You limited your search to:

  Partner: UNT Libraries
 Department: Department of Criminal Justice
 Degree Discipline: Criminal Justice
Accuracy variations in human facial identification based on time of exposure.

Accuracy variations in human facial identification based on time of exposure.

Access: Use of this item is restricted to the UNT Community.
Date: December 2006
Creator: Cowle, Kenneth M.
Description: This study examined the relationship between time of exposure to the human face and accurate subsequent photo line-up identification. A volunteer group of 124 undergraduate students was divided into three approximately equal sized subgroups. The three groups were then exposed to a video or a portion of a video depicting a theft. Exposure times ranged from two minutes to 30 seconds. The subjects were then given a questionnaire and shown a photo line-up of the mock perpetrator and five foils. Subjects were asked to identify the perpetrator and mark that identification on the questionnaire. Results of the experiment indicated that the longer a subject was exposed the greater the possibility of an accurate identification.
Contributing Partner: UNT Libraries
An Analysis of Adler's Theory and the Female Criminal

An Analysis of Adler's Theory and the Female Criminal

Date: August 2004
Creator: Armentrout, Elizabeth G.
Description: This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Contributing Partner: UNT Libraries
An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

Date: December 2007
Creator: Adger, Katherine
Description: Motor vehicle theft is the costliest property crime in the United States equaling billions of dollars in losses each year. Despite law enforcement success in decreasing the rate of motor vehicle theft in recent years, the actual number of thefts has increased. It is vital for law enforcement agencies to know who is committing motor vehicle theft and where vehicles are being stolen. This study answers these questions by examining offender demographic characteristics and the location types most targeted for motor vehicle theft in Texas from 2001 to 2005. The state of Texas was chosen because Texas has continually been ranked second in the Federal Bureau of Investigation's Uniform Crime Report for the number of reported incidents of motor vehicle theft in the United States.
Contributing Partner: UNT Libraries
An Analysis of Major American Riots: Issues in Riots and Riot Control

An Analysis of Major American Riots: Issues in Riots and Riot Control

Access: Use of this item is restricted to the UNT Community.
Date: August 2001
Creator: Cinoglu, Huseyin
Description: By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list ...
Contributing Partner: UNT Libraries
An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Date: August 2004
Creator: Teymur, Samih
Description: Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
Contributing Partner: UNT Libraries
The Appropriate Use of Human Intelligence in Combating Terrorism

The Appropriate Use of Human Intelligence in Combating Terrorism

Date: August 2003
Creator: Koseli, Mutlu
Description: When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Contributing Partner: UNT Libraries
An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers

An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers

Date: August 2005
Creator: Ekici, Siddik
Description: Although Turkey is a country with strong social cohesion, figures of runaway children in Turkey are increasing dramatically. This research focused on the factors that cause children to run away and on interaction programs to intervene and/or prevent this problem. Until recently, Turkish family life was able to avoid such problems, but with the effect of westernization and social mobility in Turkey, the basic family structure has become more like the family structure in the western countries. Studies reveal that runaway episodes happen in all families regardless of such factors as economic, race, or geographic situations. Teenagers run away for several reasons; however, early intervention is highly suggested by studies to mitigate the problem. Although, parent-child conflict plays a significant role as a reason for youth leaving home, on the other hand family interaction still remains the best alternative to the problem.
Contributing Partner: UNT Libraries
Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

Date: August 2001
Creator: Sahin, Fuat Salih
Description: This study scrutinizes the drug-terrorism nexus critically with intent to conceive possible remedies for the problem. The vast turnover of the global illicit drug industry constitutes the largest portion of organized crime enterprises' income. Different circles have argued that these enterprises are not the sole actors of the drug business, but terrorist groups, whose ultimate aim is a political change rather than financial strength, also profit from the “business.” The controversial nature of the problem fuelled heated debates and requires an in depth and impartial analysis, which was the main subject of the current study. At the first stage, three different cases, the PKK, the LTTE, and the SL, were studied either to prove or deny the alleged phenomenon. The sampled groups' ideology, structure, and operations helped understand the motives pushing the organizations into the ‘business.' Subsequently, several recommendations capturing vital issues both in countering terrorism and breaking terrorism-drugs link were spelled out.
Contributing Partner: UNT Libraries
A Case Study of Leftist Terrorism in Turkey: DHKP/C

A Case Study of Leftist Terrorism in Turkey: DHKP/C

Access: Use of this item is restricted to the UNT Community.
Date: August 2001
Creator: Yayla, Ahmet
Description: Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Contributing Partner: UNT Libraries
Challenges encountered during law enforcement investigations of terrorist use of information technology.

Challenges encountered during law enforcement investigations of terrorist use of information technology.

Access: Use of this item is restricted to the UNT Community.
Date: May 2005
Creator: Morgan, Deanne
Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST