Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Is Torture Justified In Terrorism Cases?: Comparing U.S. And European Views, Stephen P. Hoffman Jan 2013

Is Torture Justified In Terrorism Cases?: Comparing U.S. And European Views, Stephen P. Hoffman

Stephen P. Hoffman

This essay discusses issues of torture and some of the philosophical underpinnings. First, I define torture as it is used in international and human rights law. Then, I discuss three primary theories of torture: deontology, consequentialism, and threshold deontology. After setting this groundwork, I introduce particular issues in terrorism cases such as the “ticking bomb” scenario, which is often used to argue that torture may be appropriate and possibly required when done to save many lives. This invariably must include a discussion of the necessity doctrine, the legal doctrine allowing an individual to take extraordinary — even illegal — measures …


Euthanasia And Physician-Assisted Suicide: A Comparison Of Eu And U.S. Law, Stephen Hoffman Jan 2013

Euthanasia And Physician-Assisted Suicide: A Comparison Of Eu And U.S. Law, Stephen Hoffman

Stephen P. Hoffman

This paper examines the controversial and complex issues of euthanasia and physician-assisted suicide (PAS). I begin by defining and distinguishing these two terms and explain how they relate to each other. I also describe the medical doctrine of double effect, in which relieving pain comes at the expense of hastening death. Then, I give a brief overview of the common law defense of necessity, which is practically the sole defense available to or used by physicians accused of committing euthanasia or PAS. Finally, I analyze the legal doctrines of euthanasia and PAS, focusing on legislation and cases in the European …


Dodd-Frank, Securitization, And The Subprime Mortgage Crisis, Stephen P. Hoffman Jan 2012

Dodd-Frank, Securitization, And The Subprime Mortgage Crisis, Stephen P. Hoffman

Stephen P. Hoffman

There are few things more constant in life than the rise and fall of financial markets. When markets crash, however, we are forced to restore them while learning from our mistakes. In the wake of the recent subprime mortgage crisis, Congress has drastically but deservedly overhauled the regulation of financial markets in order to not only prevent such disasters in the future, but to help restore financial stability more quickly if and when they do occur. In this Paper, I provide a background of the events leading up to the most devastating financial crisis since the Great Depression, focusing on …


The Uncertainty Of “True Sale” Analysis In Originator Bankruptcy, Stephen P. Hoffman Jan 2012

The Uncertainty Of “True Sale” Analysis In Originator Bankruptcy, Stephen P. Hoffman

Stephen P. Hoffman

While much of law is complex or unclear, it is unusual for a judge to comment that a legal doctrine is so unsettled that courts “could flip a coin” to decide an issue. Unfortunately for practitioners, determining what constitutes a “true sale” for bankruptcy purposes is such an issue. Add to this the recent novel and innovative processes of structured finance and asset-backed securitization, and you have the stuff of law students’—and corporate counsels’—nightmares. As a result, courts and legislatures need to provide clarity in this area so that originators can safely structure investments and transactions, not only for the …


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Biometrics, Retinal Scanning, And The Right To Privacy In The 21st Century, Stephen Hoffman Jan 2010

Biometrics, Retinal Scanning, And The Right To Privacy In The 21st Century, Stephen Hoffman

Stephen P. Hoffman

Biometric identification techniques such as retinal scanning and fingerprinting have now become commonplace, but near-future improvements on these methods present troubling issues for personal privacy. For example, retinal scanning can be used to diagnose certain medical conditions, even ones for which the patient has no symptoms or has any other way of detecting the problem. If a health insurance company scans the retinas of potential clients before they purchase coverage, they could be charged higher premiums for conditions that do not present any issues. Not only is this unfair, but the ease with which these scans can be conducted—including scanning …