Changes and innovations are essential part of every organization. Over the years policing community has also undergone many changes which help them shape police operations and protecting people and maintain law and order. This explains how information technology is used to develop crime control model like COMPSTAT ( Computer Statistics ) , how it implements basic functions of information system, its ability of quick response towards crime and its SWOT (Strength, Weakness, Opportunity and Threat ) analysis.

Information Technology and Performance optimization of Police department Increase in crime rate, which is widespread demands policing to be proactive rather than reactive. It requires change from traditional to strong stragtegical methods combined with better intelligence. This initially led to the innovation of predictive policing in 1994 by NYPD. NIJ defines Predictive Policing as “taking data from disparate sources, analyzing them and then using the results to anticipate, prevent and respond more effectively to future crime” (Pearsall, B.

2010, May).This paved way for evolution of COMPSTAT (Computer Statistics) which used all crime related data as its input to anticipate a crime. Findings of Willis, J. , et al (2003) states Compstat combines all of the major prescriptions offered by contemporary organizational development experts with the latest geographic information systems technology. It also re-engineers police management by holding command staff directly accountable for crime levels in their beats. Furthermore, it uses sophisticated computer maps and crime statistics to facilitate timely and targeted responses to crime problems.

p. 1)This practical model when put to test proved to reduce crime rates, enabling to act upon them on or before it happens which ensures public safety. Traditional methods include random patrolling which has limited ability to identify crime because patrolling entire location may not be possible. This would involve additional Police personnel and lot of time.

Considering community policing it requires more of co-operation, trust and transparency. It becomes tough to handle a planned approach, reliability also becomes a question .This way conventional methods have their own limitations. Hence adapting predictive policing will yield better results in real time with parallel advancements in technology. Accurate anticipation, timely targeted action and reduce resources for random patrolling turns into achievable goals.

COMPSTAT implementing basic functions of Information Systems Input Data gathering process which is building block of COMPSTAT comprises of information compiled from variety of sources like police incidents, arrest reports, suspect debriefing, telephone calls, and field interview reports.Pushing the inputs to Incident Reporting System will help to maintain a database for future reference (Willis et al. , 2003). Processing Collected data is presented during every COMPSTAT meeting. This would be entered into a database using a data management program like MS Acess. Crime Analysis Unit (CAU) would perform this task.

These analysts classify, categorize, aggregate and analyze the data in order to gain a detailed report including many details like date, location, day and other informations related to the crime.At this stage they would be able to identify a targeted response that may be the source of concern. “ This report provides useful identification of crime patterns like the point of entry for a burglary or make and model of a stolen vehicle – was also entered” (Willis et al. , 2003, Pg 48-50).

Further by using GIS (Geographic Information Systems) Data and spatial analysis geographic hot spots were located and mapped to the data. Output Once accurate data is processed, it should be presented to the department commanders.With available intelligence they should devise a strategy and deploy resources with expertise to tactfully pre-empt crime situation and follow it up to ensure performance and results were as desired. These are key steps or principles which guide the departments patrol and investigative work: * Accurate and timely intelligence, * Rapid deployment * Effective tactics, and * Relentless follow-up and assessment (William J. Bratton, 1999 pg-15). Feedback Key element of improvement is feedback.

As it includes data, any error related to this aspect should be avoided.Consistent and correct data has to be entered into Incident Reporting System and Database. Accurate report writing should be followed while recording incidents. Extensive data analysis to identify root cause of crime becomes mandatory.

Regular meetings and brainstorming session should be conducted to improve data collection and teams involved should be evaluvated. Learning from past mistakes should never be avoided. Continous aiming at innovation and integration with latest technology to keep the system up to date can provide better results.Periodic assessment of performance and gap in accomplishing set goals and objectives should be reviewed so that corrective measure can be taken to fill the gap and meet desired results. Information Systems and Implementation of COMPSTAT With the advent of information systems real time access to data has become a lot easier.

Identification of hot spots related to crime is possible. Problem solving has become proactive. Monitoring of multiple locations and futuristic crime and its patterns can be detected.This allows operations to be carried with fewer resources, and reduced random patrols. Further it provides a platform for administering vast information which enables better decision making and problem solving.

By demanding accountability it facilitates team working so that police personnel could work together to accomplish set goals faster thereby reducing crime. SWOT Analysis of Predictive Policing SWOT analysis for predictive policing reveals that it is a monitoring system with proper planning, integrated technology and combined organizational values.It is able to forecast crimes and enables action against them drop down crime rates. It weakness On the other hand would data error, lack of training and improper implementation.

As information system and technology keeps expanding it gives opportunity to take this system to a whole new level by perfectly recognizing crime locations, better collection of Data and higher level of customization. But it also mandates whole system to be implemented with complexity so that it would not perpetrated terror attacks or cyber crimes so that it may not become a threat for entire system.