Accuracy Variations in Human Facial Identification Based on Time of Exposure.

Access: Use of this item is restricted to the UNT Community
This study examined the relationship between time of exposure to the human face and accurate subsequent photo line-up identification. A volunteer group of 124 undergraduate students was divided into three approximately equal sized subgroups. The three groups were then exposed to a video or a portion of a video depicting a theft. Exposure times ranged from two minutes to 30 seconds. The subjects were then given a questionnaire and shown a photo line-up of the mock perpetrator and five foils. Subjects were asked to identify the perpetrator and mark that identification on the questionnaire. Results of the experiment indicated that the longer a subject was exposed the greater the possibility of an accurate identification.
Date: December 2006
Creator: Cowle, Kenneth M.
System: The UNT Digital Library
An Analysis of Adler's Theory and the Female Criminal (open access)

An Analysis of Adler's Theory and the Female Criminal

This research paper addressed the following question: Do select case studies conform to Dr. Freda Adler's theory regarding socio-economic influences on female criminal behavior or dispute her theory? My research involved three female criminals: Karla Faye Tucker, Andrea Yates, and Susan Smith. I addressed Adler's theory in detail, other theories, the makeup of the female criminal and various female crimes. This study provided evidence that all three case studies conform to Adler's theory. nIn accordance with Adler's theory, each of these three females committed crimes of accessibility. None of the three individuals sought to commit a premeditated act or to murder unknown victims. They were motivated by emotions arising at a point in time when access/opportunity presented itself.
Date: August 2004
Creator: Armentrout, Elizabeth G.
System: The UNT Digital Library
An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005 (open access)

An Analysis of Location and Offender Characteristics for Motor Vehicle Theft in Texas from 2001 to 2005

Motor vehicle theft is the costliest property crime in the United States equaling billions of dollars in losses each year. Despite law enforcement success in decreasing the rate of motor vehicle theft in recent years, the actual number of thefts has increased. It is vital for law enforcement agencies to know who is committing motor vehicle theft and where vehicles are being stolen. This study answers these questions by examining offender demographic characteristics and the location types most targeted for motor vehicle theft in Texas from 2001 to 2005. The state of Texas was chosen because Texas has continually been ranked second in the Federal Bureau of Investigation's Uniform Crime Report for the number of reported incidents of motor vehicle theft in the United States.
Date: December 2007
Creator: Adger, Katherine
System: The UNT Digital Library

An Analysis of Major American Riots: Issues in Riots and Riot Control

Access: Use of this item is restricted to the UNT Community
By conducting sound research to understand the concepts surrounding rioting and efficient riot response tactics, professionals, especially whose main job is to ensure the tranquility in the society, will be better prepared to deal with all kinds of civil movements. The purpose of this study, consequently, is to meet the growing need for educational materials in this area and to provide riot response case studies, which demonstrate the numerous administrative challenges faced by law enforcement decision makers. In this study, seven major riots from throughout the United States are discussed including the Hay Market Riot of 1886, the Watts Riot of 1965, and Los Angeles Riots of 1992. Each riot case is studied in five different and independent stages: the setting and pre-disturbance situation, basic causes of the event, the disturbance situation, the response to the riot, and the aftermath of the incident. The study of all of these stages is intended to help police administrators acquire a general perspective on collective violence, and help them prevent future occurrences in their jurisdictions. In this thesis a special reference is given to the deficiencies of American riot policing and some recommendations were formed accordingly. Therefore, the study concludes with a list …
Date: August 2001
Creator: Cinoglu, Huseyin
System: The UNT Digital Library
An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey (open access)

An Analysis of Terrorist Recruitment by Observing DHKP/C (Revolutionary People's Liberation Party/Front) Terrorist Organization in Turkey

Terrorism has been claimed to be a major problem by hundreds of thousands of people in the international arena for years. Either it has been very difficult to determine and understand the reasons for terrorism, or those reasons have never been studied because of the immediate threat of terrorism. This research analyzed the recruitment process of terrorists by studying the DHKP/C terrorist organization and by answering the following questions. The first is "What factors are correlated with joining a terrorist organization?" And the second is "What is the recruitment process of the DHKP/C?" IN the course of this research, I used specific reports written by DHKP/C members and personal experience to come to better understanding of the motivation behind terrorism and the process by which people are recruited in the terrorist organizations.
Date: August 2004
Creator: Teymur, Samih
System: The UNT Digital Library
The Appropriate Use of Human Intelligence in Combating Terrorism (open access)

The Appropriate Use of Human Intelligence in Combating Terrorism

When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Date: August 2003
Creator: Koseli, Mutlu
System: The UNT Digital Library
An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers (open access)

An Assessment on the Impact of Family Dynamics on the Runaway Problem Among Teenagers

Although Turkey is a country with strong social cohesion, figures of runaway children in Turkey are increasing dramatically. This research focused on the factors that cause children to run away and on interaction programs to intervene and/or prevent this problem. Until recently, Turkish family life was able to avoid such problems, but with the effect of westernization and social mobility in Turkey, the basic family structure has become more like the family structure in the western countries. Studies reveal that runaway episodes happen in all families regardless of such factors as economic, race, or geographic situations. Teenagers run away for several reasons; however, early intervention is highly suggested by studies to mitigate the problem. Although, parent-child conflict plays a significant role as a reason for youth leaving home, on the other hand family interaction still remains the best alternative to the problem.
Date: August 2005
Creator: Ekici, Siddik
System: The UNT Digital Library
Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path (open access)

Case studies in terrorism-drug connection: the Kurdistan Workers' Party, the Liberation Tigers of Tamil Eelam, and the Shining Path

This study scrutinizes the drug-terrorism nexus critically with intent to conceive possible remedies for the problem. The vast turnover of the global illicit drug industry constitutes the largest portion of organized crime enterprises' income. Different circles have argued that these enterprises are not the sole actors of the drug business, but terrorist groups, whose ultimate aim is a political change rather than financial strength, also profit from the “business.” The controversial nature of the problem fuelled heated debates and requires an in depth and impartial analysis, which was the main subject of the current study. At the first stage, three different cases, the PKK, the LTTE, and the SL, were studied either to prove or deny the alleged phenomenon. The sampled groups' ideology, structure, and operations helped understand the motives pushing the organizations into the ‘business.' Subsequently, several recommendations capturing vital issues both in countering terrorism and breaking terrorism-drugs link were spelled out.
Date: August 2001
Creator: Sahin, Fuat Salih
System: The UNT Digital Library

A Case Study of Leftist Terrorism in Turkey

Access: Use of this item is restricted to the UNT Community
Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Date: August 2001
Creator: Yayla, Ahmet
System: The UNT Digital Library
A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police. (open access)

A Case Study on Police Misconduct in the United States of America and an Applicable Model for the Turkish National Police.

This study explores the underlying causes and deterrent control mechanisms of police misconduct in the United States. Outcomes of causes and control mechanisms constitute the basis for an applicable model for the Turkish National Police (TNP). Why is some police behavior deviate? What are the main determinants of police misconduct? Is police misconduct a result of sociological behavior and subcultural development within police organizations or a psychological behavior as an outcome of officers' personal traits? What are the control mechanisms for police misconduct? What are their strengths and weaknesses? Do they deter or not? Is there a control mechanism that deters better than others? What is the best deterrence model for the TNP?
Date: August 2002
Creator: Lofca, Izzet
System: The UNT Digital Library

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Access: Use of this item is restricted to the UNT Community
The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Date: May 2005
Creator: Morgan, Deanne
System: The UNT Digital Library

Changing Privacy Concerns in the Internet Era.

Access: Use of this item is restricted to the UNT Community
Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Date: August 2002
Creator: Demir, Irfan
System: The UNT Digital Library
Characteristics of Community Service Programs and Probationers in Texas (open access)

Characteristics of Community Service Programs and Probationers in Texas

As a criminal sanction, community service involves unpaid labor on the part of convicted criminal offenders. Community service was created as an alternative to incarceration for low-level offenders. It now appears, however, that community service is rarely used as a true alternative to prison, but rather as an added condition of probation. The body of research on community service in the United States is modest, so relatively little is known about its characteristics and administration. Data were attained from 88 Texas probation professionals via self-administered written surveys in an effort to gather information about the use of community service as a criminal sanction in Texas. Frequency distribution analyses identified characteristics of both community service programs and offender participants in Texas.
Date: August 2002
Creator: Roberts, Darrin David
System: The UNT Digital Library
Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis) (open access)

Civil Asset Forfeiture in the Fight Against Drugs (Policy Analysis)

Even if the main criminals of an organization are incarcerated, they will be replaced by others who would continue illegal activities, unless their financial assets are removed. Thus, civil forfeiture intends to dismantle the economic infrastructure of drug trafficking networks. Civil forfeiture considers the property as guilty, rather than the owner, and it may exist even if there is not a criminal action. Therefore, it is claimed that police agencies have chosen easy targets, such as wealthy drug users rather than major drug traffickers. Consequently, it has been particularly challenged on the basis of the Excessive Fines, Double Jeopardy, and Due Process Clauses. The use of criminal forfeiture instead of civil forfeiture and the elimination of the equitable sharing provision are considered to be the primary solutions.
Date: August 2002
Creator: Tuncer, Hakki
System: The UNT Digital Library

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Access: Use of this item is restricted to the UNT Community
The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Date: August 2003
Creator: Turer, Ahmet
System: The UNT Digital Library
Communication Assistance for Law Enforcement Act of 1994: A Case Study (open access)

Communication Assistance for Law Enforcement Act of 1994: A Case Study

The purpose of this study is: to explore and analyze the Communication Assistance for Law Enforcement Act of 1994 (CALEA), to identify problems related to CALEA, to identify solutions devised by other countries to overcome problems similar to CALEA's, and to propose feasible solutions to CALEA problems.
Date: August 2001
Creator: Ozdogan, Ali
System: The UNT Digital Library
Community Policing Training Programs and Their Roles in Implementation of Community Policing (open access)

Community Policing Training Programs and Their Roles in Implementation of Community Policing

The main goal of this study is to indicate the importance of community policing training programs for implementation of community policing. Community policing requires a transition from traditional policing methods to proactive and problem-oriented policing which is constructed upon police-citizen partnership. For the successful implementation of community policing, the change process needs to be fully realized throughout the organization. Suitably appropriate methods of training will help both officers and citizens to fully understand the goals of community policing. This study focuses on the types of existing community training methods as well as the obstacles that complicate training efforts. Consequently, this study provides some recommendations on community policing training programs to make them more helpful for police departments.
Date: August 2002
Creator: Demir, Cuneyt
System: The UNT Digital Library
Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices (open access)

Comparative Analysis of Interrelations Between Democracy and Democratic Policing Practices

It is assumed that democratic policing will help to improve the respect of human rights and democracy in a given country. Using secondary data, this study explores cross-nationally the interrelation between democratic policing practices (e.g., community policing) and democracy and human rights.The results show significant positive correlation between the practice of democratic policing and indicators of democracy and respect for human rights. The analysis strongly implies that scholars have underestimated the power of policing institutions in democratic societies.
Date: August 2002
Creator: Can, Salih Hakan
System: The UNT Digital Library

Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement.

Access: Use of this item is restricted to the UNT Community
Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that given the failures of existing private law solutions to the problem, these public law enforcement solutions should be more effective, efficient, and more satisfactory.
Date: August 2002
Creator: Temur, Nuri
System: The UNT Digital Library
The Correctional Orientation of Juvenile Facility Directors (open access)

The Correctional Orientation of Juvenile Facility Directors

Over the last 30 years, the juvenile justice system and juvenile correctional ideology shifted to become more punitive in nature. However, studies examining this shift are lacking in the literature. The present study will attempt to assess what correctional ideology, rehabilitative or punitive, is dominant within juvenile corrections by conducting a national survey to juvenile facility directors. This study will be based on prior literature, most of which has focused upon line staff in an adult correctional setting. From this prior literature, more specifically from the work of Cullen et al. (1989), scales will be created to determine the correctional orientation of the key administrators in juvenile facilities. This will allow us to assess whether the correctional ideology driving the juvenile system has in fact become punitive. The findings from this study have the opportunity to alter the current status quo in juvenile corrections.
Date: August 2001
Creator: Sifuentes-Hammer, Amy
System: The UNT Digital Library
Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders (open access)

Correlates of Recidivism: A Study Examining the Differences Between First Time Felony Probationers and Recidivist Felony Probation Offenders

The purpose of this study is to explore the differences and characteristics between first time felony probationer and recidivist felony probation offender. The importance of said studies grows significantly, given current trends of sentencing offenders to probation. Using archived data on random sample of felony offenders in 2000 and based on information acquired and maintained by the Denton County Community Supervision and Corrections Department (CSCD), the study consists of 40 first time felony offenders and 40 recidivist felony offender placed on probation during the year 2000. The method consists of a longitudinal comparison model. To examine the research question, descriptive statistics are used to compare basic demographics. Then, in order to answer the research question bi-variate significant tests, Chi-square and Independent Sample T-tests were employed when appropriate. Results indicate differences between first time felony probation offenders and recidivist felony probationers.
Date: May 2007
Creator: Lynton, Eddy
System: The UNT Digital Library
Criminal Investigations: The Impact of Patrol Officers on Solving Crime (open access)

Criminal Investigations: The Impact of Patrol Officers on Solving Crime

This two-part study of the criminal investigation process first evaluated the frequency with which patrol officers solve cases assigned to the investigations division and then examined how detectives spent their time, both on case assignments and on other activity not related to current case assignment. Cases assigned to the investigations division for follow up were examined to determine how often a case was cleared by the patrol officer. The detective's time was then evaluated in order to determine how much time detectives spent on investigative tasks and other activities. This study confirms that the patrol officer should be given more time to conduct preliminary investigations for specific cases, and that tasks performed by detectives could be shifted to other personnel in the department. Both actions should serve to positively impact case clearance rates.
Date: May 2007
Creator: Womack, Charissa L.
System: The UNT Digital Library
Criminal Justice Responses to Emerging Computer Crime Problems (open access)

Criminal Justice Responses to Emerging Computer Crime Problems

This study discussed the issue of computer crime as it relates to the criminal justice system, specifically law enforcement. The information was gathered through several books, academic journals, governmental documents, and the Internet. First, the nature and forms of computer crime, Internet crime, and cyber terrorism were analyzed. Next, law enforcement responses were discussed. International aspects of the problem were separately pointed out. Further, detection and investigation of computer crime were examined. Problems related to the each component of the criminal justice system (law enforcement, investigators, prosecutors, and judges) were described. Specific solutions to these problems were offered. In addition, computer crime handling procedures were presented. Results indicate that computer crime will increase in the 21st century, and this problem cannot be controlled by traditional methods alone. Using new technology as preventive measures, and increasing awareness and security conscious culture will prevent the problem in the long run.
Date: August 2001
Creator: Sen, Osman N.
System: The UNT Digital Library
A Descriptive Study of the Intelligence Community in the United States of America (open access)

A Descriptive Study of the Intelligence Community in the United States of America

This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
Date: May 2003
Creator: Ucak, Hursit
System: The UNT Digital Library