Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

PDF

2014

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 206

Full-Text Articles in Law

Rethinking The Timing Of Capital Clemency, Adam M. Gershowitz Oct 2014

Rethinking The Timing Of Capital Clemency, Adam M. Gershowitz

Faculty Publications

This Article reviews every capital clemency over the last four decades. It demonstrates that in the majority of cases, the reason for commutation was known at the conclusion of direct appeals—years or even decades before the habeas process ended. Yet when governors or pardon boards actually commuted the death sentences, they typically waited until the eve of execution, with only days or hours to spare. Leaving clemency until the last minute sometimes leads to many years of unnecessary state and federal habeas corpus litigation, and this Article documents nearly 300 years of wasted habeas corpus review. Additionally, last-minute commutations harm …


From Intent To Effect: Richmond, Virginia, And The Protracted Struggle For Voting Rights, 1965–1977, Julian Maxwell Hayter Oct 2014

From Intent To Effect: Richmond, Virginia, And The Protracted Struggle For Voting Rights, 1965–1977, Julian Maxwell Hayter

Jepson School of Leadership Studies articles, book chapters and other publications

Twelve years after the ratification of the Voting Rights Act of 1965 [VRA], Richmond, Virginia elected a historic majority black city council. The 5-4 majority quickly appointed an African American lawyer named Henry Marsh, III to the mayoralty. Marsh, a nationally celebrated civil rights litigator, was not only the city’s first black mayor, but the council election of 1977 was also Richmond’s first since 1970. In 1972, a federal district court used the VRA’s preclearance clause in Section 5 to place a moratorium on council contests. This moratorium lasted until the Supreme Court and the Department of Justice determined whether …


Is Burglary A Violent Crime? An Empirical Investigation Of Classifying Burglary As A Violent Felony And Its Statutory Implications, Phillip Kopp Oct 2014

Is Burglary A Violent Crime? An Empirical Investigation Of Classifying Burglary As A Violent Felony And Its Statutory Implications, Phillip Kopp

Dissertations, Theses, and Capstone Projects

Under the common law, burglary is defined as a crime committed against the property of another, and is listed as a property offense for purposes of statistical description by the Uniform Crime Reports (UCR) and the National Crime Victimization Survey (NCVS). However, burglary is prosecuted and sentenced as a violent crime under habitual offender laws at the federal level, and can be regarded as violent in state law, depending on varied circumstances. Using a mixed methods approach, the current study compared state and federal burglary and habitual offender statutes to an empirical description of the offense. First, a comprehensive content …


Reconstructing The Criminal Defenses: The Significance Of Justification, Thomas Morawetz Sep 2014

Reconstructing The Criminal Defenses: The Significance Of Justification, Thomas Morawetz

Thomas H. Morawetz

No abstract provided.


A Content Analysis Of Backpage.Com Advertisements In Louisville, Kentucky, Theresa C. Hayden Sep 2014

A Content Analysis Of Backpage.Com Advertisements In Louisville, Kentucky, Theresa C. Hayden

Faculty Scholarship

Backpage.com and Craigslist are replacing the street corner as a crime source for buying and selling of sex. “To reduce commercial sexual exploitation and enforce existing trafficking laws, communities must first recognize the extent of the problem within their local area (Janson, Mann, Marro, & Matvey, 2013, 99). In a population density study conducted in 15 major U. S. cities, it was found that males over 18 years of age who buy sex online ranged from 0.6% in San Francisco to 21.4% in Houston (Roe-Sepoqitz, Hickle, Gallagher, Smith, & Hedberg, 2013). Researchers in the Greater Cincinnati area found a high …


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


Abuse Of Property Right Without Political Foundations: A Response To Katz, Mitchell N. Berman Aug 2014

Abuse Of Property Right Without Political Foundations: A Response To Katz, Mitchell N. Berman

All Faculty Scholarship

In an article recently published in the Yale Law Journal, Larissa Katz defends a heterodox principle of abuse of property right pursuant to which an owner abuses her rights with respect to a thing she owns if she makes an otherwise permitted decision about how to use that thing just in order to harm others, either out of spite, or for leverage. Katz grounds that principle in a novel theory of the political foundations of the institution of property ownership. This essay argues that Katz’s political theory is implausible, but that this should not doom her preferred principle of …


Neighborhood Differences In Attitudes Toward Policing: Evidence For A Mixed-Strategy Model Of Policing In A Multi-Ethnic Setting, Roger G. Dunham, Geoffrey P. Alpert Aug 2014

Neighborhood Differences In Attitudes Toward Policing: Evidence For A Mixed-Strategy Model Of Policing In A Multi-Ethnic Setting, Roger G. Dunham, Geoffrey P. Alpert

Roger G. Dunham Dr.

No abstract provided.


Putting The Microscope On Crime Labs: The Effects Of Evidence Complexity And Laboratory Type On Jurors' Perceptions Of Forensic Evidence, Miliaikeala S.J. Heen Aug 2014

Putting The Microscope On Crime Labs: The Effects Of Evidence Complexity And Laboratory Type On Jurors' Perceptions Of Forensic Evidence, Miliaikeala S.J. Heen

UNLV Theses, Dissertations, Professional Papers, and Capstones

An experiment was conducted to test the effects of evidence complexity and laboratory type on jurors' perceptions of forensic evidence. The study specifically focused on three types of labs: public labs, private labs, and "corporate labs." Public labs are managed by a federal, state, or local law enforcement agency, where evidence is usually analyzed internally at an agency. Private labs are those that have been formed as private businesses to provide services to federal, state, and local crime labs with overflow work. Corporate labs are managed by major retail corporations, and primarily service the needs of their store businesses, but …


Examining Student Perceptions: Ethics And Misconduct In Today's Police Department, William Andrew Davis Aug 2014

Examining Student Perceptions: Ethics And Misconduct In Today's Police Department, William Andrew Davis

Master's Theses

Police ethics and decision making are issues of concern to both academic scholars and police leaders. While previous studies have focused on perceptions of police officers, little research has focused on the perceptions of young people about police ethical decision-making. This study aims to capture such perceptions from a cohort of college students majoring in criminal justice. Students from an undergraduate criminal justice program (n=263) were surveyed to determine their attitudes toward various ethical components of police work, including the prevalence of misconduct and the impact of a college education on ethical decision-making. Moreover, the effect of successful completion of …


The Corrections System Must Make More Accommodations For The Needs Of Motherhood During Incarceration And The Parole Period, Susan Bloom Aug 2014

The Corrections System Must Make More Accommodations For The Needs Of Motherhood During Incarceration And The Parole Period, Susan Bloom

Theses & Dissertations

While the overall prison population has experienced an unprecedented growth period over the past thirty years, no segment has grown at a faster rate than the female population. Since the majority of female inmates in this country are mothers, it is imperative that the corrections system addresses the unique needs of this subset. This thesis investigates problems women face during the pregnancy period, while in labor and delivery, while their progenies are infants, children and adolescents and reunification issues during the parole period.


An Examination Of University Speech Codes’ Constitutionality And Their Impact On High-Level Discourse, Benjamin Welch Aug 2014

An Examination Of University Speech Codes’ Constitutionality And Their Impact On High-Level Discourse, Benjamin Welch

College of Journalism and Mass Communications: Theses

The First Amendment – which guarantees the right to freedom of religion, of the press, to assemble, and petition to the government for redress of grievances – is under attack at institutions of higher learning in the United States of America. Beginning in the late 1980s, universities have crafted “speech codes” or “codes of conduct” that prohibit on campus certain forms of expression that would otherwise be constitutionally guaranteed. Examples of such polices could include prohibiting “telling a joke that conveys sexism,” or “content that may negatively affect an individual’s self-esteem.” Despite the alarming number of institutions that employ such …


Discipline And The Pipeline To The 'Pen': A Proposal For Change, Sharlette A. Kellum-Gilbert Ph.D. Jul 2014

Discipline And The Pipeline To The 'Pen': A Proposal For Change, Sharlette A. Kellum-Gilbert Ph.D.

Dr. Sharlette A. Kellum-Gilbert

Consciously or subconsciously, educators are funneling our children from schools to prisons. Moreover, they’re uploading African American and Hispanic children into the system at a number that is measurably out of proportion to their White counterparts. Ticketing students for minor behavior infractions and labeling them as “alternative” often causes them to act out alternatively. Becker (1963) believes that those who create rules and labels for others that do not follow those rules are actually responsible for creating deviance. Ultimately, when students are hastily ticketed and charged when they act out, it’s much easier for them to drop out of school …


Justice And Starvation In Cambodia: The Khmer Rouge Famine, Randle C. Defalco Jul 2014

Justice And Starvation In Cambodia: The Khmer Rouge Famine, Randle C. Defalco

Randle C DeFalco

No abstract provided.


Introduction To The Structure And Limits Of Criminal Law, Paul H. Robinson, Joshua Samuel Barton Jul 2014

Introduction To The Structure And Limits Of Criminal Law, Paul H. Robinson, Joshua Samuel Barton

All Faculty Scholarship

The book The Structure and Limits of Criminal Law (Ashgate) collects and reprints classic articles on three topics: the conceptual structure of criminal law doctrine, the conduct necessary and that sufficient for criminal liability, and the offender culpability and blameworthiness necessary and that sufficient for criminal liability. The collection includes articles by H.L.A. Hart, Sanford Kadish, George Fletcher, Herbert Packer, Norval Morris, Gordon Hawkins, Andrew von Hirsch, Bernard Harcourt, Richard Wasserstrom, Andrew Simester, John Darley, Kent Greenawalt, and Paul Robinson. This essay serves as an introduction to the collection, explaining how each article fits into the larger debate and giving …


The Conventional Option, Gregory Koger Jun 2014

The Conventional Option, Gregory Koger

Gregory Koger

The filibuster in the United States Senate effectively imposes a supermajority vote requirement to pass any legislation. Both supporters and critics of the filibuster agree that any filibuster reform would require extraordinary measures. In contrast to this consensus, this Article describes a method we call the “conventional option,” which allows the filibuster to be reformed by a simple majority of senators at any time using ordinary Senate procedures. As we show below, a majority of senators using the conventional option (1) cannot be filibustered; (2) can act on any day the Senate is in session (not just at the beginning …


From The Editor-In-Chief, Ibrahim A. Baggili Jun 2014

From The Editor-In-Chief, Ibrahim A. Baggili

Journal of Digital Forensics, Security and Law

We are proud to share with you this special edition issue of the JDFSL. This year, JDFSL partnered with both the 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C) and Systematic Approaches to Digital Forensic Engineering (SADFE)–two prominent conferences in our field that were co-hosted. Fifty-three papers were submitted, and the Technical Program Committee accepted only 17 after a rigorous review process.


Not All Women Are Mothers: Addressing The Invisibility Of Women Under The Control Of The Criminal Justice System Who Do Not Have Children, Venezia Michalsen, Jeanne Flavin Jun 2014

Not All Women Are Mothers: Addressing The Invisibility Of Women Under The Control Of The Criminal Justice System Who Do Not Have Children, Venezia Michalsen, Jeanne Flavin

Department of Justice Studies Faculty Scholarship and Creative Works

Research has consistently shown that most women under the control of the criminal justice system are mothers. The robustness of this finding has been accompanied by a failure to consider the characteristics and needs of women without children. In this study, we examine data on 1,334 formerly incarcerated women. Findings indicate that while mothers and non-mothers share some characteristics, they differ on several others, most notably demographic profile, mental health, and timing of contacts with the criminal justice system. These results suggest a need to recognize the diversity among women offender groups, particularly when developing policies and programs need.


Policing Cyber Bullying: How Parents, Educators, And Law Enforcement Respond To Digital Harassment, Ryan Broll Jun 2014

Policing Cyber Bullying: How Parents, Educators, And Law Enforcement Respond To Digital Harassment, Ryan Broll

Electronic Thesis and Dissertation Repository

Some prior research has emphasised how adults ought to address cyber bullying, yet little is known about how they actually prevent and respond to digital harassment. This study addresses this gap in the literature by exploring the formal and informal “policing” of cyber bullying by a network of security actors: parents, teachers and school administrators, and the public police. Data were collected through a mixed methods research design consisting of semi-structured qualitative interviews with eight parents, 14 teachers, and 12 members of law enforcement (n = 34) and quantitative surveys completed by 52 parents.

Drawing upon nodal governance theory as …


Translator, Traitor: A Critical Ethnography Of A U.S. Terrorism Trial, Maya Hess Jun 2014

Translator, Traitor: A Critical Ethnography Of A U.S. Terrorism Trial, Maya Hess

Dissertations, Theses, and Capstone Projects

Historically, the role of translators and interpreters has suffered from multiple misconceptions. In theaters of war, these linguists are often viewed as traitors and kidnapped, tortured, or killed; if they work in the terrorism arena, they may be prosecuted and convicted as terrorist agents. In United States v. Ahmed Abdel Sattar, a/k/a "Abu Omar," a/k/a "Dr. Ahmed," Lynne Stewart, and Mohammed [sic] Yousry, 02 Cr. 395 (JGK) (S.D.N.Y. 2003), Yousry, an Arabic linguist and scholar of Middle Eastern history, was labeled such an agent, his work as translator/interpreter construed as material support to terrorism, and his expertise recast as dangerous …


The Punishment Should Fit The Crime—Not The Prior Convictions Of The Person That Committed The Crime: An Argument For Less Impact Being Accorded To Previous Convictions, Mirko Bagaric Jun 2014

The Punishment Should Fit The Crime—Not The Prior Convictions Of The Person That Committed The Crime: An Argument For Less Impact Being Accorded To Previous Convictions, Mirko Bagaric

San Diego Law Review

The seriousness of the offense is the main consideration that should determine the severity of criminal punishment. This cardinal sentencing principle is undermined by the reality that often the criminal history of the offender is the most decisive sentencing consideration. Recidivists are frequently sent to imprisonment for long periods for crimes, which, when committed by first-time offenders, are dealt with by a bond, probation, or a fine. This makes sentencing more about an individual’s profile than the harm caused by the offender and has contributed to a large increase in prison numbers. Intuitively, it feels right to punish repeat offenders …


Incarceration And Reintegration: How It Impacts Mental Health, April M. Marier, Alex Alfredo Reyes Jun 2014

Incarceration And Reintegration: How It Impacts Mental Health, April M. Marier, Alex Alfredo Reyes

Electronic Theses, Projects, and Dissertations

ABSTRACT

Background: Previous criminal justice policies have been non-effective leading to overpopulated prisons and unsuccessful reintegration. There is a lack of effective supportive and/or rehabilitative services resulting in high rates of recidivism and mental health implications. Objective: This study investigated the perceived impact that incarceration and reintegration with little to no supportive and/or rehabilitative services has on the mental health status of an individual. The emphasis was on participant perception and not on professional reports because of underreporting and lack of attention to mental health in the criminal justice system. Methods: Focus groups in the Inland Empire and Coachella Valley …


Games Of Life And Death: The Judicial Uses Of Dice In Eighteenth And Nineteenth-Century Sweden, Per Binde May 2014

Games Of Life And Death: The Judicial Uses Of Dice In Eighteenth And Nineteenth-Century Sweden, Per Binde

UNLV Gaming Research & Review Journal

Gambling studies should take a broad view of the field and consider activities that are not strictly gambling but similar to it, such as cleromancy and secular uses of drawing of lots, to give us perspective on societal and cultural aspects of gambling. This paper presents historical data on judicial uses of throwing dice in eighteenth and nineteenth-century Sweden. The focus is on cases of manslaughter with multiple perpetrators who were considered equally guilty and were forced by the criminal court to throw dice to determine who should be executed and who should receive lesser penalties. Three principles are distinguished …


Can Retributivism Be Saved?, Chad Flanders May 2014

Can Retributivism Be Saved?, Chad Flanders

BYU Law Review

Retributive theory has long held pride of place among theories of criminal punishment in both philosophy and in law. It has seemed, at various times, either much more intuitive, or rationally persuasive, or simply more normatively right than other theories. But retributive theory is limited, both in theory and practice, and in many of its versions is best conceived not as a theory of punishment in its own right, but instead as shorthand for a set of constraints on the exercise of punishment. Whether some version of retributive theory is a live possibility in the contemporary world remains very much …


Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague May 2014

Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague

Annual ADFSL Conference on Digital Forensics, Security and Law

Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …


Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem May 2014

Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem

Annual ADFSL Conference on Digital Forensics, Security and Law

Fake AntiVirus (FakeAV) malware experienced a resurgence in the fall of 2013 after falling out of favor after several high profile arrests. FakeAV presents two unique challenges to investigators. First, because each criminal organization running a FakeAV affiliate system regularly alters the appearance of their system, it is sometimes difficult to know whether an incoming criminal complaint or malware sample is related to one ring or the other. Secondly, because FakeAV is delivered in a “Pay Per Install” affiliate model, in addition to the ring-leaders of each major ring, there are many high-volume malware infection rings who are all using …


Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen May 2014

Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

There has been extensive work in crime scene reconstruction of physical locations, and much is known in terms of digital forensics of computing devices. However, the network has remained a nebulous combination of entities that are largely ignored during an investigation due to the transient nature of the data that flows through the networks. This paper introduces an architecture for network path reconstruction using the network layer reachability information shared via OSPF Link State Advertisements and the routines and functions of OSPF::rt_sched() as applied to the construction of identical Link State Databases for all routers within an Area.


Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake May 2014

Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake

Annual ADFSL Conference on Digital Forensics, Security and Law

Most of the Live Video Systems do not preserve the Confidentiality principle, and send all frames of the video without any protection, allowing an easy “man in the middle” attack. But when it does, it uses cryptographic techniques over streaming data or makes use of secure channel systems. This generates low frame rate and demands many processor resources. In fact native Live Video Streaming demands many resources of all System.

In this paper we propose a technique to preserve confidentiality in Video Live Streaming applying a confusing visual method making use of the Toral Automorphism Spatial Transformation over each frame. …


Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt May 2014

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt

Annual ADFSL Conference on Digital Forensics, Security and Law

As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …


Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack May 2014

Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack

Annual ADFSL Conference on Digital Forensics, Security and Law

Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …