7 resultados para case law
em Digital Commons at Florida International University
Resumo:
This thesis attempted to explain society's worldview of Santeria and its practice of animal sacrifice, and the breakdown between the federal and local government after a 1993 Supreme Court ruling affirming their right to engage in this sacred ritual. Santeria practitioners are harassed and prosecuted for exercising their right to practice animal sacrifice. The research was intended to present the cosmology of the Lukumi tradition, the intellectual framework explored, a review of Freedom of Religion and the case of Lukumi v. Hialeah, and finally the media's role in shaping the worldview of Santeria that have perpetuated this breakdown. The thesis consisted of 87 research items, a community survey, interviews, a Santeria divination, and review of case law, books,newspaper and online journals. These findings demonstrated that freedom of religion is not so free in the U.S., and exists only to the extent the media and municipal laws choose to allow.
Resumo:
Title 1 of the Americans with Disabilities Act (ADA) requires all employers, public and private, with more than fifteen employees to provide reasonable accommodation to qualified individuals with disabilities if the accommodation would, within limits, allow the individual to perform the essential functions of the job. Seven years after Congress enacted the law and five years after the initial provisions became effective, little information is available about the experience of organizations faced with requests for workplace accommodation.^ The question addressed in this study is: How are organizations responding to the ADA mandate to fit individuals with psychiatric disabilities in the workplace? The data sources are three organizations that allowed access to this sensitive information, and a fourth that had two disability discrimination charges filed against it.^ A brute-force case method approach applied to the four organizations yields the following information: Attorneys are hesitant to allow inquiry into company policy owing to fear of litigation; workers are not disclosing and requesting accommodation; tacit accommodation of long-standing employees appears to be a regular practice; knowledge of the intent of the ADA makes a difference in terms of equality of treatment; and insensitivity to employee privacy results in an adversarial situation.^ Implications are relevant to the need to improve lines of communication between human resource, EEO, supervisory, and legal staff; consequences of failure to address accommodations on an explicit level; need for better understanding of the availability and use of outside resources for achieving accommodation; and improvement of self-advocacy and disclosure by the employees with disabilities. ^
Resumo:
Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.
Resumo:
Knowing how consumers perceive travel websites can help practitioners better understand consumers’ online requirements. This paper reports the findings of a longitudinal study that investigated the changes and trends in the profile and behavior of online travel-website users in Hong Kong. The profiles of e-buyers and e-browsers in 2009, when compared with those established by prior studies conducted in 2000 and 2007, point in a new direction for practitioners and researchers investigating online travelwebsite user behavior. The results indicated that more middle-aged consumers have become online travel-website users, and that website security and price are perceived to be the most important factors for travel-website use by both e-browsers and e-buyers.
Resumo:
Travel websites that enable hotel room reservations have created unprecedented business opportunities. However, they have also overloaded hotel customers with information. This situation is particularly true of China, an emerging country with the largest population in the world and the most promising growth prospect in tourism. This study investigated the room-rate pricing practice of five online distribution channels, measured by the lowest available rates. These online channels priced hotels of different categories in Shanghai, China’s largest city. Empirical findings indicated that local websites offered lower room rates than international websites for the selected hotels in different categories. Specifically, Chinatravel consistently offered the lowest room rates for the selected hotels.
Resumo:
In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^
Resumo:
Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.