Free Essay

Csi vs. Ncis

In:

Submitted By gfountain95
Words 609
Pages 3
The main difference of the two TV shows, CSI and NCIS, is that CSI consists murders of the general public and NCIS consists of only military based murders. Both TV shows are unrealistic compared to the real world. CSI shows how dangerous the job can be by agents getting killed in a crime scene, which also shows how it can affects the investigations. NCIS (Naval Criminal Investigation Service), on the other hand, is a real government agency that only focuses on crimes that involve the military and the show NCIS is deals with many of the same cases as the real life agency. In my opinion, the more realistic show between CSI and NCIS would be NCIS. The show CSI is unrealistic to the real world because the crime scenes are really convenient, such as figuring out the time of death as quickly as they do and finding evidence that is scattered across the scene, which is very rare realistically. Each episode of the show the cases are very unique, where in real life, investigators are handed a lot of paperwork and the cases are always very similar. The fingerprint information and DNA comparisons are matched and returned to the investigators very quickly, which in reality it takes weeks to make a fingerprint match to a suspect that is unknown and breaking things down to genetic material will take even longer. Teams are usually very small and move very slow in investigations, in the show, they have teams of five or six to solve a crime and they move much quicker in solving the case. Also, when investigating a crime in real life, the data that’s given is usually very debatable and don’t provide enough to convict a suspect and on CSI, the data that’s given is almost always right and results in solving the case. The show NCIS, just like CSI is dramatized and unrealistic to real life situations to make the show more interesting, I did some research and found that the real NCIS agency shares actual cases with the producers of the show to make sure the show is somewhat close to what the real NCIS does. On the show, the agents don’t act as professional as they would in real life. After watching some episodes, the differences that distinct both TV shows from real life is that they walk through the crime scenes without doing the proper procedures when entering a crime scene. At a crime scene, you must first, identify and secure the scene and also check the life of any victims found at the scene. Second, preserve the evidence by taping the perimeter of the scene and using guards to restrict the scene to authorized personnel only and also they must establish the entrance and exit paths, effects of the weather, and isolate witnesses and possible suspects. Third, the first one to the crime scene must observe the scene by walking through. Fourth, the scene must be released to higher personnel to investigate the crime. Fifth, they must record the scene by taking pictures, sketching, or taking very detailed notes. Sixth, the evidence found must be marked and must have a picture taken of it. While watching NCIS, I felt the actors really get into their characters. For example, Abby, the forensic scientist, is really good at what she does and almost seems as though she’s an actual forensic scientist in real life. While watching CSI, I felt that the actors were just acting and it made it hard to compare it to real life, other than the fact that it does show some dangers that come with becoming a CSI agent.

Similar Documents

Premium Essay

Business

...Journal of Management Information Systems, Vol. 22, No. 4, Spring 2006: 109-142. An Information Systems Security Risk Assessment Model under Dempster-Shafer Theory of Belief Functions Lili Sun Rutgers, The State University of New Jersey Rajendra P. Srivastava The University of Kansas and Theodore J. Mock University of Southern California and University of Maastricht Acknowledgements: We would like to thank the audit firm for making their audit work papers available for the study. We sincerely appreciate the help provided by the audit manager and for suggestions provided by Mike Ettredge, Greg Freix, Prakash Shenoy, and participants in AIS workshops at the University of Kansas and the 6th Annual INFORMS Conference on Information Systems and Technology. In addition, the authors would like to thank Drs. Jay F. Nunamaker, Jr., and Robert Briggs, Editor, Special Issue of JMIS, and the three anonymous reviewers for their constructive comments and valuable suggestions for revising the paper. 1 An Information Systems Security Risk Assessment Model under Dempster-Shafer Theory of Belief Functions ABSTRACT: This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions. First, the evidential reasoning approach provides a rigorous, structured manner to incorporate relevant ISS risk...

Words: 15140 - Pages: 61

Premium Essay

Cybercrime

...Measuring the Cost of Cybercrime Ross Anderson 1 Chris Barton 2 Rainer B¨hme 3 o Richard Clayton 4 Michel J.G. van Eeten 5 Michael Levi 6 Tyler Moore 7 Stefan Savage 8 Abstract In this paper we present what we believe to be the first systematic study of the costs of cybercrime. It was prepared in response to a request from the UK Ministry of Defence following scepticism that previous studies had hyped the problem. For each of the main categories of cybercrime we set out what is and is not known of the direct costs, indirect costs and defence costs – both to the UK and to the world as a whole. We distinguish carefully between traditional crimes that are now ‘cyber’ because they are conducted online (such as tax and welfare fraud); transitional crimes whose modus operandi has changed substantially as a result of the move online (such as credit card fraud); new crimes that owe their existence to the Internet; and what we might call platform crimes such as the provision of botnets which facilitate other crimes rather than being used to extract money from victims directly. As far as direct costs are concerned, we find that traditional offences such as tax and welfare fraud cost the typical citizen in the low hundreds of pounds/Euros/dollars a year; transitional frauds cost a few pounds/Euros/dollars; while the new computer crimes cost in the tens of pence/cents. However, the indirect costs and defence costs are much higher for transitional and new crimes. For the former they may be...

Words: 16972 - Pages: 68

Free Essay

Magt

...i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University complexitybook@gmail.com Not to be reproduced or distributed without the authors’ permission This is an Internet draft. Some chapters are more finished than others. References and attributions are very preliminary and we apologize in advance for any omissions (but hope you will nevertheless point them out to us). Please send us bugs, typos, missing references or general comments to complexitybook@gmail.com — Thank You!! DRAFT ii DRAFT About this book Computational complexity theory has developed rapidly in the past three decades. The list of surprising and fundamental results proved since 1990 alone could fill a book: these include new probabilistic definitions of classical complexity classes (IP = PSPACE and the PCP Theorems) and their implications for the field of approximation algorithms; Shor’s algorithm to factor integers using a quantum computer; an understanding of why current approaches to the famous P versus NP will not be successful; a theory of derandomization and pseudorandomness based upon computational hardness; and beautiful constructions of pseudorandom objects such as extractors and expanders. This book aims to describe such recent achievements of complexity theory in the context of the classical results. It is intended to both serve as a textbook as a reference for self-study. This means...

Words: 210134 - Pages: 841

Free Essay

There Once Was a Young Wild Pony

...mc md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu nv nw nx ny nz oa ob oc od oe of og oh oi oj ok ol om on oo op oq or os ot ou ov ow ox oy oz pa pb pc pd pe pf pg ph pi pj pk pl pm pn po pp pq pr ps pt pu pv pw px py pz qa qb qc qd qe qf qg qh qi qj qk ql qm qn qo qp qq qr qs qt qu qv qw qx qy qz ra rb rc rd re rf rg rh ri rj rk rl rm rn ro rp rq rr rs rt ru rv rw rx ry rz sa sb sc sd se sf sg sh si sj sk sl sm sn so sp sq sr ss st su sv sw sx sy sz ta tb tc td te tf tg th ti tj tk tl tm tn to tp tq tr ts tt tu tv tw tx ty tz ua ub uc ud ue uf ug uh ui uj uk ul um un uo up uq ur us ut uu uv uw ux uy uz va vb vc vd ve vf vg vh vi vj vk vl vm vn vo vp vq vr vs vt vu vv vw vx vy vz wa wb wc wd we wf wg wh wi wj wk wl wm wn wo wp wq wr ws wt wu wv ww wx wy wz xa xb xc xd xe xf xg xh xi xj xk xl xm xn xo xp xq xr...

Words: 29642 - Pages: 119

Free Essay

Thesis

...[pic] Frank G. Madsen Queens’ College University of Cambridge International Monetary Flows of Non-Declared Origin This dissertation is submitted to the University of Cambridge to Fulfil the Requirements for the Degree of Doctor of Philosophy April 2008 Ambrogio Lorenzetti, Effetti del Buon Governo Siena, Palazzo Pubblico Sala dei Nove 1337-1340 Declaration This dissertation is the result of my own work and includes nothing, which is the outcome of work done in collaboration. Chapter 3, “Complexity, TOC and Terrorism”, was presented in an embryonic form at the ISA conference in Chicago, USA, March 2007. Chapter 4, “Organised Crime”, is the further elaboration of a chapter of the same title published in 2007 in the Oxford Handbook on the United Nations Statement of Length The dissertation does not exceed the word limit of 80,000 words Fieldwork Thailand (money laundering); Indonesia and Burma (deforestation); New York (US money supply); Washington DC and Fort Worth, Texas (Organised Crime linked to terrorist funding); Australia (Sydney, (APG) and Canberra (money laundering, South Pacific); and Rome, Italy (Chinese organised crime). Contact Frank.Madsen@cantab.net Abstract Through an analysis of the presence and nature of international monetary flows of non-declared origin and their relation to deviant knowledge, the thesis...

Words: 99119 - Pages: 397

Free Essay

Public Policy

...本书,发表过 150 多篇文章,并是多家计算机杂志的专栏作家,其中包括《W Techni ques 》的 Java 专栏。 eb 曾出席过 C ++和 Java 的“软件开发者会议”,并分获“应用物理”与“计算机工程”的学士和硕士学位。 读者的心声 比我看过的 Java 书好多了⋯⋯非常全面,举例都恰到好处,显得颇具“智慧”。和其他许多 Java 书 籍相比,我觉得它更成熟、连贯、更有说服力、更严谨。总之,写得非常好,肯定是一本学习 Java 的好书。(A ol y Vor obey,Techni onUni ver s i t y,Hai f a,以色列)。 nat 是我见过的最好的编程指南,对任何语言都不外如是。(Joaki m z i egl er ,FI X系统管理员) 感谢你写出如此优秀的一本 Java 参考书。(D . G n Pi l l ay,Regi s t r ar ,Ki ng Edw d VI I r avi ar Hos pi t al ,南非) 再次感谢您这本令人震惊的书。我以前真的有点儿不知所从的感觉(因为不是 C程序员),但你的书 浅显易懂,使我能很快掌握 Java——差不多就是阅读的速度吧。能从头掌握基本原理和概念的感觉 真好,再也不用通过不断的试验和出错来建立概念模型了。希望不久能有机会参加您的讲座。 (Randal l R. Haw ey,A om i on Techni ci an,El i Li l l y & C l ut at o) 我迄今为止看过的最好的计算机参考书。(Tom Hol l and ) 这是我读过的关于程序设计的最好的一本书⋯⋯第 16 章有关设计方案的内容是我这么久以来看过的 最有价值的。(Han Fi nci ,助教,计算机科学学院,耶路撒冷希伯来大学,以色列) 有史以来最好的一本 Java 参考书。(Ravi ndr a Pai ,O acl e 公司 SUN S 产品线) r O 这是关于 Java 的一本好书。非常不错,你干得太好了!书中涉及的深度真让人震惊。一旦正式出 版,我肯定会买下它。我从 96 年十月就开始学习 Java 了。通过比较几本书,你的书可以纳入“必 读”之列。这几个月来,我一直在搞一个完全用 Java...

Words: 180792 - Pages: 724