9 resultados para ENFORCEMENT

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mediation techniques provide interoperability and support integrated query processing among heterogeneous databases. While such techniques help data sharing among different sources, they increase the risk for data security, such as violating access control rules. Successful protection of information by an effective access control mechanism is a basic requirement for interoperation among heterogeneous data sources. ^ This dissertation first identified the challenges in the mediation system in order to achieve both interoperability and security in the interconnected and collaborative computing environment, which includes: (1) context-awareness, (2) semantic heterogeneity, and (3) multiple security policy specification. Currently few existing approaches address all three security challenges in mediation system. This dissertation provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges. A context-aware flexible authorization framework was developed in the dissertation to deal with security challenges faced by mediation system. The authorization framework consists of two major tasks, specifying security policies and enforcing security policies. Firstly, the security policy specification provides a generic and extensible method to model the security policies with respect to the challenges posed by the mediation system. The security policies in this study are specified by 5-tuples followed by a series of authorization constraints, which are identified based on the relationship of the different security components in the mediation system. Two essential features of mediation systems, i. e., relationship among authorization components and interoperability among heterogeneous data sources, are the focus of this investigation. Secondly, this dissertation supports effective access control on mediation systems while providing uniform access for heterogeneous data sources. The dynamic security constraints are handled in the authorization phase instead of the authentication phase, thus the maintenance cost of security specification can be reduced compared with related solutions. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. ^ The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Valuing Polyrhythmic Realities and Critical Theories, specifically Critical Race Theory, is facilitated by Interdisciplinary inquiry. Racial Profiling will be utilized to demonstrate how acknowledging the lived experiences of individuals and viewing situations from the oppressed viewpoint will positively impact the number of Blacks in law enforcement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Faced with the violence, criminality and insecurity now threatening peace and democratic governance in Central America, the region’s governments have decided to use the Armed Forces to carry out actions in response to criminal actions, looking to improve their performance. Although public demand for including the Armed Forces in these functions takes place within a legally legitimate framework, it is motivated by tangible circumstances such as increased levels of violence, delinquency and crime. Despite being coupled with the perception of institutional weakness within the security and judicial system (particularly police) and the recognition of prestige, efficiency, discipline and severity in fulfilling the Armed Forces’ missions, these arguments are insufficient to legitimize the use of the military as a police force. Within this context, this paper reflects on the implications or consequences of the use of the Armed Forces in duties traditionally assigned to the police in the Central American region with the goal of contributing to the debate on this topic taking place in the Americas. To achieve this end, first we will focus on understanding the actual context in which a decision is made to involve the Armed Forces in security duties in the region. Second, we will examine the effects and implications of this decision on the Armed Forces’ relations within their respective societies. Third and finally, considering this is already a reality in the region, this paper will provide recommendations. The main findings of this research, resulting from the application of an analyticaldescriptive and historically based study, are organized in three dimensions: the political dimension, by implication referring to the relationship between the ultimate political authority and the Armed Forces; the social dimension, by implication the opinion of citizens; and other implications not only affecting the structural and cultural organization of armies and police but also the complementary operational framework within a context of comprehensive response by the State. As a main conclusion, it poses there is an environment conducive to the use of the Armed Forces in citizen’s security, in view of the impact of threats provoked by criminal structures of a military nature currently operating in Central America. However, this participation creates an inevitable social and political impact if implemented in isolation or given a political leading role and/or operational autonomy. This participation poses risks to the institutions of the Armed Forces and the police as well. Finally, this paper identifies an urgent need for the Armed Forces’ role to be more clearly defined with regard to security matters, limiting it to threats that impact States’ governability and existence. Nonetheless, Central American States should seek a COMPREHENSIVE response to current crime and violence, using all necessary institutions to confront these challenges, but with defined roles and responsibilities for each and dynamic coordination to complement their actions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In response to a crime epidemic afflicting Latin America since the early 1990s, several countries in the region have resorted to using heavy-force police or military units to physically retake territories de facto controlled by non-State criminal or insurgent groups. After a period of territory control, the heavy forces hand law enforcement functions in the retaken territories to regular police officers, with the hope that the territories and their populations will remain under the control of the state. To a varying degree, intensity, and consistency, Brazil, Colombia, Mexico, and Jamaica have adopted such policies since the mid-1990s. During such operations, governments need to pursue two interrelated objectives: to better establish the state’s physical presence and to realign the allegiance of the population in those areas toward the state and away from the non-State criminal entities. From the perspective of law enforcement, such operations entail several critical decisions and junctions, such as: Whether or not to announce the force insertion in advance. The decision trades off the element of surprise and the ability to capture key leaders of the criminal organizations against the ability to minimize civilian casualties and force levels. The latter, however, may allow criminals to go to ground and escape capture. Governments thus must decide whether they merely seek to displace criminal groups to other areas or maximize their decapitation capacity. Intelligence flows rarely come from the population. Often, rival criminal groups are the best source of intelligence. However, cooperation between the State and such groups that goes beyond using vetted intelligence provided by the groups, such as a State tolerance for militias, compromises the rule-of-law integrity of the State and ultimately can eviscerate even public safety gains. Sustaining security after initial clearing operations is at times even more challenging than conducting the initial operations. Although unlike the heavy forces, traditional police forces, especially if designed as community police, have the capacity to develop trust of the community and ultimately focus on crime prevention, developing such trust often takes a long time. To develop the community’s trust, regular police forces need to conduct frequent on-foot patrols with intensive nonthreatening interactions with the population and minimize the use of force. Moreover, sufficiently robust patrol units need to be placed in designated beats for substantial amount of time, often at least over a year. Establishing oversight mechanisms, including joint police-citizens’ boards, further facilities building trust in the police among the community. After disruption of the established criminal order, street crime often significantly rises and both the heavy-force and community-police units often struggle to contain it. The increase in street crime alienates the population of the retaken territory from the State. Thus developing a capacity to address street crime is critical. Moreover, the community police units tend to be vulnerable (especially initially) to efforts by displaced criminals to reoccupy the cleared territories. Losing a cleared territory back to criminal groups is extremely costly in terms of losing any established trust and being able to recover it. Rather than operating on a priori determined handover schedule, a careful assessment of the relative strength of regular police and criminal groups post-clearing operations is likely to be a better guide for timing the handover from heavy forces to regular police units. Cleared territories often experience not only a peace dividend, but also a peace deficit – in the rise new serious crime (in addition to street crime). Newly – valuable land and other previously-inaccessible resources can lead to land speculation and forced displacement; various other forms of new crime can also significantly rise. Community police forces often struggle to cope with such crime, especially as it is frequently linked to legal business. Such new crime often receives little to no attention in the design of the operations to retake territories from criminal groups. But without developing an effective response to such new crime, the public safety gains of the clearing operations can be altogether lost.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This phenomenological study explored Black male law enforcement officers' perspectives of how racial profiling shaped their decisions to explore and commit to a law enforcement career. Criterion and snow ball sampling was used to obtain the 17 participants for this study. Super's (1990) archway model was used as the theoretical framework. The archway model "is designed to bring out the segmented but unified and developmental nature of career development, to highlight the segments, and to make their origin clear" (Super, 1990, p. 201). Interview data were analyzed using inductive, deductive, and comparative analyses. Three themes emerged from the inductive analysis of the data: (a) color and/or race does matter, (b) putting on the badge, and (c) too black to be blue and too blue to be black. The deductive analysis used a priori coding that was based on Super's (1990) archway model. The deductive analysis revealed the participants' career exploration was influenced by their knowledge of racial profiling and how others view them. The comparative analysis between the inductive themes and deductive findings found the theme "color and/or race does matter" was present in the relationships between and within all segments of Super's (1990) model. The comparative analysis also revealed an expanded notion of self-concept for Black males – marginalized and/or oppressed individuals. Self-concepts, "such as self-efficacy, self-esteem, and role self-concepts, being combinations of traits ascribed to oneself" (Super, 1990, p. 202) do not completely address the self-concept of marginalized and/or oppressed individuals. The self-concept of marginalized and/or oppressed individuals is self-efficacy, self-esteem, traits ascribed to oneself expanded by their awareness of how others view them. (DuBois, 1995; Freire, 1970; Sheared, 1990; Super, 1990; Young, 1990). Ultimately, self-concept is utilized to make career and life decisions. Current human resource policies and practices do not take into consideration that negative police contact could be the result of racial profiling. Current human resource hiring guidelines penalize individuals who have had negative police contact. Therefore, racial profiling is a discriminatory act that can effectively circumvent U.S. Equal Employment Opportunities Commission laws and serve as a boundary mechanism to employment (Rocco & Gallagher, 2004).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research was to study the nutritional status of United States Coast Guard Law Enforcement Detachment (USCG/ LEDET) personnel before and after prolonged travel at sea. To date there is no information available regarding the nutritional status of Coast Guard personnel. Forty-seven subjects were studied in total, each served as their own control. Demographic and health history data was collected at baseline. Dietary and exercise data was collected before and during the deployment. Body composition was determined before and after a deployment. The results of this study revealed that the USCG/LEDET personnel had high cholesterol and decreased fiber intakes. Cholesterol intake during deployment (516.8±239.7 mg/day) was significantly higher (p= 0. 047) than pre-deployment (448.2 ± 144.3 mg/day). Fiber intake was significantly lower than recommended (p The results of this study indicate that LEDET personnel are put at higher nutritional risk while deployed and also have increased negative health behaviors associated with risk for Cardiovascular Disease (CVD) and other related diseases. This is crucial information for the USCG so that action can be taken to improve the physical well being of their personnel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This phenomenological study explored Black male law enforcement officers’ perspectives of how racial profiling shaped their decisions to explore and commit to a law enforcement career. Criterion and snow ball sampling was used to obtain the 17 participants for this study. Super’s (1990) archway model was used as the theoretical framework. The archway model “is designed to bring out the segmented but unified and developmental nature of career development, to highlight the segments, and to make their origin clear” (Super, 1990, p. 201). Interview data were analyzed using inductive, deductive, and comparative analyses. Three themes emerged from the inductive analysis of the data: (a) color and/or race does matter, (b) putting on the badge, and (c) too black to be blue and too blue to be black. The deductive analysis used a priori coding that was based on Super’s (1990) archway model. The deductive analysis revealed the participants’ career exploration was influenced by their knowledge of racial profiling and how others view them. The comparative analysis between the inductive themes and deductive findings found the theme “color and/or race does matter” was present in the relationships between and within all segments of Super’s (1990) model. The comparative analysis also revealed an expanded notion of self-concept for Black males – marginalized and/or oppressed individuals. Self-concepts, “such as self-efficacy, self-esteem, and role self-concepts, being combinations of traits ascribed to oneself” (Super, 1990, p. 202) do not completely address the self-concept of marginalized and/or oppressed individuals. The self-concept of marginalized and/or oppressed individuals is self-efficacy, self-esteem, traits ascribed to oneself expanded by their awareness of how others view them. (DuBois, 1995; Freire, 1970; Sheared, 1990; Super, 1990; Young, 1990). Ultimately, self-concept is utilized to make career and life decisions. Current human resource policies and practices do not take into consideration that negative police contact could be the result of racial profiling. Current human resource hiring guidelines penalize individuals who have had negative police contact. Therefore, racial profiling is a discriminatory act that can effectively circumvent U.S. Equal Employment Opportunities Commission laws and serve as a boundary mechanism to employment (Rocco & Gallagher, 2004).