Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

A Contemporary Trend Analysis Of Kentucky State Police Vehicular Pursuit-Related Collisions And Injuries., Frederick A. Williams Jr. May 2019

A Contemporary Trend Analysis Of Kentucky State Police Vehicular Pursuit-Related Collisions And Injuries., Frederick A. Williams Jr.

Electronic Theses and Dissertations

This study investigates the trends in vehicular pursuits conducted by the Kentucky State Police (KSP) over time (i.e., years 2009 - 2017). Additionally, predictors for collisions and injuries were examined. The issues surrounding vehicular pursuits center on officer safety and agency liability concerns with the most significant of these being collisions and injuries. This study contains several primary areas. Chapter two includes a review of the literature surrounding the area of vehicular pursuits. Specifically, it reviews definitions pertinent to this study, legal aspects concerning pursuits, major empirical studies conducted on pursuits and specific risks associated with pursuit practices. This section …


Evaluation Of Confidential Informant Programs In Legal Settings: Why Do 10 When You Can Send A Friend?, Kennedy Marie Cuevas Jan 2019

Evaluation Of Confidential Informant Programs In Legal Settings: Why Do 10 When You Can Send A Friend?, Kennedy Marie Cuevas

Electronic Theses and Dissertations

There is limited research regarding the use of Confidential Informants and related programming, including a consensus of Best Practices of these programs. The information available regarding CI use and its programming is limited to agency-produced literature and minimal peer-revieresearch. The present study sought to utilize the limited information available to develop Best Practices of Confidential Informant Programs by conducting an analysis of available literature to identify themes and policies that were present in a majority of the literature. Additionally, the aforementioned Best Practices were used to perform deductive qualitative analysis of the written policies of a Confidential Informant program in …