Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Mobile Computing & Law Enforcement: An Examination Of Its Application In The Field And Its Consequences, Lanny Lockhart Jr Jan 2002

Mobile Computing & Law Enforcement: An Examination Of Its Application In The Field And Its Consequences, Lanny Lockhart Jr

Theses

The following study has been conducted in the pursuit of a Masters Degree of Science in Information Technology. The functional purpose of this study was to examine three basic concepts (officer efficiency, safety, and arrest rates) within law enforcement and to attempt to determine if a specific type of information technology (wireless data computers) has had any positive impact on those concepts. To that end, the author has reviewed the history of technology in law enforcement and surveyed a group of patrol officers in the Wilmington Police Department. Difficulties associated with gathering research data from law enforcement agencies has also …


The Adult Student In Higher Education And Training, Kathlee Despain-Rogers Jan 2002

The Adult Student In Higher Education And Training, Kathlee Despain-Rogers

Theses

This thesis will focus on the needs of the adult or nontraditional student. An in-depth look at bow non-traditional students came to be and how higher education is accommodating them today and tomorrow.

Before 1944, adult students were not commonplace on college campuses. At that time even high school graduation was a rare achievement. However, The Servicemen's (and women's) Readjustment Act of 1944, better known as "The GI Bill," changed all that. The Act provided many benefits but it is best known for giving former soldiers, both male and female, a chance at a college education or a degree from …


Information Technology Breeds New Age Terrorism, Amita Aziz Jan 2002

Information Technology Breeds New Age Terrorism, Amita Aziz

Theses

This thesis examines the impact information technologies have had on the age-old phenomenon of terrorism. It looks at how terrorism has evolved into what has come to be known as information terrorism over this Information Era. Information revolution has introduced a new paradigm called Information Warfare for conflict among nations based upon attacking information infrastructures. The political attractions and deterrents to using these new information warfare methods are discussed at great length. The information age is affecting not only the types of targets and weapons terrorist choose, but also the ways in which such groups operate and structure their organizations. …