You limited your search to:

  Access Rights: Use restricted to UNT Community
 Degree Discipline: Criminal Justice
 Collection: UNT Theses and Dissertations
Investigation of Computer Crimes

Investigation of Computer Crimes

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Erdonmez, Erhan
Description: In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
Contributing Partner: UNT Libraries
New Surveillance Technologies and the Invasion of Privacy Rights

New Surveillance Technologies and the Invasion of Privacy Rights

Access: Use of this item is restricted to the UNT Community.
Date: August 2003
Creator: Simsek, Yilmaz
Description: Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
Contributing Partner: UNT Libraries
Police Officer Burnout: An Examination of Officer Stress, the Policing Subculture and the Advantages of Family Counseling

Police Officer Burnout: An Examination of Officer Stress, the Policing Subculture and the Advantages of Family Counseling

Access: Use of this item is restricted to the UNT Community.
Date: December 2004
Creator: Yanez, Luiz
Description: The work of a police officer is stressful and could potentially lead to burnout. As a result, a variety of reactions may occur which include, cynicism, abuse of authority, and in extreme cases suicide. One method which has been proven to be effective in treating officer stress is counseling; however, because of the policing subculture the opportunity to seek counseling has been ignored. In order to successfully manage officer stress, the subculture must be dealt with. Additionally, the officers' family must also be acknowledged as being affected by officer burnout. Counseling services must be made available to the officer's family and through training they can become a source of support instead of an added source of stress to the officer.
Contributing Partner: UNT Libraries
Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yalcinkaya, Ramazan
Description: Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 NEXT LAST