Transnational Organized Crime and Destabilization in Democracies, Russian Organized Crime as Case Study (open access)

Transnational Organized Crime and Destabilization in Democracies, Russian Organized Crime as Case Study

Transnational organized crime has been prevalent during the last century, but it recently has been recognized as a threat to the world order. Governments throughout the world, along with the intergovernmental organizations identified this phenomenon as a new threat to domestic and international security. This paper attempts to explain the impacts of transnational organized crime on the functioning of democratic societies by adopting the Russian Organized Crime as case study. The descriptive research with regard to definition, scope and organization of transnational organized crime, along with the objectives, limitations and methodology of this research will be included in the first chapter. Recent trends observed in organized crime`s character and the impact of organized crime on the political economies of democratic regimes will be contained in the following chapters. Pre-conditions for a broader response to transnational organized crime and conclusive remarks will be the context of the last chapter.
Date: August 2001
Creator: Yasar, Muhammet Murat
System: The UNT Digital Library
Problems Encountered in Money Laundering Investigations (open access)

Problems Encountered in Money Laundering Investigations

The purpose of this study is to identify how the U.S. is responding to money laundering and what kind of problems arise while countering it, beginning with a detailed description of money laundering, its stages, typologies, impacts, and complications. Due to the broad nature of this subject only three main issues form the focal point of this study: problems concerning the banking industry and other financial organizations, problems resulting from the limitations of law enforcement agencies, and problems arising from the lack of cooperation between and within financial institutions and law enforcement agencies. Several probable solutions to the above problems are identified: Considering the financial industry, there are loopholes in the Bank Secrecy Act (BSA) and in other regulations that apply to the industry. Thus, there is a comparison of the Subjective Model vs. Objective Model in terms of reporting systems for financial organizations. On the law enforcement side, the priority is the need to update and upgrade their technology and investigation mechanisms in order not to fall behind the criminals. Finally, cooperation is something that can be achieved through mutual respect and understanding of the priorities of each side, which can be achieved by the creation of an upper …
Date: August 2001
Creator: Akyay, Ilkay
System: The UNT Digital Library
Job Satisfaction of Juvenile Facility Directors: Results from a National Survey (open access)

Job Satisfaction of Juvenile Facility Directors: Results from a National Survey

This study utilizes a national survey to measure the job satisfaction of juvenile facility directors. The prior literature has focused on the experiences of line personnel within the adult correctional system, and this research serves to provide new information regarding this specific population. The current study will address the predictors and correlates of a director's job satisfaction. It is hypothesized that specific characteristics within the organization will predict job satisfaction. Issues regarding staff within an institution and their effect on a director's job satisfaction are the focus. Results indicate that staff issues significantly contribute to the job satisfaction of a director. Specifically, this research can be used to understand facility director retention, staff and juvenile related issues, and the effect of job satisfaction on criminal justice policy issues.
Date: August 2001
Creator: Flanigan, Amy Renee
System: The UNT Digital Library
New Organized Crime: Problems and Issues for Information Analysis (open access)

New Organized Crime: Problems and Issues for Information Analysis

This study illustrates the changing nature of organized crime at both national and international levels. Organized crime groups have changed in that they have entered the realm of high technology. In response this change, the use of new or modified analytical tools is suggested to enhance law enforcement efforts. This study highlights the problems of, and offers particular solutions for information analysis in its use in the fight against organized crime. Ultimately, it is argued that combined crime and intelligence analysis can be an effective and efficient method for the detection and prevention of modern organized crime.
Date: August 2001
Creator: Demirci, Suleyman
System: The UNT Digital Library
The Correctional Orientation of Juvenile Facility Directors (open access)

The Correctional Orientation of Juvenile Facility Directors

Over the last 30 years, the juvenile justice system and juvenile correctional ideology shifted to become more punitive in nature. However, studies examining this shift are lacking in the literature. The present study will attempt to assess what correctional ideology, rehabilitative or punitive, is dominant within juvenile corrections by conducting a national survey to juvenile facility directors. This study will be based on prior literature, most of which has focused upon line staff in an adult correctional setting. From this prior literature, more specifically from the work of Cullen et al. (1989), scales will be created to determine the correctional orientation of the key administrators in juvenile facilities. This will allow us to assess whether the correctional ideology driving the juvenile system has in fact become punitive. The findings from this study have the opportunity to alter the current status quo in juvenile corrections.
Date: August 2001
Creator: Sifuentes-Hammer, Amy
System: The UNT Digital Library
Criminal Justice Responses to Emerging Computer Crime Problems (open access)

Criminal Justice Responses to Emerging Computer Crime Problems

This study discussed the issue of computer crime as it relates to the criminal justice system, specifically law enforcement. The information was gathered through several books, academic journals, governmental documents, and the Internet. First, the nature and forms of computer crime, Internet crime, and cyber terrorism were analyzed. Next, law enforcement responses were discussed. International aspects of the problem were separately pointed out. Further, detection and investigation of computer crime were examined. Problems related to the each component of the criminal justice system (law enforcement, investigators, prosecutors, and judges) were described. Specific solutions to these problems were offered. In addition, computer crime handling procedures were presented. Results indicate that computer crime will increase in the 21st century, and this problem cannot be controlled by traditional methods alone. Using new technology as preventive measures, and increasing awareness and security conscious culture will prevent the problem in the long run.
Date: August 2001
Creator: Sen, Osman N.
System: The UNT Digital Library
Structuralist and interactionist perspectives of collective behavior and control of crowds. (open access)

Structuralist and interactionist perspectives of collective behavior and control of crowds.

The purpose of this thesis is to understand the concept of collective behavior from different theoretical perspectives and the policy implications they imply for the Turkish Riot Police Units. The civil disturbances in the 1960s have clearly illustrated range of problems in the domain of crowd control. This work will start with the general characteristics and the classification of collective behavior. Second, two main perspectives on collective behavior, which are the structuralist and the interactionist perspectives, will be examined respectively. The question will be asked whether these two perspectives efficiently and effectively explain the crowds and the crowd control. Finally, the other factors in crowd control will be explored, and recommendations concerning the handling of crowds in a more peaceful manner will be made.
Date: August 2001
Creator: Gunes, Ismail Dincer
System: The UNT Digital Library
Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis) (open access)

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
Date: August 2002
Creator: Tuncer, Hakki
System: The UNT Digital Library
Characteristics of Community Service Programs and Probationers in Texas (open access)

Characteristics of Community Service Programs and Probationers in Texas

As a criminal sanction, community service involves unpaid labor on the part of convicted criminal offenders. Community service was created as an alternative to incarceration for low-level offenders. It now appears, however, that community service is rarely used as a true alternative to prison, but rather as an added condition of probation. The body of research on community service in the United States is modest, so relatively little is known about its characteristics and administration. Data were attained from 88 Texas probation professionals via self-administered written surveys in an effort to gather information about the use of community service as a criminal sanction in Texas. Frequency distribution analyses identified characteristics of both community service programs and offender participants in Texas.
Date: August 2002
Creator: Roberts, Darrin David
System: The UNT Digital Library
Life without Parole for Juvenile Offenders: Questions of Legality and Adolescent Culpability (open access)

Life without Parole for Juvenile Offenders: Questions of Legality and Adolescent Culpability

Life without parole for juvenile offenders is a controversial issue across the globe. Recently, the United States stands alone as the only country in the world that allows juvenile offenders to be sentenced to life time confinement without the possibility of parole. Furthermore, the U.S. has seen an increase in juvenile waivers and blended sentences, which has resulted in harsher penalties for juvenile offenders who have committed serious and violent crimes. This analysis examines scientific evidence that shows juveniles are different from adults in terms of brain development, rational decision making abilities, and maturity levels. These findings have questioned the reasoning behind imposing adult punishment on adolescent behavior. This analysis also presents the legal arguments suggesting that juvenile life without parole is unconstitutional and violates the Eighth and Fourteenth Amendments. Arguments for and against life sentences were also presented. This study concludes with a discussion of policy implications, whether the U.S. Supreme Court should abolish juvenile life without parole sentencing practices and explores the possible future direction of juvenile sentencing in the United States.
Date: August 2010
Creator: Corrington, David L.
System: The UNT Digital Library
Violent Female Offending: Examining the Role of Psychopathy and Comorbidity with DSM-IV Personality Disorders (open access)

Violent Female Offending: Examining the Role of Psychopathy and Comorbidity with DSM-IV Personality Disorders

This thesis examines the role of psychopathy in violent female offending, and explores DSM-IV personality disorders that may also be a factor. Past research on female offenders and psychopathy suggest that this is a valid construct when looking at female offenders. This study was driven by two questions: which personality disorders are most common in adult female offenders who are psychopathic, and are adult female offenders who are psychopathic more likely to have been convicted of a violent offense than those who are not psychopathic, but have at least one personality disorder. The results indicate that Cluster B personality disorders were the most common, and Cluster C the least common. The results also showed that those women who were psychopathic were no more likely to have been convicted of a violent crime than those who had at least one personality disorder, but were not psychopathic. Treatment implications and the direction of future research are discussed.
Date: August 2010
Creator: Hilving, Rebecca
System: The UNT Digital Library
Political Misuse of Domestic Intelligence: A Case Study on the FBI (open access)

Political Misuse of Domestic Intelligence: A Case Study on the FBI

Domestic intelligence is very important in preventing disorder while ensuring unity and security during a time of national crisis. However, if uncontrolled, domestic intelligence can be subject to political misuse, which causes serious damage both to individuals and to democratic institutions. There are various theoretical explanations for political misuse of domestic intelligence. The political use of domestic intelligence is best explained by the sociological theory of unfulfilled needs. On the other hand, political counterintelligence can be best explained by Threat Theory. In order for a domestic intelligence organization to be effective, its organizational discretion must be limited by establishing clear legislation that is not secret, on the focus, limits, and techniques of domestic intelligence. This system must be supported by a multi-level control mechanism.
Date: August 2002
Creator: Pacci, Mehme
System: The UNT Digital Library
A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police. (open access)

A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police.

This study explores the underlying causes and deterrent control mechanisms of police misconduct in the United States. Outcomes of causes and control mechanisms constitute the basis for an applicable model for the Turkish National Police (TNP). Why is some police behavior deviate? What are the main determinants of police misconduct? Is police misconduct a result of sociological behavior and subcultural development within police organizations or a psychological behavior as an outcome of officers' personal traits? What are the control mechanisms for police misconduct? What are their strengths and weaknesses? Do they deter or not? Is there a control mechanism that deters better than others? What is the best deterrence model for the TNP?
Date: August 2002
Creator: Lofca, Izzet
System: The UNT Digital Library
Serial Killing Myths Versus    Reality:  A Content Analysis Of Serial Killer Flicks Made   Between 1980 and 2001 (open access)

Serial Killing Myths Versus Reality: A Content Analysis Of Serial Killer Flicks Made Between 1980 and 2001

Public perceptions about serial homicide are more mythical than fact. Myths about serial homicide are perpetuated through several sources, especially the entertainment media which is a dominant and influential mythmaker. The number of films depicting serial killers and serial killing themes has increased dramatically in recent years. However, the reality of these films is debatable. This research examines the reality, or lack thereof, of the most recent films involving a serial killing theme. Hickey provides a wealth of statistical information on a number of serial killers and serial killings. A content analysis of the fifty top grossing serial killer movies made between 1980 and 2001 was conducted using variables from Hickey research. Research shows similarities and differences between variables, however, results concludes the entertainment media does not accurately portray serial homicide.
Date: August 2002
Creator: McCready, Sarah Scott
System: The UNT Digital Library
Transnational Organized Crime and the Drug Business (open access)

Transnational Organized Crime and the Drug Business

This study analyzes the activities of the organized crime groups involved in the drug business, as well as examining national and international efforts to control these groups. Specifically, this study addresses the following questions: How is organized crime connected to the international drug business?; What are the major transnational organized crime groups involved in the international drug business?; What is the nature of the drug problem as it relates to organized crime internationally?; What international cooperative law enforcement efforts currently exist to deal with organized crime and the drug business? Findings indicate that efforts to create an effective international law enforcement network are needed to meet the challenges of drug trafficking and globalized crime. To date, such efforts have largely been unsuccessful.
Date: August 2002
Creator: Aksakal, Baris
System: The UNT Digital Library
An unholy alliance: Case studies in narco-terrorism (open access)

An unholy alliance: Case studies in narco-terrorism

This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Date: August 2002
Creator: Cakir, Reha
System: The UNT Digital Library
Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices (open access)

Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

It is assumed that democratic policing will help to improve the respect of human rights and democracy in a given country. Using secondary data, this study explores cross-nationally the interrelation between democratic policing practices (e.g., community policing) and democracy and human rights.The results show significant positive correlation between the practice of democratic policing and indicators of democracy and respect for human rights. The analysis strongly implies that scholars have underestimated the power of policing institutions in democratic societies.
Date: August 2002
Creator: Can, Salih Hakan
System: The UNT Digital Library
Community Policing Training Programs and Their Roles in Implementation of Community Policing (open access)

Community Policing Training Programs and Their Roles in Implementation of Community Policing

The main goal of this study is to indicate the importance of community policing training programs for implementation of community policing. Community policing requires a transition from traditional policing methods to proactive and problem-oriented policing which is constructed upon police-citizen partnership. For the successful implementation of community policing, the change process needs to be fully realized throughout the organization. Suitably appropriate methods of training will help both officers and citizens to fully understand the goals of community policing. This study focuses on the types of existing community training methods as well as the obstacles that complicate training efforts. Consequently, this study provides some recommendations on community policing training programs to make them more helpful for police departments.
Date: August 2002
Creator: Demir, Cuneyt
System: The UNT Digital Library
Racial Disparity in Traffic Stops: An Analysis of Racial Profiling Data in Texas (open access)

Racial Disparity in Traffic Stops: An Analysis of Racial Profiling Data in Texas

The primary goal of this study was to analyze existing racial profiling data collected and reported by law enforcement agencies in Texas. The internet-based data used was obtained through TCOLE, as it is the state mandated repository in which all law enforcement agencies must submit their annual racial profiling reports to. In analyzing a collection requirement of these reports, this study sought to determine how frequently law enforcement officers know the race or ethnicity of drivers prior to traffic stops. Furthermore, the study sought to determine if there are differences in the rates of race or ethnicity known prior to stops across Texas geographical regions, county population sizes, agency types, as well as between counties with and without interstate thoroughfares. This analysis consisted of 3,250,984 traffic stops conducted by 1,186 law enforcement agencies in 2014. Findings revealed that law enforcement officers rarely know the race or ethnicity of drivers prior to traffic stops, as was consistently found across all measures. Findings and implications are discussed.
Date: August 2016
Creator: Winkler, Jordan M.
System: The UNT Digital Library
New Surveillance Technologies and the Invasion of Privacy Rights (open access)

New Surveillance Technologies and the Invasion of Privacy Rights

Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
Date: August 2003
Creator: Simsek, Yilmaz
System: The UNT Digital Library
An Analysis of Adler's Theory and the Female Criminal (open access)

An Analysis of Adler's Theory and the Female Criminal

This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Date: August 2004
Creator: Armentrout, Elizabeth G.
System: The UNT Digital Library
An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey (open access)

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
Date: August 2004
Creator: Teymur, Samih
System: The UNT Digital Library
Communication Assistance for Law Enforcement Act of 1994: A Case Study (open access)

Communication Assistance for Law Enforcement Act of 1994: A Case Study

The purpose of this study is: to explore and analyze the Communication Assistance for Law Enforcement Act of 1994 (CALEA), to identify problems related to CALEA, to identify solutions devised by other countries to overcome problems similar to CALEA's, and to propose feasible solutions to CALEA problems.
Date: August 2001
Creator: Ozdogan, Ali
System: The UNT Digital Library
Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path (open access)

Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

This study scrutinizes the drug-terrorism nexus critically with intent to conceive possible remedies for the problem. The vast turnover of the global illicit drug industry constitutes the largest portion of organized crime enterprises' income. Different circles have argued that these enterprises are not the sole actors of the drug business, but terrorist groups, whose ultimate aim is a political change rather than financial strength, also profit from the “business.” The controversial nature of the problem fuelled heated debates and requires an in depth and impartial analysis, which was the main subject of the current study. At the first stage, three different cases, the PKK, the LTTE, and the SL, were studied either to prove or deny the alleged phenomenon. The sampled groups' ideology, structure, and operations helped understand the motives pushing the organizations into the ‘business.' Subsequently, several recommendations capturing vital issues both in countering terrorism and breaking terrorism-drugs link were spelled out.
Date: August 2001
Creator: Sahin, Fuat Salih
System: The UNT Digital Library