The analyst came up with the following description of their requirement:
Citizens can log onto a website to view and make potholes report. The report contains the location and severity of potholes. As potholes are reported they are logged with a "public works department repair system" and are assigned with the given data. The recorded potholes consist of information as follows:
an identifying number,
stored with street address,
size (on a scale of 1 to 10),
location (middle, curb, etc.),
district,
and repair priority (determined from the size of the pothole).
Further, a work order data is generated for each newly added pothole in the system. A work order is issued by an authorised PHTRS employee. A repair crew is allocated to repair…
arrow_forward
rm
arrow_forward
ket system
My Dispense
Academic Calendar
Clear my choice
My courses (7)
Essay Question: (LO# 2)
One of the Components of Internal Control is the control activities; which are the policies and
procedures that help ensure that necessary actions are taken to address risks to the achievement
of the entity's objectives. What are the most important control activities (Explain of each of these
control activities)?
Paragraph
B
Path: p
Which of the following is not a likely source of information to assess fraud risks?
く
&
8 A
6 7
7 V
1O
て (E
3.
Y
を
IT
K
J
H.
G
J
く
N !MS
arrow_forward
Analyze the relationship among risk, opportunity and controls:
Craig learns that one of the employees has been doing snow plowing jobs on the side with the company equipment.
Discuss both the financial and legal impacts for the company. What are the financial and legal risks to the company?
Also, discuss at least two (internal) controls could be put in place to detect/deter this activity.
arrow_forward
Show all workings and provide descriptions of how all answers were derived.
arrow_forward
Leonard Moses is planning to grow its customer base and is in the process of creating an
online web-based sales ordering system for customers to purchase products using personal
credit cards for payment. At a recent meeting with the internal auditors, it was highlighted that
there are risk associated with this system. Identify three risks related to an online sales system
that management should consider. For each risk, identify an internal control that could be
implemented to reduce that risk.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage

Essentials of Business Analytics (MindTap Course ...
Statistics
ISBN:9781305627734
Author:Jeffrey D. Camm, James J. Cochran, Michael J. Fry, Jeffrey W. Ohlmann, David R. Anderson
Publisher:Cengage Learning

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Related Questions
- FBI and Financial Fraud This assignment aligns with Outcome 4: Model techniques used to collect and analyze data. Adapted from Question 24 on pages 14-40 & 14-41 of the textbook. Go to the FBI websiteLinks to an external site. and use the search box in the top right corner to conduct a search on financial fraud. The FBI site provides numerous descriptions of financial fraud cases that they have prosecuted. Choose a case and select one of the convicted defendants named in the case. Use the profiling methods described in the chapter to perform a due diligence search and collect all the internet information that you can about this individual. The information that you collect can include news reports, addresses either physical or virtual, education background, etc. Document where you found the information by including the name of the website and its URL.arrow_forwardThe best way to enact a broad fraud prevention program is toa. Install airtight control systems of checks and supervision.b. Name an ethics officer who is responsible for receiving and acting upon fraud tips.c. Place dedicated hotline telephones on walls around the workplace with direct communication to the company ethics officer.d. Establish a corporate culture conducive to ethical behavior in the workplacearrow_forwardAssignment 1: Individual research/essay You are a newly hired fraud examiner. You have been asked to write a preliminary report on the Paving Company Case scenario based on the information presented in Units 1 to 4 and findings from your additional research. Your report should not exceed 2,000 words. The word limit is not inclusive of the bibliography and cover page. In your response, the following points must be addressed fully: a) Determine the type of fraud committed and describe the symptoms of fraud that might be evident to an investigator. b) As discussed in units 1 to 4, all frauds involve key elements. Identify and describe using examples the elements of the Sharp's fraud. c) In the scenario, Sharp’s employer has been putting more emphasis on controlling costs for the various businesses. With the slowing of overall spending in the construction sector, Travolta had ordered managers to closely monitor expenses. He had sold several companies and has given vice…arrow_forward
- Please Solve In 20minsarrow_forwardMatch the following terms and descriptions. 1. Audit planning 2. Preventive Controls 3. System Evaluation and Selection 4. Recovery Operations Centre (ROC) 5. The Sarbanes/Oxley Act Section 404 Identify optimal solution from alternatives. Involves feasibility study and cost-benefit analysis steps. In the event of a major disaster, a subscriber can occupy the premises and, within a few hours, resume processing critical applications. The auditor's objective is to obtain sufficient information about the firm to plan the other phases of the audit. Requires the management of public companies to assess the effectiveness of their organization's internal controls Passive techniques designed to reduce the frequency of occurrence of undesirable events.arrow_forwardBrowse the internet to identify a recent case (within the last five years) related to cybercrime or identity theft. Provide details on the following, in a PowerPoint presentation with speaker notes: Give a brief overview of the company or situation. What were the risks and issues in the case? Evaluate the ethical issues and privacy concerns involved in the case including possible controls to mitigate the risks.arrow_forward
- Your boss knows that you are taking a fraud examina- tion course at a local university. He is interested in learning more about data-driven fraud detection and asks you to prepare a short memo briefly explaining data-driven fraud detection methods and techniques. 1. List three data analysis methods and techniques and briefly explain them.arrow_forwardA-1arrow_forwardDomesticarrow_forward
- Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection? Will different system access levels for different users be incorporated? Will customer orders be received via the Internet? Has the company identified an off‐site alternative computer processing location? Does the project budget include line items for an upgraded, uninterrupted power source and firewall? Required: In a two (2) page response, describe the control purpose for each point presented in the case.arrow_forwardWrite a scope statement for the case study The department of public works for a large city has decided to develop a Web-based pothole tracking and repair system (PHTRS). The department hired a new system analyst to analyse and design the web-based PHTRS. The analyst came up with the following description of their requirement: Citizens can log onto a website to view and make potholes report. The report contains the location and severity of potholes. As potholes are reported they are logged with a "public works department repair system" and are assigned with the given data. The recorded potholes consist of information as follows: an identifying number, stored with street address, size (on a scale of 1 to 10), location (middle, curb, etc.), district, and repair priority (determined from the size of the pothole). Further, a work order data is generated for each newly added pothole in the system. A work order is issued by an authorised PHTRS employee. A repair crew is allocated to repair…arrow_forwardrmarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningCentury 21 Accounting Multicolumn JournalAccountingISBN:9781337679503Author:GilbertsonPublisher:Cengage
- Essentials of Business Analytics (MindTap Course ...StatisticsISBN:9781305627734Author:Jeffrey D. Camm, James J. Cochran, Michael J. Fry, Jeffrey W. Ohlmann, David R. AndersonPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage

Essentials of Business Analytics (MindTap Course ...
Statistics
ISBN:9781305627734
Author:Jeffrey D. Camm, James J. Cochran, Michael J. Fry, Jeffrey W. Ohlmann, David R. Anderson
Publisher:Cengage Learning

Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,