Search Results

open access

Characteristics of Community Service Programs and Probationers in Texas

Description: As a criminal sanction, community service involves unpaid labor on the part of convicted criminal offenders. Community service was created as an alternative to incarceration for low-level offenders. It now appears, however, that community service is rarely used as a true alternative to prison, but rather as an added condition of probation. The body of research on community service in the United States is modest, so relatively little is known about its characteristics and administration. Data we… more
Date: August 2002
Creator: Roberts, Darrin David
open access

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Description: Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy … more
Date: August 2002
Creator: Tuncer, Hakki

Changing Privacy Concerns in the Internet Era.

Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats agains… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2002
Creator: Demir, Irfan

Investigation of Computer Crimes

Description: In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case … more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2002
Creator: Erdonmez, Erhan

Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement.

Description: Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement s… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2002
Creator: Temur, Nuri
open access

Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders

Description: The purpose of this study is to explore the differences and characteristics between first time felony probationer and recidivist felony probation offender. The importance of said studies grows significantly, given current trends of sentencing offenders to probation. Using archived data on random sample of felony offenders in 2000 and based on information acquired and maintained by the Denton County Community Supervision and Corrections Department (CSCD), the study consists of 40 first time felo… more
Date: May 2007
Creator: Lynton, Eddy
open access

Criminal Investigations: The Impact of Patrol Officers on Solving Crime

Description: This two-part study of the criminal investigation process first evaluated the frequency with which patrol officers solve cases assigned to the investigations division and then examined how detectives spent their time, both on case assignments and on other activity not related to current case assignment. Cases assigned to the investigations division for follow up were examined to determine how often a case was cleared by the patrol officer. The detective's time was then evaluated in order to det… more
Date: May 2007
Creator: Womack, Charissa L.
open access

A Descriptive Study of the Intelligence Community in the United States of America

Description: This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues rela… more
Date: May 2003
Creator: Ucak, Hursit
open access

The Appropriate Use of Human Intelligence in Combating Terrorism

Description: When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terro… more
Date: August 2003
Creator: Koseli, Mutlu
open access

New Surveillance Technologies and the Invasion of Privacy Rights

Description: Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy.… more
Date: August 2003
Creator: Simsek, Yilmaz

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Description: The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mech… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2003
Creator: Turer, Ahmet
open access

An Analysis of Adler's Theory and the Female Criminal

Description: This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn a… more
Date: August 2004
Creator: Armentrout, Elizabeth G.
open access

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Description: Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joini… more
Date: August 2004
Creator: Teymur, Samih

Police Officer Burnout: An Examination of Officer Stress, the Policing Subculture and the Advantages of Family Counseling

Description: The work of a police officer is stressful and could potentially lead to burnout. As a result, a variety of reactions may occur which include, cynicism, abuse of authority, and in extreme cases suicide. One method which has been proven to be effective in treating officer stress is counseling; however, because of the policing subculture the opportunity to seek counseling has been ignored. In order to successfully manage officer stress, the subculture must be dealt with. Additionally, the officers… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2004
Creator: Yanez, Luiz

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: May 2005
Creator: Morgan, Deanne
open access

International police cooperation as a response to transnational organized crime in Europe: Improvements in extradition.

Description: International criminality has been a challenging phenomenon for national police forces for years. States have developed international police cooperation relations and extradition instruments in order to fight international criminal activity. This treatise explores the reasons for the rise in transnational organized crime activities in Europe and presents an in-depth explanation concerning the emergence, mandates, and structures of multilateral police collaboration systems such as Interpol, Trev… more
Date: August 2005
Creator: Durmaz, Huseyin
open access

Truancy Intervention: A Study of Dallas Independent School District Participants in the Dallas Challenge Truancy and Class C Enforcement Center

Description: This research examines agency data for participants in a truancy intervention program. Previous literature provides mostly descriptive information and fails to examine the effects of truancy intervention efforts. The analysis provides a profile of truant participants referred to the program and factors that correlate to successful completion of the program requirements. The results will be applicable to the study program as evaluation research and will be generalized for application to other… more
Date: August 2005
Creator: Fairchild, James John
open access

An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers

Description: Although Turkey is a country with strong social cohesion, figures of runaway children in Turkey are increasing dramatically. This research focused on the factors that cause children to run away and on interaction programs to intervene and/or prevent this problem. Until recently, Turkish family life was able to avoid such problems, but with the effect of westernization and social mobility in Turkey, the basic family structure has become more like the family structure in the western countries. St… more
Date: August 2005
Creator: Ekici, Siddik
open access

Toward Successful Negotiation Strategies in Hostage-Ttaking Situations: Case Study Approach and Future Recommendations

Description: In the last four decades, hostage situations have rapidly increased in the world due to the threat of terrorism and other social problems. The goals of hostage takers are to achieve certain political, criminal, and/or social benefits through hostage situations. It is not only a police problem but also a governmental problem. Police apply either negotiation or tactical intervention in hostage situations to recover hostages without bloodshed or loss of life. Success in this endeavor is based on … more
Date: August 2005
Creator: Hancerli, Suleyman

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Description: Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats agai… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2005
Creator: Yalcinkaya, Ramazan
open access

A Historical Analysis of the Failures of Camp David 2000 Summit

Description: This research seeks to understand the reasons for failures of Bill Clinton, Yasser Arafat, and Ehud Barak's Camp David Summit that was held in July, 2000. The Summit was arranged to complete the last phase of Oslo Peace Process. Numerous researches have attempted to reveal the facts of the summit but, so far, they have failed to present the complete details of what happened before, during, and after the summit. This research explores all aspects of the problem including the various variables th… more
Date: August 2005
Creator: Yilmaz, Ismail
open access

An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

Description: Motor vehicle theft is the costliest property crime in the United States equaling billions of dollars in losses each year. Despite law enforcement success in decreasing the rate of motor vehicle theft in recent years, the actual number of thefts has increased. It is vital for law enforcement agencies to know who is committing motor vehicle theft and where vehicles are being stolen. This study answers these questions by examining offender demographic characteristics and the location types most t… more
Date: December 2007
Creator: Adger, Katherine
open access

Getting sober while incarcerated: An exploratory analysis of correctional substance abuse treatment programs

Description: Substance abuse is an expensive problem facing the American public and the criminal justice field. Using secondary data analysis this study examined 1,921 participants across five substance abuse programs within California and New York jail systems. Specifically this study explored the impact of location, demographic characteristics, offense committed, and previous drug treatment on successful completion of the treatment program. Descriptive analyses were used to examine the demographic charact… more
Date: December 2007
Creator: Kimball, Bree A.
open access

A Longitudinal Study of Juvenile Facility Directors' Job Satisfaction Levels in the United States

Description: This national study, focusing on job satisfaction within juvenile facility directors, was conducted by the means of a survey. The study is longitudinal in nature; the survey was conducted in 1995 and 2000. Other past studies have focused on line level employees, guards, and the juveniles, but few have concentrated on juvenile facility directors. Literature on directors is currently lacking, this continuous study will give a better ongoing perspective of their attitudes and beliefs. Findings fro… more
Date: August 2006
Creator: Skertich, Jonathan David
Back to Top of Screen