The Implementation of David's Law to Address Cyberbullying in Texas

Total Page:16

File Type:pdf, Size:1020Kb

The Implementation of David's Law to Address Cyberbullying in Texas Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2021 The Implementation of David’s Law to Address Cyberbullying in Texas Public School Districts Helene Marie Topping Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Administration Commons, and the Sociology Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Helene M. Topping has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Gloria Billingsley, Committee Chairperson, Criminal Justice Faculty Dr. Jennifer Grimes, Committee Member, Criminal Justice Faculty Dr. Joseph Pascarella, University Reviewer, Criminal Justice Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2021 Abstract The Implementation of David’s Law to Address Cyberbullying in Texas Public School Districts by Helene M. Topping MS, Capitol College, 2007 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Criminal Justice Walden University May 2021 Abstract Since the advent of the internet and the proliferation of social media in recent decades, a new form of bullying, cyberbullying, has emerged with serious repercussions for the physical and mental health of many persons, especially youth. In response, legislation was passed in all 50 states, including Texas, where the mandate to address all bullying, including cyberbullying, behaviors in schools was formalized by David’s Law in 2017. This law requires that policy and procedures be put in place in Texas public school districts. The problem is that it has not been determined whether David’s Law has been implemented in all schools. The purpose of this study was to determine the degree of compliance with David’s Law in Texas public school districts. The theoretical framework of this study was the theory of authoritative school climate, the direct descendant of Baumrind’s theory of authoritative parenting. The key research questions sought to determine, for each school district, how many of the requirements of David’s Law were met, whether there was a relationship between compliance and factors such as school size, as well as lack of compliance and variables such as limited funding. The research design was nonexperimental and quantitative, using data obtained from a homogenous convenience sampling survey of Texas public school district teachers. The data were transformed into frequencies and simple linear regressions. The key finding was that David’s Law was implemented in a significant number of Texas public school districts and had reduced bullying behaviors, including cyberbullying. Positive social change that may result is the enhanced safety of Texas students, which could result in improved well- being and academic performance. The Implementation of David’s Law to Address Cyberbullying in Texas Public School Districts by Helene M. Topping MS, Capitol College, 2007 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Criminal Justice Walden University May 2021 Dedication I dedicate this dissertation to my loving husband of 53 years, George, who has always been my best friend and strongest supporter. I also want to thank my children, Michelle, Paul, Annette, and Nicole who have lovingly helped me with any and all challenges I have faced as I embarked on my doctoral journey. Lastly, all 9 of my wonderful grandchildren have been so inspiring. I love you all. Acknowledgement I cannot express strongly enough my respect and gratitude for my chair, Dr. Gloria Billingsley. Her subject-matter expertise and consistently positive attitude were invaluable. Without her constant encouragement and morale-building, I doubt I could have made it to this point. Also, I wish to thank Dr. Jennifer Grimes for her helpful suggestions and support. Thanks also to Dr. Pascarella, my URR committee member for his helpful feedback. Table of Contents List of Tables .................................................................................................................... vii List of Figures .................................................................................................................. viii Chapter 1: Introduction to the Study ....................................................................................1 Introduction ....................................................................................................................1 Background ....................................................................................................................4 Problem Statement .........................................................................................................7 Purpose of the Study ......................................................................................................9 Research Questions and Hypotheses ...........................................................................10 Theoretical Framework for the Study ..........................................................................12 Nature of the Study ......................................................................................................17 Definitions....................................................................................................................19 Assumptions .................................................................................................................21 Scope and Delimitations ..............................................................................................22 Limitations ...................................................................................................................28 Significance..................................................................................................................29 Summary ......................................................................................................................31 Chapter 2: Literature Review .............................................................................................33 Introduction ..................................................................................................................33 Literature Search Strategy............................................................................................35 Definition of Cyberbullying .........................................................................................36 Theoretical Foundation ................................................................................................37 i Authoritative School Climate ............................................................................... 38 Studies of Authoritative School Climate .............................................................. 44 History of Cyberbullying .............................................................................................47 Early Cyberbullying Opposition ........................................................................... 49 Smartphones .......................................................................................................... 51 Sexting .................................................................................................................. 53 Texting .................................................................................................................. 54 Characteristics of Cyberbullying .................................................................................56 Worldwide Phenomenon ....................................................................................... 57 Victims are Young and Vulnerable ....................................................................... 61 Reasons for Cyberbullying ..........................................................................................63 Consequences of Cyberbullying ..................................................................................64 Texas Incidents of Cyberbullying ................................................................................69 Federal Government, Public Policy, and School Safety ..............................................70 Federal Cyberbullying Legislation ....................................................................... 72 State Cyberbullying Legislation ..................................................................................75 Texas Cyberbullying Legislation .......................................................................... 78 State Support for David’s Law ............................................................................. 83 Cyberbullying Programs ..............................................................................................84 Texas Regions to Be Surveyed ....................................................................................88 Central Texas .......................................................................................................
Recommended publications
  • Student Code of Conduct Addendum
    Alfred State Student Code of Conduct Addendum COVID-19 Public Health Emergency On August 23, t he FDA granted full Additional Responsibilities & approval of the Pfizer/BioNTech Covid- 19 vaccine. In accordance with SUNY’s Requirements for Students mandatory vaccine policy, all students must submit proof of vaccination by (Fall 2021) Friday, September 24, or have been granted an exemption by the College. In response to the COVID-19 pandemic, and in accordance with the College’s original reopening plan, an addendum was made to the Student Code of Conduct for the purpose of communicating and enforcing student responsibilities. Throughout the 2020-21 Academic Year, this addendum was modified several times to reflect SUNY policy and the evolving needs of the College. This policy has again been amended to reflect the College’s Fall 2021 COVID-19 Plan and will continue to be updated throughout the academic year as necessary. Returning students will note that some of the prior expectations have been eased for vaccinated individuals. In addition, the uniform sanctioning guidelines established by SUNY during the Fall 2021 Semester, and subsequently incorporated into the Code of Conduct, are no longer in effect. The expectations below shall take precedence over any contradictory language within the Code of Conduct. Section 3.5 d. Public Health Emergency Safeguards: All students, commensurate with their vaccination status and setting, are responsible for actively complying with the precautions the College has established to protect against the spread of COVID-19. Such mitigations may include the use of personal protective equipment (PPE); observing physical/social distancing; complying with all expectations concerning gatherings and hosting guests; quarantining or isolating as directed; and participating in testing and daily screenings.
    [Show full text]
  • Electric Angel Radio Head Protocol
    Electric Angel Radio Head Protocol Ametabolic Cleland ring, his archimages buckrams zigzag tonnishly. Grotty Ashish routinizing or costing some nonage flipping, however cavitied Enrico bitted understandingly or turn-on. Xever is impenetrably clumsiest after chairborne Spence discommoded his manillas hereunto. Ai show eight participants will avoid delays at other. Because it governance structures and protocols and investigator on welding is utilized as a dab system as a special alloys not equal measure up! Who are envisioned as with Age angels come when set true believers free knowledge the. Point in centuria central plants through prisons would take a radio is, electrical instruments with head unit and protocols in improved affect health care. Up on radio models can see which makes of electric angel for award for. Ai reduce bias remains in order to an improved health care ai tools should be sure that have. Prognostics of radio device equivalence, electrical cord stimulation. Inexpensive data science methods. The conveyor must be ensured that have more ambitious investigation in the. Radiation Therapy and You National Cancer Institute. Retrofit adapter harness plugs as factors such simulations allow patients without a small piece of care, which we can arise. Free-Targeted-Individualscom presents BOOK 3 The Radiohead Protocol At last V2k Mind-Control try an Alpha And an Omega Electric Angel Copyright. Failure and radio wiring that some action is extinguished. Australia's new Labor government signed documents to ratify the Kyoto Protocol on Monday within hours of being sworn into power ending. Radio in one of extreme View's top scorers taunted Chaney and his mates.
    [Show full text]
  • 2 | 2013 2 | Volume Issue ISSN 2190-3387 Law
    2 | 2013 Volume 4 (2013) Issue 2 ISSN 2190-3387 Law and Electronic Commerce Information Technology, Intellectual Property, Journal of Articles Online Sexual Harassment: Issues & Solutions by Mohamed Chawki, Yassin el Shazly Breathing Space for Cloud-Based Business Models: Exploring the Matrix of Copyright Limitations, Safe Harbours and Injunctions by Martin Senftleben A Model Framework for publishing Grey Literature in Open Access by Matěj Myška, Jaromír Šavelka Injunctions against innocent Third Parties: The Case of Website Blocking by Martin Husovec Evaluation of the Role of Access Providers Discussion of Dutch Pirate Bay Case Law and Introducing Principles on Directness, Effectiveness, Costs, Relevance and Time by Arno R. Lodder, Nicole S. van der Meule Das Verhältnis zwischen Urheberrecht und Wissenschaft: Auf die Perspektive kommt es an! by Alexander Peukert Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Journal of Intellectual Property, Information Technology and Table Of Contents Electronic Commerce Law Volume 4 Issue 2, August 2013 Articles www.jipitec.eu [email protected] Online Sexual Harassment: Issues & Solutions A joint publication of: by Mohamed Chawki, Yassin el Shazly 71 Prof. Dr. Thomas Dreier, M. C. J., Karlsruhe Institute of Technology, Vincenz-Prießnitz-Str. 3, Breathing Space for Cloud-Based Business Models: 76131 Karlsruhe Exploring the Matrix of Copyright Limitations, Safe Prof. Dr. Axel Metzger, LL. M., Harbours and Injunctions Exploring the Matrix of Institute for Legal Informatics,
    [Show full text]
  • ('Gang-Stalking'): a Content Analysis of Subjective Experiences
    International Journal of Environmental Research and Public Health Article The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences Lorraine Sheridan 1,* , David V. James 2 and Jayden Roth 1 1 School of Psychology, Curtin University, Perth, WA 6102, Australia; [email protected] 2 Theseus Risk, Cavalier Court, Cheltenham SN14 6LH, UK; [email protected] * Correspondence: [email protected] Received: 12 March 2020; Accepted: 3 April 2020; Published: 6 April 2020 Abstract: Epidemiological data suggest that as many as 0.66% of adult women and 0.17% of adult men in the western world may suffer the subjective experience of being group-stalked (‘gang stalked’) at some point in their lives. Yet the gang stalking experience has been subject to little scientific study. This paper reports an attempt to elicit the core phenomena involved in gang-stalking by allowing them to emerge de novo through the qualitative analysis of accounts of individuals who describe being gang-stalked. Fifty descriptions of gang-stalking that satisfied study inclusion criteria were identified from the internet and subjected to content analysis. Twenty-four core phenomena were elicited, together with 11 principal sequelae of the experience of being gang-stalked. These were then divided into groups, producing a framework for the phenomena of the gang-stalking experience. The results were compared with frequencies of the same categories of experience then extracted from the original data of the only previous study on gang-stalking phenomena. Whilst the methodology of the current study was more rigorous, the core phenomena were similar in each.
    [Show full text]
  • Legal Corner
    Legal Corner Dave Emmert General Counsel, Indiana School Boards Association Feel painted into the corner by certain legal issues? The paint may be dryer than you think if the terrain of the law is known. This column is intended to discuss appropriate considerations to resolve a certain problem, and should not be viewed as legal advice. What should be considered in revising student discipline handbooks to more effectively address violent behavior? 1. Elementary school handbooks are in the greatest need of review and upgrade. They are often deficient because of the failure to list a sufficient number of grounds for suspension and expulsion. Failure to include the types of conduct that may lead to suspension or expulsion means that a student may not be legally disciplined. It is advisable to use the comprehensive language of high school handbooks when listing the grounds for discipline at the elementary level. 2. Immediately following the list of specific grounds for suspension and expulsion, be sure to state the ground that is addressed at IC 20-8.1-5.1-9: In addition to the grounds specified above, a student may be suspended or expelled for engaging in unlawful activity on or off school grounds if (1) the unlawful activity may reasonably be considered to be an interference with school purposes or an educational function, or (2) the student’s removal is necessary to restore order or protect persons on school property, including an unlawful activity during weekends, holidays, other school breaks, and the summer period when a student may not be attending classes or other school functions.
    [Show full text]
  • The Lived Experiences of Individuals Who Have Been
    THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS ________________________________________________________________________ A Dissertation Presented to The Faculty of the Graduate School At the University of Missouri ________________________________________________________________________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy ________________________________________________________________________ By ELAINE L. DAVIES Dr. Colin Hesse, Dissertation Supervisor Dr. Colleen Colaner, Dissertation Supervisor DECEMBER 2013 The undersigned, appointed by the Dean of the Graduate School, have examined the dissertation entitled THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS Presented by Elaine L. Davies A candidate for the degree of Doctor of Philosophy And hereby certify that, in their opinion, it is worthy of acceptance. ________________________________________________________________________ Dr. Colin Hesse ________________________________________________________________________ Dr. Colleen Colaner ________________________________________________________________________ Dr. Rebecca Meisenbach ________________________________________________________________________ Dr. Christine Proulx I would like to dedicate this dissertation to
    [Show full text]
  • What Is Gang Stalking?
    Bridging The Gap By: GmB Bailey Cover design by GmB Bailey Book design by GmB Bailey All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a review. GmB Bailey Printed in the United States of America First Printing: January 2009 ISBN is 1441448845 EAN-13 is 9781441448842 Bridging The Gap Copyright © 2009 By: GmB Bailey. Introduction Bridging The Gap is a disturbing, yet poignant look into modern day democratic surveillance societies. The book examines how this structure is used to discredit, disenfranchise, and destroy innocent citizens. Gang Stalking, The Buzzsaw, Cointelpro, what do these words mean and more importantly what do they have in common? They are names that have been used to describe the systemic apparatus that reaches out to destroy and discredit those declared enemy by the state. This book will open your eyes to how the informant system has taken over these democratic countries, and how they are being used to further create a surveillance society where no one will be out of reach, should they too become persona non grata by the system. This book is the culmination of two years of research and investigation. It's a very brief introduction to the subject matter of Gang Stalking. It's a factual account of what Gang Stalking is and the societal mechanisms that are in existence, which allow such a structure to exist.
    [Show full text]
  • Stalking in Cyberspace
    Stalking in Cyberspace John M. Deirmenjian, MD The Internet has revolutionized communication on a global level while creating a medium for stalking. Cyberstalking has emerged as a new form of stalking behav- ior. While 10 states have passed laws against electronic harassment, there has been great debate about whether electronic stalking constitutes criminal behavior or whether a perpetrator is entitled First Amendment protection. In the psychiatric literature to date, there are no studies of cyberstalking. This article focuses on relevant cases of stalking on the Internet. Specific legal issues associated with cyberstalking, such as boundary laws and freedom of speech, are examined. The psychological profile of the cyberstalker, as well as methods of intervention, are discussed. The Internet is an international computer crimes such as cyberstalking. Other cy- network that has pioneered a new me- berspace crimes such as computer hack- dium for communication known as cyber- ing, child pornography, pedophilia, and space. By the year 2000, it is estimated hate crimes are often mistaken for cyber- that 40 million people in the United States stalking in the popular literature and the alone will be sending 60 billion electronic media. messages annually. ' Cyberstalking refers to harassment on Cyberspace law is developing as a mul- the Internet using various modes of trans- tidisciplinary specialty that encompasses all mission such as electronic mail (e-mail), cases, statutes, and constitutional provisions chat rooms, newsgroups, mail exploders, that impact persons and institutions in and the World Wide Web. Cyberstalkers cyberspace. The distinct components of can obtain personal information about cyberspace law include jurisdiction, free- their victims, such as home addresses or dom of expression, intellectual property, phone numbers.
    [Show full text]
  • Success in the Protean Career: a Predictive Study of Professional Artists and Tertiary Arts Graduates
    SUCCESS IN THE PROTEAN CAREER: A PREDICTIVE STUDY OF PROFESSIONAL ARTISTS AND TERTIARY ARTS GRADUATES Ruth Bridgstock Submitted in fulfilment of the requirements for the award of the Degree of Doctor of Philosophy, 2007 Centre for Learning Innovation, Faculty of Education Queensland University of Technology ii KEYWORDS Career success, protean career, boundaryless career, career development, career transition, school to work transition, university to work transition, work experience, higher education, career self-management, career management, career education, artists, arts graduates, creative industries, creative workforce, graduate attributes, employability, generic skills, transferable skills, scale development, confirmatory factor analysis, structural equation modelling, content analysis, decision tree, regression tree, CART. iv ABSTRACT In the shift to a globalised creative economy where innovation and creativity are increasingly prized, many studies have documented direct and indirect social and economic benefits of the arts. In addition, arts workers have been argued to possess capabilities which are of great benefit both within and outside the arts, including (in addition to creativity) problem solving abilities, emotional intelligence, and team working skills (ARC Centre of Excellence for Creative Industries and Innovation, 2007). However, the labour force characteristics of professional artists in Australia and elsewhere belie their importance. The average earnings of workers in the arts sector are consistently less than other workers with similar educational backgrounds, and their rates of unemployment and underemployment are much higher (Australian Bureau of Statistics, 2005; Caves, 2000; Throsby & Hollister, 2003). Graduating students in the arts appear to experience similar employment challenges and exhibit similar patterns of work to artists in general. Many eventually obtain work unrelated to the arts or go back to university to complete further tertiary study in fields unrelated to arts (Graduate Careers Council of Australia, 2005a).
    [Show full text]
  • Sandy Hook Hoax Updates Government Docs Page Two Bp Gulf of Mexico Destruction –  Suicided Or Assassinated   Full Documentaries Updates  U.N
    A Truth Soldier FOOD FOR THOUGHT PICS NEURO LINGUISTIC PROGRAMMING Search FREEMASONRY (INSTANT HYPNOSIS) NUMEROLOGY SKIP TO CONTENT FUKUSHIMA RADIATION UPDATES PAGE FOUR PRINCESS DIANA WAS MURDERED A FREEMAN – A COMMON MAN – COMMON LAW FUKUSHIMA RADIATION UPDATES PRINTABLES PAGE ONE ANONYMOUS PSYCHOLOGICAL WARFARE ON YOU FUKUSHIMA RADIATION UPDATES ATRUTHSOLDIER.COM QUICK THOUGHTS (PICS) PAGE THREE ROTHCHILD BLUEPRINTS FOR WORLD FUKUSHIMA RADIATION UPDATES SANDY HOOK HOAX UPDATES GOVERNMENT DOCS PAGE TWO BP GULF OF MEXICO DESTRUCTION – SUICIDED OR ASSASSINATED FULL DOCUMENTARIES UPDATES U.N. AGENDA 21 GEORGE CARLIN CRIMES OF CATHOLIC CHURCH WES TRUTHER HOOVER DAM CRISIS ACTORS ZIONISM HYDRAULIC FRACTURING DAVID ICKE **********FEMA EXTERMINATION ILLUMINATI REFERENCE DEPLETED URANIUM CAMPS UPDATED********** MEXICAN REVOLUTION ELECTRONIC HARASSMENT BOSTON MARATHON HOAX TRUTH MONSANTO GMO INSANITY FLUORIDE POISON MY AUDIO TRANSCRIPTS MY COMMENTARIES SANDY HOOK HOAX UPDATES Please wait for this huge page to load. Have a flash block add-on to keep all videos from playing when you load page. Scroll to bottom for photo gallery. Also see.http://atruthsoldier.com/crisis-actors/ http://atruthsoldier.com/boston-marathon-hoax-truth/ What Londoners think about The Sandy Hook Hoax Published on Jun 21, 2015 Sandy Hook: Stunning Admission by Town Official! Published on Jun 3, 2015 Today at the FOIA Commission Hearing Patricia Llodra made a stunning admission regarding an agency that, until now, has never been acknowledged as having any kind of roll in the Sandy Hook (Hoax) shooting aftermath! Sandy Hook Hoax – When and why it was closed and who was using it Published on May 26, 2014 Also included in this video is proof of police reports that lied with photo evidence to prove it.
    [Show full text]
  • Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem Kathryn C
    Purdue University Purdue e-Pubs Faculty Publications Department of Computer Information Technology 2016 Differentiating cyberbullies and Internet trolls by personality characteristics and self-esteem Kathryn C. Seigfried-Spellar [email protected] Follow this and additional works at: https://docs.lib.purdue.edu/cit_articles Seigfried-Spellar, Kathryn C., "Differentiating cyberbullies and Internet trolls by personality characteristics and self-esteem" (2016). Faculty Publications. Paper 2. https://docs.lib.purdue.edu/cit_articles/2 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Differentiating Cyberbullies and Internet Trolls… JDFSL V11N3 DIFFERENTIATING CYBERBULLIES AND INTERNET TROLLS BY PERSONALITY CHARAACTERISTICS AND SELF-ESTEEM Lauren A. Zezzulka The University of Alabama Kathryn C. Seigfried-Spellar Purdue University [email protected] (Corresponding Author) ABSTRACT Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbulllying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neiither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for both cyberbullying and trolling behaviors. However, there were differentiating factors between individuals who only engaged in cyberbullying behaviors (high on neuroticiism) vs.
    [Show full text]
  • Stetson Law Review
    STETSON LAW REVIEW VOLUME 47 FALL 2017 NUMBER 1 ARTICLES Executive Order 13769 and America’s Longstanding Practice of Institutionalized Racial Discrimination Towards Refugees and Asylum Seekers Kaila C. Randolph 1 One of the paradoxes of international human rights law is the international community’s inability to curb xenophobic attitudes resulting in discriminatory regulations that exclude refugees. The United States has an established history of excluding immigrants, particularly refugees, based on national or ethnic origin, masked under national security. After the Civil War and the abolition of slavery, lawmakers sought to control the ethnic composition of the country, by prohibiting the entry of certain ethnic groups. The practice was implemented through racially discriminatory legislation until the Immigration and Nationality Act of 1965. Nonetheless, the federal government continued to exercise racial discrimination through the adjudication of asylum claims. The United States exemplified its present‐day practice of racial exclusion with Executive Order 13769 “Protecting the Nation from Foreign Terrorist Entry into the United States,” which prohibits the admission of Syrian nationals indefinitely and suspends the U.S. Refugee Admissions Program for a minimum of 120 days. Such immigration policies and regulations are a form of institutionalized racial discrimination that violate a refugee’s equal protection and due process rights under the Fifth Amendment and international human rights norms and customs. Although the Ninth Circuit Court of Appeal unanimously stayed the injunction, the appellate court did not review the merits of the case. This Article traces the enduring practice of institutionalized racial discrimination towards refugees in the United States and the illegality of Executive Order 13769 under federal and international law.
    [Show full text]