NU Masters and Dissertations (Restricted)

Permanent URI for this collection


This collection contains access-restricted National University student dissertations and master's theses, including work by students who graduated from National University, Northcentral University, and John F. Kennedy University. To learn more about this collection, please visit the NU Institutional Repository website.

If you have any questions or concerns, please email the Institutional Repository librarian, Tammy Ivins.

Browse

Recent Submissions

Now showing 1 - 5 of 1955
  • Item
    Identifying characteristics of school shooters in the United States
    (2018) White, Melissa
    With school shootings on the rise, it is important to know the characteristics that previous school shooters have in common. By analyzing whether similar characteristics exist between previous school shooters, teachers, school counselors, law enforcement, and the community can develop plans to enact in school systems in the hopes of identifying and preventing future school attacks. This study will specifically focus on whether bullying, mental disorders, and poor performance/isolation/behavioral problems have shared characteristics among previous school shooters. By analyzing several scholarly articles and two reports created from research in the wake of Columbine, this study found that previous school shooters were overwhelmingly bullied than not, that mental disorders, specifically depression and suicidal thoughts could be found among previous school shooters, and that there was not enough research done on the performance and social interactions between school shooters and their classmates, teachers, counselors, etc. In fact, the two main reports analyzed in this study were in contradiction about whether shooter had a history of poor performance and socialization in school or normal performance and socialization in school. Overall, this study showed that there is not a checklist that can be created to determine whether an individual will carry out a school shooting; rather it is important to view each characteristic and event collectively and seek necessary help for the individual when necessary.
  • Item
    Identification of human remains by frontal and maxillary sinus analysis
    (2010) Eten, Justina S.
    This research project discusses the identification of human remains by frontal and maxillary sinus analysis. The hypothesis proposed that by using maxillary sinuses in addition to frontal sinuses for analysis the forensic professional will have a more confident technique for the identification of human remains. Subjective and objective methods of frontal sinus analysis are discussed. The Daubert Standard has changed the admissibility of scientific methods in a court of law. More objective methods of frontal sinus analysis are required in order to adhere to the Daubert Guidelines. A procedural guide has been created for forensic professionals in frontal sinus analysis in this project.
  • Item
    Identifying terrorists through the collection of forensic evidence at bomb scenes
    (2000) Renaud, Michael A.
    A thorough, careful examination of bomb scenes by forensic examiners is crucial towards the goal of identifying, arresting and prosecuting terrorists. Terrorism cannot be ignored. Americans were viciously reminded in 1995 in the Oklahoma City bombing, that terrorist attacks on American soil can occur at anytime. Although the violence may never end, we can certainly learn from these tragedies, possibly identify and arrest the responsible parties, and, if necessary, work on improving security policies and procedures that may one day save lives. For these reasons, the importance of this topic cannot be stressed enough. This project will briefly overview the following areas: motivations behind terrorism, technology’s influence on terrorism and investigation efforts, and a brief history of terrorism around the world. The bombing cases of Oklahoma City, Pan Am Flight 103, the World Trade Center and the Unabomber will be reviewed in depth. In each of the four cases there will be a analysis of the forensic evidence collected, how it was gathered, and how evidence collection played a major role in identifying the suspects.
  • Item
    Identifying components of a successful anti-stalking program in San Diego county
    (1996) Sullivan, Celia Anne
    The crime of stalking is committed by approximately 200,000 people. It has been predicted that one in 20 American women become victims of stalking at some time in their lives. In San Diego County, the number of cases issued charging the crime of stalking are minuscule in part because of the following: (1) the law is comparatively new; (2) there is virtually no police officer training on stalking; and (3) the actions which make up the crime are often seen by police as bits and parts of other crimes. Without the complete involvement of an anti-stalking multi-agency approach that includes intensive investigation, vigorous prosecution, and consistent, thorough follow-up, stalkers cannot be successfully controlled and reduce victimization cannot be reduced. Due to the recognized need for effective intervention in stalking cases, and the need to reduce victimization and control the stalker, the purpose of this study was to identify the components of a successful anti-stalking program in San Diego. The methodology used open-ended interviews with three representatives from law enforcement, two representatives from probation, two representatives from judiciary and three representatives from mental health who were experts in the field of stalking.
  • Item
    Identifying photographs altered by computer digital manipulation
    (1995) Teel, Jr., Charles L.
    In recent years the increasingly sophisticated technology of the computer age has been combined with the almost 300 year old practice of photography. To alter a conventional photograph is a time consuming and exacting task requiring extensive knowledge on the part of the photographer. The computer industry has developed digital imaging equipment that is simple to operate. A relatively inexperienced operator can scan a photograph into the computer, manipulate or alter the image, and then produce a computer generated photograph. Photographs may be entered into evidence if they are a true and accurate representation of the scene. Those photographs may be altered by any number of means, but digital photography equipment is becoming so advanced that we may not be able to determine if a photograph has been altered. The computer generated photographs exhibit some common characteristics that may enable a trained individual tocorrectly identify them. Other methods include examining the scene in the photograph for any anomalies, such as lack of shadow detail, or shadows where nothing exists to cast a shadow. Further tests using a wider variety of cameras and film may also help isolate and identify the common characteristics of computer generated photographs.