首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The U.S. Census Bureau reports that Hispanics are the country's largest and fastest growing minority, representing about 14.4 percent of the population in 2005 (Census Bureau 2006b). By 2050, Hispanics will account for an estimated 24.4 percent of the population--or 1 in every 4 persons in the United States (Census Bureau 2004, Table 1 a). The Hispanic population tends to be younger than the overall population and currently represents a relatively small but growing fraction of the Social Security beneficiary population. The representation of Hispanics in the Supplemental Security Income (SSI) program, however, approximates that of their representation in the overall population. This article compares the Hispanic population with the overall population along several dimensions, with a particular focus on the Social Security beneficiary and SSI recipient populations. Data are drawn mainly from the 2005 Public Use Microdata Sample of the American Community Survey (ACS PUMS), a relatively new data source with a rich set of economic and demographic variables. Fully implemented nationwide for the first time in 2005, the ACS became the largest household survey in the United States with a sample of almost 3 million addresses. The analysis using the ACS finds that the Hispanic population is significantly different from the general population, particularly in the areas of age distribution, educational attainment, and economic well-being. Compared with the general population, the Hispanic segment is younger and is characterized by lower levels of educational attainment and a higher rate of poverty. The Hispanic Social Security beneficiary population also differs significantly from the general beneficiary population in the same areas. In contrast, the Hispanic and general SSI populations are more comparable with regard to age and economic status and differ significantly only with regard to education.  相似文献   

2.
3.
4.
New technologies have been developed in response to terrorism. These present problems for local officials: implementing technologies will be expensive, and no technologies exist that can be used to gauge demand. We apply contingent valuation methodologies to determine support for additional taxes to pay for new terrorism‐related technologies and services. We present findings from a national survey about people's attitudes toward terrorism prevention and response. We find that respondents generally support new services and technologies and local tax increases to pay for them. We also find that respondents are willing to pay more if programs have everyday uses that would enhance public safety, but are less supportive as inconveniences increase.  相似文献   

5.
6.
The majority of women Social Security beneficiaries receive at least part of their benefit based on their status as the wives or widows of entitled workers. This article discusses the impact of past and present marital status of women as a factor in establishing eligibility for monthly benefits and the amount of the benefit payment. The data are drawn from the 1980 and 1985 June Marital History Supplements to the Current Population Survey. Whether or not they are currently receiving auxiliary benefits, most older women are potentially eligible for them based on their current marital status or past marital duration.  相似文献   

7.
Household food insecurity status in the United States is ascertained by a battery of close‐ended questions. We posit that the monthly nature of benefit receipt from the Supplemental Nutrition Assistance Program (SNAP) creates experiences of food hardship, which become salient in the context of SNAP receipt, and in turn exert influence on the response to food security questions. We test this hypothesis by examining answers to a 30‐day food security module in relation to when SNAP benefits are received. We find that for SNAP households near the end of or at the beginning of the benefit month, the probability of being classified as food insecure increases by 11 percentage points, over a baseline of 42 percent. We also find that the probability of responding affirmatively to any of the first five items in the module increases during this time. We discuss the importance of these findings for the estimation of food security and its implication on program evaluation.  相似文献   

8.
September 11, 2001, led to renewed emphasis on airport security in the United States. Before the tragedy, government policy led to a suboptimal level of security. The fundamental problem was not simply the use of private security firms, but rather the reliance on airline financing and poor Federal Aviation Administration (FAA) oversight. After 9/11 a federalized security system was put in place. The current system of tightened security is substantially more costly and should be evaluated in terms of its cost-effectiveness compared to a public–private approach.  相似文献   

9.
The paper examines the social security tax and benefit system in Japan. We offer an analysis of the interaction of taxes and benefits showing that the system has evolved to the point where it may no longer fulfill the original intentions. The system today appears to redistribute income from working people, who on average have lower incomes, to the aged population, which today have higher incomes. We suggest the system is in need of significant reform.  相似文献   

10.
The 'war on terrorism' engages all the institutions of the state. A constitutional structure devoted to protection of liberty must place a paramount value on separation of powers, and a parliamentary democratic constitution should ensure that the ultimate locus of responsibility rests in the legislature, the only branch which has a direct connection to the citizens. However, in an ironic reversal of practice that prevailed before the coming of mass democracy, Parliament in the UK since the early twentieth century has largely accepted a supine role compared to the executive in matters of 'national security'. The judiciary, despite the enactment of legally enforceable human rights, has also manifestly failed to exercise its proper function of curbing abuses of state power. The result is an over-mighty executive, able to draw upon the deference of other branches of government in prosecuting the 'war on terrorism' on the battlefield and in the statute book, which has trampled on individual rights with virtually no check or counte-balance. Some principles by which the balance might be restored are suggested.  相似文献   

11.
12.
13.
在经济全球化背景下,我国的文化安全领域面临着不少问题:文化交流中面临的"霸权主义"喧嚣,文化产业发展中面临的被动状态。文化安全的实现要建立在高度的文化自觉和广泛的文化认同基础之上,即要客观认识自身的文化精神、文化方向和文化定位,努力达到对本国文化、国外文化和多元文化的广泛认同。  相似文献   

14.
Today, the idea of risk is ubiquitous, a presence in debates across a range of fields, from investment banking to politics, from anthropology and sociology to health, environmental and cultural studies. While this ubiquity attests to the importance of the concept it is at the same time a potential weakness in that it injects the term into a wide range of debates in each of which its meaning can be subject to different emphases and meanings. The notion of risk is of obvious importance to security intelligence, but here too its ubiquity has had an impact on specificity of meaning. While the term is widely used in both the profession and study of intelligence, its usage can carry different meanings and it can be used interchangeably with linked terms. Given the importance of the idea of risk to intelligence, clarity of meaning is essential. This article sets out to consider the meaning of, and relationship between, uncertainty and risk in a security intelligence context, propose a framework on which a common understanding can be built, and illustrate how this can help in thinking about the nature and role of security intelligence.  相似文献   

15.
Airport Security, High Reliability, and the Problem of Rationality   总被引:2,自引:0,他引:2  
The events of September 11, 2001, have raised troubling questions regarding the reliability and security of American commercial air travel. This article applies the concepts and logic of high–reliability organizations to airport security operations. Contemporary decision theory is built on the logic of limited or buffered rationability and is based on the study of error–tolerant organizations. The concept of high–reliability organizations is based on the study of nearly error–free operations. For commercial air travel to be highly secure, there must be very high levels of technical competence and sustained performance; regular training; structure redundancy; collegial, decentralized authority patterns; processes that reward error discovery and correction; adequate and reliable funding; high mission valence; reliable and timely information; and protection from external interference in operations. These concepts are used to inform early–stage issues being faced by both local airports and the newly established Transportation Security Administration.  相似文献   

16.
Building Secure Elections: E-Voting, Security, and Systems Theory   总被引:1,自引:0,他引:1  
The increased use of information technology promises to revolutionize both the provision of government services and the vibrancy of democracy. In the aftermath of the Florida voting controversy during the 2000 presidential election, governments have placed their faith in technology, adopting e-voting machines that offer enhanced voter convenience and eliminate the need for subjective recounts. However, the same underlying assumptions that apply to e-government theory do not apply to e-voting because of the severity of consequences if failure occurs and the loss of transparency traditionally associated with the voting process. A more useful theoretical guide is systems theory, which deals with complex, high-risk systems. This literature has been largely overlooked by adopters of e-voting technology, even though the practical criticisms of e-voting made by computer security specialists reflect an essentially systems theory perspective.  相似文献   

17.
In this paper we unpack the concept of dual citizenship in relation to the meaning of sovereignty claims in situations of political exception. We take up two contending analytical frameworks to examine dual citizenship. The first framework examines dual citizenship as a human right, and makes liberal legal arguments about the increased rights and privileges afforded to dual citizens. The second framework, which we develop here, examines dual citizenship as a form of hierarchical citizenship, whose genealogy owes substantially to orientalist mythologies, and whose technologies of governance work through securitized state policies and practices of flexible sovereignty. As a form of hierarchical citizenship, dual nationality produces hyphenated citizenships that exist on a transnational plane, yet are always rooted in relations among particular nation-states. Some of the recent cases of extraordinary rendition, detention, and torture of dual national men of Muslim and Arab background will be discussed to illuminate the securitization and racialization of diplomatic protection. While citizenship is not a standard set of rights available to all, the cases we examine reveal that dual citizens with “dangerous” nationalities caught up within the post-9/11 security paradigm may find themselves as unprotected persons, existing in a vacuum devoid of diplomatic protection, human and citizenship rights.  相似文献   

18.
This article considers the post–September 11 challenges faced by the U.S. national security machinery and analyzes the relationship between the new threat environment, the United States's role in the world, and decision–making structure. Homeland security is defined as a subset of national security. The threat of foreign terrorist organizations acting on U.S. soil should be seen in the political context of the pursuit of U.S. national interests in an often anarchic world. Two models for homeland security organizational structures are considered: a departmental model and an interagency model. The interagency model, embodied in the Homeland Security Council, is a better fit given the nature of the threat, the crucial need for coordination, and the realities of governmental decision making. The organizational challenges that may complicate the government's preparations, decisions, and implementation of a major homeland defense mission stem from three rivalries: executive–legislative, cabinet–staff, and Homeland Security Council–National Security Council.  相似文献   

19.
20.
Canada's Communications Security Establishment has undergone a far-reaching transformation in conjunction with the expanded role of Signals Intelligence in the global ‘war on terror’. For the first time, Canada adopted a formal statute for CSE, including an expanded remit for countering terrorism. With a shift in targeting priorities towards terrorism and threats to Canadian interests abroad, Canada's participation in SIGINT-related international partnerships takes on new significance. The collection of communication intelligence touches upon public sensibilities regarding privacy rights of Canadians. The evolution of Canadian SIGINT capabilities was therefore accompanied by the establishment, as early as 1996, of a system for intelligence accountability and review, the Office of the CSE Commissioner. Recent advances in communications technology and pressing requirements for Signals Intelligence have impelled changes in the law, while also accentuating the role played by the CSE Commissioner in scrutinizing CSE activities to ensure compliance with ministerial authorizations and the laws of Canada.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号