Degree Discipline

States

12 Matching Results

Results open in a new window/tab.

A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police. (open access)

A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police.

This study explores the underlying causes and deterrent control mechanisms of police misconduct in the United States. Outcomes of causes and control mechanisms constitute the basis for an applicable model for the Turkish National Police (TNP). Why is some police behavior deviate? What are the main determinants of police misconduct? Is police misconduct a result of sociological behavior and subcultural development within police organizations or a psychological behavior as an outcome of officers' personal traits? What are the control mechanisms for police misconduct? What are their strengths and weaknesses? Do they deter or not? Is there a control mechanism that deters better than others? What is the best deterrence model for the TNP?
Date: August 2002
Creator: Lofca, Izzet
System: The UNT Digital Library

Changing Privacy Concerns in the Internet Era.

Access: Use of this item is restricted to the UNT Community
Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Date: August 2002
Creator: Demir, Irfan
System: The UNT Digital Library
Characteristics of Community Service Programs and Probationers in Texas (open access)

Characteristics of Community Service Programs and Probationers in Texas

As a criminal sanction, community service involves unpaid labor on the part of convicted criminal offenders. Community service was created as an alternative to incarceration for low-level offenders. It now appears, however, that community service is rarely used as a true alternative to prison, but rather as an added condition of probation. The body of research on community service in the United States is modest, so relatively little is known about its characteristics and administration. Data were attained from 88 Texas probation professionals via self-administered written surveys in an effort to gather information about the use of community service as a criminal sanction in Texas. Frequency distribution analyses identified characteristics of both community service programs and offender participants in Texas.
Date: August 2002
Creator: Roberts, Darrin David
System: The UNT Digital Library
Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis) (open access)

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
Date: August 2002
Creator: Tuncer, Hakki
System: The UNT Digital Library
Community Policing Training Programs and Their Roles in Implementation of Community Policing (open access)

Community Policing Training Programs and Their Roles in Implementation of Community Policing

The main goal of this study is to indicate the importance of community policing training programs for implementation of community policing. Community policing requires a transition from traditional policing methods to proactive and problem-oriented policing which is constructed upon police-citizen partnership. For the successful implementation of community policing, the change process needs to be fully realized throughout the organization. Suitably appropriate methods of training will help both officers and citizens to fully understand the goals of community policing. This study focuses on the types of existing community training methods as well as the obstacles that complicate training efforts. Consequently, this study provides some recommendations on community policing training programs to make them more helpful for police departments.
Date: August 2002
Creator: Demir, Cuneyt
System: The UNT Digital Library
Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices (open access)

Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

It is assumed that democratic policing will help to improve the respect of human rights and democracy in a given country. Using secondary data, this study explores cross-nationally the interrelation between democratic policing practices (e.g., community policing) and democracy and human rights.The results show significant positive correlation between the practice of democratic policing and indicators of democracy and respect for human rights. The analysis strongly implies that scholars have underestimated the power of policing institutions in democratic societies.
Date: August 2002
Creator: Can, Salih Hakan
System: The UNT Digital Library

Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement.

Access: Use of this item is restricted to the UNT Community
Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that given the failures of existing private law solutions to the problem, these public law enforcement solutions should be more effective, efficient, and more satisfactory.
Date: August 2002
Creator: Temur, Nuri
System: The UNT Digital Library

Investigation of Computer Crimes

Access: Use of this item is restricted to the UNT Community
In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
Date: August 2002
Creator: Erdonmez, Erhan
System: The UNT Digital Library
Political Misuse of Domestic Intelligence: A Case Study on the FBI (open access)

Political Misuse of Domestic Intelligence: A Case Study on the FBI

Domestic intelligence is very important in preventing disorder while ensuring unity and security during a time of national crisis. However, if uncontrolled, domestic intelligence can be subject to political misuse, which causes serious damage both to individuals and to democratic institutions. There are various theoretical explanations for political misuse of domestic intelligence. The political use of domestic intelligence is best explained by the sociological theory of unfulfilled needs. On the other hand, political counterintelligence can be best explained by Threat Theory. In order for a domestic intelligence organization to be effective, its organizational discretion must be limited by establishing clear legislation that is not secret, on the focus, limits, and techniques of domestic intelligence. This system must be supported by a multi-level control mechanism.
Date: August 2002
Creator: Pacci, Mehme
System: The UNT Digital Library
Serial Killing Myths Versus    Reality:  A Content Analysis Of Serial Killer Flicks Made   Between 1980 and 2001 (open access)

Serial Killing Myths Versus Reality: A Content Analysis Of Serial Killer Flicks Made Between 1980 and 2001

Public perceptions about serial homicide are more mythical than fact. Myths about serial homicide are perpetuated through several sources, especially the entertainment media which is a dominant and influential mythmaker. The number of films depicting serial killers and serial killing themes has increased dramatically in recent years. However, the reality of these films is debatable. This research examines the reality, or lack thereof, of the most recent films involving a serial killing theme. Hickey provides a wealth of statistical information on a number of serial killers and serial killings. A content analysis of the fifty top grossing serial killer movies made between 1980 and 2001 was conducted using variables from Hickey research. Research shows similarities and differences between variables, however, results concludes the entertainment media does not accurately portray serial homicide.
Date: August 2002
Creator: McCready, Sarah Scott
System: The UNT Digital Library
Transnational Organized Crime and the Drug Business (open access)

Transnational Organized Crime and the Drug Business

This study analyzes the activities of the organized crime groups involved in the drug business, as well as examining national and international efforts to control these groups. Specifically, this study addresses the following questions: How is organized crime connected to the international drug business?; What are the major transnational organized crime groups involved in the international drug business?; What is the nature of the drug problem as it relates to organized crime internationally?; What international cooperative law enforcement efforts currently exist to deal with organized crime and the drug business? Findings indicate that efforts to create an effective international law enforcement network are needed to meet the challenges of drug trafficking and globalized crime. To date, such efforts have largely been unsuccessful.
Date: August 2002
Creator: Aksakal, Baris
System: The UNT Digital Library
An unholy alliance: Case studies in narco-terrorism (open access)

An unholy alliance: Case studies in narco-terrorism

This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Date: August 2002
Creator: Cakir, Reha
System: The UNT Digital Library