The primary goal of this study was to investigate the habits of college students who use pornography. The study was designed to collect data on the use of online pornography by college students. Through the use of an online survey, the study collected general demographic data and data on the frequency with which students used online pornography. The study also collected data on the general attitudes of college students towards online pornography. Participants consisted of students enrolled at the University of North Texas during the Spring 2016 semester. The participants of the study were contacted by an email requesting the student to respond to an online anonymous survey regarding their use of online pornography. The survey consisted of thirty questions and statements, primarily utilizing a five point Likert scale. Analysis of the data collected as well as a discussion of the findings are included.
The primary goal of this study was to analyze existing racial profiling data collected and reported by law enforcement agencies in Texas. The internet-based data used was obtained through TCOLE, as it is the state mandated repository in which all law enforcement agencies must submit their annual racial profiling reports to. In analyzing a collection requirement of these reports, this study sought to determine how frequently law enforcement officers know the race or ethnicity of drivers prior to traffic stops. Furthermore, the study sought to determine if there are differences in the rates of race or ethnicity known prior to stops across Texas geographical regions, county population sizes, agency types, as well as between counties with and without interstate thoroughfares. This analysis consisted of 3,250,984 traffic stops conducted by 1,186 law enforcement agencies in 2014. Findings revealed that law enforcement officers rarely know the race or ethnicity of drivers prior to traffic stops, as was consistently found across all measures. Findings and implications are discussed.
With criminal cases continuing to be exonerated across the United States, research must be done on the subject to advance current practices to reduce its occurrence in the future. This study combines county population data with the National Registry of Exonerations to analyze the contributing factors to wrongful convictions and the possible effect of population on their frequency. The objective of this study was to identify specific policy changes based on the five contributing factors to wrongful convictions that could be applied to population specific areas. The results yielded multiple patterns that are discussed thoroughly. These findings allowed the introduction of policy changes and proposals for future research.
Juvenile homicide offenders pose a significant risk to society considering the severity of the crime, yet this population of delinquents receives little attention in terms of recidivism research. This study examined the recidivism outcomes of a group of 256 determinately sentenced homicide offenders in Texas. Each of these juveniles had be confined to and subsequently release from the Texas Youth Commission, and were followed for three years following release. The aim of this research study was to distinguish recidivists from non-recidivists across demographic, delinquent history, and risk factor measures. These same measures were then used to predict recidivism among the entire sample. Overall, the measures of race, gender, and previous delinquent adjudications emerged significant. First, Black youth were significantly more likely to recidivate than both Hispanic and White youth. Additionally, recidivism among males was significantly greater than non-recidivism among males. In contrast, there were fewer females in recidivist group than the non-recidivist group. Finally, youth with a greater number of previous delinquent adjudications were significantly more likely to recidivate, and the risk of recidivism increased as the number of previous adjudications increased. These findings are consistent with previous literature and indicate that these factors are prevalent in analyzing the recidivist behavior of determinately sentenced juvenile homicide offenders.
Research has shown that the police industry has entered into an era of homeland security. However, whether the core functions of policing have significantly changed since September 11, 2001, has been the topic of considerable debate. Using secondary data, the research identifies variables that are most influential in predicting whether Texas police chiefs understand their departments’ homeland security roles and responsibilities. The data was originally obtained in 2007 through self-administered surveys of police chiefs attending the Texas Chief Leadership Series (TPCLS) and the New Chief Development Program (NCDP).
Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that given the failures of existing private law solutions to the problem, these public law enforcement solutions should be more effective, efficient, and more satisfactory.
Life without parole for juvenile offenders is a controversial issue across the globe. Recently, the United States stands alone as the only country in the world that allows juvenile offenders to be sentenced to life time confinement without the possibility of parole. Furthermore, the U.S. has seen an increase in juvenile waivers and blended sentences, which has resulted in harsher penalties for juvenile offenders who have committed serious and violent crimes. This analysis examines scientific evidence that shows juveniles are different from adults in terms of brain development, rational decision making abilities, and maturity levels. These findings have questioned the reasoning behind imposing adult punishment on adolescent behavior. This analysis also presents the legal arguments suggesting that juvenile life without parole is unconstitutional and violates the Eighth and Fourteenth Amendments. Arguments for and against life sentences were also presented. This study concludes with a discussion of policy implications, whether the U.S. Supreme Court should abolish juvenile life without parole sentencing practices and explores the possible future direction of juvenile sentencing in the United States.
In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
In Texas, determinate sentencing allows extremely serious and violent delinquents one more chance to change their ways by releasing them to the streets instead of being transferred to prison. This research study examined the recidivism outcomes of 416 serious and violent juvenile offenders previously exposed to rehabilitative treatment in the renowned Capital and Serious Violent Offender Treatment Program provided by the Texas Youth Commission. Further, this research study looked to a group of 1,261 determinately sentenced offenders who did not participate in Capital and Serious Violent Offender Treatment Program but were released from Texas Youth Commission as well. Both groups of juveniles were followed for three years following their release from institutionalization. This analysis revealed that 50% of both groups were rearrested at least once during the follow-up period for any offense. Of the Capital and Serious Violent Offender Program participants, 81% were rearrested for at least one new felony offense. Of those non-participants, 78% were rearrested for at least one new felony offense. The factors that served to distinguish both groups included African-American race and a number of delinquent history measures. This study concludes with a discussion of policy implications and suggestions for future research.
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
In the last four decades, hostage situations have rapidly increased in the world due to the threat of terrorism and other social problems. The goals of hostage takers are to achieve certain political, criminal, and/or social benefits through hostage situations. It is not only a police problem but also a governmental problem. Police apply either negotiation or tactical intervention in hostage situations to recover hostages without bloodshed or loss of life. Success in this endeavor is based on effective negotiation. The purposes of this study are to analyze the major actors and their roles in hostage situations, to identify effective negotiation strategies and tools, and to provide some future recommendations for governments, police agencies, and researchers for peaceful resolutions in hostage situations.
This research seeks to understand the reasons for failures of Bill Clinton, Yasser Arafat, and Ehud Barak's Camp David Summit that was held in July, 2000. The Summit was arranged to complete the last phase of Oslo Peace Process. Numerous researches have attempted to reveal the facts of the summit but, so far, they have failed to present the complete details of what happened before, during, and after the summit. This research explores all aspects of the problem including the various variables that would have had effected the breakdown of the Middle East peace process. Finally, the researcher determines the parameters needed to maintain a substantial peace in the Middle East and what proposed strategies might be followed in order to avoid the previous mistakes in future peace negotiations.
Although Turkey is a country with strong social cohesion, figures of runaway children in Turkey are increasing dramatically. This research focused on the factors that cause children to run away and on interaction programs to intervene and/or prevent this problem. Until recently, Turkish family life was able to avoid such problems, but with the effect of westernization and social mobility in Turkey, the basic family structure has become more like the family structure in the western countries. Studies reveal that runaway episodes happen in all families regardless of such factors as economic, race, or geographic situations. Teenagers run away for several reasons; however, early intervention is highly suggested by studies to mitigate the problem. Although, parent-child conflict plays a significant role as a reason for youth leaving home, on the other hand family interaction still remains the best alternative to the problem.
This two-part study of the criminal investigation process first evaluated the frequency with which patrol officers solve cases assigned to the investigations division and then examined how detectives spent their time, both on case assignments and on other activity not related to current case assignment. Cases assigned to the investigations division for follow up were examined to determine how often a case was cleared by the patrol officer. The detective's time was then evaluated in order to determine how much time detectives spent on investigative tasks and other activities. This study confirms that the patrol officer should be given more time to conduct preliminary investigations for specific cases, and that tasks performed by detectives could be shifted to other personnel in the department. Both actions should serve to positively impact case clearance rates.
Substance abuse is an expensive problem facing the American public and the criminal justice field. Using secondary data analysis this study examined 1,921 participants across five substance abuse programs within California and New York jail systems. Specifically this study explored the impact of location, demographic characteristics, offense committed, and previous drug treatment on successful completion of the treatment program. Descriptive analyses were used to examine the demographic characteristics of the sample and the types of drugs used by participants in the thirty days prior to jail admission. Results from bivariate analyses indicated that location, demographic characteristics, and previous drug treatment were all significantly related to successful completion. Implications for current correctional treatment programs and future research on this topic are discussed
Motor vehicle theft is the costliest property crime in the United States equaling billions of dollars in losses each year. Despite law enforcement success in decreasing the rate of motor vehicle theft in recent years, the actual number of thefts has increased. It is vital for law enforcement agencies to know who is committing motor vehicle theft and where vehicles are being stolen. This study answers these questions by examining offender demographic characteristics and the location types most targeted for motor vehicle theft in Texas from 2001 to 2005. The state of Texas was chosen because Texas has continually been ranked second in the Federal Bureau of Investigation's Uniform Crime Report for the number of reported incidents of motor vehicle theft in the United States.
This thesis is an evaluation of two coping skills programs and their effects on inmates' mental health status. The original computer coping skills program designed for the general population was modified to address the specific needs of an incarcerated population.This thesis evaluated the differences in the mental health status of the two treatment groups compared with the control group and with each other to assess the effectiveness of the two programs. The results of this study showed substantial improvement in the mental health status for the two treatment groups. There are indications from this study that specialty software designed specifically for inmates may result in lower levels of depression than non-tailored software.
This research examines agency data for participants in a truancy intervention program. Previous literature provides mostly descriptive information and fails to examine the effects of truancy intervention efforts. The analysis provides a profile of truant participants referred to the program and factors that correlate to successful completion of the program requirements. The results will be applicable to the study program as evaluation research and will be generalized for application to other truancy programs. Directions for future truancy research will be suggested based on the need to continue to evaluate truancy reduction efforts.
This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
The work of a police officer is stressful and could potentially lead to burnout. As a result, a variety of reactions may occur which include, cynicism, abuse of authority, and in extreme cases suicide. One method which has been proven to be effective in treating officer stress is counseling; however, because of the policing subculture the opportunity to seek counseling has been ignored. In order to successfully manage officer stress, the subculture must be dealt with. Additionally, the officers' family must also be acknowledged as being affected by officer burnout. Counseling services must be made available to the officer's family and through training they can become a source of support instead of an added source of stress to the officer.
International criminality has been a challenging phenomenon for national police forces for years. States have developed international police cooperation relations and extradition instruments in order to fight international criminal activity. This treatise explores the reasons for the rise in transnational organized crime activities in Europe and presents an in-depth explanation concerning the emergence, mandates, and structures of multilateral police collaboration systems such as Interpol, Trevi, Schengen, and Europol. Since the extradition has become an inseparable part of international policing, this study examines the improvements in extradition procedure and emphasizes the importance of extradition. Finally this study compares traditional (European Convention on Extradition of 1957) and new (European Arrest Warrant) extradition systems.
Within the United States, probation has customarily been used as a way to divert offenders away from prison. Over the past two decades the number of offenders who are sentenced to probation has increased tremendously. While there have been more offenders sentenced to probation, there has also been an increase in the number of probationers having that sentence revoked. The most prevalent type of revocation is a technical revocation. Probationers receive technical violations culminating in a revocation when they fail to satisfy the conditions of their probation sentence such as attending rehabilitative programming. The present study adds to the literature on technical revocations by examining characteristics of felony probationers from a large Southern state who were revoked between January 1, 2008 and December 31, 2009. Findings revealed that female probationers, older probationers, white probationers, and those probationers who had not completed high school were significantly more likely to be revoked for a technical revocation. Implications for practice and suggestions for future research based on these findings are discussed.
From the 1920s until the 1950s, brothers, Sam and Rosario Maceo, ran an influential crime family in Galveston, Texas. The brothers’ success was largely due to Galveston’s transient population, the turbulent history of the island, and the resulting economic decline experienced at the turn of the 20th century. Their success began during Prohibition, when they opened their first club. The establishment offered bootlegged liquor, fine dining, and first class entertainment. After Prohibition, the brothers continued to build an empire on the island through similar clubs, without much opposition from the locals. However, after being suspected of involvement in a drug smuggling ring, the Maceos were placed under scrutiny from outside law enforcement agencies. Through persistent investigations, the Texas Rangers finally shut down the rackets in Galveston in 1957. Despite their influence through the first half of the 20th century, on the island and off the island, their story is largely missing from the current literature.
The goal of this study was to determine the extent, motivations, and justifications of nonmedical prescription stimulant use among the population at a large public university in the North Texas region. Participants consisted of 526 undergraduate students enrolled at the studied university during the spring and summer 2014 semesters. The findings of the study suggest that the nonmedical use by students was higher than the findings in much of the current literature, but was within the parameters established in the literature. The primary motivation for nonmedical use was academic in nature and was justified by moderation of nonmedical use to strategic academic times.
The primary goal of this study was to evaluate the effectiveness of a program being run by the Bedford Police Department’s Repeat Victimization Unit on domestic violence and mental health and mental retardation. The study sought to determine whether the program was effective in reducing instances of repeat victimization in domestic violence and MHMR victims. Additionally the program investigated whether or not the program was effective at reducing victimization severity, and which demographic could be identified as the most victimized. Participants consisted of 157 domestic violence and MHMR victims in the city of Bedford, Tx between November 11, 2012 to July 30, 2013. Findings indicate that levels of repeat victimization for domestic violence and MHMR are relatively low regardless of whether the victim received services through the repeat victimization program or not. Additionally the severity of these repeat victimizations remains relatively constant regardless of whether services were received through the program or not. Implications and findings are discussed.
The last decade has witnessed the rise of a new movement called “community policing.” Basic philosophical principles, which focus on improved services to the public through decentralization, better communication and decision-making processes, and more police discretion highlight the community policing movement. Essentially, community policing is the quality movement in American policing. This thesis will explore the impact of community policing on the structure and administration of police agencies. Since this movement is centered in local police agencies, the focus will also be at that level. Considerable effort will be devoted to providing an accurate description of law enforcement in the United States; however, the crux of this treatise will be on the discussion of organizational problems developed at the local level as a result of implementing community policing concepts.
By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list of general recommendations, which are crucially important for concerned officials to pay attention before, during, and after a riot.
The purpose of this study is to identify how the U.S. is responding to money laundering and what kind of problems arise while countering it, beginning with a detailed description of money laundering, its stages, typologies, impacts, and complications. Due to the broad nature of this subject only three main issues form the focal point of this study: problems concerning the banking industry and other financial organizations, problems resulting from the limitations of law enforcement agencies, and problems arising from the lack of cooperation between and within financial institutions and law enforcement agencies. Several probable solutions to the above problems are identified: Considering the financial industry, there are loopholes in the Bank Secrecy Act (BSA) and in other regulations that apply to the industry. Thus, there is a comparison of the Subjective Model vs. Objective Model in terms of reporting systems for financial organizations. On the law enforcement side, the priority is the need to update and upgrade their technology and investigation mechanisms in order not to fall behind the criminals. Finally, cooperation is something that can be achieved through mutual respect and understanding of the priorities of each side, which can be achieved by the creation of an upper agency of whose members represent both sides of the combat efforts.
This study scrutinizes the drug-terrorism nexus critically with intent to conceive possible remedies for the problem. The vast turnover of the global illicit drug industry constitutes the largest portion of organized crime enterprises' income. Different circles have argued that these enterprises are not the sole actors of the drug business, but terrorist groups, whose ultimate aim is a political change rather than financial strength, also profit from the “business.” The controversial nature of the problem fuelled heated debates and requires an in depth and impartial analysis, which was the main subject of the current study. At the first stage, three different cases, the PKK, the LTTE, and the SL, were studied either to prove or deny the alleged phenomenon. The sampled groups' ideology, structure, and operations helped understand the motives pushing the organizations into the ‘business.' Subsequently, several recommendations capturing vital issues both in countering terrorism and breaking terrorism-drugs link were spelled out.
Over the last 30 years, the juvenile justice system and juvenile correctional ideology shifted to become more punitive in nature. However, studies examining this shift are lacking in the literature. The present study will attempt to assess what correctional ideology, rehabilitative or punitive, is dominant within juvenile corrections by conducting a national survey to juvenile facility directors. This study will be based on prior literature, most of which has focused upon line staff in an adult correctional setting. From this prior literature, more specifically from the work of Cullen et al. (1989), scales will be created to determine the correctional orientation of the key administrators in juvenile facilities. This will allow us to assess whether the correctional ideology driving the juvenile system has in fact become punitive. The findings from this study have the opportunity to alter the current status quo in juvenile corrections.
This study discussed the issue of computer crime as it relates to the criminal justice system, specifically law enforcement. The information was gathered through several books, academic journals, governmental documents, and the Internet. First, the nature and forms of computer crime, Internet crime, and cyber terrorism were analyzed. Next, law enforcement responses were discussed. International aspects of the problem were separately pointed out. Further, detection and investigation of computer crime were examined. Problems related to the each component of the criminal justice system (law enforcement, investigators, prosecutors, and judges) were described. Specific solutions to these problems were offered. In addition, computer crime handling procedures were presented. Results indicate that computer crime will increase in the 21st century, and this problem cannot be controlled by traditional methods alone. Using new technology as preventive measures, and increasing awareness and security conscious culture will prevent the problem in the long run.
Because media influence public opinion, it is often surmised that media also influence the decisions of police executives. This exploratory case study examined the relationship between police and media during the Oklahoma City bombing investigation and subsequent trials of Timothy McVeigh and Terry Nichols. Findings indicate that media influence police executive decisions when police and media interact closely. It was found that during the Oklahoma City bombing investigation and trials, police on the outer perimeter were influenced most and police conducting the investigation or who were tasked to court room security were influenced the least. It was concluded, based on the consensus of respondents interviewed, that media do influence police executive decisions.
Transnational organized crime has been prevalent during the last century, but it recently has been recognized as a threat to the world order. Governments throughout the world, along with the intergovernmental organizations identified this phenomenon as a new threat to domestic and international security. This paper attempts to explain the impacts of transnational organized crime on the functioning of democratic societies by adopting the Russian Organized Crime as case study. The descriptive research with regard to definition, scope and organization of transnational organized crime, along with the objectives, limitations and methodology of this research will be included in the first chapter. Recent trends observed in organized crime`s character and the impact of organized crime on the political economies of democratic regimes will be contained in the following chapters. Pre-conditions for a broader response to transnational organized crime and conclusive remarks will be the context of the last chapter.
Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
This thesis examines the role of psychopathy in violent female offending, and explores DSM-IV personality disorders that may also be a factor. Past research on female offenders and psychopathy suggest that this is a valid construct when looking at female offenders. This study was driven by two questions: which personality disorders are most common in adult female offenders who are psychopathic, and are adult female offenders who are psychopathic more likely to have been convicted of a violent offense than those who are not psychopathic, but have at least one personality disorder. The results indicate that Cluster B personality disorders were the most common, and Cluster C the least common. The results also showed that those women who were psychopathic were no more likely to have been convicted of a violent crime than those who had at least one personality disorder, but were not psychopathic. Treatment implications and the direction of future research are discussed.
This research analyzed all juveniles involved in a homicide, both victims and offenders, in the city of Dallas, Texas from the years 1988 through 1997. This study addressed several research questions including the identification of risk factors common to both victims and offenders. Data for this study was obtained from the homicide files of the Dallas Police Department. The findings in part identify specific profiles of the victims and offenders, as well as identifying comparisons of risk factors between the two groups. Also identified are the relationships between the offenders and victims. Conclusions from this research present implications for law enforcement agencies, as well as furthering the etiology of juvenile homicide.
The primary goal of this study was to analyze the characteristics of current registered sex offenders in Collin County, Texas, as well as to compare age and gender of the victims of these offenders in order to know who sex offenders primarily target in these crimes. The study also sought to discover geographic patterns of where the registered sex offenders reside for the purpose of keeping communities aware. Participants consisted of 175 registered sex offenders (N = 175) in Collin County, Texas, found on Collin County's and the Texas Department of Public Safety's online public registries. The findings demonstrate that there were significant trends among the sex offenders, their victims, location of residence, and housing complications as a result of progressing sex offender laws. Treatment programs and the reintegration of offenders in the community were also addressed. The meaning of the results in this study can aid in the development of safety and prevention strategies, provide an understanding about the utilization of sex offender registries, and can benefit law enforcement to predict the movement of current sex offenders, along with knowing where to find other potential offenders.
Juvenile sex offenders represent a serious and violent group of delinquents. Despite the severity of their crimes, the literature focusing on risk factors that influence recidivism and the types of re-arrest after incarceration is lacking. This research study examined 499 determinately sentenced juvenile sex offenders that were released from the Texas Juvenile Justice Department. This sample was then followed for three years upon their release. This analysis revealed that 51.5 percent were re-arrested for any offense while 45.91 percent were re-arrested for a felony offense. This study identified a number of risk factors relative to JSO recidivism. These factors include having a history of emotional abuse, race being African American, being gang affiliated, having a larger number of previous adjudications, and having higher counts of institutional misconduct infractions. Those JSOs older at intake and release, and those who were incarcerated for longer periods of time were less likely to re-offend upon release. Lastly, this study ends with suggestions for future research as well as policy implications geared toward juvenile sex offenders.
Executive clemency is assumed to be a mechanism to correct miscarriages of justice brought about by the criminal justice system, yet little empirical research exists to confirm this assumption. This research study examined the types of rationales cited in 799 cases of executive clemency from six states from 2005 to 2012. Rationales based upon retributive philosophies, in which a miscarriage of justice was cited, were further analyzed. This analysis revealed that only seven percent of all clemency decisions from the examined states cited retributive rationales. Of the fifty-six grants of clemency that cited retributive rationales, most were granted in the forms of pardons. The analysis indicated that executive clemency is utilized as a mechanism to correct injustices, specifically in cases of innocence. This study concludes with a discussion of policy implications and the reliance on executive clemency as a fail-safe to the criminal justice system.
This research focuses on the association between law enforcement training and implementation of hate crime legislation. The Anti-Defamation League's state hate crime statutory provisions and the Federal Bureau of Investigation's Hate Crime Reporting by States data are examined. Section one includes the following: What Constitutes Hate?, The History of Hate Crime Legislation, and Issues Facing Hate Crime Legislation. Section two surveys literature on both Hate Crime Legislation and the training of law enforcement officers. Section three discusses the Anti-Defamation League and FBI data in detail and explains the methods used to test the association between law enforcement training and reporting of hate crime legislation. Findings yield a statistically significant association between law enforcement training and reporting of hate crime legislation.
This thesis examines the history of the Greater Dallas Crime Commission and its effectiveness within the criminal justice system. It is a private agency established fifty (50) years ago to monitor and investigate the criminal justice system. Today, it serves as a source of funding for criminal justice agencies, provides awards and recognition forums for law enforcement and lobbies for legal revisions of the criminal code. The research is designed to examine their role within the criminal justice system. Whether current crime theories are supported by the commission is central to the thesis. There are no prior studies available of crime commissions perhaps because they are privately funded and operated by civilians. Crime commissions do exert influence, politically and financially, upon law enforcement. It is reflected often in their history. The extent of this effect is the subject of the paper. To this end, the commission's role in changing state laws, providing funds for police training, recognizing prosecutors and paying awards to informants lends credibility to their role in the criminal justice system. Their function has often changed during the fifty-year history. If there is a deficit, it may be that the commission has the capability, through its sphere of influence, of encouraging civilian actions that may conflict with law enforcement policy. Some examples of these are included in the study.
This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
The events of September 11, 2001 marked a paradigm shift in the strategy within all levels of law enforcement in the United States. Intelligence became the watchword of the day and with it, the movement to incorporate strategic and tactical information in daily policing. Yet while the philosophy was clear, the method and manner to which agencies were left to achieve these goals was much less designed. The federal government allocated funds to assist help agencies incorporate an intelligence function in their daily operations but which agencies and to what degree remains unclear even today. This study seeks to determine the current state of use of intelligence in municipal law enforcement agencies in the State of Texas ten years after 9/11. Through use of a survey, it assesses the frequency of use of intelligence units in local police departments in the State of Texas, identifies commonalities in their structure, and determines the state of their effectiveness.
When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs.