You limited your search to:

  Partner: UNT Libraries
 Degree Discipline: Criminal Justice
Synthetic Cannabinoid Usage among College Students: The Example of K2 and Spice

Synthetic Cannabinoid Usage among College Students: The Example of K2 and Spice

Date: August 2011
Creator: Stephens, Jason L.
Description: The primary goal of this study was to investigate the awareness and prevalence of Spice and K2 usage among a population of college students, as well as the demographics of such users. The study also sought to determine whether or not students prefer these products over natural cannabis, in addition to examining the most popular methods of obtainment and the most commonly reported side effects of K2 and Spice usage. Participants consisted of 643 undergraduate students enrolled at the University of North Texas during the fall 2011 semester. Findings indicate that while students exhibit a relatively high awareness of K2 and Spice, usage of these products is not a prevalent occurrence. Implications of the findings are discussed.
Contributing Partner: UNT Libraries
Job Satisfaction of Juvenile Facility Directors: Results from a National Survey

Job Satisfaction of Juvenile Facility Directors: Results from a National Survey

Date: August 2001
Creator: Flanigan, Amy Renee
Description: This study utilizes a national survey to measure the job satisfaction of juvenile facility directors. The prior literature has focused on the experiences of line personnel within the adult correctional system, and this research serves to provide new information regarding this specific population. The current study will address the predictors and correlates of a director's job satisfaction. It is hypothesized that specific characteristics within the organization will predict job satisfaction. Issues regarding staff within an institution and their effect on a director's job satisfaction are the focus. Results indicate that staff issues significantly contribute to the job satisfaction of a director. Specifically, this research can be used to understand facility director retention, staff and juvenile related issues, and the effect of job satisfaction on criminal justice policy issues.
Contributing Partner: UNT Libraries
A Descriptive Study of the Intelligence Community in the United States of America

A Descriptive Study of the Intelligence Community in the United States of America

Date: May 2003
Creator: Ucak, Hursit
Description: This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
Contributing Partner: UNT Libraries
Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

Date: August 2002
Creator: Can, Salih Hakan
Description: It is assumed that democratic policing will help to improve the respect of human rights and democracy in a given country. Using secondary data, this study explores cross-nationally the interrelation between democratic policing practices (e.g., community policing) and democracy and human rights.The results show significant positive correlation between the practice of democratic policing and indicators of democracy and respect for human rights. The analysis strongly implies that scholars have underestimated the power of policing institutions in democratic societies.
Contributing Partner: UNT Libraries
An unholy alliance: Case studies in narco-terrorism

An unholy alliance: Case studies in narco-terrorism

Date: August 2002
Creator: Cakir, Reha
Description: This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Contributing Partner: UNT Libraries
Transnational Organized Crime and the Drug Business

Transnational Organized Crime and the Drug Business

Date: August 2002
Creator: Aksakal, Baris
Description: This study analyzes the activities of the organized crime groups involved in the drug business, as well as examining national and international efforts to control these groups. Specifically, this study addresses the following questions: How is organized crime connected to the international drug business?; What are the major transnational organized crime groups involved in the international drug business?; What is the nature of the drug problem as it relates to organized crime internationally?; What international cooperative law enforcement efforts currently exist to deal with organized crime and the drug business? Findings indicate that efforts to create an effective international law enforcement network are needed to meet the challenges of drug trafficking and globalized crime. To date, such efforts have largely been unsuccessful.
Contributing Partner: UNT Libraries
Changing privacy concerns in the Internet era.

Changing privacy concerns in the Internet era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Investigation of Computer Crimes

Investigation of Computer Crimes

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Erdonmez, Erhan
Description: In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
Contributing Partner: UNT Libraries
Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yalcinkaya, Ramazan
Description: Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
Contributing Partner: UNT Libraries
New Surveillance Technologies and the Invasion of Privacy Rights

New Surveillance Technologies and the Invasion of Privacy Rights

Access: Use of this item is restricted to the UNT Community.
Date: August 2003
Creator: Simsek, Yilmaz
Description: Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST