Computer crime as a barrier to electronic commerce: New solutions for public law enforcement.

Computer crime as a barrier to electronic commerce: New solutions for public law enforcement.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Temur, Nuri
Description: Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that given the failures of existing private law solutions to the problem, these public law enforcement solutions should be more effective, efficient, and more satisfactory.
Contributing Partner: UNT Libraries
Changing privacy concerns in the Internet era.

Changing privacy concerns in the Internet era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Serial Killing Myths Versus    Reality:  A Content Analysis Of Serial Killer Flicks Made   Between 1980 and 2001

Serial Killing Myths Versus Reality: A Content Analysis Of Serial Killer Flicks Made Between 1980 and 2001

Date: August 2002
Creator: McCready, Sarah Scott
Description: Public perceptions about serial homicide are more mythical than fact. Myths about serial homicide are perpetuated through several sources, especially the entertainment media which is a dominant and influential mythmaker. The number of films depicting serial killers and serial killing themes has increased dramatically in recent years. However, the reality of these films is debatable. This research examines the reality, or lack thereof, of the most recent films involving a serial killing theme. Hickey provides a wealth of statistical information on a number of serial killers and serial killings. A content analysis of the fifty top grossing serial killer movies made between 1980 and 2001 was conducted using variables from Hickey research. Research shows similarities and differences between variables, however, results concludes the entertainment media does not accurately portray serial homicide.
Contributing Partner: UNT Libraries
A Descriptive Study of the Intelligence Community in the United States of America

A Descriptive Study of the Intelligence Community in the United States of America

Date: May 2003
Creator: Ucak, Hursit
Description: This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
Contributing Partner: UNT Libraries
Investigation of Computer Crimes

Investigation of Computer Crimes

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Erdonmez, Erhan
Description: In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
Contributing Partner: UNT Libraries
An Analysis of Adler's Theory and the Female Criminal

An Analysis of Adler's Theory and the Female Criminal

Date: August 2004
Creator: Armentrout, Elizabeth G.
Description: This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Contributing Partner: UNT Libraries
E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

Date: August 2007
Creator: Zengin, Selcuk
Description: This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
Contributing Partner: UNT Libraries
A historical analysis of the failures of Camp David 2000 Summit.

A historical analysis of the failures of Camp David 2000 Summit.

Date: August 2005
Creator: Yilmaz, Ismail
Description: This research seeks to understand the reasons for failures of Bill Clinton, Yasser Arafat, and Ehud Barak's Camp David Summit that was held in July, 2000. The Summit was arranged to complete the last phase of Oslo Peace Process. Numerous researches have attempted to reveal the facts of the summit but, so far, they have failed to present the complete details of what happened before, during, and after the summit. This research explores all aspects of the problem including the various variables that would have had effected the breakdown of the Middle East peace process. Finally, the researcher determines the parameters needed to maintain a substantial peace in the Middle East and what proposed strategies might be followed in order to avoid the previous mistakes in future peace negotiations.
Contributing Partner: UNT Libraries
Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yalcinkaya, Ramazan
Description: Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
Contributing Partner: UNT Libraries
Toward Successful Negotiation Strategies in Hostage-Ttaking Situations: Case Study Approach and Future Recommendations

Toward Successful Negotiation Strategies in Hostage-Ttaking Situations: Case Study Approach and Future Recommendations

Date: August 2005
Creator: Hancerli, Suleyman
Description: In the last four decades, hostage situations have rapidly increased in the world due to the threat of terrorism and other social problems. The goals of hostage takers are to achieve certain political, criminal, and/or social benefits through hostage situations. It is not only a police problem but also a governmental problem. Police apply either negotiation or tactical intervention in hostage situations to recover hostages without bloodshed or loss of life. Success in this endeavor is based on effective negotiation. The purposes of this study are to analyze the major actors and their roles in hostage situations, to identify effective negotiation strategies and tools, and to provide some future recommendations for governments, police agencies, and researchers for peaceful resolutions in hostage situations.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 NEXT LAST