You limited your search to:

 Degree Discipline: Criminal Justice
Is There Justice in Mercy?  the Retributive Philosophies of Executive Clemency

Is There Justice in Mercy? the Retributive Philosophies of Executive Clemency

Date: May 2013
Creator: Gibbs, Gina N.
Description: Executive clemency is assumed to be a mechanism to correct miscarriages of justice brought about by the criminal justice system, yet little empirical research exists to confirm this assumption. This research study examined the types of rationales cited in 799 cases of executive clemency from six states from 2005 to 2012. Rationales based upon retributive philosophies, in which a miscarriage of justice was cited, were further analyzed. This analysis revealed that only seven percent of all clemency decisions from the examined states cited retributive rationales. Of the fifty-six grants of clemency that cited retributive rationales, most were granted in the forms of pardons. The analysis indicated that executive clemency is utilized as a mechanism to correct injustices, specifically in cases of innocence. This study concludes with a discussion of policy implications and the reliance on executive clemency as a fail-safe to the criminal justice system.
Contributing Partner: UNT Libraries
Recidivism Among Juvenile Sex Offenders in Texas

Recidivism Among Juvenile Sex Offenders in Texas

Date: May 2013
Creator: Martinez, Crystal G.
Description: Juvenile sex offenders represent a serious and violent group of delinquents. Despite the severity of their crimes, the literature focusing on risk factors that influence recidivism and the types of re-arrest after incarceration is lacking. This research study examined 499 determinately sentenced juvenile sex offenders that were released from the Texas Juvenile Justice Department. This sample was then followed for three years upon their release. This analysis revealed that 51.5 percent were re-arrested for any offense while 45.91 percent were re-arrested for a felony offense. This study identified a number of risk factors relative to JSO recidivism. These factors include having a history of emotional abuse, race being African American, being gang affiliated, having a larger number of previous adjudications, and having higher counts of institutional misconduct infractions. Those JSOs older at intake and release, and those who were incarcerated for longer periods of time were less likely to re-offend upon release. Lastly, this study ends with suggestions for future research as well as policy implications geared toward juvenile sex offenders.
Contributing Partner: UNT Libraries
Computer crime as a barrier to electronic commerce: New solutions for public law enforcement.

Computer crime as a barrier to electronic commerce: New solutions for public law enforcement.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Temur, Nuri
Description: Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that given the failures of existing private law solutions to the problem, these public law enforcement solutions should be more effective, efficient, and more satisfactory.
Contributing Partner: UNT Libraries
Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Date: August 2002
Creator: Tuncer, Hakki
Description: Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
Contributing Partner: UNT Libraries
Political Misuse of Domestic Intelligence: A Case Study on the FBI

Political Misuse of Domestic Intelligence: A Case Study on the FBI

Date: August 2002
Creator: Pacci, Mehme
Description: Domestic intelligence is very important in preventing disorder while ensuring unity and security during a time of national crisis. However, if uncontrolled, domestic intelligence can be subject to political misuse, which causes serious damage both to individuals and to democratic institutions. There are various theoretical explanations for political misuse of domestic intelligence. The political use of domestic intelligence is best explained by the sociological theory of unfulfilled needs. On the other hand, political counterintelligence can be best explained by Threat Theory. In order for a domestic intelligence organization to be effective, its organizational discretion must be limited by establishing clear legislation that is not secret, on the focus, limits, and techniques of domestic intelligence. This system must be supported by a multi-level control mechanism.
Contributing Partner: UNT Libraries
Changing privacy concerns in the Internet era.

Changing privacy concerns in the Internet era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Transnational Organized Crime and the Drug Business

Transnational Organized Crime and the Drug Business

Date: August 2002
Creator: Aksakal, Baris
Description: This study analyzes the activities of the organized crime groups involved in the drug business, as well as examining national and international efforts to control these groups. Specifically, this study addresses the following questions: How is organized crime connected to the international drug business?; What are the major transnational organized crime groups involved in the international drug business?; What is the nature of the drug problem as it relates to organized crime internationally?; What international cooperative law enforcement efforts currently exist to deal with organized crime and the drug business? Findings indicate that efforts to create an effective international law enforcement network are needed to meet the challenges of drug trafficking and globalized crime. To date, such efforts have largely been unsuccessful.
Contributing Partner: UNT Libraries
A case study on police misconduct in the United States of America and an applicable model for the Turkish National Police.

A case study on police misconduct in the United States of America and an applicable model for the Turkish National Police.

Date: August 2002
Creator: Lofca, Izzet
Description: This study explores the underlying causes and deterrent control mechanisms of police misconduct in the United States. Outcomes of causes and control mechanisms constitute the basis for an applicable model for the Turkish National Police (TNP). Why is some police behavior deviate? What are the main determinants of police misconduct? Is police misconduct a result of sociological behavior and subcultural development within police organizations or a psychological behavior as an outcome of officers' personal traits? What are the control mechanisms for police misconduct? What are their strengths and weaknesses? Do they deter or not? Is there a control mechanism that deters better than others? What is the best deterrence model for the TNP?
Contributing Partner: UNT Libraries
Serial Killing Myths Versus    Reality:  A Content Analysis Of Serial Killer Flicks Made   Between 1980 and 2001

Serial Killing Myths Versus Reality: A Content Analysis Of Serial Killer Flicks Made Between 1980 and 2001

Date: August 2002
Creator: McCready, Sarah Scott
Description: Public perceptions about serial homicide are more mythical than fact. Myths about serial homicide are perpetuated through several sources, especially the entertainment media which is a dominant and influential mythmaker. The number of films depicting serial killers and serial killing themes has increased dramatically in recent years. However, the reality of these films is debatable. This research examines the reality, or lack thereof, of the most recent films involving a serial killing theme. Hickey provides a wealth of statistical information on a number of serial killers and serial killings. A content analysis of the fifty top grossing serial killer movies made between 1980 and 2001 was conducted using variables from Hickey research. Research shows similarities and differences between variables, however, results concludes the entertainment media does not accurately portray serial homicide.
Contributing Partner: UNT Libraries
The Sex Offender Registry in Collin County, Texas: a Descriptive Analysis of Sex Offenders

The Sex Offender Registry in Collin County, Texas: a Descriptive Analysis of Sex Offenders

Date: December 2012
Creator: Valenzuela, Priscilla
Description: The primary goal of this study was to analyze the characteristics of current registered sex offenders in Collin County, Texas, as well as to compare age and gender of the victims of these offenders in order to know who sex offenders primarily target in these crimes. The study also sought to discover geographic patterns of where the registered sex offenders reside for the purpose of keeping communities aware. Participants consisted of 175 registered sex offenders (N = 175) in Collin County, Texas, found on Collin County's and the Texas Department of Public Safety's online public registries. The findings demonstrate that there were significant trends among the sex offenders, their victims, location of residence, and housing complications as a result of progressing sex offender laws. Treatment programs and the reintegration of offenders in the community were also addressed. The meaning of the results in this study can aid in the development of safety and prevention strategies, provide an understanding about the utilization of sex offender registries, and can benefit law enforcement to predict the movement of current sex offenders, along with knowing where to find other potential offenders.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST