preview

Compare and Contrast Policies

Better Essays

Policy Analysis III-Compare and Contrast The Crime Control Model and Due Process Model is a representation of two systems that are completely different from one another and are in competition with one another to be a priority in the functioning of the criminal justice process (Neubauer, 2001, p 12). “The Due Process Model” proceeds from the premise that protecting the rights of the individual is most important, whereas in the Crime Control Model” holds that reducing crime is the key value.” (Neubauer, 2001, 12) When comparing the two control models their opinions differ completely in reference to the causes of crime. Additionally when comparing crime control and due process models one need to remember, “Proponents of both models embrace …show more content…

(Neubauer, 2001) Crime Control Model The Crime Control Model, "the repression of the criminal conduct is by far the most important function to be performed by the criminal process, which refers back to protecting privacy while maintaining public safety." (Neubauer, 2001, p 13) As well often the crime control model is perceived as negative because the model assumes the person charged of the alleged crime is guilty before entering the courtroom and supports law enforcement and prosecutors extensively (Neubauer, 2001, p 13). Differences Differences between the models include the fact the Crime Control Model is based upon "factual guilt" and the Due Process Model is based upon "legal guilt." (Gioson, 2005) (Neubauer, 2001, p 14) Also due process is based on “equal treatment” because the model has errors, which cause for an invalid conviction. Also the Crime Control Model strongly contradicts the view, which sometimes hinders a person’s rights within the system. (Neubauer, 2001) An analogy often used to describe the Crime Control Model is the “conveyer belt” because the model moves the "alleged Criminal" through the system with the forethought that everyone is guilty until proven otherwise. (Gioson, 2005) (Neubauer, 2001, p 13) As well the

Get Access