Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Entire DC Network

What Is A Search? Two Conceptual Flaws In Fourth Amendment Doctine And Some Hints Of A Remedy, Sherry F. Colb Dec 2014

What Is A Search? Two Conceptual Flaws In Fourth Amendment Doctine And Some Hints Of A Remedy, Sherry F. Colb

Sherry Colb

No abstract provided.


Sunk Costs Of Consumer Search: Economic Rationality Of Satisficing Decision., Sergey V. Malakhov Jul 2014

Sunk Costs Of Consumer Search: Economic Rationality Of Satisficing Decision., Sergey V. Malakhov

Sergey Malakhov

The paper argues that sunk costs’ sensitivity can lead to the optimal consumption-leisure choice under price dispersion. The increase in quantity to be purchased with the extension of the time horizon of the consumption-leisure choice equalizes marginal costs of search with its marginal benefits. The implicit optimal choice results in the explicit satisficing decision. The transformation of cognitive mechanism of discouragement into satisficing happens only in the “common model” of consumer behavior. The paper argues that the cognitive mechanism of aspiration takes place when consumers try to get marginal savings on purchase greater than the wage rate and, therefore, they …


Satisficing Decision Procedure And Optimal Consumption-Leisure Choice, Sergey V. Malakhov Jun 2014

Satisficing Decision Procedure And Optimal Consumption-Leisure Choice, Sergey V. Malakhov

Sergey Malakhov

The paper argues that a satisficing consumer decision equalizes marginal costs of search for satisficing price with the marginal benefit of search where the marginal costs of search are equal to the marginal loss in labor income and the marginal benefit of search is equal to the marginal savings on purchase. When the liquidity constraint is soft, a consumer maximizes the utility of his consumption-leisure choice with regard to the equality of marginal values of search. Therefore, the satisficing decision becomes optimal. And the equilibrium price of the satisficing optimal choice becomes equal to the willingness to accept.


Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang Mar 2014

Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang

Professor Willy Susilo

The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a “trapdoor” (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes this notion very practical. Following Boneh et al.’s work, there have been subsequent works that have been proposed to enhance this notion. Two important notions include the so-called keyword guessing attack and …


Similarity-Based Search For Model Checking: A Pilot Study With Java Pathfinder, Elmin Ibrahimov, Jixing Wang, Zhiquan Zhou Jan 2014

Similarity-Based Search For Model Checking: A Pilot Study With Java Pathfinder, Elmin Ibrahimov, Jixing Wang, Zhiquan Zhou

Dr Zhiquan Zhou

When a model checker cannot explore the entire state space because of limited resources, model checking becomes a kind of testing with an attempt to find a failure (violation of properties) quickly. We consider two state sequences in model checking: (i) the sequence in which new states are generated, and (ii) the sequence in which the states generated in sequence (i) are checked for property violation. We observe that neighboring states in sequence (i) often have similarities in certain ways. Based on this observation we propose a search strategy, which generates sequence (ii) in such a way that similar states …


Constitutional Trespass, Laurent Sacharoff Dec 2013

Constitutional Trespass, Laurent Sacharoff

Laurent Sacharoff

The Supreme Court has recently created a trespass test for Fourth Amendment searches without explaining what type of trespass it envisions—one based on the common law of 1791, on the specific trespass law of the state where the search occurred, or on some other trespass principles. Indeed Florida v. Jardines, decided in 2013, raises the question whether the Court has created a trespass test at all, a seeming turnabout that largely recapitulates the Court’s 125- year history of confusion in which it has embraced, rejected, or simply ignored trespass as a test from era to era or even year to …


Speech Engines, James Grimmelmann Dec 2013

Speech Engines, James Grimmelmann

James Grimmelmann

Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.

A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …


The "Not A Search" Game, John F. Stinneford Dec 2013

The "Not A Search" Game, John F. Stinneford

John F. Stinneford

No abstract provided.


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Dec 2013

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Stephen E Henderson

"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …


Reforming The Grand Jury To Protect Privacy In Third Party Records, Stephen E. Henderson, Andrew E. Taslitz Dec 2013

Reforming The Grand Jury To Protect Privacy In Third Party Records, Stephen E. Henderson, Andrew E. Taslitz

Stephen E Henderson

In late 2014, two grand juries returned controversial no bill decisions in police killings, one in Ferguson, Missouri, and one in New York City. These outcomes have renewed calls for grand jury reform, and whatever one thinks of these particular processes and outcomes, such reform is long overdue. One logical source of reform to better respect privacy in records, which would have incidental benefits beyond this privacy focus, would be the newly enacted American Bar Association Standards for Criminal Justice on Law Enforcement Access to Third Party Records (LEATPR).

But LEATPR exempts from its requirements access to records via a …