An Analysis of Major American Riots: Issues in Riots and Riot Control

Access: Use of this item is restricted to the UNT Community
By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list …
Date: August 2001
Creator: Cinoglu, Huseyin
System: The UNT Digital Library

The Impact Of Community Policing On The Structure And Administration of Police Agencies

Access: Use of this item is restricted to the UNT Community
The last decade has witnessed the rise of a new movement called “community policing.” Basic philosophical principles, which focus on improved services to the public through decentralization, better communication and decision-making processes, and more police discretion highlight the community policing movement. Essentially, community policing is the quality movement in American policing. This thesis will explore the impact of community policing on the structure and administration of police agencies. Since this movement is centered in local police agencies, the focus will also be at that level. Considerable effort will be devoted to providing an accurate description of law enforcement in the United States; however, the crux of this treatise will be on the discussion of organizational problems developed at the local level as a result of implementing community policing concepts.
Date: August 2001
Creator: Erdem, Mehmet
System: The UNT Digital Library
An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005 (open access)

An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

Motor vehicle theft is the costliest property crime in the United States equaling billions of dollars in losses each year. Despite law enforcement success in decreasing the rate of motor vehicle theft in recent years, the actual number of thefts has increased. It is vital for law enforcement agencies to know who is committing motor vehicle theft and where vehicles are being stolen. This study answers these questions by examining offender demographic characteristics and the location types most targeted for motor vehicle theft in Texas from 2001 to 2005. The state of Texas was chosen because Texas has continually been ranked second in the Federal Bureau of Investigation's Uniform Crime Report for the number of reported incidents of motor vehicle theft in the United States.
Date: December 2007
Creator: Adger, Katherine
System: The UNT Digital Library

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Access: Use of this item is restricted to the UNT Community
The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Date: August 2003
Creator: Turer, Ahmet
System: The UNT Digital Library

Police Officer Burnout: An Examination of Officer Stress, the Policing Subculture and the Advantages of Family Counseling

Access: Use of this item is restricted to the UNT Community
The work of a police officer is stressful and could potentially lead to burnout. As a result, a variety of reactions may occur which include, cynicism, abuse of authority, and in extreme cases suicide. One method which has been proven to be effective in treating officer stress is counseling; however, because of the policing subculture the opportunity to seek counseling has been ignored. In order to successfully manage officer stress, the subculture must be dealt with. Additionally, the officers' family must also be acknowledged as being affected by officer burnout. Counseling services must be made available to the officer's family and through training they can become a source of support instead of an added source of stress to the officer.
Date: December 2004
Creator: Yanez, Luiz
System: The UNT Digital Library
An Analysis of Adler's Theory and the Female Criminal (open access)

An Analysis of Adler's Theory and the Female Criminal

This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Date: August 2004
Creator: Armentrout, Elizabeth G.
System: The UNT Digital Library
An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey (open access)

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
Date: August 2004
Creator: Teymur, Samih
System: The UNT Digital Library

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Access: Use of this item is restricted to the UNT Community
The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Date: May 2005
Creator: Morgan, Deanne
System: The UNT Digital Library

Foot and/or Bicycle Patrols in Major Texas Metropolitan Police Departments

Access: Use of this item is restricted to the UNT Community
During the last 25 years in law enforcement in the United States, there has been a universal practice of foot and/or bicycle patrols used to accomplish the goal of police patrol enforcement and the philosophy of community policing in metropolitan areas. These tactics of patrol have also been used in police departments in and around the State of Texas. This report is a research project on six major metropolitan police departments in the State of Texas, analyzing their allocation of foot and/or bicycle patrol units within their urban cities. The study assesses their early history in using these two police tactics to address criminal activity and their progression from foot patrol to bicycle patrol. The findings of this research support the proposition that major Texas police departments have adopted the practices and philosophies of other major urban police departments around the US, by using foot and/or bicycle patrols in their cities. There is evidence that major Texas police departments were using foot patrol during the early 1980s in support of community policing and gradually phased out this practice in the early 1990s to adopt the new enforcement tactic of policing on a bicycle.
Date: August 2006
Creator: Pavlik, Wayne Louis
System: The UNT Digital Library
Communication Assistance for Law Enforcement Act of 1994: A Case Study (open access)

Communication Assistance for Law Enforcement Act of 1994: A Case Study

The purpose of this study is: to explore and analyze the Communication Assistance for Law Enforcement Act of 1994 (CALEA), to identify problems related to CALEA, to identify solutions devised by other countries to overcome problems similar to CALEA's, and to propose feasible solutions to CALEA problems.
Date: August 2001
Creator: Ozdogan, Ali
System: The UNT Digital Library
Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path (open access)

Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

This study scrutinizes the drug-terrorism nexus critically with intent to conceive possible remedies for the problem. The vast turnover of the global illicit drug industry constitutes the largest portion of organized crime enterprises' income. Different circles have argued that these enterprises are not the sole actors of the drug business, but terrorist groups, whose ultimate aim is a political change rather than financial strength, also profit from the “business.” The controversial nature of the problem fuelled heated debates and requires an in depth and impartial analysis, which was the main subject of the current study. At the first stage, three different cases, the PKK, the LTTE, and the SL, were studied either to prove or deny the alleged phenomenon. The sampled groups' ideology, structure, and operations helped understand the motives pushing the organizations into the ‘business.' Subsequently, several recommendations capturing vital issues both in countering terrorism and breaking terrorism-drugs link were spelled out.
Date: August 2001
Creator: Sahin, Fuat Salih
System: The UNT Digital Library
Problem-oriented approach to criminal investigation: implementation issues and challenges (open access)

Problem-oriented approach to criminal investigation: implementation issues and challenges

As a proactive, information-based policing approach, problem-oriented policing emphasizes the use of crime analysis techniques in the analysis of the underlying causes of the problems that police deal with. In particular, analysis applications can be powerful tools for criminal investigation, such as crime reconstruction, profiling, IAFIS, VICAP, and CODIS. The SARA Model represents a problem-solving strategy of problemoriented policing. It aims to address the underlying causes of the problems and create substantial solutions. However, implementing problem-oriented policing requires a significant change in both the philosophy and structure of police agencies. Not only American policing but also the Turkish National Police should consider problem-oriented policing as an alternative approach for solving criminal activities.
Date: August 2001
Creator: Ozeren, Suleyman
System: The UNT Digital Library
Exploring job related stress and job satisfaction in a modern law enforcement communications division. (open access)

Exploring job related stress and job satisfaction in a modern law enforcement communications division.

One of the most neglected areas of criminological and social science research is the police communications or dispatch center. While research projects dealing with stress and job satisfaction are found in abundance for other occupations, studies specific to the police dispatcher are uncommon. The role of the dispatcher has changed significantly in the last few decades. Improvements in technology and changes in public expectations of emergency services have forever altered the communications professional. Dispatchers work in an environment reliant on information. There is tremendous pressure to process the information coming into a communications center quickly and correctly. A mistake could prove fatal. Work pressures, burnout, high employee turnover, low pay, and a lack of respect from police coworkers can easily result in negative emotional and psychological consequences for the dispatcher. An effective manager could reduce the feelings of stress and low job satisfaction this environment can facilitate. The current study utilizes survey data from a sample of police dispatchers and their managers in the Dallas/Fort Worth, Texas area. The purpose of the survey is to identify the level of stress and job satisfaction reported by the dispatchers and their managers. The effects of differing types of stress will be investigated. …
Date: May 2005
Creator: Burgess, Lavona
System: The UNT Digital Library
A Longitudinal Study of Juvenile Facility Directors' Job Satisfaction Levels in the United States (open access)

A Longitudinal Study of Juvenile Facility Directors' Job Satisfaction Levels in the United States

This national study, focusing on job satisfaction within juvenile facility directors, was conducted by the means of a survey. The study is longitudinal in nature; the survey was conducted in 1995 and 2000. Other past studies have focused on line level employees, guards, and the juveniles, but few have concentrated on juvenile facility directors. Literature on directors is currently lacking, this continuous study will give a better ongoing perspective of their attitudes and beliefs. Findings from this particular study will help to address current concerns inside of the system, starting at the apex. The survey's goal is to correlate factors that have a direct impact on their job satisfaction. Results indicate that staff issues have a dramatic impact on a director's job satisfaction.
Date: August 2006
Creator: Skertich, Jonathan David
System: The UNT Digital Library
Institutional Misconduct Among Gang Related and Non-Gang Related Institutionalized Delinquents (open access)

Institutional Misconduct Among Gang Related and Non-Gang Related Institutionalized Delinquents

The problems that gang members create within adult correctional facilities continue to receive attention in the literature. Gang members within juvenile institutions have received far less attention from researchers, and misconduct of these juveniles, both serious and non-serious, is relatively unexplored. This study explored the institutional misconduct of 4,309 male delinquents released from the Texas Youth Commission. Youths younger at commitment, those with a higher TYC risk score, and those youths with emotional problems were found more likely to commit both serious and non-serious institutional misconduct, regardless of gang membership. This thesis concludes with suggestions for additional research on gang members within juvenile institutions and the relationship of gang membership to institutional misconduct.
Date: December 2006
Creator: Kawucha, Soraya K.
System: The UNT Digital Library

Accuracy Variations in Human Facial Identification Based on Time of Exposure.

Access: Use of this item is restricted to the UNT Community
This study examined the relationship between time of exposure to the human face and accurate subsequent photo line-up identification. A volunteer group of 124 undergraduate students was divided into three approximately equal sized subgroups. The three groups were then exposed to a video or a portion of a video depicting a theft. Exposure times ranged from two minutes to 30 seconds. The subjects were then given a questionnaire and shown a photo line-up of the mock perpetrator and five foils. Subjects were asked to identify the perpetrator and mark that identification on the questionnaire. Results of the experiment indicated that the longer a subject was exposed the greater the possibility of an accurate identification.
Date: December 2006
Creator: Cowle, Kenneth M.
System: The UNT Digital Library
Getting sober while incarcerated: An exploratory analysis of correctional substance abuse treatment programs (open access)

Getting sober while incarcerated: An exploratory analysis of correctional substance abuse treatment programs

Substance abuse is an expensive problem facing the American public and the criminal justice field. Using secondary data analysis this study examined 1,921 participants across five substance abuse programs within California and New York jail systems. Specifically this study explored the impact of location, demographic characteristics, offense committed, and previous drug treatment on successful completion of the treatment program. Descriptive analyses were used to examine the demographic characteristics of the sample and the types of drugs used by participants in the thirty days prior to jail admission. Results from bivariate analyses indicated that location, demographic characteristics, and previous drug treatment were all significantly related to successful completion. Implications for current correctional treatment programs and future research on this topic are discussed
Date: December 2007
Creator: Kimball, Bree A.
System: The UNT Digital Library
Taking Steps toward Recidivism Prevention: Examining the Impact of Cognitive Behavioral Therapy on Juvenile Delinquency (open access)

Taking Steps toward Recidivism Prevention: Examining the Impact of Cognitive Behavioral Therapy on Juvenile Delinquency

Researchers within the criminal justice field have examined recidivism to discover effective methods to deter criminals from re-offending. Typically, incarceration provided specific deterrence for offenders but recidivism after release proved problematic. Using secondary data analysis, the present study evaluates a cognitive behavioral therapy [CBT] program, Reasoning and Rehabilitation, which the state of Colorado implemented in 1995 among juveniles on intensive probation. The original research team collected the data through pre- and post-questionnaires and interviews with probation officers. The pre- and post-test data are utilized to specifically analyze certain variables including self-control, empathy and problemsolving abilities. The focus of the present study is to determine the level of change in these particular variables as an outcome of completing the CBT program. This analysis also explores the value of CBT programs and examines how the programs alter an offender's level of selfcontrol, empathy and problem-solving abilities thus reducing recidivism after completion.
Date: May 2008
Creator: Cain, Stefanie A.
System: The UNT Digital Library
A Matter of Due Process: An Examination of How State Mandated Accreditation has Impacted Texas Crime Laboratories (open access)

A Matter of Due Process: An Examination of How State Mandated Accreditation has Impacted Texas Crime Laboratories

Mandated accreditation of crime laboratories is a fairly new phenomenon. The state of Texas was the first to require that crime laboratories be accredited in order to be able to present evidence in a criminal proceeding. The laws that govern this are Texas House Bill 2703 and Texas House Bill 1068. The goal of this study is see how the enactment of these laws impacted crime laboratories. There are 42 crime laboratories that are accredited in the state of Texas. This study was conducted by the use of telephone survey interviews. Results indicated that mandated accreditation is a step in the right direction to ensure that objectivity is maintained during the processing and evaluation of physical evidence.
Date: May 2008
Creator: DeLillo, Sandy Dawn
System: The UNT Digital Library
Recidivism Outcomes among a Cohort of Violent Institutionalized Juvenile Offenders (open access)

Recidivism Outcomes among a Cohort of Violent Institutionalized Juvenile Offenders

Serious and violent juvenile offenders cause a disproportionate amount of harm to society, yet this population receives very little attention within the realm of empirical research. This research study examined the recidivism outcomes of 296 serious and violent offenders previously exposed to rehabilitative treatment in the Capital and Serious Violent Offender Program provided by the Texas Youth Commission. This group of juveniles was followed for three years following their release from institutionalization. This analysis revealed that 52% of those released were rearrested at least once during the follow-up period for any offense, while 48% of those released desisted from crime altogether. Of those 296 released, 34% were rearrested for at least one new felony offense. The analyses indicate that those involved in various forms of institutional misconduct during institutionalization were significantly more likely to recidivate. African-American race and institutional misconduct in the form of rule infractions emerged as the most consistent predictors of recidivism for this sample. This study concludes with a discussion of policy implications and risk assessment related to the decisions that are made to release this population of violent juvenile offenders.
Date: August 2008
Creator: Haerle, Darin R.
System: The UNT Digital Library
FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards? (open access)

FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?

Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
Date: May 2009
Creator: Meyer, Aric
System: The UNT Digital Library
The Appropriate Use of Human Intelligence in Combating Terrorism (open access)

The Appropriate Use of Human Intelligence in Combating Terrorism

When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Date: August 2003
Creator: Koseli, Mutlu
System: The UNT Digital Library
Truancy Intervention: A Study of Dallas Independent School District Participants in the Dallas Challenge Truancy and Class C Enforcement Center (open access)

Truancy Intervention: A Study of Dallas Independent School District Participants in the Dallas Challenge Truancy and Class C Enforcement Center

This research examines agency data for participants in a truancy intervention program. Previous literature provides mostly descriptive information and fails to examine the effects of truancy intervention efforts. The analysis provides a profile of truant participants referred to the program and factors that correlate to successful completion of the program requirements. The results will be applicable to the study program as evaluation research and will be generalized for application to other truancy programs. Directions for future truancy research will be suggested based on the need to continue to evaluate truancy reduction efforts.
Date: August 2005
Creator: Fairchild, James John
System: The UNT Digital Library

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Access: Use of this item is restricted to the UNT Community
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
Date: August 2005
Creator: Yalcinkaya, Ramazan
System: The UNT Digital Library