Foot and/or Bicycle Patrols in Major Texas Metropolitan Police Departments

Foot and/or Bicycle Patrols in Major Texas Metropolitan Police Departments

Access: Use of this item is restricted to the UNT Community.
Date: August 2006
Creator: Pavlik, Wayne Louis
Description: During the last 25 years in law enforcement in the United States, there has been a universal practice of foot and/or bicycle patrols used to accomplish the goal of police patrol enforcement and the philosophy of community policing in metropolitan areas. These tactics of patrol have also been used in police departments in and around the State of Texas. This report is a research project on six major metropolitan police departments in the State of Texas, analyzing their allocation of foot and/or bicycle patrol units within their urban cities. The study assesses their early history in using these two police tactics to address criminal activity and their progression from foot patrol to bicycle patrol. The findings of this research support the proposition that major Texas police departments have adopted the practices and philosophies of other major urban police departments around the US, by using foot and/or bicycle patrols in their cities. There is evidence that major Texas police departments were using foot patrol during the early 1980s in support of community policing and gradually phased out this practice in the early 1990s to adopt the new enforcement tactic of policing on a bicycle.
Contributing Partner: UNT Libraries
Job Satisfaction of Juvenile Facility Directors: Results from a National Survey

Job Satisfaction of Juvenile Facility Directors: Results from a National Survey

Date: August 2001
Creator: Flanigan, Amy Renee
Description: This study utilizes a national survey to measure the job satisfaction of juvenile facility directors. The prior literature has focused on the experiences of line personnel within the adult correctional system, and this research serves to provide new information regarding this specific population. The current study will address the predictors and correlates of a director's job satisfaction. It is hypothesized that specific characteristics within the organization will predict job satisfaction. Issues regarding staff within an institution and their effect on a director's job satisfaction are the focus. Results indicate that staff issues significantly contribute to the job satisfaction of a director. Specifically, this research can be used to understand facility director retention, staff and juvenile related issues, and the effect of job satisfaction on criminal justice policy issues.
Contributing Partner: UNT Libraries
A Descriptive Study of the Intelligence Community in the United States of America

A Descriptive Study of the Intelligence Community in the United States of America

Date: May 2003
Creator: Ucak, Hursit
Description: This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
Contributing Partner: UNT Libraries
An unholy alliance: Case studies in narco-terrorism

An unholy alliance: Case studies in narco-terrorism

Date: August 2002
Creator: Cakir, Reha
Description: This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Contributing Partner: UNT Libraries
Changing privacy concerns in the Internet era.

Changing privacy concerns in the Internet era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Measuring the Effects of the TYC Gainesville Resocialization Program on Juvenile Offender Resiliency Levels

Measuring the Effects of the TYC Gainesville Resocialization Program on Juvenile Offender Resiliency Levels

Date: December 2001
Creator: Kronvall, Veronica L
Description: An analysis of the effects of resocialization programming on juvenile offender resiliency levels was conducted with 220 juveniles committed to a maximum security facility. Data were examined on the subjects' age, race/ethnicity, length of time at the facility, level of resocialization, and resiliency score. The resocialization programming contains cognitive and social components that would be instrumental in augmenting juvenile offender resiliency levels. Analysis of the variables did not show a significant increase in juvenile offender resiliency levels. The results did display that students who were at the facility longer and who were in the older age groups had higher levels of resocialization.
Contributing Partner: UNT Libraries
New Surveillance Technologies and the Invasion of Privacy Rights

New Surveillance Technologies and the Invasion of Privacy Rights

Access: Use of this item is restricted to the UNT Community.
Date: August 2003
Creator: Simsek, Yilmaz
Description: Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
Contributing Partner: UNT Libraries
An Analysis of Adler's Theory and the Female Criminal

An Analysis of Adler's Theory and the Female Criminal

Date: August 2004
Creator: Armentrout, Elizabeth G.
Description: This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Contributing Partner: UNT Libraries
Factors Affecting Resistance to Change: A Case Study of Two North Texas Police Departments

Factors Affecting Resistance to Change: A Case Study of Two North Texas Police Departments

Date: May 2001
Creator: Gaylor, Thomas Kent
Description: This study focuses on four common factors believed to affect resistance to change in public organizations. It contributes to existing literature by examining the effect of higher education and trust on the police officer's level of resistance to change and the effects of participation and communication on trust. 286 police officers from two north Texas towns responded to the survey. Regression analysis and bivariate correlations were used to determine the relationship between, resistance to change, and participation, trust, communication, information, and education and the relationship between trust and the other independent variable. The analysis failed to support previous research, which listed participation as the most important factor, but did support the concept that participation and communication improved trust.
Contributing Partner: UNT Libraries
Criminal justice responses to emerging computer crime problems

Criminal justice responses to emerging computer crime problems

Date: August 2001
Creator: Sen, Osman N.
Description: This study discussed the issue of computer crime as it relates to the criminal justice system, specifically law enforcement. The information was gathered through several books, academic journals, governmental documents, and the Internet. First, the nature and forms of computer crime, Internet crime, and cyber terrorism were analyzed. Next, law enforcement responses were discussed. International aspects of the problem were separately pointed out. Further, detection and investigation of computer crime were examined. Problems related to the each component of the criminal justice system (law enforcement, investigators, prosecutors, and judges) were described. Specific solutions to these problems were offered. In addition, computer crime handling procedures were presented. Results indicate that computer crime will increase in the 21st century, and this problem cannot be controlled by traditional methods alone. Using new technology as preventive measures, and increasing awareness and security conscious culture will prevent the problem in the long run.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 NEXT LAST