Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 232

Full-Text Articles in Law

Trending @ Rwu Law: Julia Wyman's Post: The Threat Of Marine Debris 12-13-2016, Julia Wyman Dec 2016

Trending @ Rwu Law: Julia Wyman's Post: The Threat Of Marine Debris 12-13-2016, Julia Wyman

Law School Blogs

No abstract provided.


Science & Policy Issues Surrounding The Project, Emily Tucker, Patrick Harner Dec 2016

Science & Policy Issues Surrounding The Project, Emily Tucker, Patrick Harner

Virginia Coastal Policy Center Annual Conference

No abstract provided.


Sustainable Water Initiative For Tomorrow (Swift) Wastewater Injection Project, Ted Henifin, Charles Bott Dec 2016

Sustainable Water Initiative For Tomorrow (Swift) Wastewater Injection Project, Ted Henifin, Charles Bott

Virginia Coastal Policy Center Annual Conference

No abstract provided.


Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt Nov 2016

Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt

BYU Law Review

One of the fundamental goals of law is to end disputes. This push to “settlement” is foundational and has historically worked to increase societal efficiency and justice by engendering legitimate expectations among the citizenry. However, the efficient nature of much legal finality, settlement and repose only exists against a background of evolution of the physical environment that is predictable and slowpaced. That background no longer exists. The alteration of the physical world, and thus, the background for our societal structure and decisions, is accelerating rapidly due to human-caused climate change. This creates a mismatch between the law’s tendency to finality …


Ijns Masthead Nov 2016

Ijns Masthead

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor - Choe, Kwan Kyoo Choe Nov 2016

Letter From The Editor - Choe, Kwan Kyoo Choe

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor - Frahi-Amroun, Akila Frahi-Amroun Nov 2016

Letter From The Editor - Frahi-Amroun, Akila Frahi-Amroun

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor - Hirst, Russel K. Hirst Nov 2016

Letter From The Editor - Hirst, Russel K. Hirst

International Journal of Nuclear Security

No abstract provided.


Call For Submission Nov 2016

Call For Submission

International Journal of Nuclear Security

No abstract provided.


Security Culture And Its Self-Assessment As Supplementary Tools For Nuclear Security Training, Igor Khripunov, Sara Z. Kutchesfahani, Khairul -. Khairul - Nov 2016

Security Culture And Its Self-Assessment As Supplementary Tools For Nuclear Security Training, Igor Khripunov, Sara Z. Kutchesfahani, Khairul -. Khairul -

International Journal of Nuclear Security

Security Culture and its Self-Assessment as Supplementary Tools for Nuclear Security Training

Igor Khripunov, PhD

Center for International Trade and Security, University of Georgia (USA)

Sara Z. Kutchesfahani, PhD

Center for International Trade and Security, University of Georgia (USA)

Khairul Khairul

National Nuclear Energy Agency of Indonesia (BATAN)

Abstract

Nuclear security culture – an emerging and widely recognized practice – serves as a means to support and enhance nuclear security. In fact, many International Atomic Energy Agency (IAEA) publications and the Nuclear Security Summits have highlighted the vital role of nuclear security culture and raised its status to the same …


Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed Nov 2016

Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed

International Journal of Nuclear Security

Bangladesh uses category I of nuclear materials and category 1-5 of radioactive materials in the field of research, medical and industries. The Government is going to implement its first nuclear power plant under an IGA between the Bangladesh and Russian Governments. With the emerging global nuclear and radiological terrorism by potential adversaries, enhancing nuclear security is the paramount importance for the country. The paper has found no established communication channels among stakeholders in order to work in a coordinated and collaborative manner for strengthening the nuclear security. This has resulted lacking importance of education, research, training and knowledge management initiatives …


Call For The Student Writing Competition Nov 2016

Call For The Student Writing Competition

International Journal of Nuclear Security

No abstract provided.


Table Of Contents Nov 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


1975, Bulletin No. 118, California's Ground Water, Department Of Water Resources Nov 2016

1975, Bulletin No. 118, California's Ground Water, Department Of Water Resources

State and Federal Documents Relating to Monterey and San Luis Obispo Counties

The Bulletin summarizes known technical information on ground water basins in California and the extent of their water supplies throughout the State. It also discusses the ways in which ground water basins have been used and missue in the past and suggests better management mechanisms for the future.


Promoting Excellence And Demonstrated Competence For Nuclear Security Training, Daniel Johnson, Brunelle Battistella, Roger Howsley Nov 2016

Promoting Excellence And Demonstrated Competence For Nuclear Security Training, Daniel Johnson, Brunelle Battistella, Roger Howsley

International Journal of Nuclear Security

The international community has spent considerable time, money, and effort attempting to establish a series of national and regional Centres of Excellence (COEs), also known as Nuclear Security Training and Support Centres (NSSCs). These Centres tend to have a wide variety of objectives, structures, and methods of delivery. Unsurprisingly, no internationally accepted standard exists on how they should operate. The IAEA has produced some excellent guidance (TECDOC 1734), but by virtue of its role cannot provide standards for benchmarking success. Against this backdrop, the World Institute for Nuclear Security (WINS) launched the WINS Academy, an initiative to provide practitioners with …


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


Building The Education And Training Pillar Of The University Of Tennessee’S Institute For Nuclear Security, Howard Lewis Hall Nov 2016

Building The Education And Training Pillar Of The University Of Tennessee’S Institute For Nuclear Security, Howard Lewis Hall

International Journal of Nuclear Security

The University of Tennessee (UT) developed its first formal and coordinated efforts in nuclear security education in 2008-2009 with its graduate certificate program in nuclear security in the Department of Nuclear Engineering. Building on this work, in 2011 UT established the UT Institute for Nuclear Security (INS) as a collaborative center at the university to expand its curricular impact as well as foster research and partnerships with nearby major governmental facilities engaged in nuclear security work. Oak Ridge National Laboratory (ORNL), the Y-12 National Security Complex (Y-12), and Oak Ridge Associated Universities (ORAU) have joined with UT as charter members …


Nuclear Security Education At Pakistan Institute Of Engineering And Applied Sciences (Pieas): Current Status, Future Prospects And The Lessons Learnt, Tariq Majeed Dr. Nov 2016

Nuclear Security Education At Pakistan Institute Of Engineering And Applied Sciences (Pieas): Current Status, Future Prospects And The Lessons Learnt, Tariq Majeed Dr.

International Journal of Nuclear Security

In this paper, the details of nuclear security education at Pakistan Institute of Engineering and Applied Sciences (PIEAS) have been discussed. Nuclear Security education was initiated at PIEAS as a sub-specialty of its MS Nuclear Engineering Program in October 2009. Two courses, Nuclear Security (NE-581) and Physical Protection Systems (NE-582) have been offered on regular basis in the 3rd and 4th semesters. To date, 72 students have been graduated with this sub-specialty. The most important lesson learnt is that introduction of nuclear security related courses in nuclear engineering program has opened up new venues of applications of nuclear …


Challenges And Responses For Ensuring Sustainability Of Insa Training Programs, Jongsook Kim, Hyung-Kyung Lee, Jin-Young Lee Nov 2016

Challenges And Responses For Ensuring Sustainability Of Insa Training Programs, Jongsook Kim, Hyung-Kyung Lee, Jin-Young Lee

International Journal of Nuclear Security

Providing a systematic training is critical for a state or international perspective to reinforce nuclear security regime nationally or internationally. Korea government recognizes the importance of such challenge, and established the INSA under the KINAC as a Center of Excellence for fostering national nuclear security capacity and contributing international nuclear security governance. INSA started with the government policy that the establishment of sustainable education and training infrastructure and processes is fundamental to the capacity building strategy. After established, INSA has been designing and delivering the domestic and international/regional training programs for the purpose of fostering human resources development in nuclear …


Nuclear Security And Hrd - Viet Nam’S Effort, Nu-Hoai-Vi Nguyen, Tan Huu Vuong Nov 2016

Nuclear Security And Hrd - Viet Nam’S Effort, Nu-Hoai-Vi Nguyen, Tan Huu Vuong

International Journal of Nuclear Security

Viet Nam is expanding its nuclear energy program for the application in various areas including industries, agriculture, healthcare, education and research. Recognizing the importance of the nineteen issues laid out in the IAEA document “Milestones in Development of a National Infrastructure for Nuclear Power” [1], Vietnam is considering how to address these issues. This paper describes the establishment of nuclear security infrastructure in Viet Nam and how Viet Nam has addressed one of the nineteen issues, that is human resource development in nuclear energy in general and in nuclear security in particular.


Space Traffic Management Concepts Leveraging Existing Frameworks, Stephen K. Hunter Nov 2016

Space Traffic Management Concepts Leveraging Existing Frameworks, Stephen K. Hunter

Space Traffic Management Conference

Leveraging existing U.S. regulatory frameworks, as well as international organizations, will dramatically shorten the time needed to develop an effective Space Traffic Management concept. Both the Department of Defense and the Department of Transportation have been working with the U.S. Congress to define and develop a Space Traffic Management concept that will allow the Office of Commercial Space Launch to begin a new mission that will help to ensure the safety and resilience of the space domain. Outside observers can easily see forward progress toward this, still, undeveloped concept. This paper explores potential final U.S. Space Traffic Management concepts that …


The 2016 Stormwater Bill: An Analysis Of Perceived And Real Problems With Proposed Solutions, Jonathon R. Lubrano, Elizabeth A. Andrews, Roy A. Hoagland Nov 2016

The 2016 Stormwater Bill: An Analysis Of Perceived And Real Problems With Proposed Solutions, Jonathon R. Lubrano, Elizabeth A. Andrews, Roy A. Hoagland

Virginia Coastal Policy Center

No abstract provided.


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano Oct 2016

Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano

Tracy Mitrano

The San Bernardino iPhone case burst on the scene as I was nearing the completion of this manuscript. I could not have imagined a better scenario to sum up the issues of free speech, privacy, intellectual property and security than this case. Not least because the San Bernardino Apple iPhone case generated considerable public interest and policy debate in the United States and abroad. At stake are issues such as the balance between national security and personal privacy, tensions between global technology companies and domestic law enforcement, and the potential supremacy of technology -- particularly encryption -- over traditional notions …


Chapter Four: Information Security, Tracy Mitrano Oct 2016

Chapter Four: Information Security, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter One: Free Speech, Tracy Mitrano Oct 2016

Chapter One: Free Speech, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Two: Privacy, Tracy Mitrano Oct 2016

Chapter Two: Privacy, Tracy Mitrano

Tracy Mitrano

"Free speech" and "privacy" operate as integral, essential supporting values that underpin the missions of colleges and universities in the United States. Chapter One focused attention on free speech. Many of the same arguments could be made by and for privacy. It would be interesting to subject the same content about free speech to a global "find and replace" function for the applicable legal and policy points between them! Nonetheless, US law separates these two areas. Therefore, this chapter will focus on privacy law in particular: government surveillance and consumer privacy. Both subsets of privacy law, I will argue, have …


Chapter Three: Intellectual Property, Tracy Mitrano Oct 2016

Chapter Three: Intellectual Property, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge Oct 2016

Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge

Annual ADFSL Conference on Digital Forensics, Security and Law

The ubiquity of small scale digital devices (SSDD), the public’s ever increasing societal dependence on SSDD, and the continual presence of SSDD at all types of crime scenes, including non-technical and violent crimes, demand a formalized curriculum for the education and training of future cyber forensic examiners. This paper presents the various SSDD forensics labs currently in use and under development for future use at the Purdue University Cyber Forensics Laboratory. The primary objective of each module is to provide specific real-world cases for the learning, comprehension, and understanding of hands-on investigative techniques and methodologies. The purpose of this paper …


Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos Oct 2016

Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos

Annual ADFSL Conference on Digital Forensics, Security and Law

There are ad-hoc guidelines and a limited policy on computer incident response that does not include computer forensic preparation procedures (e.g. logging incidents). In addition, these guidelines do not consider the requirement of Islamic law for admissible evidence at an organisational level in Saudi Arabia. Network forensic investigation might breach the Saudi law if they follow ad-hoc or international digital forensic standards such as Association of Chief Police Officers (ACPO) guidelines. This might put the organisation in a costly situation when a malicious employee sues an Islamic court. This is because the law of Saudi Arabia is complying with Islamic …