11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

legal s<strong>of</strong>tware 273Development <strong>and</strong> TrendsThe idea <strong>of</strong> small, portable personal computers goes backto the Dynabook concept developed at Xerox PARC in the1970s (see also Kay, Alan). The first “portable” computerswere <strong>of</strong>ten more aptly described as “luggable,” having morethe form factor <strong>of</strong> a suitcase than that <strong>of</strong> today’s laptops.Nevertheless, the first commercially successful portablecomputers, the Osborne 1 (1981) <strong>and</strong> the Compaq Portable(1983), began to show the feasibility <strong>of</strong> portable computing.(At the other end <strong>of</strong> the size spectrum, the successfulRadio Shack TRS-80 Model 100 established the utility <strong>of</strong>the notebook-sized computer.) In the 1980s true laptopsfrom companies such as Zenith <strong>and</strong> Toshiba with the familiarclamshell design emerged, running PC-compatible MS-DOS <strong>and</strong>, later, Windows applications. (Apple entered themarket with the Macintosh Portable in 1989, followed bythe PowerBook series, introduced in 1991.)Most improvements in laptops in the 1990s <strong>and</strong> beyondhave been incremental (more storage, sharper displays,more efficient batteries, <strong>and</strong> so on). Wireless (see Bluetooth<strong>and</strong> wireless <strong>and</strong> mobile computing) connectivityis now st<strong>and</strong>ard. Laptop development has bifurcatedsomewhat, with higher-end machines rivaling desktops formedia, gaming, <strong>and</strong> other applications, while notebooks<strong>of</strong>ten become lighter, sometimes forgoing optical <strong>and</strong> evenhard drives in favor <strong>of</strong> network connectivity <strong>and</strong> flash memorystorage. Specially “ruggedized” laptops are used by themilitary on battlefields <strong>and</strong> in other harsh environments.Meanwhile, PDAs <strong>and</strong> smart phones capable <strong>of</strong> e-mail, Webbrowsing, <strong>and</strong> light data entry <strong>of</strong>fer an alternative to laptopsfor people who are on the road frequently.Further ReadingGookin, Dan. Laptops for Dummies. 2nd ed. Hoboken, N.J.: Wiley,2006.Laptop Magazine. Available online. URL: http://www.laptopmag.com/index.htm. Accessed September 26, 2007.Laptops [resources <strong>and</strong> reviews]. Available online. URL: http://reviews.cnet.com/laptops.html. Accessed September 26, 2007.Miller, Michael. Your First Notebook PC. Indianapolis: Que, 2008.S<strong>and</strong>ler, Corey. Upgrading & Fixing Laptops for Dummies. Indianapolis:Wiley, 2006.Wilson, James E. Vintage Laptop <strong>Computer</strong>s: First Decade, 1980–89.Denver, Colo.: Outskirts Press, 2006.law enforcement <strong>and</strong> computersBesides his superb reasoning skills, perhaps Sherlock Holmes’smost important asset was his extensive collection <strong>of</strong>notes that provided a cross-referenced index to London’scriminal underworld. Today computer applications havegiven law enforcers investigative, forensic, communication,tactical, <strong>and</strong> management tools that Holmes <strong>and</strong> his rivalsin the old Scotl<strong>and</strong> Yard could not have imagined.For the <strong>of</strong>ficer on the street, the ability to obtain autolicense, stolen vehicle, or outst<strong>and</strong>ing warrant information innear real-time provides a much better picture <strong>of</strong> the potentialrisk in making stops or arrests. Other “tactical” technologyincludes new devices for homing in on gunshots <strong>and</strong> thegrowing use <strong>of</strong> remote-controlled robots for bomb disposal<strong>and</strong> hostage negotiations (see robotics). A more controversialarea is the use <strong>of</strong> CCTV (closed-circuit TV) surveillancecameras in public places, advocated as a crime deterrent butraising concerns about privacy <strong>and</strong> intrusive social control.If a criminal case is opened, a variety <strong>of</strong> s<strong>of</strong>tware applicationscome into play. These include case managementprograms for keeping track <strong>of</strong> evidence <strong>and</strong> witness interviews.Evidence must be properly logged at all times tomaintain a legally defensible chain <strong>of</strong> custody against accusations<strong>of</strong> tampering.The investigation <strong>of</strong> a crime involves many computerizedforensic aids. Besides automated matching <strong>of</strong>fingerprints <strong>and</strong>, increasingly other physical data (see biometrics),records can also be searched to detect patternssuch as crimes with related modus oper<strong>and</strong>i (MOs). Theability to access information from other jurisdictions <strong>and</strong>to interface federal, state, <strong>and</strong> local agencies is also veryimportant, particularly for cases involving organized crime,interstate fugitives, <strong>and</strong> terrorism.Since data stored on computers is an increasingly prevalentform <strong>of</strong> evidence, law enforcement specialists must alsoemploy tools to recover data that may have been partiallyerased or encrypted by suspects (see computer forensics).<strong>Computer</strong>s can be more active instruments <strong>of</strong> crime (seecomputer crime <strong>and</strong> security). Such traditional tools aswiretapping must be adapted to new forms <strong>of</strong> communicationsuch as e-mail while addressing concerns about civilliberties <strong>and</strong> privacy (see privacy in the digital age).High-level planning for law enforcement budgets <strong>and</strong>priorities requires access to detailed crime statistics. At thenational level, the Justice Department’s Bureau <strong>of</strong> JusticeStatistics is a definitive information source. Law enforcers,like other pr<strong>of</strong>essionals, increasingly use Web sites,chat areas, <strong>and</strong> e-mail lists to discuss computer-related lawenforcement issues with colleagues.Law enforcement agencies also use the same “bread <strong>and</strong>butter” s<strong>of</strong>tware needed by any substantial organization,including word processing, spreadsheet, payroll, <strong>and</strong> otheraccounting programs.Further ReadingBoba, Rachel. Crime Analysis <strong>and</strong> Crime Mapping. Thous<strong>and</strong> Oaks,Calif.: Sage Publications, 2005.Chu, James. Law Enforcement Information <strong>Technology</strong>: A Managerial,Operational, <strong>and</strong> Practitioner Guide. Gr<strong>and</strong> Rapids, Mich.:CRC Press, 2001.Foster, Raymond E. Police <strong>Technology</strong>. Upper Saddle River, N.J.:Prentice Hall, 2004.Goold, Benjamin J. CCTV <strong>and</strong> Policing: Public Area Surveillance <strong>and</strong>Police Practices in Britain. New York: Oxford University Press,2004.Gottschalk, Petter. Knowledge Management Systems in Law Enforcement:Technologies <strong>and</strong> Techniques. Hershey, Pa.: Idea GroupPublishing, 2006.Pattvina, April, ed. Information <strong>Technology</strong> <strong>and</strong> the Criminal JusticeSystem. Thous<strong>and</strong> Oaks, Calif.: Sage Publications, 2004.legal s<strong>of</strong>twareModern law <strong>of</strong>fices rely heavily on s<strong>of</strong>tware to managecases <strong>and</strong> records, to perform legal research, <strong>and</strong> to prepare

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!