Filters
Question type

Study Flashcards

What is content analysis? What is the goal of a content analysis?

Correct Answer

verifed

verified

Content analysis is "the systematic, obj...

View Answer

One of the first graphical applications of social networks was created by Jacob Moreno to examine friendship choices, in his classic book ______.


A) The Social Network
B) Friendship Survival
C) Who Shall Survive?
D) The Sociometry Test

Correct Answer

verifed

verified

Crime mapping allows law enforcement agencies to estimate where hot spots of crime are occurring.

Correct Answer

verifed

verified

The Inter-University Consortium for Political and Social Research carefully examines all data deposited in the archive for the ______.


A) possibility of disclosure risk
B) inevitability of disclosure of information
C) probability of information disclosure
D) insensitivity of information risk

Correct Answer

verifed

verified

Reliable use of secondary data requires a good understanding of the primary data source.

Correct Answer

verifed

verified

The goal of the research by Fitterer, Nelson, and Nathoo (2015) was to ______.


A) describe BNE data in Oregon
B) use data from the early time period to predict later occurrences of BNE
C) use data from later time periods to predict BNEs
D) create a data base of nationwide BNEs

Correct Answer

verifed

verified

What is Risk-Terrain Modeling? How does it differ from Crime Mapping?

Correct Answer

verifed

verified

Crime mapping allows law enforcement age...

View Answer

Researchers who rely on secondary data inevitably make trade-offs between their ability to use a particular data set and ______.


A) the specific hypotheses they can test
B) their choice of the data set
C) why they think they may not be able to match the analytic possibilities presented by the data
D) the potential harm in collecting primary data

Correct Answer

verifed

verified

What is Google Ngrams? What does it show? Why is it an important tool?

Correct Answer

verifed

verified

Ngrams is produced by Google's database,...

View Answer

Crime mapping for research purposes ______.


A) has been around only since 2000
B) has a very long history
C) is a relatively new finding (since 1980)
D) has been shown to be most effective with pushpins and maps

Correct Answer

verifed

verified

What is "Big Data"? Give an example.

Correct Answer

verifed

verified

When do secondary data become what is no...

View Answer

What types of challenges does analysis of secondary data have?

Correct Answer

verifed

verified

Analysis of secondary data presents seve...

View Answer

If all information that could be used in any way to identify respondents cannot be removed from a data set, ICPSR will not allow access to the data to anyone.

Correct Answer

verifed

verified

Krebs' analysis shows the benefits of SNA to describe the strength of the relationships for the 9/11/2001 terrorists, concluding that the best solution for network disruption may be to discover possible suspects and then through ______.


A) contextual analysis better understand the network
B) considering census sampling
C) snowball sampling, map their ego networks
D) probability sampling, then follow up with nonprobability sampling

Correct Answer

verifed

verified

Often, a comprehensive archive can provide the primary data for analysis.

Correct Answer

verifed

verified

Responsible use of secondary data requires a good understanding of the ______.


A) individual researchers involved
B) concepts in the current research
C) primary data source
D) print media's reaction

Correct Answer

verifed

verified

What ethical issues are there when analyzing available data and content?

Correct Answer

verifed

verified

When analyzing data collected by others,...

View Answer

Subject confidentiality is a key concern when original records are analyzed with secondary data but not Big Data.

Correct Answer

verifed

verified

Geospatial locations within jurisdictions where crimes are more likely to occur compared to other areas are known as ______.


A) hot locations
B) hot spots
C) heat-seeking spots
D) crime spots

Correct Answer

verifed

verified

Modeling that uses data from several sources to predict the probability of crime occurring in the future, using the underlying factors of the environment that are associated with illegal behavior is ______ modeling.


A) risk topical
B) rated terrain
C) risk-terrain
D) rated topical

Correct Answer

verifed

verified

Showing 21 - 40 of 75

Related Exams

Show Answer