UNT Theses and Dissertations - Browse

Note: All results matching your query require you to be a member of the UNT Community (you must be on campus or login with university credentials for access).
The Academic Steroid: Nonmedical Use of Prescription Stimulants at a North Texas University
The goal of this study was to determine the extent, motivations, and justifications of nonmedical prescription stimulant use among the population at a large public university in the North Texas region. Participants consisted of 526 undergraduate students enrolled at the studied university during the spring and summer 2014 semesters. The findings of the study suggest that the nonmedical use by students was higher than the findings in much of the current literature, but was within the parameters established in the literature. The primary motivation for nonmedical use was academic in nature and was justified by moderation of nonmedical use to strategic academic times.
Accuracy Variations in Human Facial Identification Based on Time of Exposure.
This study examined the relationship between time of exposure to the human face and accurate subsequent photo line-up identification. A volunteer group of 124 undergraduate students was divided into three approximately equal sized subgroups. The three groups were then exposed to a video or a portion of a video depicting a theft. Exposure times ranged from two minutes to 30 seconds. The subjects were then given a questionnaire and shown a photo line-up of the mock perpetrator and five foils. Subjects were asked to identify the perpetrator and mark that identification on the questionnaire. Results of the experiment indicated that the longer a subject was exposed the greater the possibility of an accurate identification.
An Analysis of Major American Riots: Issues in Riots and Riot Control
By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list of general recommendations, which are crucially important for concerned officials to pay attention before, during, and after a riot.
A Case Study of Leftist Terrorism in Turkey
Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.
The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Changing Privacy Concerns in the Internet Era.
Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Combating Corruption: A Comparison of National Anti-Corruption Efforts
The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
An Etiology of Juvenile Homicide in Dallas, Texas: 1988-1997
This research analyzed all juveniles involved in a homicide, both victims and offenders, in the city of Dallas, Texas from the years 1988 through 1997. This study addressed several research questions including the identification of risk factors common to both victims and offenders. Data for this study was obtained from the homicide files of the Dallas Police Department. The findings in part identify specific profiles of the victims and offenders, as well as identifying comparisons of risk factors between the two groups. Also identified are the relationships between the offenders and victims. Conclusions from this research present implications for law enforcement agencies, as well as furthering the etiology of juvenile homicide.
Foot and/or Bicycle Patrols in Major Texas Metropolitan Police Departments
During the last 25 years in law enforcement in the United States, there has been a universal practice of foot and/or bicycle patrols used to accomplish the goal of police patrol enforcement and the philosophy of community policing in metropolitan areas. These tactics of patrol have also been used in police departments in and around the State of Texas. This report is a research project on six major metropolitan police departments in the State of Texas, analyzing their allocation of foot and/or bicycle patrol units within their urban cities. The study assesses their early history in using these two police tactics to address criminal activity and their progression from foot patrol to bicycle patrol. The findings of this research support the proposition that major Texas police departments have adopted the practices and philosophies of other major urban police departments around the US, by using foot and/or bicycle patrols in their cities. There is evidence that major Texas police departments were using foot patrol during the early 1980s in support of community policing and gradually phased out this practice in the early 1990s to adopt the new enforcement tactic of policing on a bicycle.
The Impact Of Community Policing On The Structure And Administration of Police Agencies
The last decade has witnessed the rise of a new movement called “community policing.” Basic philosophical principles, which focus on improved services to the public through decentralization, better communication and decision-making processes, and more police discretion highlight the community policing movement. Essentially, community policing is the quality movement in American policing. This thesis will explore the impact of community policing on the structure and administration of police agencies. Since this movement is centered in local police agencies, the focus will also be at that level. Considerable effort will be devoted to providing an accurate description of law enforcement in the United States; however, the crux of this treatise will be on the discussion of organizational problems developed at the local level as a result of implementing community policing concepts.
Police Officer Burnout: An Examination of Officer Stress, the Policing Subculture and the Advantages of Family Counseling
The work of a police officer is stressful and could potentially lead to burnout. As a result, a variety of reactions may occur which include, cynicism, abuse of authority, and in extreme cases suicide. One method which has been proven to be effective in treating officer stress is counseling; however, because of the policing subculture the opportunity to seek counseling has been ignored. In order to successfully manage officer stress, the subculture must be dealt with. Additionally, the officers' family must also be acknowledged as being affected by officer burnout. Counseling services must be made available to the officer's family and through training they can become a source of support instead of an added source of stress to the officer.
Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.