Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 138

Full-Text Articles in Law

Imprisoning Rationalities, Eileen Baldry, David Brown, Mark Brown, Chris Cunneen, Melanie Schwartz, Alex Steel Dec 2015

Imprisoning Rationalities, Eileen Baldry, David Brown, Mark Brown, Chris Cunneen, Melanie Schwartz, Alex Steel

David C. Brown

Imprisonment is a growth industry in Australia. Over the past 30-40 years all state and territory jurisdictions have registered massive rises in both the absolute numbers of those imprisoned and the per capita use of imprisonment as a tool of punishment and control. Yet over this period there has been surprisingly little criminological attention to the national picture of imprisonment in Australia and to understanding jurisdictional variation, change and continuity in broader theoretical terms. This article reports initial findings from the Australian Prisons Project, a multi-investigator Australian Research Council funded project intended to trace penal developments in Australia since about ...


Criminal Laws: Materials And Commentary On Criminal Law And Process In Nsw, Alex Steel, David Brown, David Farrier, Sandra Egger, Luke Mcnamara, Michael Grewcock, Donna Spears Dec 2015

Criminal Laws: Materials And Commentary On Criminal Law And Process In Nsw, Alex Steel, David Brown, David Farrier, Sandra Egger, Luke Mcnamara, Michael Grewcock, Donna Spears

David C. Brown

The success of Criminal Laws lies both in its distinctive features and in its appeal to a range of readerships. As one review put it, it is simultaneously a “textbook, casebook, handbook and reference work”. As such it is ideal for criminal law and criminal justice courses as a teaching text, combining as it does primary sources with extensive critical commentary and a contextual perspective. It is likewise indispensable to practitioners for its detailed coverage of substantive law and its extensive references and inter-disciplinary approach make it a first point of call for researchers from all disciplines. This fifth edition ...


The Gulf Cooperative Council And The Arab Spring, Ahmed Souaiaia Dec 2011

The Gulf Cooperative Council And The Arab Spring, Ahmed Souaiaia

Ahmed E SOUAIAIA

No abstract provided.


Apathy In The Face Of Cruelty, Ahmed Souaiaia Dec 2011

Apathy In The Face Of Cruelty, Ahmed Souaiaia

Ahmed E SOUAIAIA

No abstract provided.


Qatar, Al Jazeera, And The Arab Spring, Ahmed E. Souaiaia Nov 2011

Qatar, Al Jazeera, And The Arab Spring, Ahmed E. Souaiaia

Ahmed E SOUAIAIA

No abstract provided.


“Impact” In 3d—Maximizing Impact Through Transactional Clinics, Praveen Kosuri Nov 2011

“Impact” In 3d—Maximizing Impact Through Transactional Clinics, Praveen Kosuri

Faculty Scholarship at Penn Law

In speaking about “impact” clinical legal education, it is almost always exclusively as litigation—innocence projects, representing Guantanamo detainees, human rights concerns, environmental issues. Though these clinical efforts target different societal ills, all try to use the legal system as a catalyst for change. Rarely do clinicians invoke the word “impact” in the same manner in discussing transactional legal work much less transactional clinics. Yet transactional clinics can and do perform impact work. This article describes the current landscape of transactional clinics, the distinct evolution of community economic development clinics from small business and organizations clinics and argues that both ...


Reflections And Perspectives On Reentry And Collateral Consequences, Michael Pinard Oct 2011

Reflections And Perspectives On Reentry And Collateral Consequences, Michael Pinard

Michael Pinard

This essay addresses the continued and dramatic increase in the numbers of individuals released from correctional institutions and returning to communities across the United States. It provides a brief history of the collateral consequences of criminal convictions, and the ways in which these consequences impede productive reentry. It then highlights national and state efforts to address to persistent reentry obstacles and to better understand the range and scope of collateral consequences. It concludes by offering suggestions for reform.


Martha Stewart Saved! Insider Violations Of Rule 10b-5 For Misrepresented Or Undisclosed Personal Facts, Joan Heminway Oct 2011

Martha Stewart Saved! Insider Violations Of Rule 10b-5 For Misrepresented Or Undisclosed Personal Facts, Joan Heminway

Joan M Heminway

This article analyses the criminal securities fraud charges brought against Martha Stewart. Stewart was acquitted of these charges by a federal district court judge in February 2004. Specifically, the article initially focuses on whether the securities fraud charges brought against Stewart were valid as a matter of prosecutorial discretion and substantive law and whether the court was correct in granting Stewart's motion for acquittal before handing the rest of her case to the jury for deliberation. The article then offers substantive and procedural observations about Rule 10b-5 cases like the one brought against Stewart.


La Presunción De Inocencia Como Proposición Sintética, Cesar A. Prieto Oct 2011

La Presunción De Inocencia Como Proposición Sintética, Cesar A. Prieto

Cesar A. Prieto

No abstract provided.


Unanswered Questions Of A Minority People In International Law: A Comparative Study Between Southern Cameroons & South Sudan, Bernard Sama Mr Oct 2011

Unanswered Questions Of A Minority People In International Law: A Comparative Study Between Southern Cameroons & South Sudan, Bernard Sama Mr

Bernard Sama

The month July of 2011 marked the birth of another nation in the World. The distressful journey of a minority people under the watchful eyes of the international community finally paid off with a new nation called the South Sudan . As I watched the South Sudanese celebrate independence on 9 July 2011, I was filled with joy as though they have finally landed. On a promising note, I read the UN Secretary General Ban Ki-moon saying “[t]ogether, we welcome the Republic of South Sudan to the community of nations. Together, we affirm our commitment to helping it meet its ...


The Nebraska Transcript 44:2, Fall 2011 Oct 2011

The Nebraska Transcript 44:2, Fall 2011

The Nebraska Transcript

Dean’s Message 2
Faculty Update Profile: Marty Gardner 4
Whistleblowing Dilemma 6
Faculty Notes 10
Mediation Turns Twenty 16
Medill Creator of New Book Series 19
Willborn Chair of LSAC 20
Beard Returns to Midwest 23
Moberly Appointed to New Role 25
Sheppard Brings Patent Law Back 26
Around the College Feature: Justice Clarence Thomas 28
Admissions Report 31
Presidential Management Fellows Program 33
LL.M. Report 36
Leiter Spends Semester At Harvard 38
2011 Commencement 42
ACLU President Delivers Lane Lecture 46
Judge Bennett & Implicit Bias 47
College Hosts ABA Regional Conference 48
“Futurama” Producer Visits College 49 ...


Advance, Winter 2011, San Jose State University, Department Of Justice Studies Oct 2011

Advance, Winter 2011, San Jose State University, Department Of Justice Studies

Advance (Justice Studies)

News from the San Jose State University Record Clearance Project


Protecting Liberty And Autonomy: Desert/Disease Jurisprudence, Stephen J. Morse Oct 2011

Protecting Liberty And Autonomy: Desert/Disease Jurisprudence, Stephen J. Morse

Faculty Scholarship at Penn Law

This contribution to a symposium on the morality of preventive restriction on liberty begins by describing the positive law of preventive detention, which I term "desert/disease jurisprudence." Then it provides a brief excursus about risk prediction (estimation), which is at the heart of all preventive detention practices. Part IV considers whether proposed expansions of desert jurisprudence are consistent with retributive theories of justice, which ground desert jurisprudence. I conclude that this is a circle that cannot be squared. The following Part canvasses expansions of disease jurisprudence, especially the involuntary civil commitment of mentally abnormal, sexually violent predators, and the ...


Thinking Like Thinkers: Is The Art And Discipline Of An "Attitude Of Suspended Conclusion" Lost On Lawyers?, Donald J. Kochan Aug 2011

Thinking Like Thinkers: Is The Art And Discipline Of An "Attitude Of Suspended Conclusion" Lost On Lawyers?, Donald J. Kochan

Donald J. Kochan

In his 1910 book, How We Think, John Dewey proclaimed that “the most important factor in the training of good mental habits consists in acquainting the attitude of suspended conclusion. . .” This Article explores that insight and describes its meaning and significance in the enterprise of thinking generally and its importance in law school education specifically. It posits that the law would be best served if lawyers think like thinkers and adopt an attitude of suspended conclusion in their problem solving affairs. Only when conclusion is suspended is there space for the exploration of the subject at hand. The thinker must ...


Canada's Truth And Reconciliation Commission: Settling The Past?, Kim Stanton Aug 2011

Canada's Truth And Reconciliation Commission: Settling The Past?, Kim Stanton

The International Indigenous Policy Journal

The Indian Residential Schools (IRS) system has been referred to as “Canada's greatest national shame”. The IRS system is now the subject of the Canadian Truth and Reconciliation Commission (TRC). Unlike other truth commissions that have been created due to regime change, where a majority of citizens sought a truth-seeking process, Canada’s TRC arose as a result of protracted litigation by survivors of the IRS system against the government and churches that ran the schools. This article reviews the genesis of TRC in a legal settlement agreement, along with some of the challenges this origin entails.


Legal Mechanization Of Corporate Social Responsibility Through Alien Tort Statute Litigation: A Response To Professor Branson With Some Supplemental Thoughts, Donald J. Kochan Jul 2011

Legal Mechanization Of Corporate Social Responsibility Through Alien Tort Statute Litigation: A Response To Professor Branson With Some Supplemental Thoughts, Donald J. Kochan

Donald J. Kochan

This Response argues that as ATS jurisprudence “matures” or becomes more sophisticated, the legitimate limits of the law regress. The further expansion within the corporate defendant pool – attempting to pin liability on parent, great grandparent corporations and up to the top – raises the stakes and complexity of ATS litigation. The corporate social responsibility discussion raises three principal issues about how a moral corporation lives its life: how a corporation chooses its self-interest versus the interests of others, when and how it should help others if control decisions may harm the shareholder owners, and how far the corporation must affirmatively go ...


Executions In America: How Constitutional Interpretation Has Restricted Capital Punishment, Andrea Paone Jul 2011

Executions In America: How Constitutional Interpretation Has Restricted Capital Punishment, Andrea Paone

Pell Scholars and Senior Theses

In upholding the constitutionality of capital punishment, the United States Supreme Court has utilized a strict construction interpretation of the Fourteenth Amendment's Due Process Clause, which has led the opponents of capital punishment to abandon the Due Process approach and look to the Eighth Amendment, for which the justices utilize a loose construction interpretation.


Prevention Of Identity Theft: A Review Of The Literature, Portland State University. Criminology And Criminal Justice Senior Capstone Jul 2011

Prevention Of Identity Theft: A Review Of The Literature, Portland State University. Criminology And Criminal Justice Senior Capstone

Criminology and Criminal Justice Senior Capstone Project

With advances in technology and increases in impersonal electronic transactions, identity theft IT) is becoming a major problem in today’s society. One may ask why IT is growing in America. The answer is simple, as a review of literature reveals: IT is extremely hard to detect, prevent, and prosecute.

There are many ways people can protect themselves, their identities and secure their personal information; many do not concern themselves with this knowledge, however, until they become victims of this crime, themselves. With advances in technology, offenders are often turning to new methods to access information and use it for ...


Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi May 2011

Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.

Keywords: Cloud Forensics, Cloud Computing, Digital Forensics, Survey, Cloud Forensic Capability


Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld May 2011

Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to recover forensic artifacts from mobile devices is proving to be an ever-increasing challenge for investigators. Coupling this with the ubiquity of mobile devices and the increasing complexity and processing power they contain results in a reliance on them by suspects. In investigating Apple’s iOS devices -- namely the iPhone and iPad -- an investigator’s challenges are increased due to the closed nature of the platforms. What is left is an extremely powerful and complex mobile tool that is inexpensive, small, and can be used in suspect activities. Little is known about the internal data structures of the ...


Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt May 2011

Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to the ubiquitous use of smartphones, these devices become an increasingly important source of digital evidence in forensic investigations. Thus, the recovery of digital traces from smartphones often plays an essential role for the examination and clarification of the facts in a case. Although some tools already exist regarding the examination of smartphone data, there is still a strong demand to develop further methods and tools for forensic extraction and analysis of data that is stored on smartphones. In this paper we describe specifications of smartphones running Android. We further introduce a newly developed tool – called ADEL – that is ...


Kindle Forensics: Acquisition & Analysis, Peter Hannay May 2011

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader


Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis May 2011

Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis

Annual ADFSL Conference on Digital Forensics, Security and Law

The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.

The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in ...


Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston May 2011

Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston

Annual ADFSL Conference on Digital Forensics, Security and Law

Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost ...


Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay May 2011

Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these ...


Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton May 2011

Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton

Annual ADFSL Conference on Digital Forensics, Security and Law

We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across ...


Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara May 2011

Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara

Annual ADFSL Conference on Digital Forensics, Security and Law

If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about ...


Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker May 2011

Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker

Annual ADFSL Conference on Digital Forensics, Security and Law

Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as ...


Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo May 2011

Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo

Annual ADFSL Conference on Digital Forensics, Security and Law

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so ...


Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman May 2011

Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques ...