This paper proposes that legislation should be used to reduce the occurrence of courthouse violence. It begins with a review of what is known about the nature and costs of court targeted and non-targeted violence, drawing on published materials of the U.S. Marshals Service, the U.S. Secret Service, the Center for Judicial and Executive Security, and others. Previously unpublished materials are also reported. Court security efforts made in response to the violence are described. In the absence of empirical studies of the effectiveness of court security laws, the paper suggests that theories of criminology be used as guides for assessing the effectiveness of existing legislation and formulating new legislation. Criminological theories, including classical theory, rational choice theory, strain theory, and routine activity theory are discussed as models appropriate for use in evaluating court security legislation. Existing state and federal laws on paper terrorism, including false liens and U.C.C. filings; address confidentiality programs; and enhanced punishments for crimes against those involved in the judicial process are described, catalogued, and analyzed.
|Advisor:||Richardon, James T., Leone, Matthew C.|
|Commitee:||Muffler, John F., Pines, Zygmont A., Swensen, Steven K.|
|School:||University of Nevada, Reno|
|School Location:||United States -- Nevada|
|Source:||DAI-A 75/05(E), Dissertation Abstracts International|
|Subjects:||Law, Criminology, Public policy|
|Keywords:||Address confidentiality, Court security, Criminology, Paper terrorism, Rational choice, Targeted violence|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be