Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Are You Now Or Have You Ever Been A Sociologist, Barry Krisberg Dec 2015

Are You Now Or Have You Ever Been A Sociologist, Barry Krisberg

Barry A Krisberg

No abstract provided.


Not Your Father's Police Department: Making Sense Of The New Demographics Of Law Enforcement, David Sklansky Dec 2015

Not Your Father's Police Department: Making Sense Of The New Demographics Of Law Enforcement, David Sklansky

David A Sklansky

No abstract provided.


The Criminal Law And The Luck Of The Draw, Sanford Kadish Dec 2015

The Criminal Law And The Luck Of The Draw, Sanford Kadish

Sanford Kadish

No abstract provided.


Reckless Complicity, Sanford Kadish Dec 2015

Reckless Complicity, Sanford Kadish

Sanford Kadish

No abstract provided.


Decision-Making In Criminal Defense: An Empirical Study Of Insanity Pleas And The Impact Of Doubted Client Competence, Richard Bonnie, Norman Poythress, Steven Hoge, John Monahan Dec 2015

Decision-Making In Criminal Defense: An Empirical Study Of Insanity Pleas And The Impact Of Doubted Client Competence, Richard Bonnie, Norman Poythress, Steven Hoge, John Monahan

Norman Poythress

No abstract provided.


How The Justice System Fails Us After Police Shootings, Caren Morrison Dec 2015

How The Justice System Fails Us After Police Shootings, Caren Morrison

Caren Myers Morrison

No abstract provided.


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …