Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

From Standardization To Formality: Unintended Consequences Of Police Standardization Reform Of Law Enforcement In China, Lianhan Zhang May 2019

From Standardization To Formality: Unintended Consequences Of Police Standardization Reform Of Law Enforcement In China, Lianhan Zhang

Maurer Theses and Dissertations

According to social construction theory, cases are not objective entities waiting to be discovered or revealed; they cannot exist without case-makers. Construction of a case is a subjective process of choosing, increasing, decreasing, selecting, and reshaping. Therefore, a natural gap exists between the constructed and the real world. This dissertation delves into the gap, not from the existing angle of selectiveness, but from the angle of compliance. The study uses empirical data to try to answer the following question: Since the police standardization reform of law enforcement—at least parts of them—aim at controlling the evidence-collecting process and at improving the …


Evaluation Of Confidential Informant Programs In Legal Settings: Why Do 10 When You Can Send A Friend?, Kennedy Marie Cuevas Jan 2019

Evaluation Of Confidential Informant Programs In Legal Settings: Why Do 10 When You Can Send A Friend?, Kennedy Marie Cuevas

Electronic Theses and Dissertations

There is limited research regarding the use of Confidential Informants and related programming, including a consensus of Best Practices of these programs. The information available regarding CI use and its programming is limited to agency-produced literature and minimal peer-revieresearch. The present study sought to utilize the limited information available to develop Best Practices of Confidential Informant Programs by conducting an analysis of available literature to identify themes and policies that were present in a majority of the literature. Additionally, the aforementioned Best Practices were used to perform deductive qualitative analysis of the written policies of a Confidential Informant program in …