Evaluation of Program Effectiveness: a Look at the Bedford Police Department’s Strategy Towards Repeat Victimization in Domestic Violence and Mental Health (open access)

Evaluation of Program Effectiveness: a Look at the Bedford Police Department’s Strategy Towards Repeat Victimization in Domestic Violence and Mental Health

The primary goal of this study was to evaluate the effectiveness of a program being run by the Bedford Police Department’s Repeat Victimization Unit on domestic violence and mental health and mental retardation. The study sought to determine whether the program was effective in reducing instances of repeat victimization in domestic violence and MHMR victims. Additionally the program investigated whether or not the program was effective at reducing victimization severity, and which demographic could be identified as the most victimized. Participants consisted of 157 domestic violence and MHMR victims in the city of Bedford, Tx between November 11, 2012 to July 30, 2013. Findings indicate that levels of repeat victimization for domestic violence and MHMR are relatively low regardless of whether the victim received services through the repeat victimization program or not. Additionally the severity of these repeat victimizations remains relatively constant regardless of whether services were received through the program or not. Implications and findings are discussed.
Date: August 2014
Creator: Huskey, Michael G.
System: The UNT Digital Library
Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis) (open access)

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
Date: August 2002
Creator: Tuncer, Hakki
System: The UNT Digital Library
Student Perceptions of the University of North Texas Campus Police (open access)

Student Perceptions of the University of North Texas Campus Police

Numerous studies have been conducted to determine predictors of perceptions and attitudes toward police. Less effort has been spent on determining university and college students' perceptions of campus police departments. The purpose of this thesis was to fill this gap in the literature with an added emphasis on exploring potential differences in perceptions between students involved in Greek Life organizations and students not involved in Greek Life organizations. Prior literature found that Greek Life students engage in risk-taking behaviors at higher rates than their counterparts, so it was hypothesized that Greek Life students would have higher levels of distrust in the campus police due to their increased engagement in risk-taking behaviors. The survey questionnaire measuring trust and procedural justice/legitimacy perceptions of campus police was distributed through convenience sampling to university students. Descriptive statistics, bivariate analyses, and multivariate analyses were utilized to analyze the data. The results showed that students overall had positive perceptions of campus police, that Greek Life students had more negative perceptions of the campus police than non-Greek Life students, and that students with prior interactions with the campus police were more likely to perceive the police to be less procedurally just/legitimate. Race/ethnicity was not found to be …
Date: May 2018
Creator: Stidd, Megan D
System: The UNT Digital Library
Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders (open access)

Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders

The purpose of this study is to explore the differences and characteristics between first time felony probationer and recidivist felony probation offender. The importance of said studies grows significantly, given current trends of sentencing offenders to probation. Using archived data on random sample of felony offenders in 2000 and based on information acquired and maintained by the Denton County Community Supervision and Corrections Department (CSCD), the study consists of 40 first time felony offenders and 40 recidivist felony offender placed on probation during the year 2000. The method consists of a longitudinal comparison model. To examine the research question, descriptive statistics are used to compare basic demographics. Then, in order to answer the research question bi-variate significant tests, Chi-square and Independent Sample T-tests were employed when appropriate. Results indicate differences between first time felony probation offenders and recidivist felony probationers.
Date: May 2007
Creator: Lynton, Eddy
System: The UNT Digital Library
The Appropriate Use of Human Intelligence in Combating Terrorism (open access)

The Appropriate Use of Human Intelligence in Combating Terrorism

When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Date: August 2003
Creator: Koseli, Mutlu
System: The UNT Digital Library
Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path (open access)

Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

This study scrutinizes the drug-terrorism nexus critically with intent to conceive possible remedies for the problem. The vast turnover of the global illicit drug industry constitutes the largest portion of organized crime enterprises' income. Different circles have argued that these enterprises are not the sole actors of the drug business, but terrorist groups, whose ultimate aim is a political change rather than financial strength, also profit from the “business.” The controversial nature of the problem fuelled heated debates and requires an in depth and impartial analysis, which was the main subject of the current study. At the first stage, three different cases, the PKK, the LTTE, and the SL, were studied either to prove or deny the alleged phenomenon. The sampled groups' ideology, structure, and operations helped understand the motives pushing the organizations into the ‘business.' Subsequently, several recommendations capturing vital issues both in countering terrorism and breaking terrorism-drugs link were spelled out.
Date: August 2001
Creator: Sahin, Fuat Salih
System: The UNT Digital Library

A Case Study of Leftist Terrorism in Turkey

Access: Use of this item is restricted to the UNT Community
Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Date: August 2001
Creator: Yayla, Ahmet
System: The UNT Digital Library
Political Misuse of Domestic Intelligence: A Case Study on the FBI (open access)

Political Misuse of Domestic Intelligence: A Case Study on the FBI

Domestic intelligence is very important in preventing disorder while ensuring unity and security during a time of national crisis. However, if uncontrolled, domestic intelligence can be subject to political misuse, which causes serious damage both to individuals and to democratic institutions. There are various theoretical explanations for political misuse of domestic intelligence. The political use of domestic intelligence is best explained by the sociological theory of unfulfilled needs. On the other hand, political counterintelligence can be best explained by Threat Theory. In order for a domestic intelligence organization to be effective, its organizational discretion must be limited by establishing clear legislation that is not secret, on the focus, limits, and techniques of domestic intelligence. This system must be supported by a multi-level control mechanism.
Date: August 2002
Creator: Pacci, Mehme
System: The UNT Digital Library
A Descriptive Study of the Intelligence Community in the United States of America (open access)

A Descriptive Study of the Intelligence Community in the United States of America

This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
Date: May 2003
Creator: Ucak, Hursit
System: The UNT Digital Library
An unholy alliance: Case studies in narco-terrorism (open access)

An unholy alliance: Case studies in narco-terrorism

This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Date: August 2002
Creator: Cakir, Reha
System: The UNT Digital Library

An Analysis of Major American Riots: Issues in Riots and Riot Control

Access: Use of this item is restricted to the UNT Community
By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list …
Date: August 2001
Creator: Cinoglu, Huseyin
System: The UNT Digital Library
An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey (open access)

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
Date: August 2004
Creator: Teymur, Samih
System: The UNT Digital Library

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Access: Use of this item is restricted to the UNT Community
The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Date: August 2003
Creator: Turer, Ahmet
System: The UNT Digital Library
Terrorism, Media and Public Perception: Influence of Media on Public Perception on Terrorism Related Matters (open access)

Terrorism, Media and Public Perception: Influence of Media on Public Perception on Terrorism Related Matters

The purpose of this study is to measure and examine whether terrorism continues to be highly feared and over-predicted, whether exposure to mass or news media influences perceptions of terrorism, whether mass media remains a significant source of information on terrorism related matters and whether people are prepared to act in the event of a terrorist attack. The respondents in this research consisted of a sample of 135 students aged 18 and over, at a participating mid-size university in a southern state, who completed a self-reported online survey on voluntary basis. The findings of the study suggests that the respondents access terrorism related news-media on both weekly and daily basis. Those with frequent access tend to overestimate the likelihood of a domestic terrorist attack and the threat posed by terrorism and tend to show higher levels of fear associated with terrorism. The majority of the respondents indicated average access of news-media of once or twice a week, or no use at all and they tend to not overestimate the likelihood of a terrorist attack, indicate some or no fear in relation to terrorism and tend to have more accurate perception of the current threat posed by terrorism.
Date: May 2018
Creator: Ivanova, Andrea
System: The UNT Digital Library
A survey of the Greater Dallas Crime Commission and its effect on the (open access)

A survey of the Greater Dallas Crime Commission and its effect on the

This thesis examines the history of the Greater Dallas Crime Commission and its effectiveness within the criminal justice system. It is a private agency established fifty (50) years ago to monitor and investigate the criminal justice system. Today, it serves as a source of funding for criminal justice agencies, provides awards and recognition forums for law enforcement and lobbies for legal revisions of the criminal code. The research is designed to examine their role within the criminal justice system. Whether current crime theories are supported by the commission is central to the thesis. There are no prior studies available of crime commissions perhaps because they are privately funded and operated by civilians. Crime commissions do exert influence, politically and financially, upon law enforcement. It is reflected often in their history. The extent of this effect is the subject of the paper. To this end, the commission's role in changing state laws, providing funds for police training, recognizing prosecutors and paying awards to informants lends credibility to their role in the criminal justice system. Their function has often changed during the fifty-year history. If there is a deficit, it may be that the commission has the capability, through its sphere of …
Date: May 2001
Creator: Latham, H. Lee
System: The UNT Digital Library

Foot and/or Bicycle Patrols in Major Texas Metropolitan Police Departments

Access: Use of this item is restricted to the UNT Community
During the last 25 years in law enforcement in the United States, there has been a universal practice of foot and/or bicycle patrols used to accomplish the goal of police patrol enforcement and the philosophy of community policing in metropolitan areas. These tactics of patrol have also been used in police departments in and around the State of Texas. This report is a research project on six major metropolitan police departments in the State of Texas, analyzing their allocation of foot and/or bicycle patrol units within their urban cities. The study assesses their early history in using these two police tactics to address criminal activity and their progression from foot patrol to bicycle patrol. The findings of this research support the proposition that major Texas police departments have adopted the practices and philosophies of other major urban police departments around the US, by using foot and/or bicycle patrols in their cities. There is evidence that major Texas police departments were using foot patrol during the early 1980s in support of community policing and gradually phased out this practice in the early 1990s to adopt the new enforcement tactic of policing on a bicycle.
Date: August 2006
Creator: Pavlik, Wayne Louis
System: The UNT Digital Library

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Access: Use of this item is restricted to the UNT Community
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
Date: August 2005
Creator: Yalcinkaya, Ramazan
System: The UNT Digital Library

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Access: Use of this item is restricted to the UNT Community
The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Date: May 2005
Creator: Morgan, Deanne
System: The UNT Digital Library
Let the Punishment Fit the Crime: an Overview of the Historical Approach to Probation in the State of Texas (open access)

Let the Punishment Fit the Crime: an Overview of the Historical Approach to Probation in the State of Texas

Adult probation evolved in the United States as a result of the suspended sentence concept. As a result of a lack of follow through when an individual obtained a suspended sentence, there was no “checks and balances” to monitor whether an individual completed the guidelines set forth. As time progressed, it became apparent a more cohesive and monitored system was needed. Thus, an energetic and motivated individual, John Augustus, started the concept of probation by taking it upon himself to assist in the rehabilitative process of individuals charged with criminal behavior. Subsequent to his death, the concept of probation was embraced by his advocates who lobbied legislatively in order to enact probation laws that would oversee the success of probationers. It wasn’t until the 1950’s that the counties in the state of Texas took it upon themselves to enact their own system of monitoring of probationers. Over time the states have guided their probation concepts from evidence based research. Juvenile probation in the United States didn’t gain a solid foundation until the end of the 19th century with the development of the first juvenile court in Illinois. It took this country time to understand that juveniles were different than adults …
Date: May 2015
Creator: Reichstein, Sheldon Philip
System: The UNT Digital Library
FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards? (open access)

FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?

Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
Date: May 2009
Creator: Meyer, Aric
System: The UNT Digital Library
Island Empire: the Influence of the Maceo Family in Galveston (open access)

Island Empire: the Influence of the Maceo Family in Galveston

From the 1920s until the 1950s, brothers, Sam and Rosario Maceo, ran an influential crime family in Galveston, Texas. The brothers’ success was largely due to Galveston’s transient population, the turbulent history of the island, and the resulting economic decline experienced at the turn of the 20th century. Their success began during Prohibition, when they opened their first club. The establishment offered bootlegged liquor, fine dining, and first class entertainment. After Prohibition, the brothers continued to build an empire on the island through similar clubs, without much opposition from the locals. However, after being suspected of involvement in a drug smuggling ring, the Maceos were placed under scrutiny from outside law enforcement agencies. Through persistent investigations, the Texas Rangers finally shut down the rackets in Galveston in 1957. Despite their influence through the first half of the 20th century, on the island and off the island, their story is largely missing from the current literature.
Date: August 2014
Creator: Boatman, T. Nicole
System: The UNT Digital Library
Transnational Organized Crime and Destabilization in Democracies, Russian Organized Crime as Case Study (open access)

Transnational Organized Crime and Destabilization in Democracies, Russian Organized Crime as Case Study

Transnational organized crime has been prevalent during the last century, but it recently has been recognized as a threat to the world order. Governments throughout the world, along with the intergovernmental organizations identified this phenomenon as a new threat to domestic and international security. This paper attempts to explain the impacts of transnational organized crime on the functioning of democratic societies by adopting the Russian Organized Crime as case study. The descriptive research with regard to definition, scope and organization of transnational organized crime, along with the objectives, limitations and methodology of this research will be included in the first chapter. Recent trends observed in organized crime`s character and the impact of organized crime on the political economies of democratic regimes will be contained in the following chapters. Pre-conditions for a broader response to transnational organized crime and conclusive remarks will be the context of the last chapter.
Date: August 2001
Creator: Yasar, Muhammet Murat
System: The UNT Digital Library
A Historical Analysis of the Failures of Camp David 2000 Summit (open access)

A Historical Analysis of the Failures of Camp David 2000 Summit

This research seeks to understand the reasons for failures of Bill Clinton, Yasser Arafat, and Ehud Barak's Camp David Summit that was held in July, 2000. The Summit was arranged to complete the last phase of Oslo Peace Process. Numerous researches have attempted to reveal the facts of the summit but, so far, they have failed to present the complete details of what happened before, during, and after the summit. This research explores all aspects of the problem including the various variables that would have had effected the breakdown of the Middle East peace process. Finally, the researcher determines the parameters needed to maintain a substantial peace in the Middle East and what proposed strategies might be followed in order to avoid the previous mistakes in future peace negotiations.
Date: August 2005
Creator: Yilmaz, Ismail
System: The UNT Digital Library
Media Influence on Executive Police Decision-Making: A Case Study of Police and Media Interaction During the Oklahoma City Bombing Investigation and Trials (open access)

Media Influence on Executive Police Decision-Making: A Case Study of Police and Media Interaction During the Oklahoma City Bombing Investigation and Trials

Because media influence public opinion, it is often surmised that media also influence the decisions of police executives. This exploratory case study examined the relationship between police and media during the Oklahoma City bombing investigation and subsequent trials of Timothy McVeigh and Terry Nichols. Findings indicate that media influence police executive decisions when police and media interact closely. It was found that during the Oklahoma City bombing investigation and trials, police on the outer perimeter were influenced most and police conducting the investigation or who were tasked to court room security were influenced the least. It was concluded, based on the consensus of respondents interviewed, that media do influence police executive decisions.
Date: May 2001
Creator: Bellew, Steven S.
System: The UNT Digital Library