Job Satisfaction of Juvenile Facility Directors: Results from a National Survey

Job Satisfaction of Juvenile Facility Directors: Results from a National Survey

Date: August 2001
Creator: Flanigan, Amy Renee
Description: This study utilizes a national survey to measure the job satisfaction of juvenile facility directors. The prior literature has focused on the experiences of line personnel within the adult correctional system, and this research serves to provide new information regarding this specific population. The current study will address the predictors and correlates of a director's job satisfaction. It is hypothesized that specific characteristics within the organization will predict job satisfaction. Issues regarding staff within an institution and their effect on a director's job satisfaction are the focus. Results indicate that staff issues significantly contribute to the job satisfaction of a director. Specifically, this research can be used to understand facility director retention, staff and juvenile related issues, and the effect of job satisfaction on criminal justice policy issues.
Contributing Partner: UNT Libraries
Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

Date: August 2002
Creator: Can, Salih Hakan
Description: It is assumed that democratic policing will help to improve the respect of human rights and democracy in a given country. Using secondary data, this study explores cross-nationally the interrelation between democratic policing practices (e.g., community policing) and democracy and human rights.The results show significant positive correlation between the practice of democratic policing and indicators of democracy and respect for human rights. The analysis strongly implies that scholars have underestimated the power of policing institutions in democratic societies.
Contributing Partner: UNT Libraries
Changing privacy concerns in the Internet era.

Changing privacy concerns in the Internet era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Investigation of Computer Crimes

Investigation of Computer Crimes

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Erdonmez, Erhan
Description: In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
Contributing Partner: UNT Libraries
Measuring the Effects of the TYC Gainesville Resocialization Program on Juvenile Offender Resiliency Levels

Measuring the Effects of the TYC Gainesville Resocialization Program on Juvenile Offender Resiliency Levels

Date: December 2001
Creator: Kronvall, Veronica L
Description: An analysis of the effects of resocialization programming on juvenile offender resiliency levels was conducted with 220 juveniles committed to a maximum security facility. Data were examined on the subjects' age, race/ethnicity, length of time at the facility, level of resocialization, and resiliency score. The resocialization programming contains cognitive and social components that would be instrumental in augmenting juvenile offender resiliency levels. Analysis of the variables did not show a significant increase in juvenile offender resiliency levels. The results did display that students who were at the facility longer and who were in the older age groups had higher levels of resocialization.
Contributing Partner: UNT Libraries
Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yalcinkaya, Ramazan
Description: Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
Contributing Partner: UNT Libraries
Technology-mediated distance education used to prepare special education personnel.

Technology-mediated distance education used to prepare special education personnel.

Access: Use of this item is restricted to the UNT Community.
Date: August 2004
Creator: Mohr, John Darrell
Description: This study examined how technology-mediated distance education is used in special education courses in teacher preparation programs. The data are based on a 30-item survey administered to members of the Teacher Education Division of the Council for Exceptional Children, who identified themselves as serving in an instructional capacity within institutions of higher education. Technology-mediated instruction was characterized in terms course delivery methods and program attributes. An analysis of instructional design processes revealed that most instructors are largely autonomous and do not rely on a team-based approach. Most make use of course-design and management software. Training is linked to course strategy and evaluation, while experience is associated with implementation. Respondents emphasized communication and student feedback. While both users and non-users of distance education technology foresaw the increased use for course delivery in the future, a notable percentage (13%) of current users indicated a desire to discontinue use.
Contributing Partner: UNT Libraries
An Analysis of Adler's Theory and the Female Criminal

An Analysis of Adler's Theory and the Female Criminal

Date: August 2004
Creator: Armentrout, Elizabeth G.
Description: This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Contributing Partner: UNT Libraries
The Integral Role of Training in the Implementation of Hate Crime Legislation

The Integral Role of Training in the Implementation of Hate Crime Legislation

Date: May 2001
Creator: Broadhurst, Monica DeAnn
Description: This research focuses on the association between law enforcement training and implementation of hate crime legislation. The Anti-Defamation League's state hate crime statutory provisions and the Federal Bureau of Investigation's Hate Crime Reporting by States data are examined. Section one includes the following: What Constitutes Hate?, The History of Hate Crime Legislation, and Issues Facing Hate Crime Legislation. Section two surveys literature on both Hate Crime Legislation and the training of law enforcement officers. Section three discusses the Anti-Defamation League and FBI data in detail and explains the methods used to test the association between law enforcement training and reporting of hate crime legislation. Findings yield a statistically significant association between law enforcement training and reporting of hate crime legislation.
Contributing Partner: UNT Libraries
Structuralist and interactionist perspectives of collective behavior and control of crowds.

Structuralist and interactionist perspectives of collective behavior and control of crowds.

Date: August 2001
Creator: Gunes, Ismail Dincer
Description: The purpose of this thesis is to understand the concept of collective behavior from different theoretical perspectives and the policy implications they imply for the Turkish Riot Police Units. The civil disturbances in the 1960s have clearly illustrated range of problems in the domain of crowd control. This work will start with the general characteristics and the classification of collective behavior. Second, two main perspectives on collective behavior, which are the structuralist and the interactionist perspectives, will be examined respectively. The question will be asked whether these two perspectives efficiently and effectively explain the crowds and the crowd control. Finally, the other factors in crowd control will be explored, and recommendations concerning the handling of crowds in a more peaceful manner will be made.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST