Racial Disparity in Traffic Stops: An Analysis of Racial Profiling Data in Texas (open access)

Racial Disparity in Traffic Stops: An Analysis of Racial Profiling Data in Texas

The primary goal of this study was to analyze existing racial profiling data collected and reported by law enforcement agencies in Texas. The internet-based data used was obtained through TCOLE, as it is the state mandated repository in which all law enforcement agencies must submit their annual racial profiling reports to. In analyzing a collection requirement of these reports, this study sought to determine how frequently law enforcement officers know the race or ethnicity of drivers prior to traffic stops. Furthermore, the study sought to determine if there are differences in the rates of race or ethnicity known prior to stops across Texas geographical regions, county population sizes, agency types, as well as between counties with and without interstate thoroughfares. This analysis consisted of 3,250,984 traffic stops conducted by 1,186 law enforcement agencies in 2014. Findings revealed that law enforcement officers rarely know the race or ethnicity of drivers prior to traffic stops, as was consistently found across all measures. Findings and implications are discussed.
Date: August 2016
Creator: Winkler, Jordan M.
System: The UNT Digital Library
The Appropriate Use of Human Intelligence in Combating Terrorism (open access)

The Appropriate Use of Human Intelligence in Combating Terrorism

When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Date: August 2003
Creator: Koseli, Mutlu
System: The UNT Digital Library

An Analysis of Major American Riots: Issues in Riots and Riot Control

Access: Use of this item is restricted to the UNT Community
By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list …
Date: August 2001
Creator: Cinoglu, Huseyin
System: The UNT Digital Library
Is There Justice in Mercy?  the Retributive Philosophies of Executive Clemency (open access)

Is There Justice in Mercy? the Retributive Philosophies of Executive Clemency

Executive clemency is assumed to be a mechanism to correct miscarriages of justice brought about by the criminal justice system, yet little empirical research exists to confirm this assumption. This research study examined the types of rationales cited in 799 cases of executive clemency from six states from 2005 to 2012. Rationales based upon retributive philosophies, in which a miscarriage of justice was cited, were further analyzed. This analysis revealed that only seven percent of all clemency decisions from the examined states cited retributive rationales. Of the fifty-six grants of clemency that cited retributive rationales, most were granted in the forms of pardons. The analysis indicated that executive clemency is utilized as a mechanism to correct injustices, specifically in cases of innocence. This study concludes with a discussion of policy implications and the reliance on executive clemency as a fail-safe to the criminal justice system.
Date: May 2013
Creator: Gibbs, Gina N.
System: The UNT Digital Library

An Etiology of Juvenile Homicide in Dallas, Texas: 1988-1997

Access: Use of this item is restricted to the UNT Community
This research analyzed all juveniles involved in a homicide, both victims and offenders, in the city of Dallas, Texas from the years 1988 through 1997. This study addressed several research questions including the identification of risk factors common to both victims and offenders. Data for this study was obtained from the homicide files of the Dallas Police Department. The findings in part identify specific profiles of the victims and offenders, as well as identifying comparisons of risk factors between the two groups. Also identified are the relationships between the offenders and victims. Conclusions from this research present implications for law enforcement agencies, as well as furthering the etiology of juvenile homicide.
Date: December 2001
Creator: Haynes, Joseph
System: The UNT Digital Library
A Historical Analysis of the Failures of Camp David 2000 Summit (open access)

A Historical Analysis of the Failures of Camp David 2000 Summit

This research seeks to understand the reasons for failures of Bill Clinton, Yasser Arafat, and Ehud Barak's Camp David Summit that was held in July, 2000. The Summit was arranged to complete the last phase of Oslo Peace Process. Numerous researches have attempted to reveal the facts of the summit but, so far, they have failed to present the complete details of what happened before, during, and after the summit. This research explores all aspects of the problem including the various variables that would have had effected the breakdown of the Middle East peace process. Finally, the researcher determines the parameters needed to maintain a substantial peace in the Middle East and what proposed strategies might be followed in order to avoid the previous mistakes in future peace negotiations.
Date: August 2005
Creator: Yilmaz, Ismail
System: The UNT Digital Library
An unholy alliance: Case studies in narco-terrorism (open access)

An unholy alliance: Case studies in narco-terrorism

This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Date: August 2002
Creator: Cakir, Reha
System: The UNT Digital Library
Terrorism, Media and Public Perception: Influence of Media on Public Perception on Terrorism Related Matters (open access)

Terrorism, Media and Public Perception: Influence of Media on Public Perception on Terrorism Related Matters

The purpose of this study is to measure and examine whether terrorism continues to be highly feared and over-predicted, whether exposure to mass or news media influences perceptions of terrorism, whether mass media remains a significant source of information on terrorism related matters and whether people are prepared to act in the event of a terrorist attack. The respondents in this research consisted of a sample of 135 students aged 18 and over, at a participating mid-size university in a southern state, who completed a self-reported online survey on voluntary basis. The findings of the study suggests that the respondents access terrorism related news-media on both weekly and daily basis. Those with frequent access tend to overestimate the likelihood of a domestic terrorist attack and the threat posed by terrorism and tend to show higher levels of fear associated with terrorism. The majority of the respondents indicated average access of news-media of once or twice a week, or no use at all and they tend to not overestimate the likelihood of a terrorist attack, indicate some or no fear in relation to terrorism and tend to have more accurate perception of the current threat posed by terrorism.
Date: May 2018
Creator: Ivanova, Andrea
System: The UNT Digital Library
Getting sober while incarcerated: An exploratory analysis of correctional substance abuse treatment programs (open access)

Getting sober while incarcerated: An exploratory analysis of correctional substance abuse treatment programs

Substance abuse is an expensive problem facing the American public and the criminal justice field. Using secondary data analysis this study examined 1,921 participants across five substance abuse programs within California and New York jail systems. Specifically this study explored the impact of location, demographic characteristics, offense committed, and previous drug treatment on successful completion of the treatment program. Descriptive analyses were used to examine the demographic characteristics of the sample and the types of drugs used by participants in the thirty days prior to jail admission. Results from bivariate analyses indicated that location, demographic characteristics, and previous drug treatment were all significantly related to successful completion. Implications for current correctional treatment programs and future research on this topic are discussed
Date: December 2007
Creator: Kimball, Bree A.
System: The UNT Digital Library
The Buffering Effects of Religiosity on Adolescent Alcohol Abuse Coping following Victimization (open access)

The Buffering Effects of Religiosity on Adolescent Alcohol Abuse Coping following Victimization

This research comprised a secondary study using the National Longitudinal Study of Adolescent Health restricted data set to examine the buffering effects of religiosity on adolescent alcohol coping following victimization within the context of Agnew's general stain theory. Its purpose was to determine if religiosity buffered the effects of alcohol abuse coping following victimization for native-born and foreign-born non-Hispanic adolescents, and was designed as a follow-up research study to similarly replicate a prior study limited to native-born and foreign-born Hispanic adolescents. This study's findings were consistent with prior research that higher religiosity was generally predictive of lower levels of alcohol abuse. However, in the presence of violent victimization, religiosity did not buffer later increased alcohol abuse coping for non-Hispanic adolescents. Native-born religiously oriented adolescents were as likely to abuse alcohol following violent victimization as their native-born non-religious peers. Foreign-born religiously oriented versus non-religiously-oriented adolescents did not have statistically significant different outcomes on later alcohol abuse following victimization. Foreign-born non-Hispanic adolescents as a group appeared generally insensitive to victimization strain as measured by alcohol abuse coping. An important outcome of this study was the collateral finding that being Catholic substantially increased the likelihood of later alcohol abuse for both native-born and …
Date: May 2020
Creator: Bryant, Mark R
System: The UNT Digital Library
The Academic Steroid: Nonmedical Use of Prescription Stimulants at a North Texas University (open access)

The Academic Steroid: Nonmedical Use of Prescription Stimulants at a North Texas University

The goal of this study was to determine the extent, motivations, and justifications of nonmedical prescription stimulant use among the population at a large public university in the North Texas region. Participants consisted of 526 undergraduate students enrolled at the studied university during the spring and summer 2014 semesters. The findings of the study suggest that the nonmedical use by students was higher than the findings in much of the current literature, but was within the parameters established in the literature. The primary motivation for nonmedical use was academic in nature and was justified by moderation of nonmedical use to strategic academic times.
Date: December 2014
Creator: Pennington, Cody W.
System: The UNT Digital Library
Student Perceptions of the University of North Texas Campus Police (open access)

Student Perceptions of the University of North Texas Campus Police

Numerous studies have been conducted to determine predictors of perceptions and attitudes toward police. Less effort has been spent on determining university and college students' perceptions of campus police departments. The purpose of this thesis was to fill this gap in the literature with an added emphasis on exploring potential differences in perceptions between students involved in Greek Life organizations and students not involved in Greek Life organizations. Prior literature found that Greek Life students engage in risk-taking behaviors at higher rates than their counterparts, so it was hypothesized that Greek Life students would have higher levels of distrust in the campus police due to their increased engagement in risk-taking behaviors. The survey questionnaire measuring trust and procedural justice/legitimacy perceptions of campus police was distributed through convenience sampling to university students. Descriptive statistics, bivariate analyses, and multivariate analyses were utilized to analyze the data. The results showed that students overall had positive perceptions of campus police, that Greek Life students had more negative perceptions of the campus police than non-Greek Life students, and that students with prior interactions with the campus police were more likely to perceive the police to be less procedurally just/legitimate. Race/ethnicity was not found to be …
Date: May 2018
Creator: Stidd, Megan D
System: The UNT Digital Library
New Surveillance Technologies and the Invasion of Privacy Rights (open access)

New Surveillance Technologies and the Invasion of Privacy Rights

Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
Date: August 2003
Creator: Simsek, Yilmaz
System: The UNT Digital Library
An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005 (open access)

An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

Motor vehicle theft is the costliest property crime in the United States equaling billions of dollars in losses each year. Despite law enforcement success in decreasing the rate of motor vehicle theft in recent years, the actual number of thefts has increased. It is vital for law enforcement agencies to know who is committing motor vehicle theft and where vehicles are being stolen. This study answers these questions by examining offender demographic characteristics and the location types most targeted for motor vehicle theft in Texas from 2001 to 2005. The state of Texas was chosen because Texas has continually been ranked second in the Federal Bureau of Investigation's Uniform Crime Report for the number of reported incidents of motor vehicle theft in the United States.
Date: December 2007
Creator: Adger, Katherine
System: The UNT Digital Library
Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis) (open access)

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
Date: August 2002
Creator: Tuncer, Hakki
System: The UNT Digital Library
Fundamental Demographics of Digital Piracy Offenders (open access)

Fundamental Demographics of Digital Piracy Offenders

Digital piracy is an emerging cybercrime subtype with overarching implications for administrators and researchers alike. Within this body of knowledge, it is unclear what individual-level factors are linked to digital piracy. Using a college-based sample, while focusing on gender, race, and age, this study identifies fundamental individual-level variables associated with digital piracy commission. After conducting multiple independent samples t-tests and a multivariate logistic regression, results found age and computer proficiency were significantly associated with the likelihood of engaging in digital piracy. These findings can help establish the foundational characteristics of digital pirates. By shifting the focus back to basic individual factors, universities can identify preventive efforts and researchers can better understand who engages in digital piracy.
Date: May 2018
Creator: Guerra, Chris
System: The UNT Digital Library
Online Pornography and Its Effects on the Behavior of College Students (open access)

Online Pornography and Its Effects on the Behavior of College Students

The primary goal of this study was to investigate the habits of college students who use pornography. The study was designed to collect data on the use of online pornography by college students. Through the use of an online survey, the study collected general demographic data and data on the frequency with which students used online pornography. The study also collected data on the general attitudes of college students towards online pornography. Participants consisted of students enrolled at the University of North Texas during the Spring 2016 semester. The participants of the study were contacted by an email requesting the student to respond to an online anonymous survey regarding their use of online pornography. The survey consisted of thirty questions and statements, primarily utilizing a five point Likert scale. Analysis of the data collected as well as a discussion of the findings are included.
Date: May 2016
Creator: Hassell, Michelle S.
System: The UNT Digital Library
Factors Contributing to the Three-Year Graduation Rate of Students in Technical Programs at an Urban Community College (open access)

Factors Contributing to the Three-Year Graduation Rate of Students in Technical Programs at an Urban Community College

With an increasingly technological and competitive world economy, more jobs require employees to have achieved the advanced skills and knowledge gained only through postsecondary education. The data regarding the supply and demand between the workforce and higher education present a challenge for community college technical programs. These are the programs charged training the new workforce. An effort to increase the persistence and three-year graduation rate for technical students is one of Tarrant County College District's initiatives to prepare students for the workforce. Therefore, the purpose of this study was to determine factors that contribute to the three-year graduation rates of students enrolled in technical programs at the Northwest Campus of the Tarrant County College District. A quantitative survey approach was selected for this study targeting 191 technical students. The results of this study showed that females, who had established a degree plan and declared a major during the first two semesters at the urban community college campus under study, graduated in three years. The graduation rates for males in this study were lower than for females. Also, technical students who were 18 to 35 years old were more likely to graduate. Students who did not complete a degree plan in …
Date: May 2009
Creator: Gantt, Aubra Jeanette
System: The UNT Digital Library
Political Misuse of Domestic Intelligence: A Case Study on the FBI (open access)

Political Misuse of Domestic Intelligence: A Case Study on the FBI

Domestic intelligence is very important in preventing disorder while ensuring unity and security during a time of national crisis. However, if uncontrolled, domestic intelligence can be subject to political misuse, which causes serious damage both to individuals and to democratic institutions. There are various theoretical explanations for political misuse of domestic intelligence. The political use of domestic intelligence is best explained by the sociological theory of unfulfilled needs. On the other hand, political counterintelligence can be best explained by Threat Theory. In order for a domestic intelligence organization to be effective, its organizational discretion must be limited by establishing clear legislation that is not secret, on the focus, limits, and techniques of domestic intelligence. This system must be supported by a multi-level control mechanism.
Date: August 2002
Creator: Pacci, Mehme
System: The UNT Digital Library
A Descriptive Study of the Intelligence Community in the United States of America (open access)

A Descriptive Study of the Intelligence Community in the United States of America

This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
Date: May 2003
Creator: Ucak, Hursit
System: The UNT Digital Library
Serial Killing Myths Versus    Reality:  A Content Analysis Of Serial Killer Flicks Made   Between 1980 and 2001 (open access)

Serial Killing Myths Versus Reality: A Content Analysis Of Serial Killer Flicks Made Between 1980 and 2001

Public perceptions about serial homicide are more mythical than fact. Myths about serial homicide are perpetuated through several sources, especially the entertainment media which is a dominant and influential mythmaker. The number of films depicting serial killers and serial killing themes has increased dramatically in recent years. However, the reality of these films is debatable. This research examines the reality, or lack thereof, of the most recent films involving a serial killing theme. Hickey provides a wealth of statistical information on a number of serial killers and serial killings. A content analysis of the fifty top grossing serial killer movies made between 1980 and 2001 was conducted using variables from Hickey research. Research shows similarities and differences between variables, however, results concludes the entertainment media does not accurately portray serial homicide.
Date: August 2002
Creator: McCready, Sarah Scott
System: The UNT Digital Library

Changing Privacy Concerns in the Internet Era.

Access: Use of this item is restricted to the UNT Community
Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Date: August 2002
Creator: Demir, Irfan
System: The UNT Digital Library
Evaluation of Program Effectiveness: a Look at the Bedford Police Department’s Strategy Towards Repeat Victimization in Domestic Violence and Mental Health (open access)

Evaluation of Program Effectiveness: a Look at the Bedford Police Department’s Strategy Towards Repeat Victimization in Domestic Violence and Mental Health

The primary goal of this study was to evaluate the effectiveness of a program being run by the Bedford Police Department’s Repeat Victimization Unit on domestic violence and mental health and mental retardation. The study sought to determine whether the program was effective in reducing instances of repeat victimization in domestic violence and MHMR victims. Additionally the program investigated whether or not the program was effective at reducing victimization severity, and which demographic could be identified as the most victimized. Participants consisted of 157 domestic violence and MHMR victims in the city of Bedford, Tx between November 11, 2012 to July 30, 2013. Findings indicate that levels of repeat victimization for domestic violence and MHMR are relatively low regardless of whether the victim received services through the repeat victimization program or not. Additionally the severity of these repeat victimizations remains relatively constant regardless of whether services were received through the program or not. Implications and findings are discussed.
Date: August 2014
Creator: Huskey, Michael G.
System: The UNT Digital Library
Law Enforcement Training and Perceptions of Mental Illness (open access)

Law Enforcement Training and Perceptions of Mental Illness

This thesis analyzes the training and perceptions on mental health of a particular population. Through the use of previous research and literature, a survey was generated and distributed to the population. The findings were used to generate policy implications for the specific population that was analyzed.
Date: December 2018
Creator: Brabham, Sofia C
System: The UNT Digital Library