An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey (open access)

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
Date: August 2004
Creator: Teymur, Samih
System: The UNT Digital Library
A Historical Analysis of the Failures of Camp David 2000 Summit (open access)

A Historical Analysis of the Failures of Camp David 2000 Summit

This research seeks to understand the reasons for failures of Bill Clinton, Yasser Arafat, and Ehud Barak's Camp David Summit that was held in July, 2000. The Summit was arranged to complete the last phase of Oslo Peace Process. Numerous researches have attempted to reveal the facts of the summit but, so far, they have failed to present the complete details of what happened before, during, and after the summit. This research explores all aspects of the problem including the various variables that would have had effected the breakdown of the Middle East peace process. Finally, the researcher determines the parameters needed to maintain a substantial peace in the Middle East and what proposed strategies might be followed in order to avoid the previous mistakes in future peace negotiations.
Date: August 2005
Creator: Yilmaz, Ismail
System: The UNT Digital Library
An Analysis of Adler's Theory and the Female Criminal (open access)

An Analysis of Adler's Theory and the Female Criminal

This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Date: August 2004
Creator: Armentrout, Elizabeth G.
System: The UNT Digital Library

A Case Study of Leftist Terrorism in Turkey

Access: Use of this item is restricted to the UNT Community
Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Date: August 2001
Creator: Yayla, Ahmet
System: The UNT Digital Library
The Crutch of Ritual: Social Control in the Modern American Capital Punishment System (open access)

The Crutch of Ritual: Social Control in the Modern American Capital Punishment System

Contemporary American capital punishment contains many processual elements, such as the prisoner's last meal and the cleansing of his body immediately before death, that serve no concrete, practical purpose but share a nature with ritual practices. In this project, I utilize a hermeneutic phenomenological lens to identify and list these ritual elements. I also use concepts drawn from the structural functionalist tradition to both analyze the specific purposes the elements serve within individual parts of the death penalty and to discuss the overarching result of the inclusion of these elements within the process as a whole. Ultimately, I find that the ritual elements present in the capital punishment process serve a social control purpose, insulating and reinforcing the death penalty as a whole. Ritual works to do this by controlling the behavior and image of the prisoner and emotionally soothing both participants of the process and the public at large.
Date: August 2019
Creator: Pellegrino, Alexandra Clarke
System: The UNT Digital Library
Untangled: The Effects Family Structure Has on Juvenile Delinquency (open access)

Untangled: The Effects Family Structure Has on Juvenile Delinquency

Juvenile delinquency is an issue in today's society for various reasons. This issue can result due to different motives, but family dynamics is one of the most vital factors. The current study extends prior research done in regards to the family factors that affect juvenile delinquency and what policies and programs are available to eliminate these factors. The seven family dynamics that are studied are socioeconomic status, divorce, cohabiting, family transitions, parental incarceration, parental control, as well as parental substance abuse. A subsample of policies and programs are assigned to each factor and researched of whether or not they are effective. Majority of the programs were effective and were found to minimize antisocial behaviors among adolescents. The programs that were not evaluated were still found to have a positive impact on juveniles' behaviors due to the outcomes of the policies. Investing in these programs and policies are beneficial for juveniles and the impact that family dynamics play on delinquency.
Date: December 2017
Creator: Murray, Taylor Danielle
System: The UNT Digital Library
Mother Dearest: Understanding Attachment Styles of Juvenile Offenders across Crime Types (open access)

Mother Dearest: Understanding Attachment Styles of Juvenile Offenders across Crime Types

This exploratory study investigated the relationship between attachment style and offense types of juvenile offenders to determine whether there were commonalities among the cohort and their attachment style. Much of the peer-reviewed literature focuses on adult sex offenders and attachment style but neglects the juvenile population. The present study utilized secondary data from the Texas Juvenile Justice Department (TJJD) which included adjudicated juveniles with Positive Achievement Change Tool (PACT) data (n = 4,521) from 2009 to 2013. Juveniles were grouped into three attachment groups (secure, anxious-avoidant, or other) based on attachment correlates found in their PACT data. Logistic regression analyses were then used to investigate the relationship between attachment styles and offense types among the adjudicated juveniles. Results indicated that attachment style does not have an overwhelming influence on offense type of juvenile offenders. However, juveniles with an attachment style other than secure or anxious-avoidant were more likely to be adjudicated for assault/aggravated assault, sexual assault/aggravated assault, aggravated robbery, and other offenses not captured. Whereas juveniles with an anxious-avoidant attachment are at increased odds of being adjudicated for drug offenses. However, it should be noted that juveniles adjudicated for sexual assault/aggravated sexual assault with an anxious-avoidant attachment style reflected a …
Date: July 2023
Creator: White, Lindsey Nicole
System: The UNT Digital Library
Truancy Intervention: A Study of Dallas Independent School District Participants in the Dallas Challenge Truancy and Class C Enforcement Center (open access)

Truancy Intervention: A Study of Dallas Independent School District Participants in the Dallas Challenge Truancy and Class C Enforcement Center

This research examines agency data for participants in a truancy intervention program. Previous literature provides mostly descriptive information and fails to examine the effects of truancy intervention efforts. The analysis provides a profile of truant participants referred to the program and factors that correlate to successful completion of the program requirements. The results will be applicable to the study program as evaluation research and will be generalized for application to other truancy programs. Directions for future truancy research will be suggested based on the need to continue to evaluate truancy reduction efforts.
Date: August 2005
Creator: Fairchild, James John
System: The UNT Digital Library

An Analysis of Major American Riots: Issues in Riots and Riot Control

Access: Use of this item is restricted to the UNT Community
By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list …
Date: August 2001
Creator: Cinoglu, Huseyin
System: The UNT Digital Library
FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards? (open access)

FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?

Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
Date: May 2009
Creator: Meyer, Aric
System: The UNT Digital Library
Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders (open access)

Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders

The purpose of this study is to explore the differences and characteristics between first time felony probationer and recidivist felony probation offender. The importance of said studies grows significantly, given current trends of sentencing offenders to probation. Using archived data on random sample of felony offenders in 2000 and based on information acquired and maintained by the Denton County Community Supervision and Corrections Department (CSCD), the study consists of 40 first time felony offenders and 40 recidivist felony offender placed on probation during the year 2000. The method consists of a longitudinal comparison model. To examine the research question, descriptive statistics are used to compare basic demographics. Then, in order to answer the research question bi-variate significant tests, Chi-square and Independent Sample T-tests were employed when appropriate. Results indicate differences between first time felony probation offenders and recidivist felony probationers.
Date: May 2007
Creator: Lynton, Eddy
System: The UNT Digital Library
An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers (open access)

An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers

Although Turkey is a country with strong social cohesion, figures of runaway children in Turkey are increasing dramatically. This research focused on the factors that cause children to run away and on interaction programs to intervene and/or prevent this problem. Until recently, Turkish family life was able to avoid such problems, but with the effect of westernization and social mobility in Turkey, the basic family structure has become more like the family structure in the western countries. Studies reveal that runaway episodes happen in all families regardless of such factors as economic, race, or geographic situations. Teenagers run away for several reasons; however, early intervention is highly suggested by studies to mitigate the problem. Although, parent-child conflict plays a significant role as a reason for youth leaving home, on the other hand family interaction still remains the best alternative to the problem.
Date: August 2005
Creator: Ekici, Siddik
System: The UNT Digital Library

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Access: Use of this item is restricted to the UNT Community
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
Date: August 2005
Creator: Yalcinkaya, Ramazan
System: The UNT Digital Library
A survey of the Greater Dallas Crime Commission and its effect on the (open access)

A survey of the Greater Dallas Crime Commission and its effect on the

This thesis examines the history of the Greater Dallas Crime Commission and its effectiveness within the criminal justice system. It is a private agency established fifty (50) years ago to monitor and investigate the criminal justice system. Today, it serves as a source of funding for criminal justice agencies, provides awards and recognition forums for law enforcement and lobbies for legal revisions of the criminal code. The research is designed to examine their role within the criminal justice system. Whether current crime theories are supported by the commission is central to the thesis. There are no prior studies available of crime commissions perhaps because they are privately funded and operated by civilians. Crime commissions do exert influence, politically and financially, upon law enforcement. It is reflected often in their history. The extent of this effect is the subject of the paper. To this end, the commission's role in changing state laws, providing funds for police training, recognizing prosecutors and paying awards to informants lends credibility to their role in the criminal justice system. Their function has often changed during the fifty-year history. If there is a deficit, it may be that the commission has the capability, through its sphere of …
Date: May 2001
Creator: Latham, H. Lee
System: The UNT Digital Library
An unholy alliance: Case studies in narco-terrorism (open access)

An unholy alliance: Case studies in narco-terrorism

This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Date: August 2002
Creator: Cakir, Reha
System: The UNT Digital Library