You limited your search to:

  Partner: UNT Libraries
 Degree Discipline: Criminal Justice
 Collection: UNT Theses and Dissertations
The Academic Steroid: Nonmedical Use of Prescription Stimulants at a North Texas University

The Academic Steroid: Nonmedical Use of Prescription Stimulants at a North Texas University

Access: Use of this item is restricted to the UNT Community.
Date: December 2014
Creator: Pennington, Cody W
Description: The goal of this study was to determine the extent, motivations, and justifications of nonmedical prescription stimulant use among the population at a large public university in the North Texas region. Participants consisted of 526 undergraduate students enrolled at the studied university during the spring and summer 2014 semesters. The findings of the study suggest that the nonmedical use by students was higher than the findings in much of the current literature, but was within the parameters established in the literature. The primary motivation for nonmedical use was academic in nature and was justified by moderation of nonmedical use to strategic academic times.
Contributing Partner: UNT Libraries
Accuracy Variations in Human Facial Identification Based on Time of Exposure.

Accuracy Variations in Human Facial Identification Based on Time of Exposure.

Access: Use of this item is restricted to the UNT Community.
Date: December 2006
Creator: Cowle, Kenneth M.
Description: This study examined the relationship between time of exposure to the human face and accurate subsequent photo line-up identification. A volunteer group of 124 undergraduate students was divided into three approximately equal sized subgroups. The three groups were then exposed to a video or a portion of a video depicting a theft. Exposure times ranged from two minutes to 30 seconds. The subjects were then given a questionnaire and shown a photo line-up of the mock perpetrator and five foils. Subjects were asked to identify the perpetrator and mark that identification on the questionnaire. Results of the experiment indicated that the longer a subject was exposed the greater the possibility of an accurate identification.
Contributing Partner: UNT Libraries
An Analysis of Adler's Theory and the Female Criminal

An Analysis of Adler's Theory and the Female Criminal

Date: August 2004
Creator: Armentrout, Elizabeth G.
Description: This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Contributing Partner: UNT Libraries
An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

Date: December 2007
Creator: Adger, Katherine
Description: Motor vehicle theft is the costliest property crime in the United States equaling billions of dollars in losses each year. Despite law enforcement success in decreasing the rate of motor vehicle theft in recent years, the actual number of thefts has increased. It is vital for law enforcement agencies to know who is committing motor vehicle theft and where vehicles are being stolen. This study answers these questions by examining offender demographic characteristics and the location types most targeted for motor vehicle theft in Texas from 2001 to 2005. The state of Texas was chosen because Texas has continually been ranked second in the Federal Bureau of Investigation's Uniform Crime Report for the number of reported incidents of motor vehicle theft in the United States.
Contributing Partner: UNT Libraries
An Analysis of Major American Riots: Issues in Riots and Riot Control

An Analysis of Major American Riots: Issues in Riots and Riot Control

Access: Use of this item is restricted to the UNT Community.
Date: August 2001
Creator: Cinoglu, Huseyin
Description: By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list ...
Contributing Partner: UNT Libraries
An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Date: August 2004
Creator: Teymur, Samih
Description: Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
Contributing Partner: UNT Libraries
The Appropriate Use of Human Intelligence in Combating Terrorism

The Appropriate Use of Human Intelligence in Combating Terrorism

Date: August 2003
Creator: Koseli, Mutlu
Description: When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Contributing Partner: UNT Libraries
An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers

An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers

Date: August 2005
Creator: Ekici, Siddik
Description: Although Turkey is a country with strong social cohesion, figures of runaway children in Turkey are increasing dramatically. This research focused on the factors that cause children to run away and on interaction programs to intervene and/or prevent this problem. Until recently, Turkish family life was able to avoid such problems, but with the effect of westernization and social mobility in Turkey, the basic family structure has become more like the family structure in the western countries. Studies reveal that runaway episodes happen in all families regardless of such factors as economic, race, or geographic situations. Teenagers run away for several reasons; however, early intervention is highly suggested by studies to mitigate the problem. Although, parent-child conflict plays a significant role as a reason for youth leaving home, on the other hand family interaction still remains the best alternative to the problem.
Contributing Partner: UNT Libraries
Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

Date: August 2001
Creator: Sahin, Fuat Salih
Description: This study scrutinizes the drug-terrorism nexus critically with intent to conceive possible remedies for the problem. The vast turnover of the global illicit drug industry constitutes the largest portion of organized crime enterprises' income. Different circles have argued that these enterprises are not the sole actors of the drug business, but terrorist groups, whose ultimate aim is a political change rather than financial strength, also profit from the “business.” The controversial nature of the problem fuelled heated debates and requires an in depth and impartial analysis, which was the main subject of the current study. At the first stage, three different cases, the PKK, the LTTE, and the SL, were studied either to prove or deny the alleged phenomenon. The sampled groups' ideology, structure, and operations helped understand the motives pushing the organizations into the ‘business.' Subsequently, several recommendations capturing vital issues both in countering terrorism and breaking terrorism-drugs link were spelled out.
Contributing Partner: UNT Libraries
A Case Study of Leftist Terrorism in Turkey

A Case Study of Leftist Terrorism in Turkey

Access: Use of this item is restricted to the UNT Community.
Date: August 2001
Creator: Yayla, Ahmet
Description: Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Contributing Partner: UNT Libraries
A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police.

A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police.

Date: August 2002
Creator: Lofca, Izzet
Description: This study explores the underlying causes and deterrent control mechanisms of police misconduct in the United States. Outcomes of causes and control mechanisms constitute the basis for an applicable model for the Turkish National Police (TNP). Why is some police behavior deviate? What are the main determinants of police misconduct? Is police misconduct a result of sociological behavior and subcultural development within police organizations or a psychological behavior as an outcome of officers' personal traits? What are the control mechanisms for police misconduct? What are their strengths and weaknesses? Do they deter or not? Is there a control mechanism that deters better than others? What is the best deterrence model for the TNP?
Contributing Partner: UNT Libraries
Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Access: Use of this item is restricted to the UNT Community.
Date: May 2005
Creator: Morgan, Deanne
Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Contributing Partner: UNT Libraries
Changing Privacy Concerns in the Internet Era.

Changing Privacy Concerns in the Internet Era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Characteristics of Community Service Programs and Probationers in Texas

Characteristics of Community Service Programs and Probationers in Texas

Date: August 2002
Creator: Roberts, Darrin D.
Description: As a criminal sanction, community service involves unpaid labor on the part of convicted criminal offenders. Community service was created as an alternative to incarceration for low-level offenders. It now appears, however, that community service is rarely used as a true alternative to prison, but rather as an added condition of probation. The body of research on community service in the United States is modest, so relatively little is known about its characteristics and administration. Data were attained from 88 Texas probation professionals via self-administered written surveys in an effort to gather information about the use of community service as a criminal sanction in Texas. Frequency distribution analyses identified characteristics of both community service programs and offender participants in Texas.
Contributing Partner: UNT Libraries
Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Date: August 2002
Creator: Tuncer, Hakki
Description: Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
Contributing Partner: UNT Libraries
Combating Corruption: A Comparison of National Anti-Corruption Efforts

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Access: Use of this item is restricted to the UNT Community.
Date: August 2003
Creator: Turer, Ahmet
Description: The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Contributing Partner: UNT Libraries
Communication Assistance for Law Enforcement Act of 1994: A Case Study

Communication Assistance for Law Enforcement Act of 1994: A Case Study

Date: August 2001
Creator: Ozdogan, Ali
Description: The purpose of this study is: to explore and analyze the Communication Assistance for Law Enforcement Act of 1994 (CALEA), to identify problems related to CALEA, to identify solutions devised by other countries to overcome problems similar to CALEA's, and to propose feasible solutions to CALEA problems.
Contributing Partner: UNT Libraries
Community Policing Training Programs and Their Roles in Implementation of Community Policing

Community Policing Training Programs and Their Roles in Implementation of Community Policing

Date: August 2002
Creator: Demir, Cuneyt
Description: The main goal of this study is to indicate the importance of community policing training programs for implementation of community policing. Community policing requires a transition from traditional policing methods to proactive and problem-oriented policing which is constructed upon police-citizen partnership. For the successful implementation of community policing, the change process needs to be fully realized throughout the organization. Suitably appropriate methods of training will help both officers and citizens to fully understand the goals of community policing. This study focuses on the types of existing community training methods as well as the obstacles that complicate training efforts. Consequently, this study provides some recommendations on community policing training programs to make them more helpful for police departments.
Contributing Partner: UNT Libraries
Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

Date: August 2002
Creator: Can, Salih Hakan
Description: It is assumed that democratic policing will help to improve the respect of human rights and democracy in a given country. Using secondary data, this study explores cross-nationally the interrelation between democratic policing practices (e.g., community policing) and democracy and human rights.The results show significant positive correlation between the practice of democratic policing and indicators of democracy and respect for human rights. The analysis strongly implies that scholars have underestimated the power of policing institutions in democratic societies.
Contributing Partner: UNT Libraries
Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement.

Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Temur, Nuri
Description: Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that given the failures of existing private law solutions to the problem, these public law enforcement solutions should be more effective, efficient, and more satisfactory.
Contributing Partner: UNT Libraries
The Correctional Orientation of Juvenile Facility Directors

The Correctional Orientation of Juvenile Facility Directors

Date: August 2001
Creator: Sifuentes-Hammer, Amy
Description: Over the last 30 years, the juvenile justice system and juvenile correctional ideology shifted to become more punitive in nature. However, studies examining this shift are lacking in the literature. The present study will attempt to assess what correctional ideology, rehabilitative or punitive, is dominant within juvenile corrections by conducting a national survey to juvenile facility directors. This study will be based on prior literature, most of which has focused upon line staff in an adult correctional setting. From this prior literature, more specifically from the work of Cullen et al. (1989), scales will be created to determine the correctional orientation of the key administrators in juvenile facilities. This will allow us to assess whether the correctional ideology driving the juvenile system has in fact become punitive. The findings from this study have the opportunity to alter the current status quo in juvenile corrections.
Contributing Partner: UNT Libraries
Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders

Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders

Date: May 2007
Creator: Lynton, Eddy
Description: The purpose of this study is to explore the differences and characteristics between first time felony probationer and recidivist felony probation offender. The importance of said studies grows significantly, given current trends of sentencing offenders to probation. Using archived data on random sample of felony offenders in 2000 and based on information acquired and maintained by the Denton County Community Supervision and Corrections Department (CSCD), the study consists of 40 first time felony offenders and 40 recidivist felony offender placed on probation during the year 2000. The method consists of a longitudinal comparison model. To examine the research question, descriptive statistics are used to compare basic demographics. Then, in order to answer the research question bi-variate significant tests, Chi-square and Independent Sample T-tests were employed when appropriate. Results indicate differences between first time felony probation offenders and recidivist felony probationers.
Contributing Partner: UNT Libraries
Criminal Investigations: The Impact of Patrol Officers on Solving Crime

Criminal Investigations: The Impact of Patrol Officers on Solving Crime

Date: May 2007
Creator: Womack, Charissa L.
Description: This two-part study of the criminal investigation process first evaluated the frequency with which patrol officers solve cases assigned to the investigations division and then examined how detectives spent their time, both on case assignments and on other activity not related to current case assignment. Cases assigned to the investigations division for follow up were examined to determine how often a case was cleared by the patrol officer. The detective's time was then evaluated in order to determine how much time detectives spent on investigative tasks and other activities. This study confirms that the patrol officer should be given more time to conduct preliminary investigations for specific cases, and that tasks performed by detectives could be shifted to other personnel in the department. Both actions should serve to positively impact case clearance rates.
Contributing Partner: UNT Libraries
Criminal Justice Responses to Emerging Computer Crime Problems

Criminal Justice Responses to Emerging Computer Crime Problems

Date: August 2001
Creator: Sen, Osman N.
Description: This study discussed the issue of computer crime as it relates to the criminal justice system, specifically law enforcement. The information was gathered through several books, academic journals, governmental documents, and the Internet. First, the nature and forms of computer crime, Internet crime, and cyber terrorism were analyzed. Next, law enforcement responses were discussed. International aspects of the problem were separately pointed out. Further, detection and investigation of computer crime were examined. Problems related to the each component of the criminal justice system (law enforcement, investigators, prosecutors, and judges) were described. Specific solutions to these problems were offered. In addition, computer crime handling procedures were presented. Results indicate that computer crime will increase in the 21st century, and this problem cannot be controlled by traditional methods alone. Using new technology as preventive measures, and increasing awareness and security conscious culture will prevent the problem in the long run.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 NEXT LAST